Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2024: 1.7
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Article Type: Other
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1235-1235, 2018
Authors: Thampi, Sabu M. | El-Alfy, El-Sayed M. | Mitra, Sushmita | Trajkovic, Ljiljana
Article Type: Editorial
DOI: 10.3233/JIFS-169420
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1237-1241, 2018
Authors: Vijayanand, R. | Devaraj, D. | Kannapiran, B.
Article Type: Research Article
Abstract: Intrusion detection is an important requirement in wireless mesh network and the intrusion detection system (IDS) provides security by monitoring data traffic in real time. This work proposes support vector machine (SVM) classifier to identify the intrusion in the network. The traffic data collected from the wireless mesh network (WMN) is given as input to the SVM. The irrelevant and redundant input variables increase the complexity of designing IDS and may degrade its performance. Hence, feature selection techniques, which select the relevant features from the original input is essential to improve the performance of IDS in WMN. In this work, …a hybrid genetic algorithm (GA) and mutual information (MI) based feature selection technique is proposed for IDS. The performance of IDS with the proposed feature selection technique is analyzed with IDS having mutual information, genetic algorithm and GA+MI based feature selection techniques using ADFA-LD dataset. Experimental results have demonstrated the effectiveness of proposed intrusion detection system with hybrid feature selection technique in wireless mesh network. The superiority of SVM classifier with hybrid feature selection technique is also verified by comparing with artificial neural network classifier. Show more
Keywords: IDS for WMN, SVM based IDS, ADFA-LD dataset, GA with MI technique, Hybrid feature selection
DOI: 10.3233/JIFS-169421
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1243-1250, 2018
Authors: Kumar, Malay | Vardhan, Manu
Article Type: Research Article
Abstract: Cloud computing offers an economical, convenient and elastic pool of computing resources over the internet. It enables computationally weak client to execute large computations by outsourcing their computation load to the cloud servers. However, outsourcing of data and computation to the third-party cloud servers bring multifarious security and privacy challenges that needed to be understood and address before the development of outsourcing algorithm. In this paper, the authors propose solutions for matrix-chain multiplication (MCM) problem. Our goal is to minimize the execution burden on the client without sacrificing the confidentiality and integrity of the input/output. Conventionally, the complexity of matrix-chain …multiplication is O (n 3 ). After leveraging the facility of outsourcing, the client-side complexity reduces to O (n 2 ). In the proposed algorithm, the client employs some efficient linear transformation schemes, which preserve the data confidentiality. It also developed a novel result verification scheme, which verifies the result with modest burden and high probability and maintain the integrity of computed result. The analytical analysis of algorithm depicted that the algorithm is simultaneously meeting the design goals of correctness, security, efficiency and verifiability. We conduct many experiments to validate the algorithm and demonstrate its practical usability. The algorithm is implemented on public cloud “Amazon EC2 ”, and found that the proposed outsource algorithm performs 11.655 times faster computation of matrix-chain multiplication than the direct implementation. Show more
Keywords: Matrix-chain multiplication, cloud computing, secure outsourcing, security, verifiability
DOI: 10.3233/JIFS-169422
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1251-1263, 2018
Authors: Vinayakumar, R. | Soman, K.P. | Poornachandran, Prabaharan | Sachin Kumar, S.
Article Type: Research Article
Abstract: In recent years, domain generation algorithms (DGAs) are the foundational mechanisms for many malware families. Mainly, due to the fact that DGA can generate immense number of pseudo random domain names to associate to a command and control (C2) infrastructures. This paper focuses on to detect and classify the pseudo random domain names without relying on the feature engineering or any other linguistic, contextual or semantics and statistical information by adopting deep learning approaches. A deep learning approach is a complex model of traditional machine learning mechanism that has received renewed interest by solving the long-standing tasks in artificial intelligence …(AI) related to the field of natural language processing, image recognition, speech processing and many others. They have immense capability to extract optimal feature representations by taking input as in the form of raw input texts. To leverage this and to transfer the performance enhancement in aforementioned areas towards characterize, detect and classify the DGA generated domain names to a specific malware family, this paper adopts deep learning mechanisms with a known one million benign domain names from Alexa, OpenDNS and a corpus of malicious domain names generated from 17 DGA malware families in real time for training in character and bigram level and a trained model has been evaluated on the OSNIT data set in real-time. Specifically, to understand the effectiveness of various deep learning mechanisms, we used recurrent neural network (RNN), identity-recurrent neural network (I-RNN), long short-term memory (LSTM), convolution neural network (CNN), and convolutional neural network-long short-term memory (CNN-LSTM) architectures. Additionally, to find out an optimal architecture, experiments are done with various configurations of network parameters and network structures. All experiments run up to 1000 epochs with a learning rate set in the range [0.01-0.5]. Overall, deep learning approaches, particularly family of recurrent neural network and a hybrid network (where the first layer is CNN and a subsequent layer is LSTM) have showed significant performance with a highest detection rate 0.9945 and 0.9879 respectively. The main reason is deep learning approaches have inherent mechanisms to capture hierarchical feature extraction and long range-dependencies in sequence inputs. Show more
Keywords: Domain generation algorithms (DGAs), deep learning mechanisms, recurrent neural network (RNN), identity-recurrent neural network (IRNN), long short-term memory (LSTM), convolution neural network (CNN), convolutional neural network-long short-term memory (CNN-LSTM)
DOI: 10.3233/JIFS-169423
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1265-1276, 2018
Authors: Vinayakumar, R. | Soman, K.P. | Poornachandran, Prabaharan | Sachin Kumar, S.
Article Type: Research Article
Abstract: Long Short-term Memory (LSTM) is a sub set of recurrent neural network (RNN) which is specifically used to train to learn long-term temporal dynamics with sequences of arbitrary length. In this paper, long short-term memory (LSTM) architecture is followed for Android malware detection. The data set for evaluation contains real known benign and malware applications from static and dynamic analysis. To achieve acceptable malware detection rates with low computational cost, various LSTM network topologies with several network parameters are used on all extracted features. A stacked LSTM with 32 memory blocks containing one cell each has performed well on detection …of all individual behaviors of malicious applications in comparison to other traditional static machine learning classifier. The architecture quantifies experimental results up to 1000 epochs with learning rate 0.1. This is primarily due to the reason that LSTM has the potential to store long-range dependencies across time-steps and to correlate with successive connection sequences information. The experiment achieved the Android malware detection of 0.939 on dynamic analysis and 0.975 on static analysis on well-known datasets. Show more
Keywords: Android malware detection: static and dynamic analysis, deep learning: recurrent neural network (RNN), Long Short-term Memory (LSTM)
DOI: 10.3233/JIFS-169424
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1277-1288, 2018
Authors: Madhawa, Surendar | Balakrishnan, P. | Arumugam, Umamakeswari
Article Type: Research Article
Abstract: Without an iota of doubt, security, safety, and privacy are the most critical aspects of any Industrial Internet of Things (IIoT) environment. Among the existing intrusion detection methods, knowledge-based methods discover only the recognized attacks, the behavior-based methods suffer from high false positives, and specification-based methods demand the complete knowledge about the elements present in the IIoT environment. Examining the heterogeneous data from different and distributed sensors and sending the correct commands to actuators are vital to the increasingly industrialized economy. This work proposes an Intrusion Detection System (IDS) for the IIoT environment that combines both the anomaly and specification-based …approaches. The resulting system overcomes the limitations of the contemporary techniques by detecting unidentified attacks. All kinds of data emanating from any IIoT setup comprising sensors and actuators are logged, and specification rules are constructed from it. Any violations of the created rules are treated as attacks. The validation is carried out through simulation using the Mininet tool with the dataset obtained from the real-world water treatment facility at the Singapore University of Technology and Design (SUTD). The results show only 3.2% of false positives with the detection rate of 96.4%. Show more
Keywords: Industrial internet of things, software defined networking, intrusion detection, specification
DOI: 10.3233/JIFS-169425
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1289-1300, 2018
Authors: Nangrani, S.P. | Bhat, S.S.
