Статьи журнала - International Journal of Intelligent Systems and Applications

Все статьи: 1126

An anomaly detection based on optimization

An anomaly detection based on optimization

Rasim M. Alguliyev, Ramiz M. Aliguliyev, Yadigar N. Imamverdiyev, Lyudmila V. Sukhostat

Статья научная

At present, an anomaly detection is one of the important problems in many fields. The rapid growth of data volumes requires the availability of a tool for data processing and analysis of a wide variety of data types. The methods for anomaly detection are designed to detect object’s deviations from normal behavior. However, it is difficult to select one tool for all types of anomalies due to the increasing computational complexity and the nature of the data. In this paper, an improved optimization approach for a previously known number of clusters, where a weight is assigned to each data point, is proposed. The aim of this article is to show that weighting of each data point improves the clustering solution. The experimental results on three datasets show that the proposed algorithm detects anomalies more accurately. It was compared to the k-means algorithm. The quality of the clustering result was estimated using clustering evaluation metrics. This research shows that the proposed method works better than k-means on the Australia (credit card applications) dataset according to the Purity, Mirkin and F-measure metrics, and on the heart diseases dataset according to F-measure and variation of information metric.

Бесплатно

An application-oriented review of deep learning in recommender systems

An application-oriented review of deep learning in recommender systems

Jyoti Shokeen, Chhavi Rana

Статья научная

The development in technology has gifted huge set of alternatives. In the modern era, it is difficult to select relevant items and information from the large amount of available data. Recommender systems have been proved helpful in choosing relevant items. Several algorithms for recommender systems have been proposed in previous years. But recommender systems implementing these algorithms suffer from various challenges. Deep learning is proved successful in speech recognition, image processing and object detection. In recent years, deep learning has been also proved effective in handling information overload and recommending items. This paper gives a brief overview of various deep learning techniques and their implementation in recommender systems for various applications. The increasing research in recommender systems using deep learning proves the success of deep learning techniques over traditional methods of recommender systems.

Бесплатно

An approach for the generation of higher order mutants using genetic algorithms

An approach for the generation of higher order mutants using genetic algorithms

Anas Abuljadayel, Fadi Wedyan

Статья научная

Mutation testing is a structural testing technique in which the effectiveness of a test suite is measured by the suite ability to detect seeded faults. One fault is seeded into a copy of the program, called mutant, leading to a large number of mutants with a high cost of compiling and running the test suite against the mutants. Moreover, many of the mutants produce the same output as the original program (called equivalent mutants), such mutants need to be minimized to produce accurate results. Higher order mutation testing aims at solving these problems by allowing more than one fault to be seeded in the mutant. Recent work in higher order mutation show promising result in reducing the cost of mutation testing and increasing the approach effectiveness. In this paper, we present an approach for generating higher order mutants using a genetic algorithm. The aim of the proposed approach is to produce subtle and harder to kill mutants, and reduce the percentage of produced equivalent mutants. A Java tool has been developed, called HOMJava (Higher Order Mutation for Java), which implements the proposed approach. An experimental study was performed to evaluate the effectiveness of the proposed approach. The results show that the approach was able to produce subtle higher order mutants, the fitness of mutants improved by almost 99% compared with the first order mutants used in the experiment. The percentage of produced equivalent mutants was about 4%.

Бесплатно

An automated parameter tuning method for ant colony optimization for scheduling jobs in grid environment

An automated parameter tuning method for ant colony optimization for scheduling jobs in grid environment

Ankita, Sudip Kumar Sahana

Статья научная

The grid infrastructure has evolved as the integration and collaboration of multiple computer systems, networks, different databases and other network resources. The problem of scheduling in grid environment is an NP complete problem where conventional approaches like First Come First Serve (FCFS), Shortest Job First (SJF), Round Robin Scheduling algorithm (RR), Backfilling is not preferred because of the unexpectedly high computational cost and time in the worst case. Different algorithms, for example bio-inspired algorithms like Ant Colony Optimization (ACO), Artificial Bee Colony (ABC), Genetic Algorithm and Particle Swarm Optimization (PSO) are there which can be applied for solving NP complete problems. Among these algorithms, ACO is designed specifically to solve minimum cost problems and so it can be easily applied in grid environment to calculate the execution time of different jobs. Algorithms have different parameters and the performance of these algorithms extremely depends on the values of its parameters. In this paper, we have proposed a method to tune the parameters of ACO and discussed how parameter tuning affects the performance of ACO which in turn affects the performance of grid environment when applied for scheduling.

