International Journal of Computational Intelligence Systems

ISSN: 1875-6883
Volume 10, Issue 1, Jan-Dec 2017
Giovanna Castellano, Ciro Castiello, Vincenzo Pasquadibisceglie, Gianluca Zaza
Pages: 13 - 22
This paper introduces FISDeT, a tool to support the design of Fuzzy Inference Systems, composed of a set of Python modules sharing the standard specification language FCL used for FIS definition. FISDeT includes a graphical user interface that enables easy definition and quick update of elements composing the...
Laura Cruz-Reyes, Eduardo Fernandez, Nelson Rangel-Valdez
Pages: 56 - 77
A priori incorporation of the decision maker’s preferences is a crucial issue in many-objective evolutionary optimization. Some approaches characterize the best compromise solution of this problem through fuzzy outranking relations; however, they require the elicitation of a large number of parameters...
Pilar Gómez, Antonio Partal, Macarena Espinilla
Pages: 78 - 89
The guidelines published by the European Banking Authority in 2015 about the contributions to the Deposit Guarantee Systems, establish two approaches to classify the member entities’ risk: the bucket method and the sliding scale method, allowing freedom to every Member State to decide which methodology...
Guangji Yu
Pages: 90 - 103
Soft set theory is a new mathematical tool to deal with uncertain problems. Since soft sets are defined by mappings and they lack “points”, managing them is not convenient. In this paper, the concept of soft points is introduced and the relationship between soft points and soft sets is investigated....
Puneet Tiwari, Jainy Sachdeva, Chirag Kamal Ahuja, Niranjan Khandelwal
Pages: 104 - 119
The iso, hypo or hyper intensity, similarity of shape, size and location complicates the identification of brain tumors. Therefore, an adequate Computer Aided Diagnosis (CAD) system is designed for classification of brain tumor for assisting inexperience radiologists in diagnosis process. A multifarious...
Wei Yang, Yongfeng Pang, Jiarong Shi
Pages: 120 - 139
In this paper, several cross-entropy measures for linguistic hesitant intuitionistic fuzzy information have been developed which integrating cross-entropy measures of intuitionistic fuzzy sets and hesitant fuzzy linguistic sets. Some desirable properties of new cross-entropy measures have been studied....
Sanjeevikumar Padmanaban, Gabriele Grandi, Frede Blaabjerg, Pat Wheeler, Pierluigi Siano, Manel Hammami
Pages: 140 - 152
Classical DC-DC converters used in high voltage direct current (HVDC) power transmission systems, lack in terms of efficiency, reduced transfer gain and increased cost with sensor (voltage/current) numbers. Besides, the internal self-parasitic behavior of the power components reduces the output voltage...
Masoud Rohani, Hooshang Jazayeri-Rad, Reza Mosayebi Behbahani
Pages: 165 - 175
Acid gas removal (AGR) units are widely used to remove CO2 and H2S from sour gas streams in natural gas processing. When foaming occurs in an AGR system, the efficiency of the process extremely decreases. In this paper, a novel approach is suggested to regularly predict the gas...
Javier Cózar, José M. Puerta, José A. Gámez
Pages: 176 - 195
Bayesian networks have been widely used for classification problems. These models, structure of the network and/or its parameters (probability distributions), are usually built from a data set. Sometimes we do not have information about all the possible values of the class variable, e.g. data about...
Ramalingaswamy Cheruku, Damodar Reddy Edla, Venkatanareshbabu Kuppili
Pages: 247 - 265
Diabetes is one of the foremost causes for the increase in mortality among children and adults in recent years. Classification systems are being used by doctors to analyse and diagnose the medical data. Radial basis function neural networks are more attractive for classification of diseases, especially...
Shyam Prasad P.M., Radhika Swarnkar, Mohammad Farukh Hashmi, Avinash G. Keskar
Pages: 266 - 276
A speller is a communication device designed for those suffering from neuromuscular disorders having difficulty to speak. An EMG based design is proposed which uses eye blinks for character selection that offers high accuracy and more comfort to the user. The eye blink signals are feature extracted...
