International Journal of Computational Intelligence Systems

Volume 7, Issue 5, October 2014
Erratum

1. Erratum

Vahid Seydi Ghomsheh, Mohamad Teshnehlab, Mahdi Aliyari Shoorehdeli, Mojtaba Ahmadieh Khanesar
Pages: 0 - 0
Research Article

2. Black Hole: A New Operator for Gravitational Search Algorithm

Mohammad Doraghinejad, Hossein Nezamabadi-pour
Pages: 809 - 826
Inspiring by nature have motivated many researchers in many fields of sciences and engineering. The Gravitational search algorithm (GSA) is a recent created metaheuristic algorithm by using law of gravity and mass interactions. In this paper, a new operator inspired by some of the characteristics of...
Research Article

3. A Self-Adaptive Heuristic Algorithm for Combinatorial Optimization Problems

Cigdem Alabas-Uslu, Berna Dengiz
Pages: 827 - 852
This paper introduces a new self-tuning mechanism to the local search heuristic for solving of combinatorial optimization problems. Parameter tuning of heuristics makes them difficult to apply, as parameter tuning itself is an optimization problem. For this purpose, a modified local search algorithm...
Research Article

4. A Combination Prediction Model of Stock Composite Index Based on Artificial Intelligent Methods and Multi-Agent Simulation

Yongli Li, Chong Wu, Jiaming Liu, Peng Luo
Pages: 853 - 864
Predicting stock composite index is useful, which can raise the interest of both the investors and the corresponding researchers. This paper presented a new combination prediction model based on the technique of artificial intelligence and the principle of combination forecast. The principle of combination...
Research Article

5. A Robust Blind Audio Watermarking Scheme Based on Singular Value Decomposition and Neural Networks

Yu Yang, Min Lei, Huaqun Liu, Yongmei Cai, Guoyuan Lin
Pages: 865 - 873
The paper proposes a novel blind audio watermarking scheme based on singular value decomposition (SVD) and neural networks (NN), which makes use of memorization and adaptation capabilities of NN. Experimental results show that the proposed watermarking algorithm is strongly robust against several kinds...
Research Article

6. Stereo Matching Based Stereo Image Watermarking for Tamper Detection and Recovery

Ting Luo, Gangyi Jiang, Mei Yu, Feng Shao, Zongju Peng, Yo-Sung Ho
Pages: 874 - 881
Digital watermarking is an effective way for authentication of stereo images when they are transmitted over networks. Since the left and right images of a stereo image pair are not independent but similar to each other, their watermarking design should be different from that of mono-images. This paper...
Research Article

7. An improvement method for selecting the best alternative in Decision Making

Bin Zhou, Zheng Pei, Xinzi Ma
Pages: 882 - 895
Multiple attributes group decision making problems aim to find the best alternative for the experts from a solution set of alternatives. Because the attribute value and decision-makers evaluation with respect to the alternatives are usually vague and imprecise, fuzzy multiple attributes group decision...
Case Study

8. A QFD Approach for Cloud Computing Evaluation and Selection in KMS: A Case Study

Chin-Nung Liao, Hsing-Pei Kao
Pages: 896 - 908
Cloud computing services are a new information technology trend for business applications in knowledge management systems (KMS). The link between cloud computing services and KMS is a new concept, and methods for selecting multiple choice goals of cloud computing service provider have lacked a formal...
Research Article

9. Assessment of Driver Stress from Physiological Signals collected under Real-Time Semi-Urban Driving Scenarios

Rajiv Ranjan Singh, Sailesh Conjeti, Rahul Banerjee
Pages: 909 - 923
Designing a wearable driver assist system requires extraction of relevant features from physiological signals like galvanic skin response and photoplethysmogram collected from automotive drivers during real-time driving. In the discussed case, four stress-classes were identified using cascade forward...
Research Article

10. Consistency-based algorithms to estimate missing elements for uncertain 2-tuple linguistic preference relations

Zhen Zhang, Chonghui Guo
Pages: 924 - 936
For actual decision making problems, decision makers sometimes may have difficulty to provide all the preference information over alternatives through pairwise comparisons. In this paper, we focus on estimating missing elements for an incomplete uncertain 2-tuple linguistic preference relation. First,...
Research Article

11. Effective Features and Hybrid Classifier for Rainfall Prediction

KavithaRani B., A. Govardhan
Pages: 937 - 951
Rainfall prediction has emerged as a challenging time-series prediction problem in recent years. In this paper, we propose a novel rainfall prediction technique using effective feature indicators and a hybrid technique. Our proposed model consists of three phases, namely, layer model simulation, training...
Research Article

12. The Evolution of Users' Adoption Behavior under a Collaborative Service: An Agent-Based Computational Approach

Guoyin Jiang, Feicheng Ma
Pages: 952 - 962
As a relatively new collaborative service mode, Mobile Instant Messaging (MIM) is gaining ever greater popularity. MIM users interact within a complex system to influence others' adoption decisions, thus resulting in behavioral evolution. An agent-based computational approach is a methodology well suited...
Research Article

13. An efficient self-organizing map (E-SOM) learning algorithm using group of neurons

Vikas Chaudhary, R.S. Bhatia, Anil K. Ahlawat
Pages: 963 - 972
In the learning process of the conventional SOM, the neuron which is closer to the winner neuron learns more than the neuron which is farther away from the winner neuron. The neurons farther away from input are not able to learn properly and some dead units are left on the map. To decrease dead unit...
Research Article

14. Ant colony system algorithm for optimal network reconfiguration

Shabana Mehfuz, Farah Rashid
Pages: 973 - 978
Network reconfiguration of a power distribution system is an operation to alter the topological structure of distribution feeders by changing open/closed status of sectionalizing and tie switches. Network reconfiguration balances feeder loads and helps in managing overload conditions of the network by...
Research Article

15. Neural Networks for Normative Knowledge Source of Cultural Algorithm

Vahid Seydi Ghomsheh, Mohamad Teshnehlab, Mahdi Aliyari Shoorehdeli, Mojaba Ahmadieh Khanesar
Pages: 979 - 992
This study presents the normative knowledge source for the belief space of cultural algorithm(CA) based on an adaptive Radial Basis Function Neural Network (RBFNN). The use of the RBFNN makes it possible to use the previous upper and lower bounds of the normative knowledge to update them and to extract...
Research Article

16. Some properties of implications via aggregation functions and overlap functions

H. Zapata, H. Bustince, L. De Miguel, C. Guerra
Pages: 993 - 1001
In this work, using the identification between implication operators and aggregation functions, we study the implication operators that are recovered from overlap functions. In particular, we focus in which properties of implication operators are preserved. We also study how negations can be defined...
Case Study

17. Strategic Decision Selection Using Hesitant fuzzy TOPSIS and Interval Type-2 Fuzzy AHP: A case study

Sezi Cevik Onar, Başar Oztaysi, Cengiz Kahraman
Pages: 1002 - 1021
Strategic decisions such as mergers, acquisitions and joint ventures have a strong effect on firm performance. In order to be successful in highly competitive environments firms have to make right and on time strategic decisions. However, the nature of making the right strategic decision is complex and...