Статьи журнала - International Journal of Intelligent Systems and Applications
Все статьи: 1159
Basis path based test suite minimization using genetic algorithm
Статья научная
UML State Diagram is used to represent the behavior of the System Under Test (SUT) when an event occurs. The state of the system is determined by the event that occurs randomly. The system state changes when the transition relationship between the States is satisfied. Test cases are generated from State Chart Diagram to test the behavior of the system. When multiple decision nodes are present in the same path, path explosion occurs. A method is proposed to generate Basis Path (BP) test cases with node coverage using Genetic Algorithm (GA) to overcome this problem. Experiments are conducted upon various Android applications and the efficiency of the algorithm is evaluated through the code coverage and the mutation analysis. Using this approach, BP test cases, Robotium test scripts are generated for 10 Android applications and observed an average of 70% reduction in the test case number concerning all path test cases. The resulted average code coverage is 74%, and Defect Removal Efficiency (DRE) is 95%. The experimental results show that the proposed method is effective when compared to other methods.
Бесплатно
Bat-Genetic Encryption Technique
Статья научная
Nowadays, the security of confidential data is the vital issue in the digital world. Information security becomes even more essential in storing and transmitting data while online. For protecting digital data and achieving security and confidentiality over an insecure internet, the iterative Bat-Genetic Encryption Technique (B-GET) is proposed. The main stages of B-GET are pre-processing, encryption process, bat algorithm steps, and genetic processes. B-GET also comprises an arithmetic and logical operators that increase encryption quality. Empirical results show that the reconstructed data is a copy of the original. It also demonstrates that B-GET technique has a large space key and several defensive stages that resist many attacks and it has strong security based on multiple steps, multiple variables, and the main stages of the B-GET technique. Encrypted data is nearly random and does not contain any indication to secret data.
Бесплатно
Batik Classification with Artificial Neural Network Based on Texture-Shape Feature of Main Ornament
Статья научная
Batik is a textile with motifs of Indonesian culture which has been recognized by UNESCO as world cultural heritage. Batik has many motifs which are classified in various classes of batik. This study aims to combine the features of texture and the feature of shapes' ornament in batik to classify images using artificial neural networks. The value of texture features of images in batik is extracted using a gray level co-occurrence matrices (GLCM) which include Angular Second Moment (ASM) / energy), contrast, correlation, and inverse different moment (IDM). The value of shape features is extracted using a binary morphological operation which includes compactness, eccentricity, rectangularity and solidity. At this phase of the training and testing, we compare the value of a classification accuracy of neural networks in each class in batik with their texture features, their shape, and the combination of texture and shape features. From the three features used in the classification of batik image with artificial neural networks, it was obtained that shape feature has the lowest accuracy rate of 80.95% and the combination of texture and shape features produces a greater value of accuracy by 90.48%. The results obtained in this study indicate that there is an increase in accuracy of batik image classification using the artificial neural network with the combination of texture and shape features in batik image.
Бесплатно
Bespoke Shuffled Frog Leaping Algorithm and its Engineering Applications
Статья научная
Shuffled Frog Leap Algorithm (SFLA), a metaheuristic algorithms inspired by PSO and DE has proved its efficacy in solving discrete optimization problems. In this paper we have modified SFLA to solve constrained engineering design problems. The proposed modification integrates a simple mechanism to update the position of frog in its memeplex in order to accelerate the basic SFLA algorithm. The proposal is validated on four engineering design problems and the statistical results are compared with the state-of-art algorithms. The simulated statistical results indicate that our proposal is a promising alternative to solve these types of optimization problems in terms of convergence speed.
Бесплатно
Bezier Curves Satisfiability Model in Enhanced Hopfield Network
Статья научная
Bezier curve is one of the most pragmatic curves that has vast application in computer aided geometry design. Unlike other normal curves, any Bezier curve model must follow the properties of Bezier curve. In our paper, we proposed the reconstruction of Bezier models by implementing satisfiability problem in Hopfield neural network as Bezier properties verification technique. We represent our logic construction to 2-satisfiability (2SAT) clauses in order to represent the properties of the Bezier curve model. The developed Bezier model will be integrated with Hopfield neural network in order to detect the existence of any non-Bezier curve. Microsoft Visual C++ 2013 is used as a platform for training, testing and validating of our proposed design. Hence, the performance of our proposed technique is evaluated based on global Bezier model and computation time. It has been observed that most of the model produced by HNN-2SAT are Bezier curve models.
