International Journal of Computational Intelligence Systems

ISSN: 1875-6883
Volume 4, Issue 4, June-August 2011
Wen Chen, Xiao-Jie Liu, Tao Li, Yuan-Quan Shi, Xu-Fei Zheng, Hui Zhao
Pages: 410 - 419
A negative selection algorithm based on the hierarchical clustering of self set HC-RNSA is introduced in this paper. Several strategies are applied to improve the algorithm performance. First, the self data set is replaced by the self cluster centers to compare with the detector candidates in each cluster...
Arzum Ozgen, Gulfem Tuzkaya, Umut R Tuzkaya, Dogan Ozgen
Pages: 431 - 445
Tools and machines have an important effect on the manufacturing operations’ effectiveness and the selection process of appropriate tools and machines is a complex issue with the consideration of multiple criteria. Considering the complexity of the problem area and the difficulties in machine tools...
Song Chunhe, Zhao Hai, Jing Wei, Zhu Hongbo
Pages: 467 - 475
This paper proposed a framework of segmenting multiple targets basing on multiple shape priors. The key novel idea in the proposed framework is the shape degeneration model. By breaking the balance between the competition regions adaptively, the proposed model can degenerate the region which is with...
Everardo Gutierrez, Carlos Brizuela
Pages: 530 - 549
This paper proposes an enhanced Multi-objective Go with the Winners (MOGWW) algorithm to solve multi-objective combinatorial optimization problems. The original MOGWW algorithm is equipped with the well known Pareto Local Search (PLS) procedure. In order to assess the performance of the hybridization,...
Xiangjiu Che, Jun Kong, Jiangyan Dai, Zhanheng Gao, Miao Qi
Pages: 596 - 605
For secure biometric verification, most existing methods embed biometric information directly into the cover image, but content correlation analysis between the biometric image and the cover image is often ignored. In this paper, we propose a novel biometric image hiding approach based on the content...
Srdjan Vukmirovic, Aleksandar Erdeljan, Imre Lendak, Darko Capko, Nemanja Nedic
Pages: 672 - 679
Grid computing could be the future computing paradigm for enterprise applications, one of its benefits being that it can be used for executing large scale applications. Utility Management Systems execute very large numbers of workflows with very high resource requirements. This paper proposes architecture...
Itzama Lopez-Yanez, Amadeo J. Arguelles-Cruz, Oscar Camacho-Nieto, Cornelio Yanez-Marquez
Pages: 680 - 711
In this work we predict time series of air pollution data taken in Mexico City and the Valley of Mexico, by using the Gamma Classifier which is a novel intelligent associative mathematical model, coupled with an emergent coding technique. Historical and current data about the concentration of specific...
Jiaoling Zheng, Changjie Tang, Shaojie Qiao, Ning Yang, Yue Wang
Pages: 728 - 738
This paper proposes the concept of intervention rule which tries to reveal the interventional relationship between elements in a system in the following three aspects. (1) Casual relationship. Intervention rule shows which element is the cause and which element is the consequence. (2) Quantitative relationship:...
Farshad Arvin, Khairulmizam Samsudin, Abdul Rahman Ramli, Masoud Bekravi
Pages: 739 - 748
This paper analyzes the collective behaviors of swarm robots that play role in the aggregation scenario. Honeybee aggregation is an inspired behavior of young honeybees which tend to aggregate around an optimal zone. This aggregation is implemented based on variation of parameters values. In the second...