Pasi Luukka, Mikael Collan
Pages: 1 - 12
Histograms are an intuitively understandable tool for graphically presenting frequency data that is available for and
useful in modern data-analysis, this also makes comparing histograms an interesting field of research. The concept
of similarity and similarity measures have been gaining in importance,...
Giovanna Castellano, Ciro Castiello, Vincenzo Pasquadibisceglie, Gianluca Zaza
Pages: 13 - 22
This paper introduces FISDeT, a tool to support the design of Fuzzy Inference Systems, composed of a
set of Python modules sharing the standard specification language FCL used for FIS definition. FISDeT
includes a graphical user interface that enables easy definition and quick update of elements composing
Hassan Ghiti Sarand, Bahram Karimi
Pages: 23 - 33
This paper addresses a robust adaptive control problem of non-square nonlinear systems with unmeasurable states.
The systems are assumed to be multi-input/multi-output subject to dynamical uncertainties and external
disturbances. The approach is studied for two cases, i.e., underactuated and over-actuated...
Pages: 34 - 55
Effective query expansion terms selection methods are really very important for improving the accuracy and
efficiency of Pseudo-Relevance Feedback (PRF) based automatic query expansion techniques in information
retrieval system. These methods remove irrelevant and redundant terms from the top retrieved...
Laura Cruz-Reyes, Eduardo Fernandez, Nelson Rangel-Valdez
Pages: 56 - 77
A priori incorporation of the decision maker’s preferences is a crucial issue in many-objective evolutionary
optimization. Some approaches characterize the best compromise solution of this problem through fuzzy outranking
relations; however, they require the elicitation of a large number of parameters...
Pilar Gómez, Antonio Partal, Macarena Espinilla
Pages: 78 - 89
The guidelines published by the European Banking Authority in 2015 about the contributions to the Deposit
Guarantee Systems, establish two approaches to classify the member entities’ risk: the bucket method and the
sliding scale method, allowing freedom to every Member State to decide which methodology...
Pages: 90 - 103
Soft set theory is a new mathematical tool to deal with uncertain problems. Since soft sets are defined
by mappings and they lack “points”, managing them is not convenient. In this paper, the concept of
soft points is introduced and the relationship between soft points and soft sets is investigated....
Puneet Tiwari, Jainy Sachdeva, Chirag Kamal Ahuja, Niranjan Khandelwal
Pages: 104 - 119
The iso, hypo or hyper intensity, similarity of shape, size and location complicates the identification of
brain tumors. Therefore, an adequate Computer Aided Diagnosis (CAD) system is designed for classification
of brain tumor for assisting inexperience radiologists in diagnosis process. A multifarious...
Wei Yang, Yongfeng Pang, Jiarong Shi
Pages: 120 - 139
In this paper, several cross-entropy measures for linguistic hesitant intuitionistic fuzzy information have
been developed which integrating cross-entropy measures of intuitionistic fuzzy sets and hesitant fuzzy
linguistic sets. Some desirable properties of new cross-entropy measures have been studied....
Sanjeevikumar Padmanaban, Gabriele Grandi, Frede Blaabjerg, Pat Wheeler, Pierluigi Siano, Manel Hammami
Pages: 140 - 152
Classical DC-DC converters used in high voltage direct current (HVDC) power transmission systems, lack in terms of efficiency, reduced transfer gain and increased cost with sensor (voltage/current) numbers. Besides, the internal self-parasitic behavior of the power components reduces the output voltage...
M. Muñoz, E. Miranda, P.J. Sánchez
Pages: 153 - 164
The calculation of the premium cost of an option exchange is usually computed by the different mathematical
models that obtain the degree of uncertainty in the financial market by Black-Scholes method though such a degree
is inaccurate. In order to improve the management of uncertainty the use of fuzzy...
Masoud Rohani, Hooshang Jazayeri-Rad, Reza Mosayebi Behbahani
Pages: 165 - 175
Acid gas removal (AGR) units are widely used to remove CO2 and H2S from sour gas streams in natural gas
processing. When foaming occurs in an AGR system, the efficiency of the process extremely decreases. In this
paper, a novel approach is suggested to regularly predict the gas...
