International Journal of Computational Intelligence Systems

ISSN: 1875-6883
Volume 4, Issue 5, September-October 2011
Meiyu Fang, Xiaolin Zheng, Deren Chen
Pages: 759 - 767
In traditional models, fuzzy sets are used to describe trust degree and evaluate reputation for vague words. But in some practical applications, the determination of membership functions associated with vague concepts is difficult or impossible. This paper builds a reputation computing model based on...
Jia-Hong Li, Wei-Bin Lee, Dengpan Ye, Tzong-Jye Liu, Chuan Qin
Pages: 797 - 805
A secret sharing model can secure a secret over multiple noise-like shadows and remain recoverable despite multiple shadow failures. Even if some of the shadows are compromised, the secret will not be revealed as long as the number of the compromised shadows is smaller than a pre-determined threshold....
Joe Hoffert, Douglas C. Schmidt, Aniruddha Gokhale
Pages: 806 - 816
Several adaptation approaches have been devised to ensure end-to-end quality-of-service (QoS) for enterprise distributed systems in dynamic operating environments. Not all approaches are applicable, however, for the stringent accuracy, timeliness, and development complexity requirements of distributed...
V.R Ghezavati, S.J. Sadjadi, M. Dehghan Nayeri
Pages: 837 - 854
Cellular manufacturing (CM) has been identified as an innovative practice for manufacturer to achieve efficiency as well as flexibility under an uncertain environment. This study addresses a new mathematical robust model for a cellular manufacturing problem integrated with tactical aspects under supply...
Yubin Zhan, Jianping Yin, Xinwang Liu
Pages: 863 - 873
Recently, many feature extraction methods, which are based on the matrix representation of image and matrix bidirectional projection technique, are proposed. However, these methods in solving the two projection matrices will suffer from non-optimized or non-convergent solution. To overcome this problem,...
Cai Guo-Rong, Li Shao-Zi, Wu Yun-Dong, Chen Shui-Li, Su Song-Zhi
Pages: 874 - 885
This paper presents an automated image registration approach to detecting changes in multi-temporal remote sensing images. The proposed algorithm is based on the scale invariant feature transform (SIFT) and has two phases. The first phase focuses on SIFT feature extraction and on estimation of image...
S. Siva Sathya, S. Kuppuswami, S. Sendhil Kumar
Pages: 886 - 893
Genetic Algorithms are efficient search and optimization techniques inspired by natural evolution. To show the difficulties in solving constrained optimization problems through GA, the 0/1 knapsack problem with user specific object preferences has been taken up. A new genetic operator, namely, ‘gene...
Gizem Cifci, Gülcin Büyüközkan
Pages: 894 - 909
Nowadays the effect of industrial production on the environment brought out the importance of the green concept in supply chains. Particularly for supplier firms, greening is essential in a supply chain because with growing worldwide awareness of environmental protection, green production has become...
Ping Ren, Zude Zhou, Quan Liu
Pages: 910 - 920
In the MS/TP network, token is passed according to the address of master station. A novel token passing algorithm was proposed based on the characteristics of MS/TP network frame distribution and the requirements of real-time performance. The algorithm adopts distributed control method, which can adjust...
Ramon A Carrasco, Pedro Villar, Miguel J Hornos, Enrique Herrera-Viedma
Pages: 946 - 959
We present a model made up of linguistic multi-criteria decision making processes to integrate the answers to heterogeneous questionnaires, based on a five-point Likert scale, into a unique form rooted in the widespread course experience questionnaire. The main advantage of having the resulting integrated...
Jianbin Gao, Mao Ye, Jianping Li, Qi Xia
Pages: 991 - 1001
Minor component analysis (MCA) are used in many applications such as curve and surface fitting, robust beam forming, and blind signal separation. Based on the generalized eigen-decomposition, we present a completely different approach that leads to derive a novel MCA algorithm. First, in the sense of...
Shaojie Qiao, Tianrui Li, Michael Chau, Jing Peng, Yan Zhu, Hong Li
Pages: 1012 - 1021
To effectively score pages with uncertainty in web social networks, we first proposed a new concept called transition probability matrix and formally defined the uncertainty in web social networks. Second, we proposed a hybrid page scoring algorithm, called WebScore, based on the PageRank algorithm and...
Jerzy Gomula, Krzysztof Pancerz, Jaroslaw Szkola
Pages: 1022 - 1031
In the research presented in the paper, we test the classification potential for different configurations of the MMPI data used for nosological diagnosis of patients with mental disorders. Originally, each patient is described by an MMPI profile consisting of a set of values of thirteen attributes (the...
Avatharam Ganivada, Sankar K. Pal
Pages: 1042 - 1051
A novel fuzzy rough granular neural network (NFRGNN) based on the multilayer perceptron using backpropagation algorithm is described for fuzzy classification of patterns. We provide a development strategy of knowledge extraction from data using fuzzy rough set theoretic techniques. Extracted knowledge...
Shihong Yue, Teresa Wu, Zhiqing Liu, Xian Zhao
Pages: 1052 - 1061
The quality of reconstructed images is an important and direct criterion to quantitatively evaluate the effectiveness of reconstruction algorithms in electrical tomography (ET). Unfortunately, there lacks of effective and efficient approach to assessing the quality of ET images in literature and practices....
Wojciech Jaworski
Pages: 1062 - 1069
Our aim is to develop methodology for recognition of Internet portal users on the base of their browsing patterns. This is a classification task in which we have thousands values of decision attribute and objects are described by means of sequences of symbols. We develop feature selectors which make...
Ying Xia, Guo-Yin Wang, Xu Zhang, Gyoung-Bae Kim, Hae-Young Bae
Pages: 1070 - 1079
Trajectory similarity measure is an important issue for analyzing the behavior of moving objects. In this paper, a similarity measure method for network constrained trajectories is proposed. It considers spatial and temporal features simultaneously in calculating spatio-temporal distance. The crossing...
Lili Liu, Yilong Yin, Wei Qin, Ying Li
Pages: 1090 - 1099
Gait recognition aims to identify people by the way they walk. In this paper, a simple but e ective gait recognition method based on Outermost Contour is proposed. For each gait image sequence, an adaptive silhouette extraction algorithm is firstly used to segment the frames of the sequence and a series...