Article Type: Research Article
Abstract: Smart grid networks to deliver power, are futuristic well planned, designed and managed systems in real time. The potential threat to the dynamic security of such systems is chaotic nature of real power flow on transmission lines. Smart grid needs to be secure in static and dynamic sense under contingent conditions. At present static security assessment is based on monitoring of conventional mega-watt performance index along with other voltage and current related performance indices. This paper proposes an intelligent technique based on novel interleaved performance index. Proposed technique uses interleaving of two features. One feature is related to computation of …Lyapunov Exponent for chaotic behavior related to the divergent trend of power flow increase and other related to conventional megawatt performance index for overload monitoring. Novel proposed index is named as interleaved Mega Watt-Lyapunov Exponent performance index. Chaos quantification and overload of real power flow on transmission lines, both can be evaluated using proposed index. This paper presents formulation and computation of novel proposition for smart grids. Benchmark model with computed values of novel performance index under different contingencies and load profiles along with a comparison to conventional index, is demonstrated and discussed at length in the paper. Show more
Keywords: Discrete Lyapunov Exponent (DLE), Mega Watt Performance Index (MW-PI), Security monitoring
DOI: 10.3233/JIFS-169426
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1301-1310, 2018
Authors: Mathi, Senthilkumar | Srilakshmy,
Article Type: Research Article
Abstract: The mobile Internet Protocol (IP) is a mobility based communication protocol that provides guidelines for the routing of mobile nodes in a network. The mobile IP manipulates IP addresses as a natural identifier for each mobile communicant. Here, each mobile device recognizes itself via two IP addresses: a home-of address and a care-of address . Owing to the mobility nature of the these devices, the location update of their current care-of address plays a vital role in receiving continuous services without interference. Many investigations have been explored on the location update of mobile devices along with the security and …computation issues. However, the efforts on the security services have not received much attention in these investigations. Consequently, there is an increasing need for optimized binding update that balances security and efficiency. In this paper, a new Binding Update using Twofold Encryption (BUTE) is proposed, for balancing both security and efficiency of binding update for IPv6 mobility. It exhibits the alleviation of the attacks such as rerun, man-in-the-middle, false binding update and denial-of-service. The proposed BUTE is simulated using network simulator-2 and the experimental results are analyzed. Also, it is validated for security attributes using Automated Validation of Internet Security Protocols and Applications (AVISPA) – a security tool. Finally, the numerical results reveal that the proposed BUTE provides a significant reduction in communication cost and binding update delays. Show more
Keywords: Binding update, asymmetric encryption, authentication, return routability, message latency, tunneling
DOI: 10.3233/JIFS-169427
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1311-1322, 2018
Authors: Ahmad, Musheer | Alam, Mohammad Zaiyan | Ansari, Subia | Lambić, Dragan | AlSharari, Hamed D.
Article Type: Research Article
Abstract: Recently, a color image encryption algorithm is suggested by Lakshmanan et al. in [IEEE Transactions on Neural Networks and Learning Systems 2016, doi: 10.1109/TNNLS.2016.2619345]. In encryption algorithm, a piece-wise linear chaotic map is adopted to create a permutation matrix to perform shuffling of pixels of plain-image. The encryption of shuffled image is proceeded by extracting keystreams from chaotic inertial delayed neural network. This paper evaluates the security of encryption algorithm to unveil its inherent defects and proposes to present a complete cryptanalysis. To demonstrate the break of algorithm, we apply proposed chosen-plaintext attack that successfully recovers the exact plain-image …from encrypted image without secret key. The proposed cryptanalysis shows that the encryption algorithm is inapt to realize a secure communication, the security claims by authors are not valid as the algorithm has serious security flaws and susceptible to proposed attack. Show more
Keywords: Cryptanalysis, image encryption, chaotic inertial neural network, permutation matrix, chosen-plaintext attack
DOI: 10.3233/JIFS-169428
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1323-1332, 2018
Authors: Vinayakumar, R. | Soman, K.P. | Poornachandran, Prabaharan
Article Type: Research Article
Abstract: Malicious uniform resource locator (URL), termed as malicious website is a foundation mechanisms for many of internet criminal activities such as phishing, spamming, identity theft, financial fraud and malware. It has been considered as a common and serious threat to the Cybersecurity. Blacklisting mechanism and many machine learning based solutions found by researchers with the aim to effectively signalize and classify the malicious URL’s in internet. Blacklisting is completely ineffective at finding both variations of malicious URL or newly generated URL. Additionally, it requires human input and ends up as a time consuming approach in real-time scenarios. Machine learning based …solutions implicitly rely on feature engineering phase to extract hand crafted features including linguistic, lexical, contextual or semantics, statistical information of URL string, n-gram, bag-of-words, link structures, content composition, DNS information, network traffic, etc. As a result feature engineering in machine learning based solutions has to evolve with the new malicious URL’s. In recent times, deep learning is the most talked due to the significant results in various artificial intelligence (AI) tasks in the field of image processing, speech processing, natural language processing and many others. They have an ability to extract features automatically by taking the raw input texts. To leverage this and to transform the efficacy of deep learning algorithms to the task of malicious URL’s detection, we evaluate various deep learning architectures specifically recurrent neural network (RNN), identity-recurrent neural network (I-RNN), long short-term memory (LSTM), convolution neural network (CNN), and convolutional neural network-long short-term memory (CNN-LSTM) architectures by modeling the real known benign and malicious URL’s in character level language. The optimal parameter for deep learning architecture is found by conducting various experiments with various configurations of network parameters and network structures. All the experiments run till 1000 epochs with a learning rate in the range [0.01-0.5]. In our experiments, deep learning mechanisms outperformed the hand crafted feature mechanism. Specifically, LSTM and hybrid network of CNN and LSTM have achieved highest accuracy as 0.9996 and 0.9995 respectively. This might be due to the fact that the deep learning mechanisms have ability to learn hierarchical feature representation and long range-dependencies in sequences of arbitrary length. Show more
Keywords: Malicious uniform resource locator (URL) or malicious website, deep learning mechanisms: Recurrent Neural Network (RNN), Identity-Recurrent Neural Network (I-RNN), Long Short-Term Memory (LSTM), Convolution Neural Network (CNN), Convolutional Neural Network-Long Short-Term Memory (CNN-LSTM)
DOI: 10.3233/JIFS-169429
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1333-1343, 2018
Authors: Handa, Rohit | Rama Krishna, C. | Aggarwal, Naveen
Article Type: Research Article
Abstract: With the advancement of cloud computing, data-owners prefer to outsource their confidential data to cloud as it provides storage facility at reduced administration and maintenance cost. When these confidential documents leave the user’s premises, security of the data becomes a prime concern, as cloud service provider (CSP) and end users are in different trust domains. To provide data privacy, it is preferred that the end user should encrypt the data before outsourcing to the cloud. Encryption provides security but makes data utilization a challenging task, i.e., searching encrypted documents is difficult. Various schemes exist in the literature but they are …either restricted to single keyword search or are inefficient in terms of search time required. In this paper, we propose an efficient approach for secure information retrieval using the concept of bucketization. This reduces the average number of comparisons per query to sub-linear. Experimental analysis on Reuters-21578 data-set demonstrates that the proposed scheme provides a recall of 100% and precision of 98.45% while decreasing the search time by 98.85% using bucketization. Show more
Keywords: Privacy-preserving, multi-keyword, conjunctive search, bucketization, cloud storage
DOI: 10.3233/JIFS-169430
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1345-1353, 2018
Authors: Vinayakumar, R. | Soman, K.P. | Poornachandran, Prabaharan
Article Type: Research Article
Abstract: Threats related to computer security constantly evolving and attacking the networks and internet all the time. New security threats and the sophisticated methods that hackers use can bypass the detection and prevention mechanisms. A new approach which can handle and analyze massive amount of logs from diverse sources such as network packets, Domain name system (DNS) logs, proxy logs, system/service logs etc. required. This approach can be typically termed as big data. This approach can protect and provide solution to various security issues such as fraud detection, malicious activities and other advanced persistent threats. Apache spark is a distributed big …data based cluster computing platform which can store and process the security data to give real time protection. In this paper, we collect only DNS logs from client machines in local area network (LAN) and store it in a server. To find the domain name as either benign or malicious, we propose deep learning based approach. For comparison, we have evaluated the effectiveness of various deep learning approaches such as recurrent neural network (RNN), long short-term memory (LSTM) and other traditional machine learning classifiers. Deep learning based approaches have performed well in comparison to the other classical machine learning classifiers. The primary reason is that deep learning algorithms have the capability to obtain the right features implicitly. Moreover, LSTM has obtained highest malicious detection rate in all experiments in comparison to the other deep learning approaches. Show more
Keywords: Big data approach, log files, Apache Spark, Domain Name Service (DNS), machine learning, and deep learning: Recurrent Neural Network (RNN), Long Short-Term Memory (LSTM)
DOI: 10.3233/JIFS-169431
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1355-1367, 2018
Authors: Al-Utaibi, Khaled A. | El-Alfy, El-Sayed M.
