Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2024: 1.7
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Mishra, K.K.
Article Type: Editorial
DOI: 10.3233/JIFS-169266
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3229-3229, 2017
Authors: Navarro, Pedro Luis Mateo | Ruiz, Diego Sevilla | Pérez, Gregorio Martínez
Article Type: Research Article
Abstract: GUI testing is essential to provide validity and quality of system response, but applying it to a development is not straightforward: it is time consuming, requires specialized personnel, and involves complex activities that sometimes are implemented manually. GUI testing tools help supporting these processes. However, integrating them into software projects may be troublesome, mainly due to the diversity of GUI platforms and operating systems in use. This work presents the design and implementation of Open HMI Tester (OHT), an application framework for the automation of testing processes based on GUI introspection. It is cross-platform, and provides an adaptable design aimed …at supporting major event-based GUI platforms. It can also be integrated into ongoing and legacy developments using dynamic library preloading. OHT provides a robust and extensible basis to implement GUI testing tools. A capture and replay approach has been implemented as proof of concept. Introspection is used to capture essential GUI and interaction data. It is used also to simulate real human interaction in order to increase robustness and tolerance to changes between testing iterations. OHT is being actively developed by the Open-source Community and, as shown in this paper, it is ready to be used in current software projects. Show more
Keywords: Graphical User Interfaces, GUI testing, application frameworks, capture and replay, open-source, cross-platform
DOI: 10.3233/JIFS-169267
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3231-3243, 2017
Authors: Singh, Shailendra Pratap | Kumar, Anoj
Article Type: Research Article
Abstract: Differential evolution algorithm is a very popular nature inspired algorithm and it is used for solving single objective optimization problems. Due to its high convergence rate and ability to produce diverse solutions, it has been extended to solve multiobjective optimization problems. Many versions of DE were proposed however multiobjective versions, where concept of Pareto optimality is used, are most popular. Pareto Based Differential Evolution (PBDE) is one of them. Although performance of this algorithm is very good, yet its convergence rate can be further improved by minimizing the time complexity of nondominated sorting and by improving the diversity among solutions. …This has been implemented by using efficient nondominated algorithm whose time complexity is better than the previous one and a new mutation scheme is implemented in DE which can provide more diversity among solutions. The proposed variant adds one more vector named as Homeostasis mutation vector in the existing mutation vectors to provide more bandwidth for selecting effective mutant solutions. The proposed approach provides more promising solutions to guide the evolution and helps DE escaping the situation of stagnation. Performance of proposed algorithm is evaluated on twelve benchmark test functions (bi-objective and tri-objective) on Pareto-optimal front. Performance of proposed algorithm is compared with other state-of-the-art algorithms on five multiobjective evolutionary algorithms (MOEAs). The result verifies that our proposed Homeostasis mutation strategy performs better than other state-of-the-art variants. Show more
Keywords: Adaptation, optimization, multi-objective evolutionary algorithm
DOI: 10.3233/JIFS-169268
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3245-3257, 2017
Authors: Siddiqa, Aisha | Karim, Ahmad | Saba, Tanzila | Chang, Victor
Article Type: Research Article
Abstract: Efficient response to search queries is very crucial for data analysts to obtain timely results from big data spanned over heterogeneous machines. Currently, a number of big-data processing frameworks are available in which search operations are performed in distributed and parallel manner. However, implementation of indexing mechanism results in noticeable reduction of overall query processing time. There is an urge to assess the feasibility and impact of indexing towards query execution performance. This paper investigates the performance of state-of-the-art clustered indexing approaches over Hadoop framework which is de facto standard for big data processing. Moreover, this study leverages a comparative …analysis of non-clustered indexing overhead in terms of time and space taken by indexing process for varying volume data sets with increasing Index Hit Ratio. Furthermore, the experiments evaluate performance of search operations in terms of data access and retrieval time for queries that use indexes. We then validated the obtained results using Petri net mathematical modeling. We used multiple data sets in our experiments to manifest the impact of growing volume of data on indexing and data search and retrieval performance. The results and highlighted challenges favorably lead researchers towards improved implication of indexing mechanism in perspective of data retrieval from big data. Additionally, this study advocates selection of a non-clustered indexing solution so that optimized search performance over big data is obtained. Show more
Keywords: Big data, indexing, big data processing, data retrieval
DOI: 10.3233/JIFS-169269
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3259-3271, 2017
Authors: Sarika, S. | Paul, Varghese
Article Type: Research Article
Abstract: Internet phishing has become a continual threat that keeps growing day by day. Phishing takes advantage of the user’s trust and use social engineering techniques to deceive them. Despite having several anti-phishing strategies, the threat of phishing is not mitigated as modern types of attack keeps coming to the fore. Nowadays, phishers launch sophisticated phishing attacks which tricks users to submit their credentials by leveraging the facilities tabs offer to web browsers. Browser security is important in this perspective. This paper explains a heuristic method to defend phishing attacks by utilizing software agents for parallel attack recognition. The main focus …is on a browser based attack called Tabnabbing which takes action in inactive browser tabs. The proposed method uses agents in three levels to continuously monitor the presence of attack in regular intervals at multiple tabs and warn the user at the earliest. This approach also protects the users against URL obfuscations and malicious links. Results show that the proposed method outperforms the state of the art phishing detection methods and achieves an accuracy of 97.3%. Show more
Keywords: Tabnabbing, intelligent agents, internet security, antiphishing
DOI: 10.3233/JIFS-169270
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3273-3284, 2017
Authors: Punhani, Akash | Kumar, Pardeep | Nitin,
Article Type: Research Article
Abstract: Many variants of the mesh interconnection networks have been suggested in past by the placement of the extra links to the existing mesh topology. In this paper, we have searched for the optimal links that should place in the topology so as to reduce the average inter node distance of the resultant topology. This is a heuristic search problem which has the single objective that is to minimize the average inter node distance of the topology. The Improved Environmental Adaptation Method (IEAM) is one of the latest techniques based on phenotypic properties of genes, which prove to be fast in …searching the optimal solution to the problem. The paper describes in detail the various operator of IEAM and compares its performance with the existing heuristic technique that is Genetic algorithm. The IEAM obviously proves to be better in finding the results. After finding the optimized topology the resultant is tested for the performance with existing variant of the topology like mesh, center concentrated mesh, T Mesh for performance and proves to give the improvement more than 2 times. Show more
Keywords: Optimization, environmental adaptation method, interconnection network, average inter node distance, performance evaluation
DOI: 10.3233/JIFS-169271
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3285-3295, 2017
Authors: Piryani, Rajesh | Gupta, Vedika | Singh, Vivek Kumar
Article Type: Research Article
Abstract: This paper describes an integrated aspect level opinion summary generation system for movie reviews. The system, named as Movie Prism, analyses each movie review, locates aspect term in it, identifies opinion about those aspects and then generates a visual aspect based opinion summary of the movie in question. At present, the movie reviews and other related information is being automatically fetched from IMDb for all the movies released during the years 2010 to 2014. The system has an integrated crawler for this purpose. Further, ontology for the movie domain is created for better aspect identification. We have evaluated the system …on three annotated movie review datasets. The system obtains good accuracy. Overall the designed system is capable of producing visual aspect level opinion summaries from unstructured textual reviews, without any need of training and results have a reasonable degree of accuracy. Show more
Keywords: Aspect level sentiment analysis, linguistic approach, natural language processing (NLP), ontology
DOI: 10.3233/JIFS-169272