Javier Cózar, José M. Puerta, José A. Gámez
Pages: 176 - 195
Bayesian networks have been widely used for classification problems. These models, structure of the
network and/or its parameters (probability distributions), are usually built from a data set. Sometimes we
do not have information about all the possible values of the class variable, e.g. data about...
Animesh Biswas, Nilkanta Modak
Pages: 196 - 211
In this article a fuzzy multiobjective chance constrained programming model is used for modeling and solving land
allocation problems efficiently with the help of fuzzy goal programming. Optimal production of seasonal crops and
related expenditures are considered from the viewpoint of proper utilization...
Junfang Luo, Yaya Liu, Keyun Qin, Heng Ding
Pages: 212 - 233
The incremental updating of lower and upper approximations under the variation of information systems
is an important issue in rough set theory. Many incremental updating approaches with respect to different
kinds of indiscernibility relations have been proposed. The grade indiscernibility relation...
Manoj Kumar, Charul Bhatnagar
Pages: 234 - 246
In the current era, crowd behavior analysis is important topic due to the significance of video surveillance in the
public area. Literature presents a handful of works for crowd behavior detection and analysis. Even though, the
complicated challenges such as, low quality video, wide variation in the...
Ramalingaswamy Cheruku, Damodar Reddy Edla, Venkatanareshbabu Kuppili
Pages: 247 - 265
Diabetes is one of the foremost causes for the increase in mortality among children and adults in recent
years. Classification systems are being used by doctors to analyse and diagnose the medical data. Radial
basis function neural networks are more attractive for classification of diseases, especially...
Shyam Prasad P.M., Radhika Swarnkar, Mohammad Farukh Hashmi, Avinash G. Keskar
Pages: 266 - 276
A speller is a communication device designed for those suffering from neuromuscular disorders having difficulty to
speak. An EMG based design is proposed which uses eye blinks for character selection that offers high accuracy
and more comfort to the user. The eye blink signals are feature extracted...
Xibei Yang, Suping Xu, Huili Dou, Xiaoning Song, Hualong Yu, Jingyu Yang
Pages: 277 - 292
A simple multigranulation rough set approach is to approximate the target through a family of binary relations.
Optimistic and pessimistic multigranulation rough sets are two typical examples of such approach.
However, these two multigranulation rough sets do not take frequencies of occurrences of...
Behnam Vahdani, S. Meysam Mousavi, R. Tavakkoli-Moghaddam, H. Hashemi
Pages: 293 - 311
In sustainable supply chain networks, companies are obligated to have a systematic decision support system in
place to help it adopt right decisions at right times. Among strategic decisions, supplier selection and evaluation
outranks other decisions in terms of importance due to its long-term impacts....
Xin Liu, Ying Wang, Xiaonan Li, Li Zou
Pages: 312 - 319
In order to process the linguistic-valued information with uncertainty in the financial decision- making, the present
work uses a lattice-valued logical algebra - lattice implication algebra to deal with both comparable and
incomparable linguistic truth-values. A new personal financial decision auxiliary...
José Alejandro Lugo García, Anié Bermudez Peña, Pedro Yobanis Piñero Pérez, Rafael Bello Pérez
Pages: 320 - 335
Project monitoring and control by using key performance indicators has become a widespread method for decisionmaking
in project-oriented organizations. However, the current schools and IT tools created for this purpose require an
upgrade in design due to imprecision, vagueness or uncertainty present...
Binghui Wu, Tingting Duan
Pages: 336 - 346
The stock price shows the character of complex non-linear system, along with changes of internal and external
environmental factors in stock market. As a form of artificial intelligence, neural network can fully reveal the
complex relationship between investors and price fluctuations. After comparing...
Debasish Majumder, Subhashis Sahu, Animesh Biswas
Pages: 347 - 362
In this article assessment of morningness of individuals has been performed using fuzzy reasoning approach. The
responses are quantified using fuzzy numbers. Based on experts’ opinion a fuzzy rule-base is prepared. The model
is validated by considering responses of some students, selected randomly,...