Article Type: Research Article
Abstract: With the increasingly growing internal and external attacks on computer systems and online services, cybersecurity has become a vibrant research area. Countering intrusive attacks is a daunting task with no universal magic solution that can successfully handle all scenarios. A variety of machine-learning and computational intelligence techniques have been applied extensively to detect and classify these attacks. However, the effectiveness of these techniques greatly depends on the adopted data preprocessing methods for feature extraction and engineering. This paper presents an extended taxonomy of the work related to intrusion detection and reviews the state-of-the-art techniques for data preprocessing. It offers a …critical up-to-date survey which can be an instrumental pedagogy to help junior researchers conceive the vast amount of research work and gain a holistic view and awareness of various contemporary research directions in this domain. Show more
Keywords: Information systems, cybersecurity, intrusion detection, machine learning, computational intelligence, feature normalization, feature discretization, feature engineering, feature selection, dimensionality reduction
DOI: 10.3233/JIFS-169432
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1369-1383, 2018
Authors: Srivastava, Smriti | Gopal, | Bhardwaj, Saurabh
Article Type: Research Article
Abstract: The present work describes different research techniques for collecting and organizing speech database in different scenario at the institute and successfully structuring the text independent speaker identification database in Indian context. In order to get the Multi-Scenario dataset, each speaker performed multiple sessions recording in reading style with English and Hindi language with same passages but under different conditions. This work analyzed different scenario affecting the performance of speaker recognition system when tested under dissimilar training conditions. Here four different scenarios are considered; sensor and environment, language, aging and health. To study the effect of sensor, language and environment on …the performance of ASR system a database of 200 speaker was created. Under different environmental conditions, four different types of sensors in parallel configuration were used to study the sensor mismatch conditions over testing and training phase. The database contains speech samples of the individual in English and Hindi in read speech styles under two environment i.e. a controlled recording chamber and library. To study the aging effect, an aging NSIT speaker database (AG-NSIT-SD) of 53 famous personalities was collected from online source varying over a period of 10–20 years. Further to study the effect of health, a cough and cold NSIT speaker database (CC-NSIT-SD) of 38 speakers was also collected to study the performance of system. Apart from this, the effect of different noise types on the speaker identification was also studied on different sensors. Show more
Keywords: Speaker identification, speaker database, aging database, cough and cold database
DOI: 10.3233/JIFS-169433
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1385-1392, 2018
Authors: Ibrayev, Timur | Myrzakhan, Ulan | Krestinskaya, Olga | Irmanova, Aidana | James, Alex Pappachen
Article Type: Research Article
Abstract: Hierarchical Temporal Memory is a new machine learning algorithm intended to mimic the working principle of the neocortex, part of the human brain, responsible for learning, classification, and making predictions. Although many works illustrate its effectiveness as a software algorithm, hardware design for HTM remains an open research problem. Hence, this work proposes an architecture for HTM Spatial Pooler and Temporal Memory with learning mechanism, which creates a single image for each class based on important and unimportant features of all images in the training set. In turn, the reduction in the number of templates within database reduces the memory …requirements and increases the processing speed. Moreover, face recognition analysis indicates that for a large number of training images, the proposed design provides higher accuracy results (83.5%) compared to only Spatial Pooler design presented in the previous works. Show more
Keywords: HTM, temporal memory, spatial pooler, memristor, face recognition
DOI: 10.3233/JIFS-169434
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1393-1402, 2018
Authors: Roy, Sandip | Chatterjee, Santanu | Mahapatra, Gautam
Article Type: Research Article
Abstract: A well connected of network of smart devices that can be accessed through internet is broadly known as Internet of Things (IoT). IoT has diversified application exploiting various technologies that requires integration of computing devices with end users. The use of IoT provides efficient management large and heterogeneous assets, establishes a real time network for strong connectivity and set up useful coordination among various resources. For example, in defense system, IoT can be applicable in monitoring war fighter’s health, border area surveillance, proactive equipment maintenance etc. However, maintaining privacy and security through secure remote authentication is an essential prerequisite for …hazard-free use of IoT based services. In this paper, we provide an efficient and secured authentication protocol for remote IoT based services. Our proposed scheme does not exploit computation costly operation and avoids heavy storage in medical application server, thus making it suitable for battery limited devices. Finally, we perform the formal security verification using the widely accepted verification tool, called the ProVerif 1.93, to show that presented scheme is secure. Show more
Keywords: Remote user authentication, internet of things, biometrics, security, ProVerif 1.93
DOI: 10.3233/JIFS-169435
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1403-1410, 2018
Authors: Mohanraj, V. | Sibi Chakkaravarthy, S. | Gogul, I. | Sathiesh Kumar, V. | Kumar, Ranajit | Vaidehi, V.
Article Type: Research Article
Abstract: Face Recognition is widely used applications such as of mobile phone unlocking, credit card authentication and person authentication in airports. The face biometric authentication system can be easily spoofed by printed photograph, replay video of the legitimate user and 3D face mask. This paper proposes hybrid feature descriptors to detect the face spoofing attack (printed photograph and replay video attacks). The proposed method extracts three different feature descriptors such as Color moment, Haralick texture and Color Local Binary Pattern (CLBP) feature descriptors. The extracted features are concatenated and classified by Logistic Regression. The performance of the proposed method is evaluated …on the Michigan State University Mobile Face Spoofing Database (MSU-MFSD) dataset and found to achieve better results than state-of-the-art methods. Show more
Keywords: Face recognition, spoof detection, color moment, Local Binary Pattern (LBP), Haralick texture
DOI: 10.3233/JIFS-169436
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1411-1419, 2018
Authors: Sivakumar, Trivandrum T. | Nair, Shali S. | Zacharias, Geevar C. | Nair, Madhu S. | Joseph, Anna P.