Бесплатно

An effectiveness evaluation of information technology of gene expression profiles processing for gene networks reconstruction

An effectiveness evaluation of information technology of gene expression profiles processing for gene networks reconstruction

Sergii Babichev, Maksym Korobchynskyi, Serhii Mieshkov, Oleksandr Korchomnyi

Статья научная

The paper presents the research results concerning an effectiveness evaluation of information technology of gene expression profiles processing for purpose of gene regulatory networks reconstruction. The information technology is presented as a structural block-chart of step-by-step stages of the studied data processing. The DNA microchips of patients, who were investigated on different types of cancer, were used as experimental data. The optimal parameters of data processing algorithm at appropriate stage of this process implementation by quantity criteria of data processing quality were determined during simulation. Validation of the reconstructed gene networks was performed with the use of ROC-analysis by comparison of character of genes interconnection in both the basic network and networks reconstructed based on the obtained biclusters.

Бесплатно

An efficient approach for keyphrase extraction from English document

An efficient approach for keyphrase extraction from English document

Imtiaz Hossain Emu, Asraf Uddin Ahmed, Manowarul Islam, Selim Al Mamun, Ashraf Uddin

Статья научная

Keyphrases are set of words that reflect the main topic of interest of a document. It plays vital roles in document summarization, text mining, and retrieval of web contents. As it is closely related to a document, it reflects the contents of the document and acts as indices for a given document. Extracting the ideal keyphrases is important to understand the main contents of the document. In this work, we present a keyphrase extraction method that efficiently finds the keywords from English documents. The methods use some important features of the document such as TF, TF*IDF, GF, GF*IDF, TF*GF*IDF for the purpose. Finally, the performance of the proposal is evaluated using well-known document corpus.

Бесплатно

An efficient scheme of deep convolution neural network for multi view face detection

An efficient scheme of deep convolution neural network for multi view face detection

Shivkaran Ravidas, M.A. Ansari

Статья научная

The aim of this paper is to detect multi-view faces using deep convolutional neural network (DCNN). Multi-view face detection is a challenging issue due to wide changes in appearance under different pose expression and illumination conditions. To address challenges, we designed a deep learning scheme with different network structures to enhance the multi view faces. More specifically, we design cascade architecture on convolutional neural networks (CNNs) which quickly reject non-face regions. Implementation, detection and retrieval of faces will be obtained with the help of direct visual matching technology. Further, a probabilistic calculation of resemblance among the images of face will be conducted on the basis of the Bayesian analysis for achieving detection of various faces. Experiment detects faces with ±90 degree out of plane rotations. Fine-tuned AlexNet is used to detect multi view faces. For this work, we extracted examples of training from AFLW (Annotated Facial Landmarks in the Wild) dataset that involve 21K images with 24K annotations of the face.

Бесплатно

An enhanced differential evolution algorithm with multi-mutation strategies and self-adapting control parameters

An enhanced differential evolution algorithm with multi-mutation strategies and self-adapting control parameters