R. Leena Sri, N. Balaji
Pages: 363 - 374
Cloud Computing is a utility model that offers everything as a service and supports dynamical resource
provisioning and auto-scaling in datacenter. Cloud datacenter must envision resource allocation and reallocation to
meet out the unpredictable user demand that touted gains in the model. This impact...
A.K. Parida, R. Bisoi, P.K. Dash, S. Mishra
Pages: 375 - 393
The model proposed in this paper, is a hybridization of fuzzy neural network (FNN) and a functional link neural
system for time series data prediction. The TSK-type feedforward fuzzy neural network does not take the full
advantage of the use of the fuzzy rule base in accurate input-output mapping and...
José Carlos R. Alcantud, Gustavo Santos-García
Pages: 394 - 404
We put forward a completely redesigned approach to soft set based decision making problems under
incomplete information. An algorithmic solution is proposed and compared with previous approaches in
the literature. The computational performance of our algorithm is critically analyzed by an experimental
H. Olmí, C. Urrea, M. Jamett
Pages: 405 - 418
The development of a computational tool for the recognition of numerical characters already segmented from
Chilean license plates, located in semi-controlled scenarios, is presented. Two algorithms are highlighted: one for
the Fine Segmentation of the Characters through the K-Means algorithm and a...
Sarah Ben Othman, Slim Hammadi
Pages: 419 - 439
We are interested in this paper in studying and developing a decision support tool for multi-skill health care tasks
scheduling in the Pediatric Emergency Department. We use an evolutionary algorithm and we propose the use of
fuzzy logic to formulate an adapted fitness function. We consider the potential...
José Sanz, Javier Fernandez, Humberto Bustince, Carlos Gradin, Mariano Fortún, Tomás Belzunegui
Pages: 440 - 455
Survival prediction of poly-trauma patients measure the quality of emergency services by comparing their
predictions with the real outcomes. The aim of this paper is to tackle this problem applying C4.5 since it
achieves accurate results and it provides interpretable models. Furthermore, we use sampling...
Huchang Liao, Zhimin Li, Xiao-Jun Zeng, Weishu Liu
Pages: 456 - 469
Intuitionistic fuzzy preference relation (IFPR), which express experts’ preferences from the preferred, the nonpreferred
and the indeterminate aspects, has turned out to be an efficient tool in describing the rough and subjective
opinions of experts. This paper focuses on the consensus measures for...
Ahmad Jafarian, Fariba Rostami, Alireza K. Golmankhaneh, Dumitru Baleanu
Pages: 470 - 480
Indeed, interesting properties of artificial neural networks approach made this non-parametric model a
powerful tool in solving various complicated mathematical problems. The current research attempts
to produce an approximate polynomial solution for special type of fractional order Volterra integrodifferential
Goran Z. Marković
Pages: 481 - 494
Revenue-driven Lightpaths Provisioning over Optical WDM Networks Using Bee Colony Optimization
Goran Z. Markovic
University of Belgrade – Faculty of Transport and Traffic Engineering,
Vojvode Stepe 305,
Belgrade, 11000, Serbia
Sivakami Raja, Jaiganesh M, Saravanan Ramaiah
Pages: 495 - 506
Though cloud computing has become an attractive technology due to its openness and services, it brings several
security hazards towards cloud storage. Since the distributed nature of clouds is achieved through internetworking
technologies, clouds suffer from all the vulnerabilities by which networking...
Lu Wang, Chong Wu
Pages: 507 - 520
It is very important to enhance the accuracy of financial crisis prediction (FCP). Because the traditional
probabilistic neural network (PNN) has some deficiencies, such as the difficult estimation of parameters and the
high computational complexity, this paper proposes a new combination model, which...
Pages: 521 - 539
In the cloud storage system, data sets replicas technology can efficiently enhance data availability and thereby increase the system reliability by replicating commonly used data sets in geographically different data centers. Most current approaches largely focus on system performance improvement by...