Article Type: Research Article
Abstract: Biometric refers to the automatic identification of a person based on physiological or behavioural characteristics. Current modes of biometric systems are fingerprint, voice, face, signature, palm print, iris scan etc. The conventional biometric systems are unable to meet these authentication requirements as it can be forged. Hence, a novel biometric system which can overcome these limitations is proposed. Tongue is a unique vital organ which is well protected within the mouth and not affected by external factors. Dorsum of the tongue exhibits a great amount of information along with its visual differences in shape, texture and pattern which can be …called the tongue print. As tongue exhibits rich textural patterns, Local Binary Pattern (LBP) algorithm is used for extracting features. Extracted features are then trained by a linear Support Vector Machine (SVM) for personal identification. From the database consisting of 136 tongue print images of 34 individuals, we achieved an accuracy of 97.05% for identification. Our study is the first of its kind where texture patterns are extracted from tongue images using Local Binary Pattern for biometric authentication. We achieved a level of accuracy compared to the technique used in other studies. Show more
Keywords: Tongue print, biometric, identification, Local Binary Pattern, Support Vector Machine
DOI: 10.3233/JIFS-169437
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1421-1426, 2018
Authors: Sooraj, S. | Manjusha, K. | Anand Kumar, M. | Soman, K.P.
Article Type: Research Article
Abstract: Spell checking plays an important role in conveying correct information and hence helps in clear communication. Spell checkers for English language are well established. But in case of Indian languages, especially Malayalam lacks a well developed spell checker. The spell checkers that currently exist for Indian languages are based on traditional approaches such as rule based or dictionary based. The rich morphological nature of Malayalam makes spell checking a difficult task. The proposed work is a novel attempt and first of its kind that focuses on implementing a spell checker for Malayalam using deep learning. The spell checker comprises of …two processes: error detection and error correction. The error detection section employs a LSTM based neural network which is trained to identify the misspelled words and the position where the error has occurred. The error detection accuracy is measured using the F1 score. Error correction is achieved by the selecting the most probable word from the candidate word suggestions. Show more
Keywords: Malayalam, spell checker, deep learning, natural language processing, long short term memory
DOI: 10.3233/JIFS-169438
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1427-1434, 2018
Authors: Remmiya Devi, G. | Anand Kumar, M. | Soman, K.P.
Article Type: Research Article
Abstract: Social media is considered to be a vibrant area where millions of individuals interact and share their views. Processing social media text in Indian languages is a challenging task, as it is a well-known fact that Indian languages are morphologically rich in structure. On transferring such an unstructured text into a consistent format, the data is exposed to feature extraction method. In the huge corpora, information units i.e. entities holds the basic idea of the content. The main aim of the system is to recognise and extract the named entities in the social media twitter text. The proposed system relies …on the proficient co-occurrence based word embedding models to extract the features for the words in the dataset. The proposed work makes use of text data from the Twitter resource in the Tamil language. In order to enhance the performance of the system, tri-gram features are extracted from the word embedding vectors. Hence, systems are trained using N-gram embedding features and named entity tags. Implementation of the system is using machine learning classifier, Support Vector Machine (SVM). On comparing the performance of the proposed systems, it can be seen that glove embedding shows better results with the accuracy of 96.93%, whereas the accuracy of word2vec embedding is 84.53%. The improvement in the performance of the system based on glove embedding with regard to the accuracy may be due to the imperative role of the co-occurrence information of glove embedding in recognising the entities. Show more
Keywords: Support Vector Machine, Word2vec, glove embedding, N-gram embedding, structured skip gram
DOI: 10.3233/JIFS-169439
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1435-1442, 2018
Authors: Ahmed, Khalifa | El-Alfy, El-Sayed M. | Awad, Wasan S.
Article Type: Research Article
Abstract: Parallel processing is crucial for accelerating computation in many high-performance applications and modern technologies including computational modeling, optimization and simulation, Web and DNS servers, peer-to-peer systems, grid computing and cloud computing. Due to the heterogeneity nature of various processing nodes and the differences of workloads of various tasks, some processors can be idle while others are overloaded. In this paper, we present a simple, yet efficient, solution inspired by the intelligence of ant colonies to adequately mitigate the load imbalance and communication overhead problems in multiprocessor environments. The proposed approach is based on defining and maintaining data structures to dynamically …track the load of each processor. We implemented the proposed algorithm and evaluated its performance under different scenarios against the baseline round-robin algorithm. The results showed that the proposed algorithm has more effective properties than the round-robin algorithm. Show more
Keywords: Parallel processing, cloud computing, grid computing, load balancing, artificial ant colony, optimization
DOI: 10.3233/JIFS-169440
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1443-1451, 2018
Authors: Athira, U. | Thampi, Sabu M.
Article Type: Research Article
Abstract: Illegal cyber activities can be curbed by means of authorship analysis which intends to identify the authors of a document by scrutinizing the writing style involved in it. One of the major threats associated with online media is the propagation of false statements on behalf of celebrities with the aim of tarnishing their public image especially as a part of online political campaigns. The scenario calls for the need of analyzing the authorship of documents with less contents and capturing the author style from among a large number of candidate authors belonging to the same domain. This is a less …explored area of authorship analysis as the task is challenging because traditional methods fail to acquire accuracy when the contents of different authors are pertaining to same topic. Here we propose a method that accomplishes the task of analysis in such an environment, by employing psycholinguistic, lexical, and syntactic aspects of an author combined with word co-occurrences obtained by modeling the style word pattern of the text. The method identifies an author’s individualistic form of expression of emotional aspects, sociolinguistic aspects and word co-occurrences, to obtain an author-style pattern for each candidate author. An author-specific model is generated. The questioned document is fed into the different models so formed, and the final decision regarding the authorship is made based on the ensembled learning method. The experimental results of the proposed method has secured a precision of 0.98 in best case and 0.45 in worst case, thereby illustrating an improvement in the accuracy of authorship attribution of short texts, in comparison with the existing methods. Show more
Keywords: Authorship attribution, computational linguistics, cyber forensics, psycholinguistic features, topic modelling, stylometry, ensembled learning
DOI: 10.3233/JIFS-169441
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1453-1466, 2018
Authors: Mohan, Vijay | Chhabra, Himanshu | Rani, Asha | Singh, Vijander
Article Type: Research Article
Abstract: A novel Non-Linear Fractional order PID controller (NLF-PID) is designed for control of coupled and non-linear 2-link rigid robot. The structure of proposed controller comprises of non-linear hyperbolic function of instantaneous error and current state cascaded with Fractional Order PID (FO-PID). Non-linear function provides adaptive control ability while incorporation of fractional operator enhances flexibility of designed controller. To examine the comparative merits of NLF-PID controller, Non-linear PID (NL-PID), FO-PID and traditional PID schemes are also implemented. Design variables of controllers are optimally tuned using multi objective Non-dominated Sorting Genetic Algorithm II (NSGA-II) for small variation in control and error signal. …Results prove that NLF-PID provides robust and efficient control of robotic arm as compared to other designed controllers for reference tracking, model uncertainty, disturbance and noise due to inherent shortcoming of sensor. Show more
Keywords: Fractional order PID (FO-PID), non-linear PID (NL-PID), non-linear fractional order PID (NLF-PID), robustness analysis, NSGA-II
DOI: 10.3233/JIFS-169442
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1467-1478, 2018
Authors: Kumar, Abhishek | Sharma, Rajneesh | Varshney, Pragya
Article Type: Research Article