Бесплатно
Статья научная
Biometric authentication systems operating in real world environments using a single modality are found to be insecure and unreliable due to numerous limitations. Multimodal biometric systems have better accuracy and reliability due to the use of multiple biometric traits to authenticate a claimed identity or perform identification. In this paper a novel method for person identification using multimodal biometrics with hand geometry and palmprint biometric traits is proposed. The geometrical information embedded in the user hand and palmprint images are brought out through the graph representations. The topological characterization of the image moments, represented as the virtual nodes of the palmprint image graph is a novel feature of this work. The user hand and palmprint images are represented as weighted undirected graphs and spectral characteristics of the graphs are extracted as features vectors. The feature vectors of the hand geometry and palmprint are fused at feature level to obtain a graph spectral feature vector to represent the person. User identification is performed by using a multiclass support vector machine (SVM) classifier. The experimental results demonstrate, an appreciable performance giving identification rate of 99.19% for multimodal biometric after feature level fusion of hand geometry and palmprint modalities. The performance is investigated by conducting the experiments separately for handgeometry, palmprint and fused feature vectors for person identification. Experimental results show that the proposed multimodal system achieves better performance than the unimodal cues, and can be used in high security applications. Further comparison show that it is better than similar other multimodal techniques.
Бесплатно
Biorthogonal Wavelet Transform Using Bilateral Filter and Adaptive Histogram Equalization
Статья научная
Image fusion is a process of combining data from multiple sources to achieve refined or improved information for making decisions. It has many applications. When we use images with a similar acquisition time, the expected result is to obtain a fused image that retains the spatial resolution from the panchromatic image and color content from the multi-spectral image. In recent time different methods have been developed. These methods are both in spatial domain and in wavelet domain. Out of these two the wavelet domain based methods are more suitable as they are capable to handle the spatial distortion produced by the spatial domain. In this paper the proposed method is compared with principle component analysis, discrete cosine transform and also with biorthogonal wavelet transform in which bilateral filter and adaptive histogram is not present. This comparison is on the bases of different parameters. Biorthogonal wavelet transform is capable to preserve edge information and hence reducing the distortions in the fused image. It has two important properties wavelet symmetry and linear phase which are not present in spatial domain. The performance of the proposed method has been extensively tested on several pairs of multi-focus and multimodal images. Experimental results show that the proposed method improves fusion quality by reducing loss of significant information available in individual images.
Бесплатно
Blackout Estimation by Neural Network
Статья научная
Cascading failures play an important role in creation of blackout. These events consist of lines and generators outages. Online values of voltage, current, angle, and frequency are changing during the cascading events. The percent of blackout can be estimated during the disturbance by neural network. Proper indices must be defined for this purpose. These indices can be computed by online measurement from WAMs. In this paper, voltage, load, lines, and generators indices are defined for estimating the percent of blackout during the disturbance. These indices are used as the inputs of neural networks. A new combinational structure of neural network is used for this purpose. Proposed method is implemented on 39-bus New-England test system.
Бесплатно
Blockchain Management and Federated Learning Adaptation on Healthcare Management System
Статья научная
Recently, health management systems have some troubles such as insufficient sharing of medical data, security problems of shared information, tampering and leaking of private data with data modeling probes and developing technology. Local learning is performed together with federated learning and differential entropy method to prevent the leakage of medical confidential information, so blockchain-based learning is preferred to completely eliminate the possibility of leakage while in global learning. Qualitative and quantitative analysis of information can be made with information entropy technology for the effective and maximum use of medical data in the local learning process. The blockchain is used the distributed network structure and inherent security features, at the same time information is treated as a whole, not as islands of data. All the way through this work, data sharing between medical systems can be encouraged, access records tampered with, and better support medical research and definitive medical treatment. The M/M/1 queue for the memory pool and M/M/C queue to combine integrated blockchains with a unified learning structure. With the proposed model, the number of transactions per block, mining of each block, learning time, index operations per second, number of memory pools, waiting time in the memory pool, number of unconfirmed transactions in the whole system, total number of transactions were examined. Thanks to this study, the protection of the medical privacy information of the user during the service process and the autonomous management of the patient’s own medical data will benefit the protection of privacy within the scope of medical data sharing. Motivated by this, proposed a blockchain and federated learning-based data management system able to develop in next studies.
Бесплатно
Blockchain with internet of things: benefits, challenges, and future directions
Статья научная
The Internet of Things (IoT) has extended the internet connectivity to reach not just computers and humans, but most of our environment things. The IoT has the potential to connect billions of objects simultaneously which has the impact of improving information sharing needs that result in improving our life. Although the IoT benefits are unlimited, there are many challenges facing adopting the IoT in the real world due to its centralized server/client model. For instance, scalability and security issues that arise due to the excessive numbers of IoT objects in the network. The server/client model requires all devices to be connected and authenticated through the server, which creates a single point of failure. Therefore, moving the IoT system into the decentralized path may be the right decision. One of the popular decentralization systems is blockchain. The Blockchain is a powerful technology that decentralizes computation and management processes which can solve many of IoT issues, especially security. This paper provides an overview of the integration of the blockchain with the IoT with highlighting the integration benefits and challenges. The future research directions of blockchain with IoT are also discussed. We conclude that the combination of blockchain and IoT can provide a powerful approach which can significantly pave the way for new business models and distributed applications.
