Статьи журнала - International Journal of Intelligent Systems and Applications

Все статьи: 1126

Fuzzy-Based System for Determining the Severity Level of Knee Osteoarthritis

Fuzzy-Based System for Determining the Severity Level of Knee Osteoarthritis

Emuoyibofarhe O. Justice, Taiwo K.F

Статья научная

The task of medical diagnosis, unlike other diagnostic processes is more complex because a lot of vagueness, linguistic uncertainty, subjectivity, measurement imprecision, natural diversity are all prominently present in medical diagnosis. Osteoarthritis (OA) of the knee is a major public health issue causing chronic disability and reduction in quality of life; it is reported to be associated with a significant decline in function and causes a higher rate of disability than any other chronic condition. Osteoarthritis (OA) exacts a cost in terms of pain, limited mobility, and decreased function among a wide range of individuals. With improvement in science and technology, intelligent computing has been used to assist in enhancing qualitative services. This paper reports the development of a fuzzy-based system to determine the level of severity of knee osteoarthritis, given some input conditions. The system was implemented and simulated using MATLAB Fuzzy Logic Toolbox. The results are entrusting and promising based on the flexibility and case of adaptability.

Бесплатно

Fuzzy-Based XML Knowledge Retrieval Methods in Edaphology

Fuzzy-Based XML Knowledge Retrieval Methods in Edaphology

K. Naresh kumar, Ch. Satyanand Reddy, N.V.E.S. Murthy

Статья научная

In this paper, we propose a proficient method for knowledge management in Edaphology to assist the edaphologists and those related with agriculture in a big way. The proposed method mainly consists two sections of which the first one is to build the knowledge base using XML and the latter part deals with information retrieval by searching using fuzzy. Initially, the relational database is converted to the XML database. The paper discusses two algorithms, one is when the soil characteristics are inputted to have the plant list and in the other, plant names are inputted to have the soil characteristics suited for the plant. While retrieving the query result, the crisp numerical values are converted to fuzzy using the triangular fuzzy membership function and matched to those in database. And those which satisfy are added to the result list and subsequently the frequency is found out to rank the result list so as to obtain the final sorted list. Performance metrics used in order to evaluate the method and compare it to baseline paper are number of plants retrieved, ranking efficiency, and computation time and memory usage. Results obtained proved the validity of the method and the method obtained average computation time of 0.102 seconds and average memory usage of 2486 Kb, which all are far better than the previous method results.

Бесплатно

Fuzzy-based user behavior characterization to detect HTTP-GET flood attacks

Fuzzy-based user behavior characterization to detect HTTP-GET flood attacks

Karanpreet Singh, Paramvir Singh, Krishan Kumar

Статья научная

Internet was designed to serve the basic requirement of data transfer between systems. The security perspectives were therefore overlooked due to which the Internet remains vulnerable to a variety of attacks. Among all the possible attacks, Distributed Denial of Service (DDoS) attack is one of the eminent threats that target the availability of the online services to the intended clients. Now-a-days, attackers target application layer of the network stack to orchestrate attacks having a high degree of sophistication. GET flood attacks have been very much prevalent in recent years primarily due to advancement of bots allowing impersonating legitimate client behavior. Differentiating between a human client and a bot is therefore necessary to mitigate an attack. This paper introduces a mitigation framework based on Fuzzy Control System that takes as input two novel detection parameters. These detection parameters make use of clients' behavioral characteristic to measure their respective legitimacy. We design an experimental setup that incorporates two widely used benchmark web logs (Clarknet and WorldCup) to build legitimate and attack datasets. Further, we use these datasets to assess the performance of the proposed through well-known evaluation metrics. The results obtained during this work point towards the efficiency of our proposed system to mitigate a wide range of GET flood attack types.

Бесплатно

GA Based Optimal Placement of DGs for Loss Reduction and Reliability Improvement in Distribution Networks with Time Varying Loads

GA Based Optimal Placement of DGs for Loss Reduction and Reliability Improvement in Distribution Networks with Time Varying Loads

Zahra Boor, Seyyed Mehdi Hosseini

Статья научная

The distributed generation (DG) locations have significant impacts on network reliability and loss. This paper presents a method for optimal DG allocation and sizing in distribution systems in order to reduce network loss and improve system reliability at the lowest cost. For this purpose, a multi-objective cost function considering active power loss, reliability index and DG cost is used to find the optimal size and location of DG units. Also, a load duration curve including four load levels with different weighting factor is considered. Moreover, the optimization technique that is based on Genetic Algorithm (GA) is implemented. In this paper, ECOST index is considered for reliability evaluation in the cost function and also, the effects system reconfiguration, is also considered for reliability assessment. To evaluate the proposed algorithm, the IEEE 33-bus and 69-bus test systems are employed and the results obtained reveal the effectiveness of proposed method.

