International Journal of Computational Intelligence Systems

Volume 5, Issue 1, February 2012

1. A Finite Equivalence of Verifiable Multi-secret Sharing

Hui Zhao, Mingchu Li, Kouichi Sakurai, Yizhi Ren, JonathanZ. Sun, Fengying Wang
Pages: 1 - 12
We give an abstraction of verifiable multi-secret sharing schemes that is accessible to a fully mechanized analysis. This abstraction is formalized within the applied pi-calculus by using an equational theory which characterizes the cryptographic semantics of secret share. We also present an encoding...


Ebru Turanoğlu, İhsan Kaya, Cengiz Kahraman
Pages: 13 - 29
Acceptance sampling is primarily used for the inspection of incoming or outgoing lots. Acceptance sampling refers to the application of specific sampling plans to a designated lot or sequence of lots. The parameters of acceptance sampling plans are sample sizes and acceptance numbers. In some cases,...

3. Intrusion Detection Models Based on Data Mining

Guojun Mao, Xindong Wu, Xuxian Jiang
Pages: 30 - 38
Computer intrusions are taking place everywhere, and have become a major concern for information security. Most intrusions to a computer system may result from illegitimate or irregular calls to the operating system, so analyzing the system-call sequences becomes an important and fundamental technique...

4. Autonomously Implemented Versatile Path Planning for Mobile Robots Based on Cellular Automata and Ant Colony

Adel Akbarimajd, Akbar Hassanzadeh
Pages: 39 - 52
A path planning method for mobile robots based on two dimensional cellular automata is proposed. The method can be applied for environments with both concave and convex obstacles. It is also appropriate for multi-robot problems as well as dynamic environments. In order to develop the planning method,...

5. Region-based Image Segmentation by Watershed Partition and DCT Energy Compaction

Chi-Man Pun, Ning-Yu An, C.L. Philip Chen
Pages: 53 - 64
An image segmentation approach by improved watershed partition and DCT energy compaction has been proposed in this paper. The proposed energy compaction, which expresses the local texture of an image area, is derived by exploiting the discrete cosine transform. The algorithm is a hybrid segmentation...

6. PSOPB: A Two-population Particle Swarm Optimizer Mimicking Facultative Bio-parasitic Behavior

Quande Qin, Li Li, Rongjun Li, Ben Niu
Pages: 65 - 75
Inspired by the phenomenon of bio-parasitic behavior in natural ecosystem, this paper presents a novel particle swarm optimizer named PSOPB, in which particles are composed of the host and the parasite population. In the presented algorithm, the two populations mimic facultative bio-parasitic behaviour...

7. Intelligent Recognition of Lung Nodule Combining Rule-based and C-SVM Classifiers

Bin Li, Jing Zhang, Lianfang Tian, Li Tan, Shijie Xiang, Shanxing Ou
Pages: 76 - 92
Computer-aided detection(CAD) system for lung nodules plays the important role in the diagnosis of lung cancer. In this paper, an improved intelligent recognition method of lung nodule in HRCT combing rule-based and cost-sensitive support vector machine(C-SVM) classifiers is proposed for detecting both...

8. A New Multidisciplinary Design Optimization Method Accounting for Discrete and Continuous Variables under Aleatory and Epistemic Uncertainties

Hong-Zhong Huang, Xudong Zhang, De-Biao Meng, Yu Liu, Yan-Feng Li
Pages: 93 - 110
Various uncertainties are inevitable in complex engineered systems and must be carefully treated in design activities. Reliability-Based Multidisciplinary Design Optimization (RBMDO) has been receiving increasing attention in the past decades to facilitate designing fully coupled systems but also achieving...

9. Anesthesiology Nurse Scheduling using Particle Swarm Optimization

Leopoldo Altamirano, María Cristina Riff, Ignacio Araya, Lorraine Trilling
Pages: 111 - 125
In this article we present an approach designed to solve a real world problem: the Anesthesiology Nurse Scheduling Problem (ANSP) at a public French hospital. The anesthesiology nurses are one of the most shared resources in the hospital and we attempt to find a fair/balanced schedule for them, taking...

10. Commercial Territory Design for a Distribution Firm with New Constructive and Destructive Heuristics

Jaime Cano-Belmán, RogerZ. Ríos-Mercado, M. Angélica Salazar-Aguilar
Pages: 126 - 147
A commercial territory design problem with compactness maximization criterion subject to territory balancing and connectivity is addressed. Four new heuristics based on Greedy Randomized Adaptive Search Procedures within a location-allocation scheme for this NP-hard combinatorial optimization problem...

11. Design of Service Net based Correctness Verification Approach for Multimedia Conferencing Service Orchestration

Cheng Bo, Zhang Chengwen, Chen Junliang
Pages: 148 - 162
Multimedia conferencing is increasingly becoming a very important and popular application over Internet. Due to the complexity of asynchronous communications and handle large and dynamically concurrent processes for multimedia conferencing, which confront relevant challenge to achieve sufficient correctness...

12. Semantic Learning Service Personalized

Yibo Chen, Chanle Wu, Xiaojun Guo, Jiyan Wu
Pages: 163 - 172
To provide users with more suitable and personalized service, personalization is widely used in various fields. Current e-Learning systems search for learning resources using information search technology, based on the keywords that selected or inputted by the user. Due to lack of semantic analysis for...


Zhirui Lu, Juan Augusto, Jun Liu, Hui Wang
Pages: 173 - 196
This paper focuses on a linguistic-valued temporal logic based reasoning formalism for dynamically modelling and merging information under uncertainty in some real world systems where the state of a system evolves over time and the transition through states depends on uncertain conditions. We provide...


Songhua Liu, Junying Zhang, Caiying Ding
Pages: 197 - 208
In this paper, information energy metric (IEM) is obtained by similarity computing for high-dimensional samples in a reproducing kernel Hilbert space (RKHS). Firstly, similar/dissimilar subsets and their corresponding informative energy functions are defined. Secondly, IEM is proposed for similarity...