Guanglei Gou, Guoyin Wang
Pages: 540 - 554
Approximation computation is a critical step in rough sets theory used in knowledge discovery and other
related tasks. In practical applications, an information system often evolves over time by the variation
of attributes or objects. Effectively computing approximations is vital in data mining. Dominance-based
Siham Tabik, Daniel Peralta, Andrés Herrera-Poyatos, Francisco Herrera
Pages: 555 - 568
In the last five years, deep learning methods and particularly Convolutional Neural Networks (CNNs)
have exhibited excellent accuracies in many pattern classification problems. Most of the state-of-the-art
models apply data-augmentation techniques at the training stage. This paper provides a brief...
Yaya Liu, Junfang Luo, Bing Wang, Keyun Qin
Pages: 569 - 592
In this work, the axiomatical definition of similarity measure, distance measure and inclusion measure
for interval-valued intuitionistic fuzzy soft set (IVIFSSs) are given. An axiomatical definition of entropy
measure for IV IFSSs based on distance is firstly proposed, which is consistent with the...
Chao Yang, Donghua Zhu, Xuefeng Wang
Pages: 593 - 604
A Subject-Action-Object (SAO) is a triple structure which can be used to both describe topics in detail and explore
the relationship between them. SAO analysis has become popular in bibliometrics, however there are two
challenges in the identification of SAO structures: low relevance of SAOs to domain...
V. Mohagheghi, S.M. Mousavi, M. Aghamohagheghi, B. Vahdani
Pages: 605 - 626
Selecting transport project to invest is an important task. This paper offers a new sustainable transport investment
selection approach that applies interval-valued fuzzy sets (IVFSs) to address uncertainty. Relative preference
relation is employed to address importance of criteria. Judgments of experts...
Jorge Gálvez, Erik Cuevas, Omar Avalos
Pages: 627 - 646
This paper proposes a new algorithm called Multimodal Flower Pollination Algorithm (MFPA). Under MFPA, the
original Flower Pollination Algorithm (FPA) is enhanced with multimodal capabilities in order to find all possible
optima in an optimization problem. The performance of the proposed MFPA is compared...
Chubato Wondaferaw Yohannese, Tianrui Li
Pages: 647 - 662
Software Fault Prediction (SFP) is found to be vital to predict the fault-proneness of software modules, which
allows software engineers to focus development activities on fault-prone modules, thereby prioritize and optimize
tests, improve software quality and make better use of resources. In this...
Yanmin Liu, Hua Zhao, Zeshui Xu
Pages: 663 - 676
In this paper, we investigate the cluster techniques of hesitant fuzzy information. Consider that the distance measure
is one of the most widely used tools in clustering analysis, we first point out the weakness of the existing distance
measures for hesitant fuzzy sets (HFSs), and then put forward...
Yi-Chih Hsieh, Peng-Sheng You
Pages: 677 - 689
We present a new multiple-type museum visitor routing problem (MT-MVRP) in which a museum’s exhibition
rooms are classified into must-see and select-see rooms. A novel encoding scheme is proposed to simultaneously
determine the scheduling of rooms for all of the groups and an immune based evolutionary...
Ali Fahmi, Kemal Burc Ulengin, Cengiz Kahraman
Pages: 690 - 710
Almost all the worldwide and nationwide companies utilize advertising to increase their sales volume
and profit. These companies pay millions of dollars to reach consumers and announce their products or
services. This forces companies to evaluate advertising effects and check whether ads meet companys
Biswajit Sarkar, Sovan Samanta
Pages: 711 - 720
Graphs are the backbone of many real systems like social networks, image segmentation, scheduling, etc.
To input uncertainty to such systems, generalized fuzzy graphs are used. Generalized fuzzy tree is one
generalized fuzzy subgraph of a generalized fuzzy graph which characterizes the whole graph....
Abbas Parchami, Sezi Çevik Onar, Başar Öztayşi, Cengiz Kahraman
Pages: 721 - 733
In some cases, the specification limits of a quality characteristic should be defined under uncertain information. In
the literature, process capability analyses have been handled by using type-1 fuzzy sets under fuzziness up to now.