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3297-3311, 2017
Authors: Kustiawan, Iwan | Chi, Kuang-Hui
Article Type: Research Article
Abstract: Handoff decision is an important issue governing the perceived quality of service by a mobile terminal. This study aims to provide a handoff scheme leveraging a Kalman filter combined with a fuzzy system that is intended for a UE (user equipment) to carry out while roaming among different radio access technologies. Handoff decision is made in light of UE-discovered information such as RSS (received signal strength), data rate, network latency, and user preference as input criteria. A Kalman filter is tasked to reduce noisy RSSs. Then a fuzzy inference engine fuses the filtered-RSSs with the remaining three metrics to deduce …whether to launch handoff. UE movements within heterogeneous wireless networks are simulated with a symmetric random walk model. The Pascal’s triangle is applied to visualize UE’s mobility patterns as an elegant way. Simulation results show that the proposed scheme outperforms other approaches in terms of reducing unnecessary handoffs. Show more
Keywords: Kalman filter, fuzzy system, handoff decision, random walk model, heterogeneous wireless network
DOI: 10.3233/JIFS-169273
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3313-3324, 2017
Authors: Selwal, Arvind | Gupta, Sunil Kumar | Surender,
Article Type: Research Article
Abstract: Multi-modal biometric systems (MBS) are an enhancement of unibiometric systems where recognition is based on multiple biological traits of the user. Once the biological traits of a user are captured through sensors, the unique feature points are extracted from each modality and represented as a feature vector. The privacy and security of feature templates in biometric recognition systems are the top design issues, which is gaining the attention of the majority of research community. In this paper, a hybrid template security technique is designed for a bi-modal biometric system based on fingerprint and hand geometry. The technique first use the …bio-hashing, in order to transform the actual feature vectors (FVs) into respective binary feature vectors (BFVs) and then applying a transformation scheme to fuse the binary vectors into a secured template. In order to improve the storage overhead for the protected template, a novel octet indexing technique is applied on the intermediate feature vector (IFV). The proposed technique results in improvement of storage requirement by representing secured template as a 64-bits vector with octet indexing. Furthermore, the proposed technique results in the overall enhancement of the recognition accuracy as compared to fingerprint and hand geometry uni-biometrics. The proposed hybrid scheme results in a recognition rate of 98.4% and an equal error rate (EER) of 0.48%, with improvement in template storage overhead up to 50%. Show more
Keywords: Biometric system, feature fusion, multimodal biometric, template indexing, template security
DOI: 10.3233/JIFS-169274
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3325-3337, 2017
Authors: Pandey, Ramesh C. | Singh, Sanjay K. | Shukla, K.K.
Article Type: Research Article
Abstract: The purpose of this paper is to detect tampering in the video using passive forensic method. With the extensive availability of sophisticated video editing software and tools, it has become easy to forge the video using different tampering techniques. A well-known video tampering technique is to duplicate the frames or manipulate the contents of the frames to remove and hide the objects or person in a video. Video forensic is necessary because people tampered the video to get justice from court of law on the basis of video evidence, disgrace the important celebrity and to hide or expose some unwanted …object. In this paper, we propose a passive forensic method to expose dynamic object removal and frames duplication by detecting the noise variance between original and tampered video frames. The proposed method exploits sensor noise features, extracted from each frame of the video using Discrete Wavelet Transform (DWT) and nonlinear thresholding such as Hard and Soft with Stein’s Unbiased Risk Estimator (SURE) shrinkage. Gaussian Mixture Density (GMD) is used as Bayesian classifier and Expectation-Maximization (EM) algorithm set the parameters of the GMD. Implementation results demonstrate that we are getting commendable processing speed, accuracy 97.36-96.26%, recall 99.80-98.94% and precision 97.34-87.95% respectively for object removal and frame duplication detection in comparison to existing methods. Proposed method successfully detect and localize forgery in the given video. Show more
Keywords: Passive forensic, video tampering, noise features, hard thresholding, soft thresholding, SURE shrinkage, Gaussian Mixture Density (GMD)
DOI: 10.3233/JIFS-169275
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3339-3353, 2017
Authors: He, Jinqiang | Sun, Xiaojie | Li, Wei | Chen, Jie
Article Type: Research Article
Abstract: Ant system (AS), the first Ant Colony Optimization algorithm (ACO), was proposed by mimicking the foraging behavior of real ants. The inspiring source of ACO is the pheromone laying and following behavior of real ants. The pheromone serves as numerical information to reflect ants’ experience accumulated. However, tests on AS indicate that its pheromone update method can’t always retain the ants’ useful search experiences which mainly refer to the better solutions found. In this study we propose a new pheromone update strategy that uses the Traveling Salesman Problem (TSP) as the instance problem. The idea is to update the pheromone …on each edge in TSP by a variable termed component best solution (CBS) matrix, which stores the length of the best tour found for each edge. Simultaneously, the importance of pheromone is strengthened gradually by augmenting the value of its exponent. To investigate its effectiveness, comparisons of experiments are conducted among AS, Elitist ACO and the new algorithm (CBSACO) on five TSP instances. Results show that the performance of CBSACO outperforms that of AS and Elitist ACO. Because this modification to AS is based on the pheromone update method, it can be easily transferred to other combinatorial optimization problems. Show more
Keywords: Ant colony optimization (ACO), pheromone, component best solution, Elitist AC
DOI: 10.3233/JIFS-169276
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3355-3364, 2017
Authors: Trivedi, Munesh Chandra | Mishra, Shilpi | Yadav, Virendra Kumar
Article Type: Research Article
Abstract: The Data hiding concept such as steganography can provide security and facilitate the safe exchange of important information in the digital world. This concept can be used with the various multimedia such as text, image, video, audio acting as cover medium to carry out the one way exchange or two way exchange of secret information. The presented paper focusses only on the kind of steganography that uses audio as a carrier. This concept of steganography is, act of encoding mystery data in invisible manner. Steganography along with cryptography add a step futher in security by hiding cipher text in such …a manner that middle man is unaware about the secret message is concealed in it. Cipher text generated by encryption creates suspects but steganography creates environment that looks like normal behavior, hiding suspect nature of cipher text thus making it more secure. Audio steganography is the investigation of concealing a few mystery content or audio data in a host audio. This paper presents execution of two level security of end user information by associating the two fields of system security, cryptography and steganography. Concept of index based chaotic sequence is used for encryption. It carries two approaches which make the cryptanalysis and steganalysis furthermore difficult as compare to simple LSB method. First approach is encrypting the secret text using index based chaotic sequence. The proposed approach is more secure, strong and robust, giving security to our secret information. Second approach is hiding output generated by first approach using the concept of LSB with XOR method. It gives extra level of security by creating minimum distortion in host audio file simultaneously maintaining high embedding capacity. Show more
Keywords: Audio steganography, LSB technique, index based chaotic sequence, XORing method
DOI: 10.3233/JIFS-169277
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3365-3375, 2017
Authors: Sang, Haitao | Zhou, Zhen | Qu, Fang | Ke, Qiao
Article Type: Research Article
Abstract: In order to improve the recognition rate and the recognition time of the low resolution image, the face recognition technology based on matching degree and local phase quantization is studied. In face recognition, the dynamic time warping strategy is applied to the fast extraction of face contour, and a parallel matching local phase quantization algorithm is proposed to realize the face recognition, which can be expressed by a number of 2D curves extracted from the surface. The experimental results verify the feasibility and effectiveness of the proposed algorithm on the face database of ORL, Yale B and AR, and show …it can obtain better recognition results especially in real time and robustness. Show more
Keywords: Face recognition, matching degree, feature extraction, local phase quantization
DOI: 10.3233/JIFS-169278
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3377-3385, 2017
Authors: Liu, Kun | Li, Jianqing | Chris, H.Z.