Abstract: Markov game based controllers are robust but lack guarantee on the stability of the designed controller. In this work, we attempt to address this shortcoming by proposing a lyapunov fuzzy Markov game controller for safe and stable tracking control of two link robotic manipulators. Lyapunov theory has been used to generate fuzzy linguistic rules for implementing a reinforcement learning (RL) based Markov game controller. We employ fuzzy inference system as a generic function approximator to deal with the “curse of dimensionality” issue. Proposed RL based Markov game controller is self-learning, adaptive and optimal. We implement the proposed control paradigm on: …a) Two link robot manipulator and b) SCARA manipulator for the cases: i) controller handles disturbances and parameter variations, and ii) disturbances and no parameter variations. We give comparative evaluation of our approach against: a) fuzzy Q learning controller, and b) fuzzy Markov game controller. Simulation results illustrate stable and superior tracking performance and advantage in terms of lower control torque requirements. Show more
Keywords: Reinforcement learning, fuzzy Q learning, fuzzy Markov game control, lyapunov fuzzy control, two link robotic manipulator, SCARA
DOI: 10.3233/JIFS-169443
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1479-1490, 2018
Authors: Nangrani, S.P. | Singh, Arvind R. | Chandan, Ajaysingh
Article Type: Research Article
Abstract: Engineering systems are governed by set of differential equations and work under various uncertainties of parameters. Type–1 fuzzy logic controller are widely used in engineering systems for expert control of system using logic and mathematics together. This paper proposes the first-ever use of Interval Type–2 fuzzy logic controller design to control chaos and associated instability in a nonlinear dynamical power system. Interval Type–2 fuzzy designs have an edge over type-1 fuzzy sets and interval type–2 fuzzy logic controller is well suited for the uncertainty present in weak and chaos sensitive systems. Uncertainty in parameters affects differential equation very badly for …such systems. Uncertainty in engineering applications needs an extra layer of handling system control mathematically and logically. Comparison of Type–1 and Type–2 fuzzy logic controller based on time domain waveform, phase plane trajectory and integral square error, clearly proves the efficacy of Type–2 fuzzy logic controller in controlling dynamic behavior of a nonlinear dynamical system as demonstrated through results discussed in the paper. This paper discusses control of chaos driven voltage instability issue in the case of nonlinear dynamical power system, as an application. Show more
Keywords: Type-2 fuzzy logic controller, interval type-2 fuzzy logic controller, fuzzy logic set, nonlinear dynamical system
DOI: 10.3233/JIFS-169444
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1491-1501, 2018
Authors: Gupta, Shalini | Dixit, Veer Sain
Article Type: Research Article
Abstract: This article presents a scalable and optimized recommender system for e-commerce web sites to maintain a better customer relationship management and survive among its competitors. The proposed system analyses the clickstream data obtained from an ecommerce site and predicts the preference level of the customer for the products clicked but not purchased using efficient classifiers such as decision trees, artificial neural networks and extended trees. Collaborative filtering technique is used to recommend products in which similarity measures are used along with efficient rough set leader clustering algorithm which helps in making accurate and fast recommendations. To determine the effectiveness of …the proposed approach, an experimental evaluation has been done which clearly depicts the better performance of the system as compared to conventional approaches. Show more
Keywords: Recommender system, e-commerce, clickstream data, preference level, collaborative filtering, rough set leader clustering
DOI: 10.3233/JIFS-169445
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1503-1510, 2018
Authors: Sharma, Chhavi | Bedi, Punam
Article Type: Research Article
Abstract: The microblogging service Twitter has witnessed a rapid increase in its adopters ever since it’s discovery in October 2006. Today it has become a medium of communication as well as spread of information. Hashtags are created in twitter by users whenever an event of significant importance occurs and hence they become trending on twitter network. Once hashtags are created on twitter platform, the tweeters may communicate within a particular community of interest following and tweeting to any particular hashtag conversations. In this paper, we propose the design of Community based Hashtag Recommender System (CHRS) for twitter users. This will help …the users by expanding their hashtag base and hence strengthening the hashtag conversation for a particular event. The tweets collected over a period of time for some particular hashtags have been categorised to communities based on sentiment analysis of the tweets. Once the process of community detection completes, the existing users are found in the tweets. Further the idea of Hashtag frequency- Inverse Community Frequency (HF-ICF) has been suggested and deployed to find hashtags which uniquely distinguish the users found earlier. Finally relevance score is computed based on the idea of collaborative filtering approach to recommendation, for various hashtags used by the users. A prototype of the system is developed using the statistical tool R and experimental analysis has been carried out. Tweets of national concern in India pertaining to ‘demonetisation’ have been collected and used for experimental purposes. Show more
Keywords: Recommender system, demonetisation, twitter, hashtag, community detection, HF-ICF
DOI: 10.3233/JIFS-169446
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1511-1519, 2018
Authors: Richa, | Bedi, Punam
Article Type: Research Article
Abstract: Recommender systems (RS) suffer from cold start and data sparsity problem. Researchers have proposed various solutions to this problem in which cross domain recommendation is an effective approach. Cross domain recommender system (CDRS) utilizes user data from multiple domains to generate prediction for the target user. This paper proposes a proactive cross domain recommender system. This paper also introduces a parallel approach in cross domain recommendation using general purpose graphic processing unit (GPGPU). This will help to accelerate the computation in the multi-agent environment as data processing in multiple domains takes significant amount of time. A prototype of the system …is developed in tourism domain using Cuda, JCuda, Java, Android studio and Jade. The system uses four domains which is restaurant, tourist places, shopping places and hotels. The performance of the parallel CDRS system is compared with non-parallel CDRS in terms of their processing speed. Also the system is compared to the normal Collaborative Filtering approach to measure accuracy of the proposed system using MAE as well as precision, recall and F-measure. The results show a significant speedup for the presented system over non-parallel system. Show more
Keywords: Recommender system, cross domain, proactive recommender system, multi-agent system, parallel processing
DOI: 10.3233/JIFS-169447
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1521-1533, 2018
Authors: Vimala, J. | Reeta, J. Arockia | Ilamathi, V.S. Anusuya
Article Type: Research Article
Abstract: Aktas and Cagman propounded soft group in 2007 and Abdulkadir Aygunoglu and Halis Aygun defined fuzzy soft group in 2009. In 2016, J. Vimala and J. Arockia Reeta proposed lattice ordered fuzzy soft group and derived its pertinent properties. In this work, fuzzy soft cardinality and fuzzy soft relative cardinality are promoted in lattice ordered fuzzy soft group. Then we give decision making method that can be applied successfully for solving many problems with uncertainties.
Keywords: l-Fsg, fuzzy soft cardinality, fuzzy soft relative cardinality
DOI: 10.3233/JIFS-169448
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1535-1542, 2018
Authors: Tripathi, Diwakar | Edla, Damodar Reddy | Cheruku, Ramalingaswamy
Article Type: Research Article
Abstract: Credit scoring is a procedure to estimate the risk related with credit products which is calculated using applicants’ credentials and applicants’ historical data. However, the data may have some redundant and irrelevant information and features, which lead to lower accuracy on the credit scoring model. So, by eliminating the redundant features can resolve the problem of credit scoring dataset. In this work, we have proposed a hybrid credit scoring model based on dimensionality reduction by Neighborhood Rough Set (NRS) algorithm and layered ensemble classification with weighted voting approach to improve the classification performance. For classifiers’ raking, we have proposed a …novel classifier ranking algorithm as an underlying model for representing ranks of the classifiers based on classifier accuracy. It is used on seven heterogeneous classifiers for finding the ranks of those classifiers. Further five best ranking classifiers are used as base classifier in layered ensemble framework. Results of the ensemble frameworks (Majority Voting (MV), Weighted Voting (WV), Layered Majority Voting (LMV), Layered Weighted Voting (LWV)) with all features and after feature reduction by various existing feature selection algorithms are compared in terms of accuracy, sensitivity, specificity and G -measure. Further, results of ensemble frameworks with NRS are also compared in terms of ROC curve analysis. The experimental outcomes reveal the success of proposed methods in two benchmarked credit scoring (Australian credit scoring and German loan approval) datasets obtained from UCI repository. Show more
Keywords: Weighted voting, classification, feature selection, ensemble learning, credit scoring
DOI: 10.3233/JIFS-169449
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1543-1549, 2018
Authors: Singh, Shivkaran | Anand Kumar, M. | Soman, K.P.