M. A. Attia, M. Arafa, E. A. Sallam, M. M. Fahmy

Статья научная

Differential evolution (DE) is a stochastic population-based optimization algorithm first introduced in 1995. It is an efficient search method that is widely used for solving global optimization problems. It has three control parameters: the scaling factor (F), the crossover rate (CR), and the population size (NP). As any evolutionary algorithm (EA), the performance of DE depends on its exploration and exploitation abilities for the search space. Tuning the control parameters and choosing a suitable mutation strategy play an important role in balancing the rate of exploration and exploitation. Many variants of the DE algorithm have been introduced to enhance its exploration and exploitation abilities. All of these DE variants try to achieve a good balance between exploration and exploitation rates. In this paper, an enhanced DE algorithm with multi-mutation strategies and self-adapting control parameters is proposed. We use three forms of mutation strategies with their associated self-adapting control parameters. Only one mutation strategy is selected to generate the trial vector. Switching between these mutation forms during the evolution process provides dynamic rates of exploration and exploitation. Having different rates of exploration and exploitation through the optimization process enhances the performance of DE in terms of accuracy and convergence rate. The proposed algorithm is evaluated over 38 benchmark functions: 13 traditional functions, 10 special functions chosen from CEC2005, and 15 special functions chosen from CEC2013. Comparison is made in terms of the mean and standard deviation of the error with the standard "DE/rand/1/bin" and five state-of-the-art DE algorithms. Furthermore, two nonparametric statistical tests are applied in the comparison: Wilcoxon signed-rank and Friedman tests. The results show that the performance of the proposed algorithm is better than other DE algorithms for the majority of the tested functions.

Бесплатно

An exploratory approach to find a novel metric based optimum language model for automatic Bangla word prediction

An exploratory approach to find a novel metric based optimum language model for automatic Bangla word prediction

Md. Tarek Habib, Abdullah Al-Mamun, Md. Sadekur Rahman, Shah Md. Tanvir Siddiquee, Farruk Ahmed

Статья научная

Word completion and word prediction are two important phenomena in typing that have intense effect on aiding disable people and students while using keyboard or other similar devices. Such auto completion technique also helps students significantly during learning process through constructing proper keywords during web searching. A lot of works are conducted for English language, but for Bangla, it is still very inadequate as well as the metrics used for performance computation is not rigorous yet. Bangla is one of the mostly spoken languages (3.05% of world population) and ranked as seventh among all the languages in the world. In this paper, word prediction on Bangla sentence by using stochastic, i.e. N-gram based language models are proposed for auto completing a sentence by predicting a set of words rather than a single word, which was done in previous work. A novel approach is proposed in order to find the optimum language model based on performance metric. In addition, for finding out better performance, a large Bangla corpus of different word types is used.

Бесплатно

An improved PSO algorithm and its application in seismic wavelet extraction

An improved PSO algorithm and its application in seismic wavelet extraction

Yongshou Dai, Hui Niu

Статья научная

The seismic wavelet estimation is finally a multi-dimension, multi-extreme and multi-parameter optimization problem. PSO is easy to fall into local optimum, which has simple concepts and fast convergence. This paper proposes an improved PSO with adaptive parameters and boundary constraints, in ensuring accuracy of the algorithm optimization and fast convergence. Simulation results show that the methods have good applicability and stability for seismic wavelet extraction.

Бесплатно

An improved hybrid distributed collaborative filtering model for recommender engine using apache spark

An improved hybrid distributed collaborative filtering model for recommender engine using apache spark

Rakesh K. Lenka, Rabindra K. Barik, Sasmita Panigrahi, Sai S. Panda

Статья научная

The present scenario there is a serious need of scalability for efficient analytics of big data. In order to achieve this, technology like MapReduce, Pig and HIVE came into action but when the question comes to scalability; Apache Spark maintains a great position far ahead. In this research paper, it has designed and developed an improved hybrid distributed collaborative model for filtering recommender engine. Execution time, scalability and robustness of the engine are the three evaluation parameters; has been considered for this present study. The present work keeps an eye on recommender system built with help of Apache Spark. Apart from this, it has been proposed and implemented the bisecting KMeans clustering algorithms. It has discussed about the comparative analysis between KMeans and Bisecting KMeans clustering algorithms on Apache Spark environment.