Article Type: Research Article
Abstract: In general, there are two sorts of strategies of energy saving and CO2 emissions reduction in transportation systems using wireless sensor network for transportation. They are single-level optimization solutions and the bi-level optimization ones. The bi-level optimization solutions are considered a sort of optimization in both road side unit (RSU) side and on-board unit (OBU) one. However, the single-level optimization solutions are considered optimization only in RSU or OBU side. A bi-level optimization model with Genetic Algorithm/Particle Swarm Optimization (GA/PSO) hybrid algorithm is proposed to improve performance instead of non-hybrid algorithms. The upper-level optimization model considers the real-time traffic …characteristics of the traffic flows near the signalized road intersection. At the same time, vehicles in the lower-level optimization model retrieve the real-time traffic signals using vehicular networks. Then, the traffic signals update the schedule and the vehicles motion states for greener environment factor respectively. Simulation results indicate that the GA/PSO hybrid algorithm performs much better than non-hybrid ones especially when the traffic is heavy. The fuel consumption and CO2 emissions are greatly reduced. Show more
Keywords: Wireless sensor networks, hybrid algorithm, transportation management, bi-level optimization, energy saving
DOI: 10.3233/JIFS-169279
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3387-3400, 2017
Authors: Wang, Tong | Wang, Yunfeng | Han, Chong
Article Type: Research Article
Abstract: In Wireless Ad hoc Networks (WANET), to organize sensor nodes for data collection is an important research issue. Clustering is an effective technique for prolonging the network lifetime. However, the Cluster Header (CH) in a cluster always involves a lot of data forwarding tasks, rather than its Cluster Members (CMs). This energy consumption overloading inevitably leads to the “hot spot” problem. With these in mind, an Energy-Balanced and Unequally-Layered Routing Protocol (EBULRP) is proposed in this article. The main emphasis is on balancing the energy consumption among CHs. In our design, the network is decoupled into multiple layers with different …width, where the radius of clusters is differentiated at each layer. The core is to organize those CHs closer to the sink node, with more energy for inter-cluster data forwarding. Simulation results show that the proposed EBULRP effectively balances the energy consumption among CHs, and further prolongs the network lifetime. Show more
Keywords: Wireless sensor networks, communication protocol, routing, energy efficiency
DOI: 10.3233/JIFS-169280
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3401-3412, 2017
Authors: Kumar, Malay | Meena, Jasraj | Tiwari, Shailesh | Vardhan, Manu
Article Type: Research Article
Abstract: Cloud computing has become ubiquitous, offers an economical solution for convenient on-demand access to computing resources, which enable the resource-constrained clients to execute extensive computation. However, outsourcing of data and computation to the cloud server is a great cause of concern, such as confidentiality of input/output and verifiability of the result. This paper addresses the problem of designing outsourcing algorithm for linear regression analysis (LR), which is an important data analysis technique and widely applied across multiple domains. The outsourcing framework illustrated by the following scenario: a client is having a large dataset and needs to perform regression analysis, but …unable to process due to lack of computing resources. Therefore, the client outsources the computation to the cloud server. In the proposed LR outsourcing algorithm, the client outsources LR problem to the cloud server without revealing to them either the input dataset and the output. The algorithm is a non-interactive solution to the client, it sends only input and receives output along with the proof of verification from the cloud server. The client in the proposed algorithm able to verify the correctness of result with an optimal probability. The analytical analysis shows that the algorithm is successfully meeting the challenges of correctness, security, verifiability, and efficiency. The experimental evaluation validates the proposed algorithm. The result analysis shows that the algorithm is highly efficient and endorses the practical usability of the algorithm. Show more
Keywords: Regression analysis, computation outsourcing, cloud computing, linear transformation
DOI: 10.3233/JIFS-169281
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3413-3427, 2017
Authors: Bu, Hao | Zhu, Rong | Chen, Shihong | Tan, Xiaoqiong
Article Type: Research Article
Abstract: π -calculus is one of the most effective means for the modeling of the concurrent mobile system at the present stage. The paper starts with a brief introduction of π -calculus, which concerns mutual simulation, the fundamentals of mobile computing, and the concept of interaction with some basic grammars and regulations of π -calculus while the system mobility is discussed with special focuses on the relation between the referent and the mobility, and the relation between the granular size and mobility. Then the analysis goes on to discuss the sorting problems that frequently occur in modeling concurrent systems. Through the …discussion of the underlying sorting algorithms based on π -calculus, five processes are established by applying such artless thoughts as “looking for the seats in the cinema” or “changing keys among a group” to do quick concurrent locating and instant sorting, so that the sorting problems of specific elements in the well-ordered sets could be solved on the basis of π -calculus. In this way, the sorting results will eventually be displayed in the specified process and conveniently help the readings of other processes. Show more
Keywords: π-calculus, mobile computing, sorting, cinema algorithm, key change algorithm
DOI: 10.3233/JIFS-169282
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3429-3445, 2017
Authors: Ma, Tao | Wang, Fen | Wang, Jianzhou | Yao, Yukai | Chen, Xiaoyun
Article Type: Research Article
Abstract: Electric load prediction is an important decision tool in area of electricity economy. Recently researchers have presented innovative models to improve the forecasting accuracy of short-term electricity series, which is valuable in allowing both consumers and electric power sector to make effective planning. This study proposed novel combing optimization model to improve the precision of electric load forecasting and called SSPM. First, taken the advantage of linear prediction for the seasonal autoregressive integrated moving average (SARIMA) model and non-linear prediction for the support vector machines (SVM) model to combine a new model. Next, the produce results by SARIMA model is …regarded as linear component and used SVM model for correcting the residual from SARIMA as non-linear component of forecasting results. Third, in order to show the dynamic relationship of linear and non-linear components, the weight variable of α1 and α2 are proposed that optimized by particle swarm optimization (PSO) algorithm with lower error of fitness function, the combining model is applied in the daily electric load data at New South Wales (NSW) in Australia. The experimental results indicate that the proposed optimization model obtains better performance of precise and stability than models of SARIMA and SVM respectively, outperform than conventional artificial neural network (ANN). Although the novel model is applied to electric load forecasting in this paper, it has more scopes for application in a number of areas to gain improvement of forecast accuracy in complex time series. Show more