Бесплатно

GA_MLP NN: A Hybrid Intelligent System for Diabetes Disease Diagnosis

GA_MLP NN: A Hybrid Intelligent System for Diabetes Disease Diagnosis

Dilip Kumar Choubey, Sanchita Paul

Статья научная

Diabetes is a condition in which the amount of sugar in the blood is higher than normal. Classification systems have been widely used in medical domain to explore patient's data and extract a predictive model or set of rules. The prime objective of this research work is to facilitate a better diagnosis (classification) of diabetes disease. There are already several methodology which have been implemented on classification for the diabetes disease. The proposed methodology implemented work in 2 stages: (a) In the first stage Genetic Algorithm (GA) has been used as a feature selection on Pima Indian Diabetes Dataset. (b) In the second stage, Multilayer Perceptron Neural Network (MLP NN) has been used for the classification on the selected feature. GA is noted to reduce not only the cost and computation time of the diagnostic process, but the proposed approach also improved the accuracy of classification. The experimental results obtained classification accuracy (79.1304%) and ROC (0.842) show that GA and MLP NN can be successfully used for the diagnosing of diabetes disease.

Бесплатно

GPS based Advanced Vehicle Tracking and Vehicle Control System

GPS based Advanced Vehicle Tracking and Vehicle Control System

Mashood Mukhtar

Статья научная

Security systems and navigators have always been a necessity of human’s life. The developments of advanced electronics have brought revolutionary changes in these fields. In this paper, we will present a vehicle tracking system that employs a GPS module and a GSM modem to find the location of a vehicle and offers a range of control features. To complete the design successfully, a GPS unit, two relays, a GSM Modem and two MCU units are used. There are five features introduced in the project. The aim of this project is to remotely track a vehicle’s location, remotely switch ON and OFF the vehicle’s ignition system and remotely lock and unlock the doors of the vehicle. An SMS message is sent to the tracking system and the system responds to the users request by performing appropriate actions. Short text messages are assigned to each of these features. A webpage is specifically designed to view the vehicle’s location on Google maps. By using relay based control concept introduced in this paper, number of control features such as turning heater on/off, radio on/off etc. can be implemented in the same fashion.

Бесплатно

Game Theory based Resource Identification Scheme for Wireless Sensor Networks

Game Theory based Resource Identification Scheme for Wireless Sensor Networks

Gururaj S. Kori, Mahabaleshwar S. Kakkasageri

Статья научная

In modern world of sensing and distributive systems, traditional Wireless Sensor Networks (WSN) has to deal with new challenges, such as multiple application requirements, dynamic and heterogeneous networks. Senor nodes in WSN are resource constrained in terms of energy, communication range, bandwidth, processing delay and memory. Numerous solutions are proposed to optimize the performance and to increase the lifetime of WSN by introducing new resource management principles. Effective and intelligent resource management in WSN involves in resource identification, resource scheduling, and resource utilization. This paper proposes a Bayesian Game Model (BGM) approach to efficiently identify the best node with the maximum resource in WSN for data transmission, considering energy, bandwidth, and computational delay. The scheme operates as follows: (1) Sensor nodes information such as residual energy, available bandwidth, and node ID, etc., is gathered (2) Energy and bandwidth of each node are used to generate the payoff matrix (3) Implementation of node identification scheme is based on payoff matrix, utilities assigned, strategies and reputation of each node (4) Find Bayesian Nash Equilibrium condition using Starring algorithm (5) Solving the Bayesian Nash Equilibrium using Law of Total Probability and identifying the best node with maximum resources (6) Adding/Subtracting reward (reputation factor) to winner/looser node. Simulation results show that the performance of the proposed Bayesian game model approach for resource identification in WSN is better as compared with the Efficient Neighbour Discovery Scheme for Mobile WSN (ENDWSN). The results indicate that the proposed scheme has up to 12% more resource identification accuracy rate, 10% increase in the average number of efficient resources discovered and 8% less computational delay as compared to ENDWSN.