Article Type: Research Article
Abstract: Neural machine translation is an approach to learn automatic translation using a large, single neural network. It models the whole translation process in an end-to-end manner without requiring any additional components as in statistical machine translation systems. Neural machine translation has achieved promising translation performances. It has become the conventional approach in machine translation research nowadays. In this work, we applied neural machine translation for English-Punjabi language pair. In particular, attention based mechanism was used for developing the machine translation system. We also developed the parallel corpus for English-Punjabi language pair. As of now, we are releasing version-1 of the …corpus and it is freely available for any non-commercial research. To the best of author’s knowledge, there is no relevant literature on neural/statistical machine translation implementation for English-Punjabi language pair as of this writing. To evaluate the system, BLEU evaluation metric was used. To quantify system’s performance, the results obtained were further compared with existing systems such as AnglaMT and Google Translate. The BLEU score of the developed system exceeds both of these systems marginally. Show more
Keywords: Neural machine translation, recurrent neural network, long short term memory, English Punjabi machine translation
DOI: 10.3233/JIFS-169450
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1551-1559, 2018
Authors: Mohanapriya, N. | Kousalya, G. | Balakrishnan, P. | Pethuru Raj, C.
Article Type: Research Article
Abstract: Cloud computing offers utility-based IT services on-demand to the users on a pay-per-use-basis. The cloud centers consist of physical machines (PMs) with virtual machines (VMs). These data centers consume a large amount of energy due to the improper resource utilization and lack of efficient scheduling algorithms to perform the task-resource mapping. These issues lead to huge energy consumption along with high maintenance costs and carbon emissions. In this paper, a Power Efficient Scheduling and VM Consolidation (PESVMC) algorithm is proposed to address these issues and the associated challenges. The numerous existing research works concentrated on the application of energy management …techniques to hardware level support for the reduction of energy consumption. The proposed algorithm emphasizes on the software level by taking the flexibility of the virtualization technology and it consists of two phases, VM Scheduling phase, and VM Consolidation phase. In the Scheduling phase, the tasks with maximum runtime are allocated to VM, which is expected to consume minimal energy. In the VM Consolidation phase, overloaded and underloaded hosts are determined based on the double-threshold scheme. Further, Live Migration technique is applied for migrating the VMs from over-utilized or underutilized hosts to other hosts with the normal utilization. A power efficient utilization factor is introduced to determine the underloaded hosts. This utilization factor is proven to reduce the number of migrations, which can cause additional energy consumption. Energy efficient Scheduling combined with VM Consolidation is successful in maximizing the resource utilization and minimizing the energy consumption. The experimental evaluation is performed using WorkflowSim and the proposed algorithm achieves significant energy conservation and resource utilization. Show more
Keywords: Workflow scheduling, energy efficiency, VM consolidation
DOI: 10.3233/JIFS-169451
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1561-1572, 2018
Authors: Jain, Mohit | Maurya, Shubham | Rani, Asha | Singh, Vijander
Article Type: Research Article
Abstract: This paper presents, a novel nature-inspired optimization paradigm, named as owl search algorithm (OSA) for solving global optimization problems. The OSA is a population based technique based on the hunting mechanism of the owls in dark. The proposed method is validated on commonly used benchmark problems in the field of optimization. The results obtained by OSA are compared with the results of six state-of-the-art optimization algorithms. Simulation results reveal that OSA provides promising results as compared to the existing optimization algorithms. Moreover, to show the efficacy of the proposed OSA, it is used to design two degree of freedom PI …(OSA-2PI) controller for temperature control of a real-time heat flow experiment (HFE). Experimental results demonstrate that OSA-2PI controller is more precise for temperature control of HFE in comparison to the conventional PI controller. Show more
Keywords: Nature-inspired algorithm, unconstrained optimization, two degree of freedom PI controller, Heat flow experiment
DOI: 10.3233/JIFS-169452
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1573-1582, 2018
Authors: Shukla, Alok Kumar | Singh, Pradeep | Vardhan, Manu
Article Type: Research Article
Abstract: In the recent era, evolutionary meta-heuristic algorithms is popular research area in engineering and scientific field. One of the intelligent evolutionary meta-heuristic algorithms is Teaching Learning Based Optimization (TLBO). The basic TLBO algorithm follows the isolated learning strategy for the whole population. This invariable learning strategy may cause the misconception of knowledge for a specific learner, which makes it unable to deal with different complex situations. For solving the complex non-linear optimization problems, local optimum frequently happens in the generating process. To resolve these kinds of problem, this paper introduces Neighbour based TLBO (NTLBO) and differential mutation. The concept of …neighbour learning and differential mutation is introduced to improve the convergence solution after each run of experiment. Neighbour learning method maintains the explorative and exploitation search of the population and discourages the premature convergence. The efficiency of the proposed algorithm is evaluated on eight benchmark functions of Congress on Evolutionary Computation (CEC) 2006. The proposed NTLBO present extensive comparative study with the state-of-the-art forms of the meta-heuristic algorithms for standard benchmark functions. The result shows that the proposed NTLBO gives the superior performance over recent meta-heuristic algorithms. Show more
Keywords: Differential mutation, explorative and exploitation, meta-heuristic, neighbour learning, Teaching learning-based optimization
DOI: 10.3233/JIFS-169453
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1583-1594, 2018
Authors: Sreedhar, K.C. | Suresh Kumar, N.
Article Type: Research Article
Abstract: Because of its increasing usage, internet has become an integral component of our daily lives. In this paradigm, users can share their perceptions and collaborate with others easily through social communities. The e-healthcare community service is particularly recommended by individual patients who are remotely located, have embarrassing medical conditions, or have caretaker responsibilities that may prohibit them from obtaining satisfactory face-to-face medical and emotional support. However, participation in such online social collaborations may be constrained due to cultural and language barriers. This paper proposes a privacy-preserving collaborative e-healthcare system that connects and integrates patients or caretakers into different groups. This …system helps them to chat with other patients with similar problems, understand their feelings, and much more. However, patients’ private and sensitive information cannot be disclosed to anyone at any point of time. The recommended model uses a special technique, k-centroid multi-view point similarity algorithm, to cluster e-profiles based on their similarities. Finally, a distributed hashing technique is used to encrypt the clustered profiles to persevere patients’ personal information. The suggested framework is compared with well-known privacy-preserving clustering algorithms to compute accuracy and latency by using popular similarity measures. Show more
Keywords: e-profile, healthcare, k-centroid, symptoms, disease, cluster
DOI: 10.3233/JIFS-169454
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1595-1607, 2018
Authors: Mathew, Terry Jacob | Sherly, Elizabeth | Alcantud, José Carlos R.