Keywords: Support vector machines, seasonal autoregressive integrated moving average, combining optimization model, electric load forecasting, particle swarm optimization algorithm
DOI: 10.3233/JIFS-169283
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3447-3459, 2017
Authors: Song, Xiaoying | Zhang, Qilong | Sun, Wei | Wei, Wei
Article Type: Research Article
Abstract: Due to the imbalanced energy consumption among nodes, some nodes die prematurely, which decreases the network lifetime in wireless sensor networks, especially many nodes and one Sink. To solve this problem, in this paper, we propose an energy-efficient data gathering protocol in unequal clustered WSN utilizing fuzzy multiple criteria decision making called DGUCF. In DGUCF, nodes can be divided into unequal clusters to balance energy consumption in the network scenario with nodes of non-uniform distribution and heterogeneous energy. First, DGUCF adopts an intuitionistic fuzzy analytic process and hierarchical fuzzy integral to select cluster heads synthetically. Then, we propose a new …cluster head competition radius that is fit for this network scenario. In succession, to balance energy consumption, each cluster head transmits data packets over the next hop cluster heads in proportion to their residual energy. Finally, the simulation results demonstrate that the DGUCF protocol can balance energy consumption effectively, and the network lifetime can be prolonged. Show more
Keywords: Wireless sensor networks, unequal cluster, cluster head, intuitionistic fuzzy analytic hierarchy process, fuzzy multiple criteria decision making
DOI: 10.3233/JIFS-169284
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3461-3473, 2017
Authors: Lei, Liu | Ming, Diao
Article Type: Research Article
Abstract: This paper focuses on the issue of the large calculation when searching for the optimal solution of weighted subspace fitting algorithm (WSF) in the Direction of Arrival (DOA) estimation and introduces the artificial bee colony algorithm (ABC) to optimize solving process. Taking advantage of Niche technique and coordinating with improved strategy and control exclusion method, the proposed algorithm can overcome the weakness that bee colony algorithm itself can only get the global solutions, and hence get the local optimization solution for the multimodal problem. The experiment results demonstrate the proposed algorithm has small computation load, less controlling parameters, and high …accuracy. Show more
Keywords: DOA, weighted subspace fitting algorithm, artificial bee colony algorithm, niche
DOI: 10.3233/JIFS-169285
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3475-3485, 2017
Authors: Shi, Yanli | Nan, Jizhu
Article Type: Research Article
Abstract: Fuzzy c-means is one of the most popular partitional clustering. However, it has the shortcoming that it is sensitive to initial centers and noises. Density-based clustering algorithm overcomes this shortcoming, but cannot obtain the better clustering results when the density of data space has uneven distribution. Grid-based method is advantageous to save computational time, but the clustering performance was unsatisfied. Based on the above analysis, the improved FCM algorithm based on initial center optimization method is proposed. First, the initial center optimization method based on density and grid is presented to avoid the sensitivity of FCM to initial centers. Then, …improved FCM algorithm based on initial center optimization method is proposed. Finally, the performance and effectiveness of the proposed clustering algorithm is evaluated by 4 San Francisco taxi GPS cab mobility traces data sets, and the experimental results show that the proposed algorithm has better clustering results. Show more
Keywords: Fuzzy clustering, fuzzy c-means, density-based clustering, grid-based method
DOI: 10.3233/JIFS-169286
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3487-3494, 2017
Authors: Linqin, Cai | Shuangjie, Cui | Min, Xiang | Jimin, Yu | Jianrong, Zhang
Article Type: Research Article
Abstract: Hand gesture recognition is widely used in human-computer interaction (HCI) and has attracted substantial researching attentions. This paper aims to develop low-complexity and real-time solutions of dynamic hand gestures recognition using RGB-D depth sensor for natural human-computer interaction applications. We combine Euclidean distance between hand joints and shoulder center joint with the modulus ratios of skeleton features to generate a unifying feature descriptor for each dynamic hand gesture. And then, an improved dynamic time warping (IDTW) algorithm is proposed to obtain the final recognition results, which applies the weighted distance and a restricted search path to avoid the huge computation …in conventional DTW and improves the recognition performance. Experimental results show that the proposed algorithm of dynamic hand gesture recognition not only achieves higher average recognition rate of 96.5% and better performance in response time, but also is robust to uncontrolled environments. Finally, according to our hand gesture recognition solutions, we develop one real-life HCI applications to control a virtual coalmine environment, which operates accurately and efficiently. Show more
Keywords: Dynamic gesture, red green blue-depth (RGB-D), human-computer interaction (HCI), dynamic time warping (DTW), virtual environment
DOI: 10.3233/JIFS-169287
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3495-3507, 2017
Authors: Hu, Fengjun | Tu, Chun
Article Type: Research Article