In this paper, we develop the concept of type-2 fuzzy quality and...
Narges Shafaei Bajestani, Ali Vahidian Kamyad, Assef Zare
Pages: 734 - 744
The type-2 fuzzy logic system permits us to model uncertainties existing in membership functions. Accordingly,
this study aims to propose a linear and a piecewise framework for an interval type-2 fuzzy regression model based
on the existing possibilistic models. In this model, vagueness is minimized,...
Mohamed Marzouk, Ahmed Osama
Pages: 745 - 759
Most municipal agencies are facing challenges regarding the deterioration of infrastructures due to the lack of
available funds and available data. There is a need to perform infrastructure asset management for infrastructure
assets in an integrated manner. This research proposes a decision making...
Patrick Glauner, Jorge Augusto Meira, Petko Valtchev, Radu State, Franck Bettinger
Pages: 760 - 775
Detection of non-technical losses (NTL) which include electricity theft, faulty meters or billing errors
has attracted increasing attention from researchers in electrical engineering and computer science. NTLs
cause significant harm to the economy, as in some countries they may range up to 40% of the...
Raciel Yera, Luis Martínez
Pages: 776 - 803
Recommender systems are currently successful solutions for facilitating access for online users to the
information that fits their preferences and needs in overloaded search spaces. In the last years several
methodologies have been developed to improve their performance. This paper is focused on developing...
Jian Yao, Weiping Wang, Zhifei Li, Yonglin Lei, Qun Li
Pages: 804 - 814
Engagement-level simulation is a quantitative way to evaluate the effectiveness of weapon systems before
construction and acquisition, minimizing the risk of investment. Though contractors have built simulation
systems with high fidelity models of weapon systems and battlefields, developing competent...
Lipeng Feng, Jun Ma, Yong Wang, Jie Yang
Pages: 815 - 823
Cross-border E-commerce has grown exponentially in the past decade in global market. To gain global
competition in product-convergent markets, China’s over 200 thousands cross-border E-commerce businesses
have focused more on the service and cost control of supply chain downstream. In this study,
Qingshan Chen, Yang Xu, Jun Liu, Xingxing He
Pages: 824 - 834
Clause learning is the key component of modern SAT solvers, while conflict analysis based on the implication graph is the mainstream technology to generate the learnt clauses. Whenever a clause in the clause database is falsified by the current variable assignments, the SAT solver will try to analyze...
Hanane Zermane, Hayet Mouss
Pages: 835 - 850
This paper develops an Internet-based fuzzy control system for an industrial process plant to ensure the remote and fuzzy control in cement factories in Algeria. The remote process consists of control, diagnosing alarms occurs, maintaining and synchronizing different regulation loops. Fuzzy control of...
Saleem Abdullah, Sanam Ayub, Iqtadar Hussain, Benjamin Bedregal, Muhammad Yaqub Khan
Pages: 851 - 865
Decision making implies selection of the best decision from a set of possible options. In some cases, this selection is based on past experience. Past experience is used to analyse the situations and the choice made in these situations. The aim of this work is to analyse the strength of the nonlinear...
Nihat Kasap, Berna Tektaş Sivrikaya, Hasan Hüseyin Turan, Dursun Delen
Pages: 866 - 881
In this research, we study a cost minimization problem for a firm that acquires capacity from providers to accomplish daily operations on telecommunication networks. We model the related optimization problem considering quality of service and capacity requirements and offer a solution approach based...
Vangelis Marinakis, Haris Doukas, Evangelos Spiliotis, Ilias Papastamatiou
Pages: 882 - 893
The main objective of this paper is to present a transparent Decision Support System (DSS) for the energy managers of buildings, which can assist them in setting indoor temperature set point, based on the feedback received by the occupants. Within the proposed DSS, the Thermal Comfort Validator (TCV)...
Mahdi Alinaghian, Alireza Goli
Pages: 894 - 913
In this paper, an uncertain integrated model for simultaneously locating temporary health centers in the affected areas, allocating affected areas to these centers, and routing to transport their required good is considered. Health centers can be settled in one of the affected areas or in a place out...
