International Journal of Computational Intelligence Systems

ISSN: 1875-6883
Volume 5, Issue 1, February 2012
Hui Zhao, Mingchu Li, Kouichi Sakurai, Yizhi Ren, JonathanZ. Sun, Fengying Wang
Pages: 1 - 12
We give an abstraction of verifiable multi-secret sharing schemes that is accessible to a fully mechanized analysis. This abstraction is formalized within the applied pi-calculus by using an equational theory which characterizes the cryptographic semantics of secret share. We also present an encoding...
Ebru Turanoğlu, İhsan Kaya, Cengiz Kahraman
Pages: 13 - 29
Acceptance sampling is primarily used for the inspection of incoming or outgoing lots. Acceptance sampling refers to the application of specific sampling plans to a designated lot or sequence of lots. The parameters of acceptance sampling plans are sample sizes and acceptance numbers. In some cases,...
Guojun Mao, Xindong Wu, Xuxian Jiang
Pages: 30 - 38
Computer intrusions are taking place everywhere, and have become a major concern for information security. Most intrusions to a computer system may result from illegitimate or irregular calls to the operating system, so analyzing the system-call sequences becomes an important and fundamental technique...
Hong-Zhong Huang, Xudong Zhang, De-Biao Meng, Yu Liu, Yan-Feng Li
Pages: 93 - 110
Various uncertainties are inevitable in complex engineered systems and must be carefully treated in design activities. Reliability-Based Multidisciplinary Design Optimization (RBMDO) has been receiving increasing attention in the past decades to facilitate designing fully coupled systems but also achieving...
Leopoldo Altamirano, María Cristina Riff, Ignacio Araya, Lorraine Trilling
Pages: 111 - 125
In this article we present an approach designed to solve a real world problem: the Anesthesiology Nurse Scheduling Problem (ANSP) at a public French hospital. The anesthesiology nurses are one of the most shared resources in the hospital and we attempt to find a fair/balanced schedule for them, taking...
Jaime Cano-Belmán, RogerZ. Ríos-Mercado, M. Angélica Salazar-Aguilar
Pages: 126 - 147
A commercial territory design problem with compactness maximization criterion subject to territory balancing and connectivity is addressed. Four new heuristics based on Greedy Randomized Adaptive Search Procedures within a location-allocation scheme for this NP-hard combinatorial optimization problem...
Yibo Chen, Chanle Wu, Xiaojun Guo, Jiyan Wu
Pages: 163 - 172
To provide users with more suitable and personalized service, personalization is widely used in various fields. Current e-Learning systems search for learning resources using information search technology, based on the keywords that selected or inputted by the user. Due to lack of semantic analysis for...
Zhirui Lu, Juan Augusto, Jun Liu, Hui Wang
Pages: 173 - 196
This paper focuses on a linguistic-valued temporal logic based reasoning formalism for dynamically modelling and merging information under uncertainty in some real world systems where the state of a system evolves over time and the transition through states depends on uncertain conditions. We provide...