Abstract: According to the defects of the standard particle filter algorithm in target tracking of mobile sensor networks, such as low accuracy, large network energy consumption and poor anti-noise ability, an optimization model is proposed for target tracking of mobile sensor network based on motion state prediction. First, centroid algorithm was adopted to construct the node localization model, and then the features of the position and the direction of the moving target in the mobile sensor network were as the measurements. The method of integral point assignment was adopted to self-adaptionly optimize the weights of the standard particle filter algorithm, and …the introduced modifying factor, the value assignment of integral point was for self-adaption correction, then the difference between the observed and predicted values of the system was provided news residual interest knowledge in the re-sampling phase, to self-adaption modify the sampling particles by measuring the news. And then improve the operation efficiency of the particle filter algorithm with asymmetric kernel function, and provide new residual interest knowledge with the difference between the system current time and forecast values in the re-sampling phase, self-adaptive adjusting of sampling population through measuring the new rates. The simulation experiments show that the proposed improved particle filter algorithm has the higher accuracy and better stability for target tracking, and has lower energy consumption of the network. Show more
Keywords: Emerging sensor networks, movement trend prediction, parallel optimisation, integral point assignment, self-adaption correction
DOI: 10.3233/JIFS-169288
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3509-3524, 2017
Authors: Singh, Shailendra Pratap | Kumar, Anoj
Article Type: Research Article
Abstract: The differential evolution, one of the most powerful nature inspired algorithm is used to solve the real world problems. This algorithm takes minimum number of function evaluations to reach near to global optimum solution. Although its performance is very good, yet it suffers from the problem of stagnation. In this paper, some new mutation strategies are proposed to improve the performance of differential evolution (DE). The proposed method adds one more vector named as Homeostasis mutation vector in the existing mutation vectors to provide more bandwidth for selecting effective mutant solutions. The proposed approach provides more promising solutions to guide …the evolution and helps DE escaping the situation of stagnation. Performance of proposed algorithm is compared with other state-of-the-art algorithms on COCO (Comparing Continuous Optimizers) framework. The result verifies that our proposed Homeostasis mutation strategy outperform most of the state-of-the-art DE variants and other state-of-the-art population based optimization algorithms. Show more
Keywords: Adaptation, optimization, evolutionary algorithm
DOI: 10.3233/JIFS-169289
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3525-3537, 2017
Authors: Zong, Liang | Bai, Yong | Huang, Tongcheng | Zhou, Shihao
Article Type: Research Article
Abstract: The satellite network has the advantages of wide coverage, convenient access, and the influence of the natural environment. Wireless multi-hop network is suitable for the occasion that cannot be easily or inconvenient to lay network facilities and the occasion of the need for rapid automatic networking. Multi-hop network and the satellite network may combine a heterogeneous network that can provide an effective and convenient way to access the network in the ocean or in remote areas. This paper, firstly, builds a heterogeneous network with satellite network and multi-hop network, and discusses the bandwidth delay product (BDP) of heterogeneous network, then …proposes a new end-to-end congestion control algorithm. The proposed scheme at the outset increases the dynamic time interval for the initial transmission data that can reduce the backlog of burst data at the access point, and then increases the amount of data transmission in the slow start that can improve high bandwidth delay product of satellite network. In the congestion avoidance, it adjusts the congestion window size by monitoring the random packet loss and congestion packet loss. This algorithm can effectively solve the long delay in heterogeneous networks, and improve the accuracy of the high packet loss rate monitoring in multi hop networks and satellite networks. The proposed algorithm can effectively solve the influence of the long delay in the heterogeneous network, at the same time it can distinguish the different packet loss. Show more
Keywords: Congestion control, multi-hop network, satellite network, heterogeneous networks
DOI: 10.3233/JIFS-169290
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3539-3550, 2017
Authors: Chen, Xue Gang
Article Type: Research Article
Abstract: Network reliability is an important index in measuring the reliability of large-sized network, but network reliability calculation is a NP-hard problem, and simulation is a feasible approach to estimating network reliability. Aiming at the problem of reliability evaluation in a complex network, develop a general scheme that combines Crude Monte Carlo and event-driven, and a novel reliability assessment method based on event-driven is put forward. The unbiased and the accurate estimation of the proposed method are analyzed from a theoretical point of view. Experimental results demonstrate that the proposed method is more efficient than other algorithms, such as high simulation …efficiency, fine estimation accuracy and greatly reducing the algorithm complexity. Show more
Keywords: Network reliability, failure events, Monte-Carlo, event-driven, connectivity
DOI: 10.3233/JIFS-169291
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3551-3560, 2017
Authors: Bagga, Sachin | Girdhar, Akshay | Trivedi, Munesh Chandra
Article Type: Research Article
Abstract: Thread based programs are very much efficient in terms of increasing application response, improving structure of the program, combining with the remote procedure call(RPC) and complete utilization of the computation available. A shared-memory system along with the multithreading, can result in developing a parallel system on which different threads can run in parallel on different processor cores. Even when there are more number of threads than the processor cores, scheduling along with context switching can be done to ensure start of execution of all the threads. Keeping these benefits in mind, present research formulates that in certain cases, the results …of multithreading based programming on a single system can be more convincing than making use of the cluster based distributed programming. Proposed work tests all these claims, by decomposing an image having salt and pepper noise into number of small images and then applying median filtering parallely on all these subimages using multithreading approach. Various performance measurement metrics like % Idle Time, % Processor Time, % Maximum Frequency, % Processor Utility, total execution time are used to validate the results generated by the proposed approach. Remote method invocation (RMI) based cluster for distributed programming has also been deployed to perform the same operation on a cluster based architecture with number of nodes working together, to compare the results of both the architectures. Show more
Keywords: SPMD, time sharing, median filter, Java, RMI, threads, processor frequency, processor utility
DOI: 10.3233/JIFS-169292
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3561-3573, 2017
Authors: Gupta, Tanvi | Gandhi, Tapan K. | Panigrahi, B.K.