Wassila Guendouzi, Abdelmadjid Boukra
Pages: 914 - 935
Feature selection is used as a preprocessing step in the resolution of many problems using machine learning. It aims to improve the classification accuracy, speed up the model generation process, reduce the model complexity and reduce the required storage space. Feature selection is an NP-hard combinatorial...
Vijayalakshmi G.V. Mahesh, Alex Noel Joseph Raj, Zhun Fan
Pages: 936 - 950
The paper proposes a method using convolutional neural network to effectively evaluate the discrimination between face and non face patterns, gender classification using facial images and facial expression recognition. The novelty of the method lies in the utilization of the initial trainable convolution...
Shawkat K. Guirguis, Mohamed A. Abdou, Ahmed A. Elnaggar
Pages: 951 - 961
Clustering is carried out to explore and solve power dissipation problem in wireless sensor network (WSN). Hierarchical network architecture, based on clustering, can reduce energy consumption, balance traffic load, improve scalability, and prolong network lifetime. However, clustering faces two main...
Zou Beiji, Nurudeen Mohammed, Zhu Chengzhang, Zhao Rongchang
Pages: 962 - 969
This paper presents a new approach to crime hotspot detection and monitoring. The approach consists of three phases’ namely: video analysis, crime prediction and crime mapping. In video analysis, crime indicator events are modelled using statistical distribution of semantic concepts. In crime prediction,...
Guiqing Zhang, Yuzhu Wu, Yucheng Dong
Pages: 970 - 985
The hesitant fuzzy linguistic term set (HFLTS) and the linguistic distribution (LD) are becoming popular tools to describe decision makers’ linguistic preferences. By combining HFLTS and LD, this paper proposes a new concept called hesitant linguistic distribution (HLD), and then presents the transformation...
Pages: 986 - 1001
This paper considers the greening policies in a decentralized channel between one manufacturer and one retailer in a fuzzy decision making environment. We consider the manufacturing cost and the parameters of demand function as the fuzzy variables. Based on the different market structures, we develop...
Ze-Ling Wang, Jian-Xin You, Hu-Chen Liu, Song-Man Wu
Pages: 1002 - 1015
Failure mode and effect analysis (FMEA) is a risk management technique frequently applied to enhance the system performance and safety. In recent years, many researchers have shown an intense interest in improving FMEA due to inherent weaknesses associated with the classical risk priority number (RPN)...
Mei Cai, Zaiwu Gong, Yan Li
Pages: 1016 - 1035
Currently, recommender systems (RS) are incorporating implicit information from social circle of the Internet. The implicit social information in human mind is not easy to reflect in appropriate decision making techniques. This paper consists of 2 contributions. First, we develop an item-based prototype...
Lijia Chen, Mingguo Liu, Jianfeng Yang, Jing Wu, Zhen Dai
Pages: 1036 - 1055
Digital filters are generally designed by identifying the transfer functions. Most researches are focused on the goal of approaching the desired frequency response, and take less additional consideration of structure characteristics which can greatly affect the performance of the digital filter. This...
Pages: 1056 - 1065
For many of the applications in which wireless sensor networks are used, it is important to know from which nodes or what location useful information is acquired. The Global Positioning System (GPS) is conventionally used to determine location. However, GPS systems are not ideal for many applications...
Chunli Wu, Hanbing Liu, Xuxi Qin, Guojin Tan, Zhengwei Gu
Pages: 1066 - 1081
For the damage identification technique of civil structures, the reduction of the computational cost for methods based on the optimization algorithms is the most crucial step. In this study, a fast multi-stage method is developed that uses the multiple damage location assurance criterion and an improved...
Nihan Çetin Demirel, Muhammet Deveci
Pages: 1082 - 1101
This study examines the crew pairing problem, which is one of the most comprehensive problems encountered in airline planning, to generate a set of crew pairings that has minimal cost, covers all flight legs and fulfils legal criteria. In addition, this study examines current research related to crew...