Article Type: Research Article
Abstract: The diagnostic prediction models in medical sciences are more relevant today than ever before. The nature and type of the data do have a profound impact on the prediction output. As the nature of data changes, the choice of intelligent methods also has to be altered adaptively to attain promising results. A highly customised data oriented model which encompasses multi-dimensional information can aid and improve the prediction process. This paper proposes an adaptive soft set based intelligent system which is designed to receive a set of input parameters related to any disease and generates the risk percentage of the patient. …The system produces soft sets with the given inputs by fuzzification; followed by rule generation. The rules are analysed to obtain the risk percentage and based on its intensity, the system proceeds with the disease diagnosis. Four different approaches are introduced in this study to enhance the risk prediction accuracy, namely subset of parameters method, adaptive selection of analysis metrics, weighted rules method and the unique set method. The best model is acquired from these approaches in an adaptive fashion by the algorithm. Our method of risk prediction is applied for prostate cancer detection as a case study and we provide exhaustive comparison of the different approaches employed within the algorithm. The results prove that this synergistic approach gives better prediction results than the existing methods. The combination of unique set and weighted approach gave the best predictive solution for the proposed system. Show more
Keywords: Soft set, fuzzy set, adaptive decision making, risk prediction
DOI: 10.3233/JIFS-169455
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1609-1618, 2018
Authors: Harikumar, Sandhya | Akhil, A.S.
Article Type: Research Article
Abstract: High-dimensional data analysis is quite inevitable due to emerging technologies in various domains such as finance, healthcare, genomics and signal processing. Though data sets generated in these domains are high-dimensional, intrinsic dimensions that provide meaningful information are often much smaller. Conventionally, unsupervised clustering methods known as subspace clustering are utilized for finding clusters in different subspaces of high dimensional data, by identifying relevant features, irrespective of labels associated with each instance. Available label information, if incorporated in clustering algorithm, can bias the algorithm towards solutions more consistent with our knowledge, leading to improved cluster quality. Therefore, an Information Gain based …Semi-supervised- subspace Clustering (IGSC) is proposed that identifies a subset of important attributes based on the known label for each data instance. The information about the labels associated with data sets is integrated with the search strategy for subspaces to leverage them into a model based clustering approach. Our experimentation on 13 real world labeled data sets proves the feasibility of IGSC and we validate the clusters obtained, using an improvised Davies Bouldin Index (DBI) for semi-supervised clusters. Show more
Keywords: Subspace clustering, semi-supervised, information gain, entropy
DOI: 10.3233/JIFS-169456
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1619-1629, 2018
Authors: Dai, Yinglong | Wang, Guojun | Li, Kuan-Ching
Article Type: Research Article
Abstract: Deep Neural Networks (DNNs) have powerful recognition abilities to classify different objects. Although the models of DNNs can reach very high accuracy even beyond human level, they are regarded as black boxes that are absent of interpretability. In the training process of DNNs, abstract features can be automatically extracted from high-dimensional data, such as images. However, the extracted features are usually mapped into a representation space that is not aligned with human knowledge. In some cases, the interpretability is necessary, e.g. medical diagnoses. For the purpose of aligning the representation space with human knowledge, this paper proposes a kind of …DNNs, termed as Conceptual Alignment Deep Neural Networks (CADNNs), which can produce interpretable representations in the hidden layers. In CADNNs, some hidden neurons are selected as conceptual neurons to extract the human-formed concepts, while other hidden neurons, called free neurons, can be trained freely. All hidden neurons will contribute to the final classification results. Experiments demonstrate that the CADNNs can keep up with the accuracy of DNNs, even though CADNNs have extra constraints of conceptual neurons. Experiments also reveal that the free neurons could learn some concepts aligned with human knowledge in some cases. Show more
Keywords: Deep neural networks, conceptual alignment, interpretability, supervised learning, representation learning
DOI: 10.3233/JIFS-169457
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1631-1642, 2018
Authors: Gayathri, R.G. | Nair, Jyothisha J.
Article Type: Research Article
Abstract: Computing the all pair shortest paths in a graph is a widely used solution, but a time-consuming process too. The popularly used conventional algorithms rely solely on the computing capability of the CPU, but fail to meet the demand of real-time processing and mostly do not scale well for larger data. In this paper, we propose the ex-FTCD (extending Full Transitive Closure with Dijkstra’s) algorithm for finding the all pair shortest path by merging the features of the greedy technique in Dijkstra’s single source shortest path method and the transitive closure property. Experiments show that the process improves computing speed …and is more scalable. We re-designed the algorithm for the parallel execution and implemented it in mapreduce on Hadoop that supports the conventional map/reduce jobs. This work also includes the implementation on Spark that supports the in-memory computational capability which uses Random Access Memory for computations. The experiments show that the numbers of iterations are relatively small for even large networks. Show more
Keywords: All pair shortest path, transitive closure, distributed computing, greedy approach
DOI: 10.3233/JIFS-169458
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1643-1652, 2018
Authors: Aliakhmet, Kamilla | Sadykova, Diana | Mathew, Joshin | James, Alex Pappachen
Article Type: Research Article
Abstract: Image blurring artifact is the main challenge to any spatial, denoising filters. This artifact is contributed by the heterogeneous intensities within the given neighborhood or window of fixed size. Selection of most similar intensities (G-Neighbors) helps to adapt the window shape which is of edge-aware nature and subsequently reduce this blurring artifact. The paper presents a memristive circuit design to implement this variable pixel G-Neighbor filter. The memristive circuits exhibits parallel processing capabilities (near real-time) and neuromorphic architectures. The proposed design is demonstrated as simulations of both algorithm (MATLAB) and circuit (SPICE). Circuit design is evaluated for various parameters such …as processing time, fabrication area used, and power consumption. Denoising performance is demonstrated using image quality metrics such as peak signal-to-noise ratio (PSNR), mean square error (MSE), and structural similarity index measure (SSIM). Combining adaptive filtering method with mean filter resulted in average improvement of MSE to about 65% reduction, increase of PSNR and SSIM to nearly 18% and 12% correspondingly. Show more
Keywords: Denoising filter, G-neighbor, memristor, SPICE
DOI: 10.3233/JIFS-169459
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1653-1667, 2018
Authors: Narang, Ankit | Batra, Bhumika | Ahuja, Arpit | Yadav, Jyoti | Pachauri, Nikhil
Article Type: Research Article
Abstract: EEG is the most effective diagnostic technique to determine epilepsy in a patient. The objective of this research work is to apply classification techniques on EEG signals to determine whether the patient has suffered from epileptic seizure. This is carried out through the extraction of various time and frequency domain features. The two classifiers, i.e. Artificial Neural Network (ANN) and Support Vector Machine (SVM) are used and compared using various evaluation parameters. The simulation results and corresponding quantitative analysis shows that ANN classifier is superior to SVM.
Keywords: Artificial neural network, support vector machine, EEG signal
DOI: 10.3233/JIFS-169460
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1669-1677, 2018
Authors: Isaac, Meera Mary | Wilscy, M.
