International Journal of Computational Intelligence Systems

Volume 6, Issue 4, July 2013
Research Article

1. Support Vector Machine Based Robotic Traversability Prediction with Vision Features

Jianwei Cui, Yan Guo, Huatao Zhang, Kui Qian, Jiatong Bao, Aiguo Song
Pages: 596 - 608
This paper presents a novel method on building relationship between the vision features of the terrain images and the terrain traversability which manifests the difficulty of field robot traveling across one terrain. Vision features of the image are extracted based on color and texture. The travesability...
Research Article

2. The Markov Model of Bean Optimization Algorithm and Its Convergence Analysis

Xiaoming Zhang, Halei Wang, Bingyu Sun, Wenbo Li, Rujing Wang
Pages: 609 - 615
By simulating the self-adaptive phenomena of plants in nature, a novel evolutionary algorithm named Bean Optimization Algorithm (BOA) was proposed in 2008. BOA can be used for resolving complex optimization problems. As BOA is a new optimization algorithm, theoretical analysis of the algorithm is still...
Research Article

3. MULTI-CRITERIA GROUP DECISION MAKING WITH HETEROGENEOUS INFORMATION BASED ON IDEAL POINTS CONCEPT

Ding-Hong Peng, Chang-Yuan Gao, Li-Li Zhai
Pages: 616 - 625
This paper presents a flexible multi-criteria group decision making method based on ideal points concept, which can be used to deal with heterogeneous information(numerical, interval valued and linguistic variable with different granularity and/or semantic)and reflect the Decision Makers’ different...
Research Article

4. Enhancing False Alarm Reduction Using Voted Ensemble Selection in Intrusion Detection

Yuxin Meng, Lam-For Kwok
Pages: 626 - 638
Network intrusion detection systems (NIDSs) have become an indispensable component for the current network security infrastructure. However, a large number of alarms especially false alarms are a big problem for these systems which greatly lowers the effectiveness of NIDSs and causes heavier analysis...
Research Article

5. Cryptographic Secrecy Analysis of Matrix Embedding

Jiayong Chen, Jiufen Liu, Weiming Zhang, Huisheng Liu, Xianfeng Zhao
Pages: 639 - 647
For good security and large payload in information hiding, matrix embedding is a popular method for increasing the embedding efficiency. This paper analyzes the security of matrix embedding against cryptanalytic attacks. The secrecy security of matrix embedding using information theory under the conditions...
Research Article

6. Transitive Closure of Interval-valued Fuzzy Relations

Ramón González-del-Campo, Luis Garmendia, Jordi Recasens
Pages: 648 - 657
In this paper are introduced some concepts of interval-valued fuzzy relations and some of their properties: reflexivity, symmetry, T-transitivity, composition and local reflexivity. The existence and uniqueness of T-transitive closure of interval-valued fuzzy relations is proved. An algorithm to compute...
Research Article

7. Decision Making and Fundamental Matrix approach in Process Safety

DjordjeN. Dihovicni
Pages: 658 - 668
The paper describes solving problem of constructing knowledge database of a decision making in process safety. It provides analyses of the requirements as well the analyses of the system incidents caused by specification, design and the implementation of the project. Main focus of this scientific paper...
Research Article

8. Robust binary neural networks based 3D Face detection and accurate face registration

Quan Ju
Pages: 669 - 683
In this paper, we propose a facial feature localization algorithm based on a binary neural network technique - k-Nearest Neighbour Advanced Uncertain Reasoning Architecture (kNN AURA) to encode, train and match the feature patterns to accurate identify the nose tip in 3D. Based on the results of the...
Research Article

9. A Particle Swarm Optimization Algorithm for Scheduling Against Restrictive Common Due Dates

Andreas C. Nearchou, Sotiris L. Omirou
Pages: 684 - 699
Focusing on the just-in-time (JIT) operations management, earliness as well as, tardiness of jobs’ production and delivery should be discouraged. In accordance to this philosophy, scheduling problems involving earliness and tardiness penalties are very critical for the operations manager. In this...
Research Article

10. REFLECTING THE PERSPECTIVES OF MULTIPLE AGENTS IN DISTRIBUTED REASONING FOR CONTEXT-AWARE SERVICE

Seungwok Han, Hee Yong Youn
Pages: 700 - 711
Effective manipulation of context is very important in providing the context-aware services. In recent years, a variety of context models have been proposed to properly handle the key aspects of the context, while focusing on scenario-based acquisition, management, and representation of context. However,...
Research Article

11. A Dynamic Verification Model based on Information Flow Constraint

Dan Wang, Yan Lu, Lihua Fu, Wenbing Zhao
Pages: 712 - 723
After analyzing the common attacks for some software systems, a dynamic software behavior verification model related with the unchecked input data based on software analysis and dynamic slicing technology is proposed. Regarding a statement as a basic analysis unit, and the information flow as the main...
Research Article

12. Robust Speed Control of an Induction Motor Drive using Wavelet-fuzzy based Self-tuning Multiresolution Controller

J.L Febin Daya, V. Subbiah, P. Sanjeevikumar
Pages: 724 - 738
This paper presents a hybrid wavelet-fuzzy based multiresolution (MR) controller for robust speed control of induction motor. The discrete wavelet transform (DWT) is used to decompose the error between the actual speed and command speed of the induction motor drive in to different frequency components....
Research Article

13. User-Personality Classification Based on the Non-Verbal Cues from Spoken Conversations

Soonil Kwon, Joon Yeon Choeh, Jong-Weon Lee
Pages: 739 - 749
Technology that detects user personality based on user speech signals must be researched to enhance the function of interaction between a user and virtual agent that takes place through a speech interface. In this study, personality patterns were automatically classified as either extroverted or introverted....
Research Article

14. Some Hybrid Geometric Aggregation Operators with 2-tuple Linguistic Information and Their Applications to Multi-attribute Group Decision Making

Shu-Ping Wan
Pages: 750 - 763
A new method is developed to solve multi-attribute group decision making (MAGDM) problem in which the attribute values, attribute weights and expert weights are all in the form of 2-tuple linguistic information. First, the operation laws for 2-tuple linguistic information are defined and the related...
Research Article

15. Unsupervised Clustering for Fault Diagnosis in Nuclear Power Plant Components

Piero Baraldi, Francesco Di Maio, Enrico Zio
Pages: 764 - 777
The development of empirical classification models for fault diagnosis usually requires a process of training based on a set of examples. In practice, data collected during plant operation contain signals measured in faulty conditions, but they are ‘unlabeled’, i.e., the indication of the...
Research Article

16. Model Reference Adaptive Control in Fuzzy-Based Context-Aware Middleware

Ronnie Cheung, HassanB. Kazemian, Jiannong Cao
Pages: 778 - 795
Owing to the dynamic characteristics of mobile environments, a mobile application needs to adapt to changing contexts to improve performance and resource utilization. We have developed an adaptive middleware infrastructure that simultaneously satisfies the individual needs of applications while maintaining...