Pages: 1102 - 1115
This paper proposes a novel performance enhanced Jaya algorithm with a two group adaption (E-Jaya). Two improvements are presented in E-Jaya. First, instead of using the best and the worst values in Jaya algorithm, EJaya separates all candidates into two groups: the better and the worse groups based...
Xu Shaohua, Xue Jiwei, Li Xuegui
Pages: 1116 - 1131
Aiming at the problem of time-varying signal pattern classification, a sparse auto-encoder deep process neural network (SAE-DPNN) is proposed. The input of SAE-DPNN is time-varying process signal and the output is pattern category. It combines the time-varying signal classification method of process...
Yuxuan Gao, Yueping Du, Bingzhen Sun, Rui Wang, Chaoying Jiang
Pages: 1132 - 1148
This study applies the game theory to the discussion and analysis of trans-regional Telemedicine System, builds the game model of the selection strategies of trans-regional hospitals and patients and analyzes evolving paths, equilibrium states and influencing factors of the three parties. It is derived...
Veysel Coban, Sezi Çevik Onar
Pages: 1149 - 1167
Solar energy is an important and reliable source of energy. Better understanding the concepts and relationships of the factors that affect solar energy generation capacity can enhance the usage of solar energy. This understanding can lead investors and governors in their solar power investments. However,...
Gül T. Temur, Seda Yanık
Pages: 1168 - 1185
In this paper, a multi-period multi-echelon reverse logistics network design problem under high extent of uncertainty is addressed. We first formulate and then solve the multi-period network design model using the cloudbased design optimization framework which ensures to: (1) handle high number of uncertain...
Javier Arellano-Verdejo, Salvador Godoy-Calderon, Federico Alonso-Pecina, Adolfo Guzmáan Arenas, Marco Antonio Cruz-Chavez
Pages: 1186 - 1197
In this paper a coarse-grain execution model for evolutionary algorithms is proposed and used for solving numerical and combinatorial optimization problems. This model does not use migration as the solution dispersion mechanism, in its place a more efficient population-merging mechanism is used that...
Abdul Halim Abdul Latiff, Deva Prasad Ghosh, Nurul Mu’azzah Abdul Latiff
Pages: 1198 - 1210
Many hydrocarbon explorations in mature fields have been severely affected by complex and overburdening issues, such as shallow gas accumulation, gas pockets, and gas seepage. In this work, a new forward modelling technique is proposed in evaluating the potential survey design for fields affected by...
Alberto Fernández, Abdulrahman Altalhi, Saleh Alshomrani, Francisco Herrera
Pages: 1211 - 1225
The significance of addressing Big Data applications is beyond all doubt. The current ability of extracting interesting knowledge from large volumes of information provides great advantages to both corporations and academia. Therefore, researchers and practitioners must deal with the problem of scalability...
Raheleh Jafari, Wen Yu, Xiaoou Li, Sina Razvarz
Pages: 1226 - 1237
The uncertain nonlinear systems can be modeled with fuzzy equations or fuzzy differential equations (FDEs) by incorporating the fuzzy set theory. The solutions of them are applied to analyze many engineering problems. However, it is very difficult to obtain solutions of FDEs. In this paper, the solutions...
Isaac Triguero, Sergio González, Jose M. Moyano, Salvador García, Jesús Alcalá-Fdez, Julián Luengo, Alberto Fernández, Maria José del Jesús, Luciano Sánchez, Francisco Herrera
Pages: 1238 - 1249
This paper introduces the 3rd major release of the KEEL Software. KEEL is an open source Java framework (GPLv3 license) that provides a number of modules to perform a wide variety of data mining tasks. It includes tools to perform data management, design of multiple kind of experiments, statistical analyses,...
Macarena Espinilla, Chris Nugent
Pages: 1250 - 1251
Veena Anand, Sudhakar Pandey
Pages: 1252 - 1262
Wireless Sensor Networks (WSN) has the disadvantage of limited and non-rechargeable energy resource in WSN creates a challenge and led to development of various clustering and routing algorithms. The paper proposes an approach for improving network lifetime by using Particle swarm optimization based...