Article Type: Research Article
Abstract: Magnetic Resonance Imaging (MRI) is a diagnostic tool of remarkable potential in the area of neuroscience and clinical neuroimaging. The diagnostic accuracy can be limited by incompetence of the operating personnel, which can be supplemented by machine learning algorithms for classification of physiology and pathology. This paper uses effective information feature extraction, principal component analysis (PCA) for feature reduction and support vector machine (SVM) for classification of multi-sequence MR images of 7 patients. All axial slices of the brain are classified into normal and abnormal images. Various methods for feature extraction were tested among which effective information yielded the highest …accuracy of 80.8% in a set of 677 images used for training and testing. The sensitivity and specificity were 80% and 81.06%, respectively. Different grid sizes were tested, and the highest accuracy was reported for 2 × 2 which indicates that the feature extraction must be taken over a small grid to ensure detection of minor variation from normal. The image sequences tested considered in the study are T1 weighted, T2 weighted, Fluid-attenuated inversion recovery (FLAIR), and post contrast T1 weighted. T2 weighted images were best classified with the maximum accuracy of 95.97%. This method proved to be effective to classify the images of all four sequences with accuracy ranging from 92–96%. The method was also tested with out of sample data and the accuracy obtained was 72.4%. The novelty of this work lies in the classification of multi-sequential images using all the different slices of the patient which includes the top of the skull as well as the mandible. The slices differ significantly as the spread of the tumor varies with each slice. The slices are taken at 5mm gap and the tumor can have a thickness less or more than the slice gap considered for the scan. Show more
Keywords: Machine learning, MRI, SVM, T1 weighted, FLAIR
DOI: 10.3233/JIFS-169293
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3575-3583, 2017
Authors: Xiao, Ming-Ming | Luo, Yu-Ping
Article Type: Research Article
Abstract: For a thorough understanding of procedures in various network applications, and to automatically classify, recognize, trace, and control them, it is necessary that the state machine representing application sessions is obtained in advance. This article presents a novel approach to reversely infer a protocol state machine from collected data of the application layer. Protocol state machines are derived using a method of error-correcting grammatical inference, which is based on symbol sequences that appear in the application sessions. The techniques are implemented into a tool called PREUGI, which is conducted in a real network, containing a number of real applications with …several application layer protocols, to validate the proposed method. Show more
Keywords: Protocol reverse engineering, protocol state machine inference, protocol analysis, error-correcting grammatical inference
DOI: 10.3233/JIFS-169294
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3585-3594, 2017
Authors: Zhang, Jian | Fillatre, Lionel | Nikiforov, Igor
Article Type: Research Article
Abstract: The anomaly localization in distributed networks can be treated as a multiple hypothesis testing (MHT) problem and the Bayesian test with 0 - 1 loss function is a standard solution to this problem. However, For the anomaly localization application, the cost of different false localization varies, which cannot be reflected by the 0 - 1 loss function while the quadratic loss function is more appropriate. The main contribution of the paper is the design of a Bayesian test with a quadratic loss function and its performance analysis. The non-asymptotic bounds of the misclassification probabilities of the proposed test and the standard one with 0 - 1 …loss function are established and the relationship between their asymptotic equivalence with respect to signal-to-noise ratio and the geometry of the parameter space is analyzed. The effectiveness of the non-asymptotic bounds and the analysis on the asymptotic equivalence are verified by the simulation results. Show more
Keywords: Anomaly localization, multiple hypothesis testing, wireless sensor network, Bayesian test
DOI: 10.3233/JIFS-169295
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3595-3608, 2017
Authors: He, Luwei | Lu, Lu | Wang, Qiang
Article Type: Research Article
Abstract: Markov Clustering algorithm provides an effective method for network clustering problem, especially including community problem and bioinformatics. However, the expansion operation is the most time-consuming procedure, since the multiplication of two large-scale phalanxes can cause the time complexity of Θ (n3 ). Considering that each element value calculation is independent from others, expansion and inflation can be parallel-executed on the multi-core GPU. First, a basic parallel implementation of Markov Clustering which needs the whole adjacent matrix is proposed as a traditional method to improve the performance. In addition, the adjacent matrix is usually sparse and sometimes ultra-sparse. Hence, an optimal parallel …implementation working with the CSR*CSC multiplication has been developed, which significantly decreases the space needed to store the matrix and promotes the performance of the expansion to the extent. The experimental results show that Sparse-MCL is more effective than CPU-MCL and P-MCL when dealing with the big scale network. Show more
Keywords: MCL, GPU, sparse matrix, OpenCL
DOI: 10.3233/JIFS-169296
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3609-3617, 2017
Authors: Samuel, Avinash | Sharma, Dilip Kumar
Article Type: Research Article
Abstract: As the number of social networks users has increased day by day so has the user’s dependency for communication on the social networks. Social networks enable people to connect with one another in many different ways. Many social networks such as Twitter provide their users the functionality to tag the user’s current location to the post. This geographical information can be used in various information retrieval processes. Currently many methods are present which cluster the tweets using traditional K-means algorithm in which user has to specify the number of clusters to be formed, and if the tweets do not lie …within those clusters they are then treated as outliers and discarded. This paper presents a framework which focuses on clustering and indexing of tweets on the basis of its geographical and temporal features. The X-means clustering has been used which does not require the cluster number input from the user but rather it takes input from the index of the specified characteristics created from tweets. The indexing mechanism will not only help in ease of searching but will also aid in many retrieval tasks. The experimental analysis shows that the proposed framework generates improved results over traditional tweet clustering methods. Show more
Keywords: Tweet indexing, tweet clustering, microblog information retrieval
DOI: 10.3233/JIFS-169297
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3619-3632, 2017
Authors: Lu, Lu | Li, Cancan | Yang, Yubin
Article Type: Research Article
Abstract: With the development and popularization of virtualization technology, more and more enterprises tend to deploy applications to virtual machines, in order to reduce cost and improve the utilization rate of resources in the meantime. On the basis of the combination method of the comprehensive performance assessment of virtualization, this article aim to find a way to measure the performance percentage of the virtual machine against the physical machine percentage as a whole, which is built on the method of Fuzzy Analytic Hierarchy Process and the principle of maximizing deviations. According to the shortcoming of the Analytic Hierarchy Process, this article presents a way …to calculate weight of the functional layer elements based on the method of Fuzzy Analytic Hierarchy Process. The experimental results show that the conclusions drawn from the comprehensive performance evaluation method for virtualization are consistent with the experimental results. Show more
Keywords: Virtual machine, FAHP, maximizing deviation decision-making method, performance test, LoadRunner
DOI: 10.3233/JIFS-169298
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3633-3640, 2017
Authors: Sehgal, Priti | Goel, Nidhi
Article Type: Research Article