Бесплатно
Статья научная
The behaviour of consumers mostly follows the guidelines derived from marketing theories and models. But under some unavoidable circumstances, the consumers show a complete deviation compared to their existing consumption pattern, purchase behaviour, decision-making and so on. Under similar circumstances, this study aims to capture both urban and rural Bottom of the Pyramid (BoP) consumers’ perceptions of various marketing mixes during the COVID-19 pandemic situation. With a sample size of 378 and 282, the perception towards different marketing mixes has been captured for Pre-COVID and During-COVID periods, respectively. The adopted quantitative analysis indicates a difference in perception towards marketing mix During COVID compared to Pre-COVID. Moreover, the selection of West Bengal, India, as an area of research fulfills the BoP literature’s existing prominent research gap. This study also comes with the potential to assist marketers and the Fast-Moving Consumer Goods (FMCG) industry in framing strategies to target BoP consumers.
Бесплатно
BoPMLPIP: Application of Classification Techniques to Explore the Impact of PIP among BoPs
Статья научная
This study tries to gain insight into the effect of demographic and psychological variables on the Bottom of the Pyramid (BoP) consumers for making Packaging Influenced Purchase (PIP) decisions by focusing on two specific consumer behaviour theories - compensatory consumption and consumers’ resistance. Being the product's face, packaging contributes heavily to the above mentioned two streams of consumption behaviour. A collection of ten demographic variables and four psychological variables have been administered on a sample of 1400 BoP consumers to explore their effect behind making PIP of selected FMCG products. Various classification techniques have been deployed to capture the impact of these variables. This experimental research design revealed that both demographic and psychological variables affect the PIP. The comparison between urban and rural BoPs potentially comes with the guidelines for practical marketing implications.
Бесплатно
Building Sequence Span Attribute Model and Example Analysis
Статья научная
Parallel parsing is one of the key technologies of parallel system. Grammatical character affects the efficiency of parallel parsing and degree of difficulty of implement. Existing methods have problems as follows: Parallelism of grammar that adapt different data object is difference, if there is a large difference between considering attribute and analysis object structure, then affect efficiency. Specific grammar parallel parsing is systematically studied. Scanning parallel parsing methods from the new angle of sequence span after word lattice distortion. Considering sequence span attribute between some specific grammars makes parsing without changing structure and data of CYK table based on the structure of word lattice CYK initialization table; In passing item of the form [i , j , Bη•] in parallel parsing item table memory structure in circle structure is adopted chain breaking technology; When indexed optimize analysis, the key algorithms of increasing the feasibility and validity of sequence span attribute、reusing parsing tree、calculating of d space function and node separating are further studied, then unification and optimize effect between analysis table middle structure and data object structure is reached. New algorithm and implement strategy of parallel parsing of specific grammar is proposed.
Бесплатно
CFD-based Analysis of Aeroelastic behavior of Supersonic Fins
Статья научная
The main goal of this paper is to analyze the flutter boundary, transient loads of a supersonic fin, and the flutter with perturbation. Reduced order mode (ROM) based on Volterra Series is presented to calculate the flutter boundary, and CFD/CSD coupling is used to compute the transient aerodynamic load. The Volterra-based ROM is obtained using the derivative of unsteady aerodynamic step-response, and the infinite plate spline is used to perform interpolation of physical quantities between the fluid and the structural grids. The results show that inertia force plays a significant role in the transient loads, the moment cause by inertia force is lager than the aerodynamic force, because of the huge transient loads, structure may be broken by aeroelasticity below the flutter dynamic pressure. Perturbations of aircraft affect the aeroelastic response evident, the reduction of flutter dynamic pressure by rolling perturbation form 15.4% to 18.6% when Mach from 2.0 to 3.0. It is necessary to analyze the aeroelasticity behaviors under the compositive force environment.
Бесплатно
COCOMO Estimates Using Neural Networks
Статья научная
Software cost estimation is an important phase in software development. It predicts the amount of effort and development time required to build a software system. It is one of the most critical tasks and an accurate estimate provides a strong base to the development procedure. In this paper, the most widely used software cost estimation model, the Constructive Cost Model (COCOMO) is discussed. The model is implemented with the help of artificial neural networks and trained using the perceptron learning algorithm. The COCOMO dataset is used to train and to test the network. The test results from the trained neural network are compared with that of the COCOMO model. The aim of our research is to enhance the estimation accuracy of the COCOMO model by introducing the artificial neural networks to it.