Бесплатно

Generalization of Magic Square (Numerical Logic) 3×3 and its Multiples (3×3) × (3×3)

Generalization of Magic Square (Numerical Logic) 3×3 and its Multiples (3×3) × (3×3)

B L Kaul, Ramveer Singh

Статья научная

A magic square of 3×3 and its multiples i.e. (9×9) squares and so on, of order N are composed of (n×n) matrix having filled with numbers in such a way that the totals sum along the rows ,columns and main diagonals adds up the same. By using a special geometrical figure developed.

Бесплатно

Generalized Method for Constructing Magic Cube by Folded Magic Squares

Generalized Method for Constructing Magic Cube by Folded Magic Squares

Omar A. Dawood, Abdul Monem S. Rahma, Abdul Mohsen J. Abdul Hossen

Статья научная

In the present paper we have developed a new method for constructing magic cube by using the folded magic square technique. The proposed method considers a new step towards the magic cube construction that applied a good insight and provides an easy generalized technique. This method generalized the design of magic cube with N order regardless the type of magic square whether odd order, singly even order or doubly even order. The proposed method is fairly easy, since it have depended mainly on the magic square construction methods, and all what the designer need is just how to builds six magic square sequentially or with constant difference value between each pair of the numbers in the square matrix, whereby each one of this magic square will represents the surface or dimension for magic cube configuration. The next step for the designer will be how to arrange each square in the proper order to constitute the regular cube in order to maintain the properties of magic cube, where the sum of rows, columns and the diagonals from all directions are the same.

Бесплатно

Genetic Algorithm Combination of Boolean Constraint Programming for Solving Course of Action Optimization in Influence Nets

Genetic Algorithm Combination of Boolean Constraint Programming for Solving Course of Action Optimization in Influence Nets

Yanguang Zhu, Dongliang Qin, Yifan Zhu, Xingping Cao

Статья научная

A military decision maker is typically confronted by the task of determining optimal course of action under some constraints in complex uncertain situation. Thus, a new class of Combinational Constraint Optimization Problem (CCOP) is formalized, that is utilized to solve this complex Operation Optimization Problem. The object function of CCOP is modeled by Influence net, and the constraints of CCOP relate to resource and collaboration. These constraints are expressed by Pseudo-Boolean and Boolean constraints. Thus CCOP holds a complex mathematical configuration, which is expressed as a 0 1 integer optimization problem with compositional constraints and unobvious optimal object function. A novel method of Genetic Algorithm (GA) combination of Boolean Constraint Programming (BCP) is proposed to solve CCOP. The constraints of CCOP can be easily reduced and transformed into Disjunctive Normal Form (DNF) by BCP. The DNF representation then can be used to drive GA so as to solve CCOP. Finally, a numerical experiment is given to demonstrate the effectiveness of above method.

Бесплатно

Genetic Algorithm for Biomarker Search Problem and Class Prediction

Genetic Algorithm for Biomarker Search Problem and Class Prediction

Shabia Shabir Khan, S.M.K. Quadri, M.A. Peer

Статья научная

In the field of optimization, Genetic Algorithm that incorporates the process of evolution plays an important role in finding the best solution to a problem. One of the main tasks that arise in the medical field is to search a finite number of factors or features that actually affect or predict the survival of the patients especially with poor prognosis disease, thus helping them in early diagnosis. This paper discusses the various steps that are performed in genetic algorithm and how it is going to help in extracting knowledge out of high dimensional medical dataset. The more the attributes or features, the more difficult it is to correctly predict the class of that sample or instance. This is because of inefficient, useless, noisy attributes in the dataset. So, here the main aim is to search the features or genes that can strongly predict the class of subject (patient) i.e. healthy or cancerous and thus help in early detection and treatment.