Xibei Yang, Suping Xu, Huili Dou, Xiaoning Song, Hualong Yu, Jingyu Yang
Pages: 277 - 292
A simple multigranulation rough set approach is to approximate the target through a family of binary relations. Optimistic and pessimistic multigranulation rough sets are two typical examples of such approach. However, these two multigranulation rough sets do not take frequencies of occurrences of...
Behnam Vahdani, S. Meysam Mousavi, R. Tavakkoli-Moghaddam, H. Hashemi
Pages: 293 - 311
In sustainable supply chain networks, companies are obligated to have a systematic decision support system in place to help it adopt right decisions at right times. Among strategic decisions, supplier selection and evaluation outranks other decisions in terms of importance due to its long-term impacts....
José Alejandro Lugo García, Anié Bermudez Peña, Pedro Yobanis Piñero Pérez, Rafael Bello Pérez
Pages: 320 - 335
Project monitoring and control by using key performance indicators has become a widespread method for decisionmaking in project-oriented organizations. However, the current schools and IT tools created for this purpose require an upgrade in design due to imprecision, vagueness or uncertainty present...
Debasish Majumder, Subhashis Sahu, Animesh Biswas
Pages: 347 - 362
In this article assessment of morningness of individuals has been performed using fuzzy reasoning approach. The responses are quantified using fuzzy numbers. Based on experts’ opinion a fuzzy rule-base is prepared. The model is validated by considering responses of some students, selected randomly,...
José Sanz, Javier Fernandez, Humberto Bustince, Carlos Gradin, Mariano Fortún, Tomás Belzunegui
Pages: 440 - 455
Survival prediction of poly-trauma patients measure the quality of emergency services by comparing their predictions with the real outcomes. The aim of this paper is to tackle this problem applying C4.5 since it achieves accurate results and it provides interpretable models. Furthermore, we use sampling...
Huchang Liao, Zhimin Li, Xiao-Jun Zeng, Weishu Liu
Pages: 456 - 469
Intuitionistic fuzzy preference relation (IFPR), which express experts’ preferences from the preferred, the nonpreferred and the indeterminate aspects, has turned out to be an efficient tool in describing the rough and subjective opinions of experts. This paper focuses on the consensus measures for...
Ahmad Jafarian, Fariba Rostami, Alireza K. Golmankhaneh, Dumitru Baleanu
Pages: 470 - 480
Indeed, interesting properties of artificial neural networks approach made this non-parametric model a powerful tool in solving various complicated mathematical problems. The current research attempts to produce an approximate polynomial solution for special type of fractional order Volterra integrodifferential equations....
Lu Wang, Chong Wu
Pages: 507 - 520
It is very important to enhance the accuracy of financial crisis prediction (FCP). Because the traditional probabilistic neural network (PNN) has some deficiencies, such as the difficult estimation of parameters and the high computational complexity, this paper proposes a new combination model, which...
Yaya Liu, Junfang Luo, Bing Wang, Keyun Qin
Pages: 569 - 592
In this work, the axiomatical definition of similarity measure, distance measure and inclusion measure for interval-valued intuitionistic fuzzy soft set (IVIFSSs) are given. An axiomatical definition of entropy measure for IV IFSSs based on distance is firstly proposed, which is consistent with the...
Chao Yang, Donghua Zhu, Xuefeng Wang
Pages: 593 - 604
A Subject-Action-Object (SAO) is a triple structure which can be used to both describe topics in detail and explore the relationship between them. SAO analysis has become popular in bibliometrics, however there are two challenges in the identification of SAO structures: low relevance of SAOs to domain...
V. Mohagheghi, S.M. Mousavi, M. Aghamohagheghi, B. Vahdani
Pages: 605 - 626
Selecting transport project to invest is an important task. This paper offers a new sustainable transport investment selection approach that applies interval-valued fuzzy sets (IVFSs) to address uncertainty. Relative preference relation is employed to address importance of criteria. Judgments of experts...
