International Journal of Computational Intelligence Systems

Volume 5, Issue 3, June 2012

1. Cooperative Data Management in Wireless Sensor Networks

Hajar Mousannif, Ismail Khalil
Pages: 403 - 412
Introducing cooperation into a wireless sensor network (WSN) has gained much attention in the recent few years mainly because of the significant effect it has on optimizing energy consumption and on enhancing the lifetime and the overall performance of the network. Cooperation can be exploited at different...

2. A Novel Real-coded Quantum-inspired Genetic Algorithm and Its Application in Data Reconciliation

Gao Lin, Gu Xingsheng
Pages: 413 - 420
Traditional quantum-inspired genetic algorithm (QGA) has drawbacks such as premature convergence, heavy computational cost, complicated coding and decoding process etc. In this paper, a novel real-coded quantum-inspired genetic algorithm is proposed based on interval division thinking. Detailed comparisons...

3. External and Distributed Databases: Efficient and Secure XML Query Assurance

Andrew Clarke, Eric Pardede, Robert Steele
Pages: 421 - 433
Emerging information system architectures will often be comprised of distributed systems and data repositories. As a result, providing efficient and secure query assurance over these emerging future information systems is a concern. This paper details the use of temporary time stamps and variable hash...

4. Mining Hierarchical Negative Association Rules

David Taniar, Wenny Rahayu, Olena Daly, Hong-Quang Nguyen
Pages: 434 - 451
The negative association between items in databases is as important and interesting as the positive one. But, it has not been studied as much. We consider negative association in a hierarchical setting, in which we are able to generate negative association rules at different hierarchy levels. It allows...

5. Specificity for interval-valued fuzzy sets

Ramón González-del-Campo, Luis Garmendia, RonaldR. Yager
Pages: 452 - 459
In this paper some axiomatic definitions about specificity for interval-valued fuzzy sets are proposed. Some examples of measures of specificity for interval-valued fuzzy sets are showed. It is also defined a extension of the notion of alpha cut for interval-valued fuzzy sets and a generalized similarity...

6. Artificial Neural Network for Compositional Ionic Liquid Viscosity Prediction

Yiqing Miao, DavidW. Rooney, Quan Gan
Pages: 460 - 471
Being a new generation of green solvents and high-tech reaction media of the future, ionic liquids have increasingly attracted much attention. Of particular interest in this context are room temperature ionic liquids (in short as ILs in this paper). Due to the relatively high viscosity, ILs is expected...

7. On a Versatile Stochastic Growth Model

Samiur Arif, Ismail Khalil, Stephan Olariu
Pages: 472 - 482
Growth phenomena are ubiquitous and pervasive not only in biology and the medical sciences, but also in economics, marketing and the computer and social sciences. We introduce a three-parameter version of the classic pure-birth process growth model when suitably instantiated, can be used to model growth...

8. An Optimization Algorithm Based on Binary Difference and Gravitational Evolution

Junli Li, Yang Lou, Yuhui Shi
Pages: 483 - 493
Universal gravitation is a natural phenomenon. Inspired by Newton's universal gravitation model and based on binary differences strategy, we propose an algorithm for global optimization problems, which is called the binary difference gravitational evolution (BDGE) algorithm. BDGE is a population-based...

9. Anisotropic Diffusion based Brain MRI Segmentation and 3D Reconstruction

M. Arfan Jaffar, Sultan Zia, Ghaznafar Latif, AnwarM. Mirza, Irfan Mehmood, Naveed Ejaz, Sung Wook Baik
Pages: 494 - 504
In medical field visualization of the organs is very imperative for accurate diagnosis and treatment of any disease. Brain tumor diagnosis and surgery also required impressive 3D visualization of the brain to the radiologist. Detection and 3D reconstruction of brain tumors from MRI is a computationally...

10. Utilizing Multi-Field Text Features for Efficient Email Spam Filtering

Wuying Liu, Ting Wang
Pages: 505 - 518
Large-scale spam emails cause a serious waste of time and resources. This paper investigates the text features of email documents and the feature noises among multi-field texts, resulting in an observation of a power law distribution of feature strings within each text field. According to the observation,...

11. Entropy, Similarity Measure, Inclusion Measure of Intuitionistic Fuzzy Sets and Their Relationships

Qiansheng Zhang, Hongyan Xing, Lihua Wu
Pages: 519 - 529
In the present paper, we introduce a new axiomatic definition of the inclusion measure for intuitionistic fuzzy sets (IFSs, for short). The close relationships among entropy, similarity measure, and inclusion measure of IFSs are then discussed in detail. Also, we obtain some important theorems by which...

12. Investment Opportunities Forecasting: Extending the Grammar of a GP-based Tool

Michael Kampouridis, Edward Tsang
Pages: 530 - 541
In this paper we present a new version of a GP financial forecasting tool, called EDDIE 8. The novelty of this version is that it allows the GP to search in the space of indicators, instead of using pre-specified ones. We compare EDDIE 8 with its predecessor, EDDIE 7, and find that new and improved solutions...

13. Group decision making methods of the incomplete IFPRs and IPRs

Zaiwu Gong, Chonglan Guo, Yuanyuan He
Pages: 542 - 552
We propose optimal priority methods on the incomplete intuitionistic fuzzy preference relation (IFPR) and the incomplete interval preference relation (IPR). The least squares method has been used previously to derive the priority vector of the fuzzy preference relation (FPR). In this paper, we generalize...

14. Aircraft Maintenance Planning Using Fuzzy Critical Path Analysis

Omer Atli, Cengiz Kahraman
Pages: 553 - 567
Aircraft's availability is certainly one of the most important features of modern avionic industry. The aircraft maintenance scheduling is one of the major decisions an airline has to make during its operation. When an aircraft maintenance event occurs, the overhaul tasks management process requires...

15. PSO-Optimized Hopfield Neural Network-Based Multipath Routing for Mobile Ad-hoc Networks

Mansour Sheikhan, Ehsan Hemmati
Pages: 568 - 581
Mobile ad-hoc network (MANET) is a dynamic collection of mobile computers without the need for any existing infrastructure. Nodes in a MANET act as hosts and routers. Designing of robust routing algorithms for MANETs is a challenging task. Disjoint multipath routing protocols address this problem and...

16. Analysis of Neighbourhoods in Multi-layered Dynamic Social Networks

Piotr Bródka, PrzemysÅ‚aw Kazienko, Katarzyna MusiaÅ‚, Krzysztof Skibicki
Pages: 582 - 596
Social networks existing among employees, customers or other types of users of various IT systems have become one of the research areas of growing importance. Data about people and their interactions that exist in social media, provides information about many different types of relationships within one...

17. Using data mining on student behavior and cognitive style data for improving e-learning systems: a case study

Milos Jovanovic, Milan Vukicevic, Milos Milovanovic, Miroslav Minovic
Pages: 597 - 610
In this research we applied classification models for prediction of students’ performance, and cluster models for grouping students based on their cognitive styles in e-learning environment. Classification models described in this paper should help: teachers, students and business people, for early...