Бесплатно

Genetic-based Summarization for Local Outlier Detection in Data Stream

Genetic-based Summarization for Local Outlier Detection in Data Stream

Mohamed Sakr, Walid Atwa, Arabi Keshk

Статья научная

Outlier detection is one of the important tasks in data mining. Detecting outliers over streaming data has become an important task in many applications, such as network analysis, fraud detections, and environment monitoring. One of the well-known outlier detection algorithms called Local Outlier Factor (LOF). However, the original LOF has many drawbacks that can’t be used with data streams: 1- it needs a lot of processing power (CPU) and large memory to detect the outliers. 2- it deals with static data which mean that in any change in data the LOF recalculates the outliers from the beginning on the whole data. These drawbacks make big challenges for existing outlier detection algorithms in terms of their accuracies when they are implemented in the streaming environment. In this paper, we propose a new algorithm called GSILOF that focuses on detecting outliers from data streams using genetics. GSILOF solve the problem of large memory needed as it has fixed memory bound. GSILOF has two phases. First, the summarization phase that tries to summarize the past data arrived. Second, the detection phase detects the outliers from the new arriving data. The summarization phase uses a genetic algorithm to try to find the subset of points that can represent the whole original set. our experiments have been done over real datasets. Our experiments confirming the effectiveness of the proposed approach and the high quality of approximate solutions in a set of real-world streaming data.

Бесплатно

Geometrical Framework Application Directions in Identification Systems. Review

Geometrical Framework Application Directions in Identification Systems. Review

Nikolay Karabutov

Статья научная

The approaches review of the framework application in identification problems is fulfilled. It is showed that this concept can have different interpretations of identification problems. In particular, the framework is understood as a frame, structure, system, platform, concept, and basis. Two directions of this concept application are allocated: 1) the framework integrating the number of methods, approaches or procedures; b) the mapping describing in the generalized view processes and properties in a system. We give the review of approaches that are the basis of the second direction. They are based on the analysis of virtual geometric structures. These mappings (frameworks) differ in the theory of chaos, accidents, and the qualitative theory of dynamic systems. Introduced mappings (frameworks) are not set a priori, and they are determined based of the experimental data processing. The main directions analysis of geometrical frameworks application is fulfilled in structural identification problems of systems. The review includes following directions: i) structural identification of nonlinear systems; ii) an estimation of Lyapunov exponents; iii) structural identifiability of nonlinear systems; iv) the system structure choice with lag variables; v) system attractor reconstruction.

Бесплатно

Graph Coloring in University Timetable Scheduling

Graph Coloring in University Timetable Scheduling

Swapnil Biswas, Syeda Ajbina Nusrat, Nusrat Sharmin, Mahbubur Rahman

Статья научная

Addressing scheduling problems with the best graph coloring algorithm has always been very challenging. However, the university timetable scheduling problem can be formulated as a graph coloring problem where courses are represented as vertices and the presence of common students or teachers of the corresponding courses can be represented as edges. After that, the problem stands to color the vertices with lowest possible colors. In order to accomplish this task, the paper presents a comparative study of the use of graph coloring in university timetable scheduling, where five graph coloring algorithms were used: First Fit, Welsh Powell, Largest Degree Ordering, Incidence Degree Ordering, and DSATUR. We have taken the Military Institute of Science and Technology, Bangladesh as a test case. The results show that the Welsh-Powell algorithm and the DSATUR algorithm are the most effective in generating optimal schedules. The study also provides insights into the limitations and advantages of using graph coloring in timetable scheduling and suggests directions for future research with the use of these algorithms.

Бесплатно

Graphical Data Steganographic Protection Method Based on Bits Correspondence Scheme

Graphical Data Steganographic Protection Method Based on Bits Correspondence Scheme

Zhengbing Hu, Ivan Dychka, Yevgeniya Sulema, Yevhen Radchenko

Статья научная

The proposed method of graphical data protection is a combined crypto-steganographic method. It is based on a bit values transformation according to both a certain Boolean function and a specific scheme of correspondence between MSB and LSB. The scheme of correspondence is considered as a secret key. The proposed method should be used for protection of large amounts of secret graphical data.

Бесплатно

Grass Fibrous Root Optimization Algorithm

Grass Fibrous Root Optimization Algorithm

Hanan A. R. Akkar, Firas R. Mahdi

Статья научная

This paper proposes a novel meta-heuristic optimization algorithm inspired by general grass plants fibrous root system, asexual reproduction, and plant development. Grasses search for water and minerals randomly by developing its location, length, primary root, regenerated secondary roots, and small branches of roots called hair roots. The proposed algorithm explore the bounded solution domain globally and locally. Globally using the best grasses survived by the last iteration, and the root system of the best grass obtained so far by the iteration process and locally uses the primary roots, regenerated secondary roots and hair roots of the best global grass. Each grass represents a global candidate solution, while regenerated secondary roots stand for the locally obtained solution. Secondary generated hair roots are equal to the problem dimensions. The performance of the proposed algorithm is tested using seven standard benchmark test functions, comparing it with other meta-heuristic well-known and recently proposed algorithms.