Jorge Gálvez, Erik Cuevas, Omar Avalos
Pages: 627 - 646
This paper proposes a new algorithm called Multimodal Flower Pollination Algorithm (MFPA). Under MFPA, the original Flower Pollination Algorithm (FPA) is enhanced with multimodal capabilities in order to find all possible optima in an optimization problem. The performance of the proposed MFPA is compared...
Yanmin Liu, Hua Zhao, Zeshui Xu
Pages: 663 - 676
In this paper, we investigate the cluster techniques of hesitant fuzzy information. Consider that the distance measure is one of the most widely used tools in clustering analysis, we first point out the weakness of the existing distance measures for hesitant fuzzy sets (HFSs), and then put forward...
Yi-Chih Hsieh, Peng-Sheng You
Pages: 677 - 689
We present a new multiple-type museum visitor routing problem (MT-MVRP) in which a museum’s exhibition rooms are classified into must-see and select-see rooms. A novel encoding scheme is proposed to simultaneously determine the scheduling of rooms for all of the groups and an immune based evolutionary...
Ali Fahmi, Kemal Burc Ulengin, Cengiz Kahraman
Pages: 690 - 710
Almost all the worldwide and nationwide companies utilize advertising to increase their sales volume and profit. These companies pay millions of dollars to reach consumers and announce their products or services. This forces companies to evaluate advertising effects and check whether ads meet companys strategies....
Biswajit Sarkar, Sovan Samanta
Pages: 711 - 720
Graphs are the backbone of many real systems like social networks, image segmentation, scheduling, etc. To input uncertainty to such systems, generalized fuzzy graphs are used. Generalized fuzzy tree is one generalized fuzzy subgraph of a generalized fuzzy graph which characterizes the whole graph....
Abbas Parchami, Sezi Çevik Onar, Başar Öztayşi, Cengiz Kahraman
Pages: 721 - 733
In some cases, the specification limits of a quality characteristic should be defined under uncertain information. In the literature, process capability analyses have been handled by using type-1 fuzzy sets under fuzziness up to now. In this paper, we develop the concept of type-2 fuzzy quality and...
Narges Shafaei Bajestani, Ali Vahidian Kamyad, Assef Zare
Pages: 734 - 744
The type-2 fuzzy logic system permits us to model uncertainties existing in membership functions. Accordingly, this study aims to propose a linear and a piecewise framework for an interval type-2 fuzzy regression model based on the existing possibilistic models. In this model, vagueness is minimized,...
Patrick Glauner, Jorge Augusto Meira, Petko Valtchev, Radu State, Franck Bettinger
Pages: 760 - 775
Detection of non-technical losses (NTL) which include electricity theft, faulty meters or billing errors has attracted increasing attention from researchers in electrical engineering and computer science. NTLs cause significant harm to the economy, as in some countries they may range up to 40% of the...
Raciel Yera, Luis Martínez
Pages: 776 - 803
Recommender systems are currently successful solutions for facilitating access for online users to the information that fits their preferences and needs in overloaded search spaces. In the last years several methodologies have been developed to improve their performance. This paper is focused on developing...
Jian Yao, Weiping Wang, Zhifei Li, Yonglin Lei, Qun Li
Pages: 804 - 814
Engagement-level simulation is a quantitative way to evaluate the effectiveness of weapon systems before construction and acquisition, minimizing the risk of investment. Though contractors have built simulation systems with high fidelity models of weapon systems and battlefields, developing competent...
Saleem Abdullah, Sanam Ayub, Iqtadar Hussain, Benjamin Bedregal, Muhammad Yaqub Khan
Pages: 851 - 865
Decision making implies selection of the best decision from a set of possible options. In some cases, this selection is based on past experience. Past experience is used to analyse the situations and the choice made in these situations. The aim of this work is to analyse the strength of the nonlinear...
Nihat Kasap, Berna Tektaş Sivrikaya, Hasan Hüseyin Turan, Dursun Delen
Pages: 866 - 881
In this research, we study a cost minimization problem for a firm that acquires capacity from providers to accomplish daily operations on telecommunication networks. We model the related optimization problem considering quality of service and capacity requirements and offer a solution approach based...