Abstract: Non-destructive techniques such as hyperspectral imaging, backscattering imaging are the advanced techniques used for predicting mechanical properties of horticulture products. They show relatively good performance but at the expense of costly measuring setups. This application-oriented paper investigates the feasibility of employing simple digital color camera imaging for prediction and fuzzy classification of firmness of tomatoes. Images acquired using digital color camera are preprocessed and subject to texture analysis in order to extract the number of features. The proposed approach exploits four texture feature extraction algorithms: three are based on statistical techniques viz. first order statistics (FOS), gray level co-occurrence matrix …(GLCM), gray level run length matrix (GLRLM), and one is based on transform-based technique viz. wavelet-transform. Out of all extracted features, redundant features are eliminated using various attribute selection methods. Subsequently, prediction models are built and analyzed using regression analysis. Sample space has been split into two sets; 80% training and 20% testing data having tomatoes with almost identical formation. Experimental results illustrates that RBF regression gave the lowest RMSE of 0.174 and highest prediction correlation coefficient of 0.929 for wavelet feature set. Grounded on the prediction model, fuzzy rule based classification (FRBC) is proposed to classify tomatoes into three firmness categories soft, medium, and hard. Accuracy statistics of the proposed FRBCS are compared with the state-of-the-art result and highest classification accuracy of 92.68% is achieved by proposed FRBCS. The results exhibit the possibility of using a digital color imaging system for firmness estimation and further for classification. Show more
Keywords: Image texture analysis, Tomato firmness, fuzzy rule based classification system, RBF regression, machinevision
DOI: 10.3233/JIFS-169299
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3641-3653, 2017
Authors: Li, Chen | Yang, Cheng | Jiang, Qin
Article Type: Research Article
Abstract: This paper proposed a cluster algorithm based on the combination of LDA (Latent Dirichlet allocation) probabilistic topic model and VSM (Vector Space Model), with the three-tier framework adopted containing text, topic and feature word. Although LDA alone has the ability to seek out the hidden topic knowledge, it is hard for the low-dimensional model to remain the integrity of the text information, leading to insufficient capacity for distinguishing texts. The paper is set to launch the cluster analysis in turns of feature words and topic through integrating two model above. With a better mix of LDA and VSM, the clustering effect will be …improved, paralleling determining the optimal clustering number K of the K-means algorithms and optimum topic number T of LDA model. In order to design the algorithms more scientifically and effectively, silhouette coefficient and Dunn coefficient have been brought in to make assessments. Show more
Keywords: Text cluster, LDA model, K-means algorithms, VSM model, silhouette coefficient, Dunn coefficient
DOI: 10.3233/JIFS-169300
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3655-3667, 2017
Authors: Mohan, Vijay | Rani, Asha | Singh, Vijander
Article Type: Research Article
Abstract: The main objective of the present work is to stabilize and maintain the angular position of Double Inverted Pendulum (DIP) system at desired position in presence of disturbances and noise. The system is highly coupled, nonlinear, complex and unstable, thereby making it difficult to control. Genetic algorithm tuned Fuzzy Controller (GFC) and adaptive Neuro-Fuzzy Controller (NFC) is proposed for the purpose, wherein the fuzzy parameters are optimized by genetic algorithm and artificial neural network respectively. The adaptive neuro-fuzzy control technique enjoys powerful learning capability of neural network, whereas genetic algorithm discovers the optimum solutions for the problem. Also a suitable …function is proposed for modifying training data set of neuro-fuzzy inference system that leads to Modified Neuro-Fuzzy Controller (MNFC). Linear Quadratic Regulator (LQR) and Fuzzy Logic Controllers (FLC) are also designed for comparative analysis. Intensive simulation studies are carried out to critically examine the performance of designed controllers on the basis of Integral Absolute Error (IAE), settling time, overshoot and steady state error for set-point tracking, disturbance rejection, noise suppression and simultaneous noise & disturbance rejection. The rigorous comparative analysis shows that MNFC exhibits fast and robust control of DIP system in comparison to designed controllers for all cases. Show more
Keywords: Double Inverted Pendulum (DIP), Fuzzy Logic Controller (FLC), Genetic Algorithm (GA), Linear Quadratic Regulator (LQR), GA Tuned Fuzzy Controller (GFC), Modified Neuro-Fuzzy Controller (MNFC)
DOI: 10.3233/JIFS-169301
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3669-3687, 2017
Authors: Allen, Allen D.
Article Type: Research Article
Abstract: Big data have revealed unexpected and statistically significant correlations along with intractable propositions. In order to address this development, an algorithm is introduced that is consistent with Ramsey’s theorem for pairs and Gödel’s incompleteness theorem. The algorithm assigns one of three truth values to a fuzzy proposition in order to update automatic theorem proving. A unique feature of the algorithm is an AI module that selects the multiple axiom sets needed for a proof. A metric for the AI module is the probability that the database of axiom sets is inadequate for the context. The importance of context is illustrated …by a simple analog electrical circuit applied to Fermat’s last theorem as contrasted with a similar exponential equation having positive real numbers for bases. Another algorithm or decision tree is introduced to differentiate risk factors from necessary conditions. A failure to recognize this distinction has impaired the public health sector for centuries and continues to do so. The second algorithm introduced here represents an effort to conserve science in general. The risk that big data pose for science is the misuse of positive, statistically significant correlations to infer causality when the correlations actually reflect risk factors or even rare coincidences. Show more
Keywords: Artificial intelligence, automatic theorem proving, big data, context awareness, knowledge acquisition
DOI: 10.3233/JIFS-169302
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3689-3694, 2017
Authors: Wang, Hua | Wen, Yingyou | Zhao, Dazhe
Article Type: Research Article
Abstract: In this paper, we study the problem of secure localization in Mobile Wireless Sensor Networks (MWSNs) where beacon nodes are not available. The location reference information is obtained from neighboring nodes within the commination rage of the target node, with the help of a relative location map. A Relative Location Map based Robust Positioning Algorithm (RLMRPA) for MWSNs is presented. The location estimate of the localizing node is formulated by constructing a distance measurement error model. Considering limited resources available, the steepest descent, which is fast and easy to implement, is employed to iteratively find the optimal solution. A 3- …Farthest Neighbors Trilateral Localization Algorithm (3FNTLA) is presented to find the initial position. Considering that malicious neighbors tend to cause larger distance measurement errors and the further the neighbor, the larger the measurement error, an attack-resistant distance residue method is developed to neutralize the impact of inconsistent measurements. Our experiments show that the RLMRPA can perform secure location determination, even with some neighbors aiming at making the localization failed. In addition, our simulation results also demonstrate that the RLMRPA is more resistant to attacks and achieves higher localization accuracy than existing methods. Show more
Keywords: Mobile wireless sensor networks, localization, threats, security
DOI: 10.3233/JIFS-169303
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3695-3710, 2017
Authors: Hasnat, Abul | Barman, Dibyendu | Halder, Santanu | Bhattacharjee, Debotosh
Article Type: Research Article
Abstract: The present work proposes a modified vector quantization algorithm to overcome the blocking artifacts problem of the conventional Vector Quantization (VQ) algorithm. Blocking artifacts affects visual appeal of the decompressed images. The Vector Quantization (VQ) algorithm is improvised where the blocking artifact does not appear in the decompressed image. The proposed algorithm is applied on luminance-chrominance color model where luminance channel is compressed using a novel approach. For the luminance channel, eight separate clusters are constructed using the k-means clustering algorithm then for each cluster, fuzzy intensification applied separately; next for each cluster training vectors are formed by taking sixteen …consecutive elements from a cluster to form one vector, next sixteen elements for second vector and so on. For each group of these training vectors, vector quantization is applied to generate the code vectors. For chrominance channels the conventional VQ algorithm is applied. At the time of decompression the reverse process is followed. The modified VQ algorithm has been applied on standard UCID v.2 image database and standard images found in literature where blocking artifacts problem is effectively solved. Experimental result shows that the proposed algorithm successfully avoids the blocking artefacts and the quality of the decompressed image is improved in terms of PSNR and vSNR compared to the conventional VQ algorithm. This article focuses on retaining more original information of the image rather than restoration of the decompressed image where blocking artifacts exists. Show more
Keywords: Lossy image compression, blocking artifacts, Vector Quantization, LBG, luminance, Kmeans clustering, fuzzy intensification, PSNR, vSNR
DOI: 10.3233/JIFS-169304
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3711-3727, 2017