Бесплатно

Guide Me: A Research Work Area Recommender System

Guide Me: A Research Work Area Recommender System

Richa Sharma, Sharu Vinayak, Rahul Singh

Статья научная

With the advent of Industrial Revolution, not only the choices in various fields increased but also the era of computer came into existence thereby revolutionizing the global market. People had numerous choices in front of them that often led to the confusion about what product might actually fulfill their requirements. So the need for having a system which could facilitate the selection criteria and eradicate the dilemma of masses, was realized and ultimately recommender systems of present day world were introduced. So we can refer recommender systems as software tools that narrow down our choices and provide us with the most suitable suggestions as per our requirements. In this paper, we propose a novel recommender system i.e. RWARS (Research Work Area Recommender System) that will recommend research work area to a user based on his/her characteristics similar to those of other users. The characteristics considered here are hobbies, subjects of interests, programming skills and future objectives. The proposed system will use Cosine Similarity approach of Collaborative Filtering.

Бесплатно

Handling Fuzzy Image Clustering with a Modified ABC Algorithm

Handling Fuzzy Image Clustering with a Modified ABC Algorithm

Salima Ouadfel, Souham Meshoul

Статья научная

Image segmentation can be cast as a clustering task where the image is partitioned into clusters. Pixels within the same cluster are as homogenous as possible whereas pixels belonging to different clusters are not similar in terms of an appropriate similarity measure. Several clustering methods have been proposed for image segmentation purpose among which the Fuzzy C-Means clustering algorithm. However this algorithm still suffers from some drawbacks, such as local optima and sensitivity to initialization. Artificial Bees Colony algorithm is a recent population-based optimization method which has been successfully used in many complex problems. In this paper, we propose a new fuzzy clustering algorithm based on a modified Artificial Bees Colony algorithm, in which a new mutation strategy inspired from the Differential Evolution is introduced in order to improve the exploitation process. Experimental results show that our proposed approach improves the performance of the basic fuzzy C-Means clustering algorithm and outperforms other population based optimization methods.

Бесплатно

Handwritten character recognition on focused on the segmentation of character prototypes in small strips

Handwritten character recognition on focused on the segmentation of character prototypes in small strips

Ali Benafia, Smaine Mazouzi, Benafia Sara

Статья научная

The automatic recognition of handwriting is a particularly complex operation. Until now, there is no algorithm able to recognize handwriting without that; there are assumptions to take in advance to facilitate the task of the process. A handwritten text can contain letters lowercase, uppercase letters, characters sticks and digits. Therefore, it is capital to know extract and separate all these different units in order to process them with specific algorithms to their class handwriting. In this paper, we present a system for unconstrained handwritten text recognition, which allows to achieve this operation thanks to an intelligent segmentation based on an iterative cutting in a multi-script environment. The results obtained from the experimental protocol reach an "equal error rate" (EER) neighboring to 6%. These calculations were calculated with a relatively small base; however this same rate can be decreased with great bases. Our results are extremely encouraging for the simple reason that our approach is situated in a more general context unlike other approaches which define several non-rigid assumptions; this clearly makes the problem simpler and may make it trivial.

Бесплатно

Hardware-in-the-loop of Simulation for a Hydraulic Antilock Brake System

Hardware-in-the-loop of Simulation for a Hydraulic Antilock Brake System

Ayman A. Aly

Статья научная

Hardware-In-the-Loop (HIL) of simulation policy is used as a rapid and economical tool for developing automotive systems effectively and for dangerous situations tests such as extreme road conditions or high travelling speeds. A method for building a HIL of simulation a hydraulic Antilock Braking System (ABS) based on MATLAB/Simulink is presented in this paper. The system is implemented for research purposes as well as for the application in educational process. It can help the user heightening the efficiency when developing the electronic device. Also, the system can be used as teaching demo software. Experiment tests of HIL scheme were carried to ensure the feasibility and effectiveness of the system.

Бесплатно

Журнал