Vangelis Marinakis, Haris Doukas, Evangelos Spiliotis, Ilias Papastamatiou
Pages: 882 - 893
The main objective of this paper is to present a transparent Decision Support System (DSS) for the energy managers of buildings, which can assist them in setting indoor temperature set point, based on the feedback received by the occupants. Within the proposed DSS, the Thermal Comfort Validator (TCV)...
Mahdi Alinaghian, Alireza Goli
Pages: 894 - 913
In this paper, an uncertain integrated model for simultaneously locating temporary health centers in the affected areas, allocating affected areas to these centers, and routing to transport their required good is considered. Health centers can be settled in one of the affected areas or in a place out...
Vijayalakshmi G.V. Mahesh, Alex Noel Joseph Raj, Zhun Fan
Pages: 936 - 950
The paper proposes a method using convolutional neural network to effectively evaluate the discrimination between face and non face patterns, gender classification using facial images and facial expression recognition. The novelty of the method lies in the utilization of the initial trainable convolution...
Zou Beiji, Nurudeen Mohammed, Zhu Chengzhang, Zhao Rongchang
Pages: 962 - 969
This paper presents a new approach to crime hotspot detection and monitoring. The approach consists of three phases’ namely: video analysis, crime prediction and crime mapping. In video analysis, crime indicator events are modelled using statistical distribution of semantic concepts. In crime prediction,...
Guiqing Zhang, Yuzhu Wu, Yucheng Dong
Pages: 970 - 985
The hesitant fuzzy linguistic term set (HFLTS) and the linguistic distribution (LD) are becoming popular tools to describe decision makers’ linguistic preferences. By combining HFLTS and LD, this paper proposes a new concept called hesitant linguistic distribution (HLD), and then presents the transformation...
Ze-Ling Wang, Jian-Xin You, Hu-Chen Liu, Song-Man Wu
Pages: 1002 - 1015
Failure mode and effect analysis (FMEA) is a risk management technique frequently applied to enhance the system performance and safety. In recent years, many researchers have shown an intense interest in improving FMEA due to inherent weaknesses associated with the classical risk priority number (RPN)...
Chunli Wu, Hanbing Liu, Xuxi Qin, Guojin Tan, Zhengwei Gu
Pages: 1066 - 1081
For the damage identification technique of civil structures, the reduction of the computational cost for methods based on the optimization algorithms is the most crucial step. In this study, a fast multi-stage method is developed that uses the multiple damage location assurance criterion and an improved...
Nihan Çetin Demirel, Muhammet Deveci
Pages: 1082 - 1101
This study examines the crew pairing problem, which is one of the most comprehensive problems encountered in airline planning, to generate a set of crew pairings that has minimal cost, covers all flight legs and fulfils legal criteria. In addition, this study examines current research related to crew...
Chibing Gong
Pages: 1102 - 1115
This paper proposes a novel performance enhanced Jaya algorithm with a two group adaption (E-Jaya). Two improvements are presented in E-Jaya. First, instead of using the best and the worst values in Jaya algorithm, EJaya separates all candidates into two groups: the better and the worse groups based...
Yuxuan Gao, Yueping Du, Bingzhen Sun, Rui Wang, Chaoying Jiang
Pages: 1132 - 1148
This study applies the game theory to the discussion and analysis of trans-regional Telemedicine System, builds the game model of the selection strategies of trans-regional hospitals and patients and analyzes evolving paths, equilibrium states and influencing factors of the three parties. It is derived...
Javier Arellano-Verdejo, Salvador Godoy-Calderon, Federico Alonso-Pecina, Adolfo Guzmáan Arenas, Marco Antonio Cruz-Chavez
Pages: 1186 - 1197
In this paper a coarse-grain execution model for evolutionary algorithms is proposed and used for solving numerical and combinatorial optimization problems. This model does not use migration as the solution dispersion mechanism, in its place a more efficient population-merging mechanism is used that...