Authors: Li, Cheng-Fan | Liu, Lan | Lei, Yong-Mei | Yin, Jing-Yuan | Zhao, Jun-juan | Sun, Xian-Kun
Article Type: Research Article
Abstract: Feature extraction from hyperspectral remote sensing data is an effective method for object classification, and how to classify the object information from hyperspectral remote sensing image has become one of the core technologies of the remote sensing application. Aiming at the characteristics of space modulated interference hyperspectral image (HSI) hyperspectral remote sensing image, in this article a new remote sensing clustering method is presented on the basis of analyzing the principal component analysis (PCA) and independent component analysis (ICA), which is able both to extract data’s independent features in terms on the second-order statistics and higher-order statistical information. The proposed …method classifies the HSI hyperspectral remote sensing image better than the traditional methods. Firstly, the definition of the feature weighting between PCA and ICA is used in order to calculate the weighted value. Then, similarity measure contains distance similarity and cosine similarity is introduced. Finally, the recognition rule is constructed to classify the hyperspectral remote sensing image. The true HSI hyperspectral remote sensing is used to evaluate the performance of our method. Experimental results indicate that the proposed clustering method outperforms traditional classification methods, and the classification accuracy reaches to 85% under certain conditions with the suitable number of eigenvectors is 12 and weighted values is 0.8. Meanwhile, the image quality of our method is well preserved. Show more
Keywords: Clustering, hyperspectral image, principal component analysis (PCA), independent component analysis (ICA), classification
DOI: 10.3233/JIFS-169305
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3729-3737, 2017
Authors: Lianqiang, Niu | Xin, Chen | Min, Peng | Gang, Zhang
Article Type: Research Article
Abstract: This paper presents an efficient run-based algorithm for labeling connected components in a binary image. By means of two tables called index table and equivalent information table respectively, the algorithm assign labels only to run sets which are composed of a series of runs connected to each other in adjacent scan rows, then the same index in equivalent information table can be assigned to all runs of a set in index table at one time. Further, the algorithm organizes all equivalence information in equivalent information table in a tree structure, and employee the union-find technique to merge connected components rapidly. …The algorithm is very simple, and fewer operations are needed to check and to label runs of a connected branch. Furthermore, it is not necessary to calculate the minimum label while combining two runs, and is able to construct a union-find tree with smaller height. Thus the algorithm is able to provide a high speed to label connected components for general images. Show more
Keywords: Connected components, union-find, labeling algorithm, label equivalent, run length encoding
DOI: 10.3233/JIFS-169306
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3739-3748, 2017
Authors: Zhang, Zhenhua | Hu, Yong | Ma, Chao | Xu, Jinhui | Yuan, Shenguo | Chen, Zhao
Article Type: Research Article
Abstract: By analyzing three parts of interval valued intuition fuzzy sets (IVIFS), we provide a novel framework constructing risk function with IVIFS information for risk analysis of outsourced software project. First, we introduced some risk factors of outsourced software project according to their hierarchical levels, and present a general risk function model. And then, some useful mathematical properties of this risk function are proved. Based on the mathematical properties of general risk function, all these presented specific risk functions are classified into four types: incentive function, punitive function, incentive-punitive function and equilibrium function. Especially, two kinds of incentive-punitive risk functions are …focused on and a construction method for them is proposed. Finally, an application example for the risk assessment of outsourced software project illustrates the use of this decision making method. The simulation results show that these functions are effective in risk prediction. Show more
Keywords: Interval valued intuitionistic fuzzy sets, risk assessment, incentive-punitive risk function, equilibrium risk function, outsourced software project
DOI: 10.3233/JIFS-169307
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3749-3760, 2017
Authors: Kumar, Tarun | Kushwaha, Dharmender Singh
Article Type: Research Article
Abstract: India has shown rapid economic development and this has forced the country to adopt smart traffic management and surveillance process. The intelligent traffic management and surveillance is the basic need for development of smart cities in India. The Intelligent traffic surveillance includes the detection of moving vehicles, estimation of their speed and extracting its registration number. This paper proposes an efficient and novel approach for the detection of moving vehicles as well as estimation of their speeds for detection of any speed limit violation by using a single camera in daylight or properly illuminated environment. The proposed approach detects and …tracks the vehicle passing through the surveillance area and maintains the record of vehicles position. The Region of Interest (ROI) of the approach is the dark shaded area formed under the vehicles road clearance area instead of the vehicles. The average detection accuracy achieved by proposed approach is 93.32%. This is on an average 7.54% higher than other existing approaches. The proposed approach uses cropping operation to minimize the scope of any false positive detection on both sides of road. The average tracking accuracy of the proposed approach is about 92.2%. The tracking accuracy achieved by the proposed approach is on an average 2.2% higher than the other leading approaches. The average speed estimation error in proposed approach is +2.2 km/h which is lower than other existing leading approaches. The proposed approach is also time and space efficient over the existing approaches. Show more
Keywords: Background subtraction, image filtering, thresholding, contours processing, camera calibration, moving object detection
DOI: 10.3233/JIFS-169308
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3761-3773, 2017
Authors: Wang, Bin | Kong, Bin | Ding, Dawen | Wang, Can | Yang, Jing
Article Type: Research Article
Abstract: In this paper, we have proposed a novel traffic sign recognition algorithm based on sparse representation and dictionary learning. In the past period of research and applications of traffic sign recognition, most of the traffic sign recognition algorithms are based on statistical learning, neural networks and template matching algorithm. In these algorithms, they need high-dimensional mapping during classification, resulting in huge amount of calculation. Meanwhile, when the external environment changes, such as illumination, deformation and occlusion, the recognition rate will be further reduced. The proposed sparse representation theory has much better performance to solve the problems of external environment changed …and while we use dictionary learning method to build a traffic sign over-complete redundant dictionary, the experimental results clearly showed that the algorithm we proposed has much better performance than traditional algorithm and also has much higher recognition rates. Show more
Keywords: Compressive sensing, sparse representation, traffic sign recognition, over-complete, dictionary learning
DOI: 10.3233/JIFS-169310
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3775-3784, 2017
Authors: Zhou, Guiliang | Liu, Zhiqiang | Shu, Wanneng | Bao, Tianwen | Mao, Lina | Wu, Dingxin | Feng-Qiu,
Article Type: Research Article
Abstract: Smart city relies on the smart transportation. And the smart savings on private car pooling based on internet of vehicles will greatly facilitate the expansion of smart transportation. The paper puts forward the smart savings scheme for private car pooling, establishes the dynamic relationship of human – vehicle – road during carpooling process basing on internet of vehicles. We applied the route recommendation technology, information matching technology, information notification technology, dynamic information searching technology and collaborative route optimization technology to the carpooling system to improve the real-time, accuracy and efficiency of carpooling process in uncertain dynamic demand market and realize …the smart savings on private car pooling. Finally, we take an area of Huai’an as example to verify the feasibility of the program and technologies. The experimental results show that the carpooling program (TCP) increased 40% on the private car seat utilization, saved 30.7% on the total travel cost and 38.4% on total travel time than the other existing carpooling program (TECP). Show more
Keywords: Internet of vehicles, private car pooling, smart savings, carpool program, carpooling technology research
DOI: 10.3233/JIFS-169311
Citation: Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3785-3796, 2017
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]