Бесплатно

An univariate feature elimination strategy for clustering based on metafeatures

An univariate feature elimination strategy for clustering based on metafeatures

Saptarsi Goswami, Sanjay Chakraborty, Himadri Nath Saha

Статья научная

Feature selection plays a very important role in all pattern recognition tasks. It has several benefits in terms of reduced data collection effort, better interpretability of the models and reduced model building and execution time. A lot of problems in feature selection have been shown to be NP – Hard. There has been significant research in feature selection in last three decades. However, the problem of feature selection for clustering is still quite an open area. The main reason is unavailability of target variable as compared to supervised tasks. In this paper, five properties or metafeatures like entropy, skewness, kurtosis, coefficient of variation and average correlation of the features have been studied and analysed. An extensive study has been conducted over 21 publicly available datasets, to evaluate viability of feature elimination strategy based on the values of the metafeatures for feature selection in clustering. A strategy to select the most appropriate metafeatures for a particular dataset has also been outlined. The results indicate that the performance decrease is not statistically significant.

Бесплатно

Analysis and Design of CLL Resonant Converter for Solar Panel-battery Systems

Analysis and Design of CLL Resonant Converter for Solar Panel-battery Systems

C.Nagarajan, M.Muruganandam, D.Ramasubramanian

Статья научная

This paper presents a CLL resonant converter with DSP based Fuzzy Logic Controller (FLC) for solar panel to battery charging system. The mathematical model of the converters has been developed and simulated using MATLAB. The state space model of the converter is developed; it is used to analysis the steady state stability of the system. The aim of the proposed converter is to regulate and control of the output voltage from the solar panel voltage. The performance of the proposed converter is validated through experiments with a 75-Watt solar panel. The effectiveness of the controller is verified for supply change and load disturbance. The converter is implemented on a TMS320F2407 Digital Signal Processor with 75-Watt PV system. Comparison between experimental and simulations show a very good agreement and the reliability of fuzzy controller.

Бесплатно

Analysis and Design of Tri-Gate MOSFET with High Dielectrics Gate

Analysis and Design of Tri-Gate MOSFET with High Dielectrics Gate

Viranjay M. Srivastava, Setu P. Singh

Статья научная

The scaling of simple gate transistors requires the scaling and transistor elements like source/drain junction became difficult to scale further after a limit due to adverse effect of electrostatic and short-channel performance. The solution of the problem is tri-gate where we can increase the performance without increasing the width and without scaling. In this paper we have described the parameter of tri-gate and taking the high dielectric as substrate.

Бесплатно

Analysis and Estimation of Values of Currents and Voltages at the Disturbances in Induction Machine Using Tested Matlab Simulation

Analysis and Estimation of Values of Currents and Voltages at the Disturbances in Induction Machine Using Tested Matlab Simulation

Nenad Marković, Slobodan Bjelić, Jeroslav Živanić, Zorica Bogićević

Статья научная

The paper we presents mathematical model for analysis of transitional processes in three-phase induction motor, that is, wave forms of currents and voltages in time domain and phase coordinates. Model is suitable for relay protection of the motor from disturbances and for estimation of electrical energy quality in the distribution network. New constructions of induction motors present more progressive technical solutions comparing with classical variants and reliable entity only within selected system of protection from expected disturbances (failures and disorders followed by asymmetries). Measuring process is not required due to application of simulation in selected MATLAB package.

Бесплатно

Analysis of Cyberbullying Incidence among Filipina Victims: A Pattern Recognition using Association Rule Extraction

Analysis of Cyberbullying Incidence among Filipina Victims: A Pattern Recognition using Association Rule Extraction

Frederick F. Patacsil

Статья научная

Cyberbullying is an intentional action of harassment along the complex domain of social media utilizing information technology online. This research experimented unsupervised associative approach on text mining technique to automatically find cyberbullying words, patterns and extract association rules from a collection of tweets based on the domain / frequent words. Furthermore, this research identifies the relationship between cyberbullying keywords with other cyberbullying words, thus generating knowledge discovery of different cyberbullying word patterns from unstructured tweets. The study revealed that the type of dominant frequent cyberbullying words are intelligence, personality, and insulting words that describe the behavior, appearance of the female victims and sex related words that humiliate female victims. The results of the study suggest that we can utilize unsupervised associative approached in text mining to extract important information from unstructured text. Further, applying association rules can be helpful in recognizing the relationship and meaning between keywords with other words, therefore generating knowledge discovery of different datasets from unstructured text.