Abdul Halim Abdul Latiff, Deva Prasad Ghosh, Nurul Mu’azzah Abdul Latiff
Pages: 1198 - 1210
Many hydrocarbon explorations in mature fields have been severely affected by complex and overburdening issues, such as shallow gas accumulation, gas pockets, and gas seepage. In this work, a new forward modelling technique is proposed in evaluating the potential survey design for fields affected by...
Alberto Fernández, Abdulrahman Altalhi, Saleh Alshomrani, Francisco Herrera
Pages: 1211 - 1225
The significance of addressing Big Data applications is beyond all doubt. The current ability of extracting interesting knowledge from large volumes of information provides great advantages to both corporations and academia. Therefore, researchers and practitioners must deal with the problem of scalability...
Isaac Triguero, Sergio González, Jose M. Moyano, Salvador García, Jesús Alcalá-Fdez, Julián Luengo, Alberto Fernández, Maria José del Jesús, Luciano Sánchez, Francisco Herrera
Pages: 1238 - 1249
This paper introduces the 3rd major release of the KEEL Software. KEEL is an open source Java framework (GPLv3 license) that provides a number of modules to perform a wide variety of data mining tasks. It includes tools to perform data management, design of multiple kind of experiments, statistical analyses,...
P. SrideviPonmalar, V. Jawahar Senthil Kumar, R. Harikrishnan
Pages: 1263 - 1271
Localization is one of the key issues in wireless sensor networks. Several algorithms and techniques have been introduced for localization. Localization is a procedural technique of estimating the sensor node location. In this paper, a novel three hybrid algorithms based on firefly is proposed for localization...
Niklas Karvonen, Lara Lorna Jimenez, Miguel Gomez Simon, Joakim Nilsson, Basel Kikhia, Josef Hallberg
Pages: 1272 - 1279
Computational intelligence is often used in smart environment applications in order to determine a user’s context. Many computational intelligence algorithms are complex and resource-consuming which can be problematic for implementation devices such as FPGA:s, ASIC:s and low-level microcontrollers. These...
Marta Bautista-Durán, Joaquín García-Gómez, Roberto Gil-Pita, Inma Mohíno-Herranz, Manuel Rosa-Zurera
Pages: 1298 - 1305
Violence detection represents an important issue to take into account in the design of intelligent algorithms for smart environments. This paper proposes an energy-efficient system capable of acoustically detecting violence. In our solution, genetic algorithms are used to select the best subset of features...
José Á. Concepción-Sánchez, Pino Caballero-Gil, Jezabel Molina-Gil
Pages: 1306 - 1313
Gender violence is one of the most serious and widespread problems in our society. In dangerous cases, the use of special devices for GPS tracing is recommended in some countries. However, these devices are used only in extreme cases and have many drawbacks. This work describes a new system to combat...
Yanxia Sun, Zenghui Wang
Pages: 1316 - 1329
Topology plays an important role for Particle Swarm Optimization (PSO) to achieve good optimization performance. It is difficult to find one topology structure for the particles to achieve better optimization performance than the others since the optimization performance not only depends on the searching...
Chen Hong, Nai-Yu Yin, Ning He, Oriol Lordan, Jose Maria Sallan
Pages: 1330 - 1336
Network robustness against cascades is a major topic in the fields of complex networks. In this paper, we propose an attack-cost-based cascading failure model, where the attack cost of nodes is positively related to its degree. We compare four attacking strategies: the random removal strategy (RRS),...
Su Yan, Kaiquan Cai, Majed Swaid
Pages: 1345 - 1354
Although conventional multi-objective evolutionary optimization algorithms (MOEAs) are proven to be effective in general, they are less superior when applied to solve a large-scale combinational real-world optimization problem with tightly coupled decision variables. For the purpose to enhance the capability...
Bowen Kan, Wendong Zhu, Guangyi Liu, Xi Chen, Di Shi, Weiqing Yu
Pages: 1355 - 1363
We introduce a new method for storing, modeling, and analyzing power grid data. First, we present an architecture for building the network model for a power grid using the open source graph database Neo4j. Second, we design single- and multi-threading systems for initial energization analysis of the...