Бесплатно
COVID-19 Control: Face Mask Detection Using Deep Learning for Balanced and Unbalanced Dataset
Статья научная
Facemask wearing is becoming a norm in our daily lives to curb the spread of Covid-19. Ensuring facemasks are worn correctly is a topic of concern worldwide. It could go beyond manual human control and enforcement, leading to the spread of this deadly virus and many cases globally. The main aim of wearing a facemask is to curtail the spread of the covid-19 virus, but the biggest concern of most deep learning research is about who is wearing the mask or not, and not who is incorrectly wearing the facemask while the main objective of mask wearing is to prevent the spread of the covid-19 virus. This paper compares three state-of-the- art object detection approaches: Haarcascade, Multi-task Cascaded Convolutional Networks (MTCNN), and You Only Look Once version 4 (YOLOv4) to classify who is wearing a mask, who is not wearing a mask, and most importantly, who is incorrectly wearing the mask in a real-time video stream using FPS as a benchmark to select the best model. Yolov4 got about 40 Frame Per Seconds (FPS), outperforming Haarcascade with 16 and MTCNN with 1.4. YOLOv4 was later used to compare the two datasets using Intersection over Union (IoU) and mean Average Precision (mAP) as a comparative measure; dataset2 (balanced dataset) performed better than dataset1 (unbalanced dataset). Yolov4 model on dataset2 mapped and detected images of masks worn incorrectly with one correct class label rather than giving them two label classes with uncertainty in dataset1, this work shows the advantage of having a balanced dataset for accuracy. This work would help decrease human interference in enforcing the COVID-19 face mask rules and create awareness for people who do not comply with the facemask policy of wearing it correctly. Hence, significantly reducing the spread of COVID-19.
Бесплатно
CRPCG—Clustering Routing Protocol based on Connected Graph
Статья научная
In order to balance the load between cluster head, save the energy consumption of the inter-cluster routing, enhance reliability and flexibility of data transmission, the paper proposes a new clustering routing protocol based on connected graph (CRPCG). The protocol optimizes and innovates in three aspects: cluster head election, clusters formation and clusters routing. Eventually, a connected graph is constituted by the based station and all cluster heads, using the excellent algorithm of the graph theory, to guarantee the network connectivity and reliability, improve the link quality, balance node energy and prolong the network life cycle. The results of simulation show that, the protocol significantly prolong the network life cycle, balance the energy of network nodes, especially in the phase of inter-cluster data transmission, improving the reliability and efficiency of data transmission.
Бесплатно
Care4Student: An Embedded Warning System for Preventing Abuse of Primary School Students
Статья научная
Child abuse is a social and medical problem that has negative effects on the individual development of the child and can lead to mental disorders such as depression and post-traumatic stress disorder in both short and long-term mental health. Therefore, any abuse that the child may encounter should be immediately intervened. This paper presents the design of an integrated embedded warning system that includes an embedded system module, a server-based module, and a mobile-based module as a solution to concerns of ensuring the safety of students in places where there are fewer safety measures. Our solution aims to ensure that the school management team is quickly informed about the adverse situation that primary school students may encounter and able to respond to them. In this context, this system activates the warning status when it correctly detects the phrases 'help me' and 'give it up'. Thus, any negativity that may be encountered in a closed environment is prevented. The embedded warning system detected correctly the phrase "help me" with 80%, and the phrase "give it up" with 75%.
Бесплатно
Challenges with Sentiment Analysis of On-line Micro-texts
Статья научная
With the evolution of World Wide Web (WWW) 2.0 and the emergence of many micro-blogging and social networking sites like Twitter, the internet has become a massive source of short textual messages called on-line micro-texts, which are limited to a few number of characters (e.g. 140 characters on Twitter). These on-line micro-texts are considered as real-time text streams. On-line micro-texts are extremely subjective; they contain opinions about various events, social issues, personalities, and products. However, despite being so voluminous in quantity, the qualitative nature of these micro-texts is very inconsistent. These qualitative inconsistencies of raw on-line micro-texts impose many challenges in sentiment analysis of on-line micro-texts by using the established methods of sentiment analysis of unstructured reviews. This paper presents many challenges and issues observed during sentiment analysis of On-line Micro-texts.
Бесплатно
Chaotic Genetic Algorithm based on Lorenz Chaotic System for Optimization Problems
Статья научная
Very recently evolutionary optimization algorithms use the Genetic Algorithm to improve the result of Optimization problems. Several processes of the Genetic Algorithm are based on 'Random', that is fundamental to evolutionary algorithms, but important defections in the Genetic Algorithm are local convergence and high tolerances in the results, they have happened for randomness reason. In this paper we have prepared pseudo random numbers by Lorenz chaotic system for operators of Genetic Algorithm to avoid local convergence. The experimental results show that the proposed method is much more efficient in comparison with the traditional Genetic Algorithm for solving optimization problems.
Бесплатно