Бесплатно

Analysis of Transient Response and Load Disturbance Rejection Ability of Induction Motor using Fuzzy Logic Approach

Analysis of Transient Response and Load Disturbance Rejection Ability of Induction Motor using Fuzzy Logic Approach

Ravi Sharma, Renu Singh, Rakesh Kumar Saxena

Статья научная

In this paper, an efficient control algorithm for an Intelligent Controller Induction Motor Drive system using Fuzzy Logic Approach has been proposed. The Indirect Vector Control principle has been employed to control the Induction Motor. Next, a two-degree-of freedom controller is proposed to improve the system performance. The controller design algorithm can be applied in an adjustable speed control system to obtain good transient responses and good load disturbance rejection abilities. The proposed controller has been analyzed using computer simulation and compared with a simple conventional Controller strategy. The simulated controller performances have been finally verified experimentally using TMS320C6711 Digital Signal Processor. The results obtained substantiate the robustness and effectiveness of Intelligent Controller for high performance of Induction Motor.

Бесплатно

Analysis towards Mobile IPV4 and Mobile IPV6 in Computer Networks

Analysis towards Mobile IPV4 and Mobile IPV6 in Computer Networks

Seyedeh Masoumeh Ahmadi

Статья научная

With the rapid growth in the number of mobile devices like cellular phones, personal digital assistants (PDAs), and laptop computers, the demand for “anywhere, anytime, and any way” high-speed Internet access is becoming a primary concern in our lives. Mobile IP has been designed with the Internet Engineering Task Force (IETF) to serve the needs of growing population of mobile computer users who wish to connect to the internet and maintain communication as they move from place to place. Mobile IP enables a wireless network node to move freely from one point of connection to the Internet to another, without disrupting the end-to-end connectivity. The goals of this paper are to define the fundamentals of mobile IPV4, elaborate the problems of mobile IPV4, give a brief overview of some of the literature that deals with the fundamentals of mobile IPV6, explain the problems of mobile IPV6, compare Mobile IPv6 and Mobile IPv4, discuss the advantages of mobile IP, and review the application of mobile IP for vehicular networks.

Бесплатно

Analytical Assessment of Security Level of Distributed and Scalable Computer Systems

Analytical Assessment of Security Level of Distributed and Scalable Computer Systems

Zhengbing Hu, Vadym Mukhin, Yaroslav Kornaga, Yaroslav Lavrenko, Oleg Barabash, Oksana Herasymenko

Статья научная

The article deals with the issues of the security of distributed and scalable computer systems based on the risk-based approach. The main existing methods for predicting the consequences of the dangerous actions of the intrusion agents are described. There is shown a generalized structural scheme of job manager in the context of a risk-based approach. Suggested analytical assessments for the security risk level in the distributed computer systems allow performing the critical time values forecast for the situation analysis and decision-making for the current configuration of a distributed computer system. These assessments are based on the number of used nodes and data links channels, the number of active security and monitoring mechanisms at the current period, as well as on the intensity of the security threats realization and on the activation intensity of the intrusion prevention mechanisms. The proposed comprehensive analytical risks assessments allow analyzing the dynamics of intrusions processes, the dynamics of the security level recovery and the corresponding dynamics of the risks level in the distributed computer system.

Бесплатно

Ant Colony Optimization for Train Scheduling: An Analysis

Ant Colony Optimization for Train Scheduling: An Analysis

Sudip Kumar Sahana, Aruna Jain, Prabhat Kumar Mahanti

Статья научная

This paper deals on cargo train scheduling between source station and destination station in Indian railways scenario. It uses Ant Colony Optimization (ACO) technique which is based on ant’s food finding behavior. Iteration wise convergence process and the convergence time for the algorithm are studied and analyzed. Finally, the run time analysis of Ant Colony Optimization Train Scheduling (ACOTS) and Standard Train Scheduling (STS) algorithm has been performed.

Бесплатно

Журнал