Article Type: Research Article
Abstract: Today’s Image processing tools have matured to a level where its users can effortlessly modify or enhance the images according to their requirement. A misuse of such tools has created a necessity for authenticating images to ensure its correctness. Image Forensics deals with the study of different kinds of manipulation on images and their detection. Image forgery detection algorithms detect forgery related artifacts which can be distinguished using specific image properties. Texture-based features have been widely used to detect forgery induced texture variations in the images. In this paper, we propose Region and Texture combined features for Image Forgery Detection. …The Region-based approaches like – Edge-based Region Detection, Saliency-based Region Detection, and Wavelet-based Region Detection are captured, and on these regions, the texture feature- Rotation invariant Co-occurrences among adjacent LBP (RiCoLBP) is applied. The features thus obtained are optimized using Non-Negative Matrix Factorization and fed to a Support Vector Machine (SVM) for classification. The method is extensively evaluated on three benchmark datasets for image forgery detection namely CASIA v1.0, CASIA v2.0 and CUISDE. The performance reveals improved detection accuracies when compared to the state-of-the-art methods in detecting forged and authentic images. Show more
Keywords: Image forgery detection, edge-based features, Saliency, Wavelets, RiCLBP
DOI: 10.3233/JIFS-169461
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1679-1690, 2018
Authors: Islam, Mohiul | Roy, Amarjit | Laskar, Rabul Hussain
Article Type: Research Article
Abstract: In this paper, a robust image watermarking technique has been proposed in lifting wavelet transform (LWT) domain. Neural network is incorporated in the watermark extraction process to achieve improved robustness against different attacks. The integration of neural network with LWT makes the system robust to various attacks maintaining an adequate level of imperceptibility. The 3-level LWT coefficients are randomized and arranged in 2×2 non-overlapping blocks. Each block is modified according to a binary watermark bit. Randomization of coefficients and blocks has been done to enhance the security of the system. The binary watermark bit is also encrypted using another key. …The scheme provides an average imperceptibility of 43.88 dB for a watermark capacity of 512 bits. The robustness has been observed against all the intentional and non-intentional attacks. The technique provides satisfactory robustness against different attacks such as noising attacks, de-noising attacks, lossy compression attacks, image processing attacks and some geometric attacks. The algorithm has been tested on a large image database containing different class of images. Show more
Keywords: Lifting wavelet transform (LWT), image watermarking, artificial neural network (ANN), peak signal to noise ratio (PSNR), normalized cross-correlation (NC)
DOI: 10.3233/JIFS-169462
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1691-1700, 2018
Authors: Ganga Gowri, B. | Soman, K.P.
Article Type: Research Article
Abstract: In this paper, a two step approach using Variational Mode Decomposition (VMD) and ℓ1 trend filter is proposed for enhancing speech signals degraded by white Gaussian noise. In the first step, VMD decomposes the noisy speech signal into Intrinsic Mode Functions (IMFs) corresponding to different frequency components of the signal. In the second step, ℓ1 trend filter retrieves the speech information by filtering out the noisy sub frames. The noisy sub frames are identified using a threshold based on noise variance in the corresponding IMFs. The proposed work experiments on speech signals degraded by white Gaussian noise in …the range 10 dB– 30 dB. The performance of proposed method is compared with some of the well known speech enhancement techniques: Spectral Subtraction (SS) and Minimized Mean Square Error (MMSE) using the subjective and objective quality measures. The proposed, two-step approach of VMD-ℓ1 trend filter achieves better performance compared to the considered methods. Show more
Keywords: Speech enhancement, white Gaussian noise, variational mode decomposition (VMD), ℓ1 trend filter
DOI: 10.3233/JIFS-169463
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1701-1711, 2018
Authors: Kulkarni, Nilima | Amudha, J.
Article Type: Research Article
Abstract: Optic disc (OD) detection is an important step in a number of algorithms developed for automatic extraction of anatomical structures and retinal lesions. In this article, a novel system, eye gaze– based OD detection, is presented for detecting OD in fundus retinal image using the knowledge developed from the expert’s eye gaze data. The eye gaze data are collected from expert optometrists and non-experts group while viewing the fundus retinal images. The task given to them is to spot the OD in fundus retinal images. Eye gaze fixations were used to identify the target and distractor regions. The image-based features …were extracted from the identified regions. The top-down (TD) knowledge is developed using feature ranking and fuzzy system. This TD knowledge is further used for building the TD map. The success rates for various standard datasets are: DRIVE dataset, 100%; DRIONS-DB, 98.2%; INSPIRE, 97.5%; High Resolution Fundus Images, 100%; DIRECTDB0, 96.9%; ONHSD, 91.9% and STARE, 81.4%. Show more
Keywords: Optic disc detection, fuzzy system, eye gaze, fixations, regions identification, top-down knowledge
DOI: 10.3233/JIFS-169464
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1713-1722, 2018
Authors: Shanmugha Sundaram, G.A. | Reshma, R.
Article Type: Research Article
Abstract: Satellites that orbit the Earth at lower altitudes are the predominant type that are deployed in remote sensing missions. Although thee are many well documented advantages in having the Earth-observing satellites in such lower orbits, the altitude parameter often introduces significant variabilities to the orbital elements, the predominant among them being the perturbative forces due to atmospheric drag. The drag parameter causes deviation of the satellite from its actual orbital trajectory. While updated near-Earth atmospheric drag models have helped resolve this issue, there are the other forces that are secondary in importance, such as the non-spherical Earth’s shape factor effect …and luni-solar perturbations that also affect on remote sensing satellites, particularly of the low-Earth Orbit (LEO) and geosynchronous transfer orbiting (GTO) types, that are considered for this particular study. After verifying the equivalent perturbed acceleration terms using the Cowell’s method, variations caused to the classical orbital elements in general, and the altitude element in particular, are characterised in terms of the corresponding distortions caused in the imaging data obtained by the Landsat platform, that are then shown as resulting in a image quality degradation. Show more
Keywords: LEO and GTO satellites, PAN image, orbital perturbations, Keplerian elements, imaging sensors
DOI: 10.3233/JIFS-169465
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1723-1730, 2018
Authors: Kaur, Parampreet | Sobti, Rajeev
Article Type: Research Article
Abstract: Automotive embedded applications are gaining widespread importance worldwide. Almost every car is equipped with hundreds of software-enabled technologies which are expected to have a drastic spike in the coming years ahead. With the advent of more and more automatic and autonomous techniques, there arises an extensive requirement of applying latest development and testing strategies. Apart from using single traditional V-Model, the design and test cases are generated based on more advanced double and triple V-models. The front panel of one of the autonomous car systems is designed and more refinement is obtained for optimum test path generation using prefix graph …algorithm and edge-pair coverage criteria. Show more
Keywords: Design model, automotive, double V-model, testing, edge-pair coverage criteria
DOI: 10.3233/JIFS-169466
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1731-1742, 2018
Authors: Chandrika, K.R. | Amudha, J.
Article Type: Research Article
Abstract: A quality software development is inclined to the software developer skills. The research focus on recommending the skills of individuals based on the eye movement data. The paper sketches a study conducted on students who are future developers. A fuzzy based recommendation system was implemented to recommend two skills, code coverage and debugging skills that are primary in source code review. The code coverage inference system recommends individual code coverage as maximum, average and minimum and the debugging fuzzy inference system recommends debugging skills as skilled, unskilled and expert.
Keywords: Software engineering, recommendation system, eye tracking, source cod review, code coverage, debugging, skills
DOI: 10.3233/JIFS-169467
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1743-1754, 2018
Authors: Malhotra, Ruchika | Khanna, Megha
Article Type: Research Article
Abstract: Determination of change prone classes is crucial in providing guidance to software practitioners for efficient allocation of limited resources and to develop favorable quality software products with optimum costs. Previous literature studies have proposed successful use of design metrics to predict classes which are more prone to change in an Object-Oriented (OO) software. However, the use of evolution-based metrics suite, which quantifies history of changes in a software, release by release should also be evaluated for effective prediction of change prone classes. Evolution-based metrics are representative of evolution characteristics of a class over all its previous releases and are important …in order to understand progression and change-prone nature of a class. This study evaluates the use of evolution-based metrics when used in conjunction with OO metrics for prediction of classes which are change prone in nature. In order to empirically validate the results, the study uses two application packages of the Android software namely Contacts and Gallery2. The results indicate that evolution based metrics when used in conjunction with OO metrics are the best predictors of change prone classes. Furthermore, the study statistically evaluates the superiority of this combined metric suite for change proneness prediction. Show more
Keywords: Change proneness, evolution-based metrics, empirical validation, machine learning techniques
DOI: 10.3233/JIFS-169468
Citation: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1755-1766, 2018
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]