P. SrideviPonmalar, V. Jawahar Senthil Kumar, R. Harikrishnan
Pages: 1263 - 1271
Localization is one of the key issues in wireless sensor networks. Several algorithms and techniques have been introduced for localization. Localization is a procedural technique of estimating the sensor node location. In this paper, a novel three hybrid algorithms based on firefly is proposed for localization...
Niklas Karvonen, Lara Lorna Jimenez, Miguel Gomez Simon, Joakim Nilsson, Basel Kikhia, Josef Hallberg
Pages: 1272 - 1279
Computational intelligence is often used in smart environment applications in order to determine a user’s context. Many computational intelligence algorithms are complex and resource-consuming which can be problematic for implementation devices such as FPGA:s, ASIC:s and low-level microcontrollers. These...
Caglar Uyulan, Turker Tekin Erguzel
Pages: 1280 - 1288
Many endogenous and external components may affect the physiological, mental and behavioral states in humans. Monitoring tools are required to evaluate biomarkers, identify biological events, and predict their outcomes. Being one of the valuable indicators, brain biomarkers derived from temporal or spectral...
Vahid Ghasemi, Ali Akbar Pouyan
Pages: 1289 - 1297
Modeling users’ data traces is of crucial importance for human behavior analysis and context-aware applications in ambient assisted living (AAL) environments. However, learning the parameters of the underlying model is a challenging task in multi-occupant environments; because, the anonymous users’ data...
Marta Bautista-Durán, Joaquín García-Gómez, Roberto Gil-Pita, Inma Mohíno-Herranz, Manuel Rosa-Zurera
Pages: 1298 - 1305
Violence detection represents an important issue to take into account in the design of intelligent algorithms for smart environments. This paper proposes an energy-efficient system capable of acoustically detecting violence. In our solution, genetic algorithms are used to select the best subset of features...
José Á. Concepción-Sánchez, Pino Caballero-Gil, Jezabel Molina-Gil
Pages: 1306 - 1313
Gender violence is one of the most serious and widespread problems in our society. In dangerous cases, the use of special devices for GPS tracing is recommended in some countries. However, these devices are used only in extreme cases and have many drawbacks. This work describes a new system to combat...
Wen-Bo Du, Gang Yan, Raymond Chiong, Yong-Xiang Xia
Pages: 1314 - 1315
Yanxia Sun, Zenghui Wang
Pages: 1316 - 1329
Topology plays an important role for Particle Swarm Optimization (PSO) to achieve good optimization performance. It is difficult to find one topology structure for the particles to achieve better optimization performance than the others since the optimization performance not only depends on the searching...
Chen Hong, Nai-Yu Yin, Ning He, Oriol Lordan, Jose Maria Sallan
Pages: 1330 - 1336
Network robustness against cascades is a major topic in the fields of complex networks. In this paper, we propose an attack-cost-based cascading failure model, where the attack cost of nodes is positively related to its degree. We compare four attacking strategies: the random removal strategy (RRS),...
Xiaowen Bi, Zeyu Han, Wallace K. S. Tang
Pages: 1337 - 1344
Delivering goods in an efficient and cost-effective way is always a challenging problem in logistics. In this paper, the multi-depot vehicle routing is focused. To cope with the conflicting requirements, an advanced multi-objective evolutionary algorithm is proposed. Local-search empowered genetic operations...
Su Yan, Kaiquan Cai, Majed Swaid
Pages: 1345 - 1354
Although conventional multi-objective evolutionary optimization algorithms (MOEAs) are proven to be effective in general, they are less superior when applied to solve a large-scale combinational real-world optimization problem with tightly coupled decision variables. For the purpose to enhance the capability...
Bowen Kan, Wendong Zhu, Guangyi Liu, Xi Chen, Di Shi, Weiqing Yu
Pages: 1355 - 1363
We introduce a new method for storing, modeling, and analyzing power grid data. First, we present an architecture for building the network model for a power grid using the open source graph database Neo4j. Second, we design single- and multi-threading systems for initial energization analysis of the...