Статьи журнала - International Journal of Intelligent Systems and Applications
Все статьи: 1159
Статья научная
This paper proposes an advanced pitch angle control strategy based on neural network (NN) for variable speed wind turbine. The proposed methodology uses Radial Basis Function Network (RBFN) and Feed-forward based Back propagation network (BPN) algorithm to generate pitch angle. The performance of the proposed control technique is analyzed by comparing the results with Fuzzy Logic Control (FLC) and Proportional - Integral (PI) control techniques. The control techniques implemented is able to compensate the nonlinear characteristic of wind speed. The wind turbine is smoothly controlled to maintain the generator power and the mechanical torque to the rated value without any fluctuation during rapid variation in wind speed. The effectiveness of the proposed control strategy is verified using MATLAB/Simulink for 2-MW permanent magnet synchronous generator (PMSG) based wind energy conversion system.
Бесплатно
Comparative Study between ARX and ARMAX System Identification
Статья научная
System Identification is used to build mathematical models of a dynamic system based on measured data. To design the best controllers for linear or nonlinear systems, mathematical modeling is the main challenge. To solve this challenge conventional and intelligent identification are recommended. System identification is divided into different algorithms. In this research, two important types algorithm are compared to identifying the highly nonlinear systems, namely: Auto-Regressive with eXternal model input (ARX) and Auto Regressive moving Average with eXternal model input (Armax) Theory. These two methods are applied to the highly nonlinear industrial motor.
Бесплатно
Comparative Study of End-to-end Deep Learning Methods for Self-driving Car
Статья научная
Self-driving car is one of the most amazing applications and most active research of artificial intelligence. It uses end-to-end deep learning models to take orientation and speed decisions, using mainly Convolutional Neural Networks for computer vision, plugged to a fully connected network to output control commands. In this paper, we introduce the Self-driving car domain and the CARLA simulation environment with a focus on the lane-keeping task, then we present the two main end-to-end models, used to solve this problematic, beginning by Deep imitation learning (IL) and specifically the Conditional Imitation Learning (COIL) algorithm, that learns through expert labeled demonstrations, trying to mimic their behaviors, and thereafter, describing Deep Reinforcement Learning (DRL), and precisely DQN and DDPG (respectively Deep Q learning and deep deterministic policy gradient), that uses the concepts of learning by trial and error, while adopting the Markovian decision processes (MDP), to get the best policy for the driver agent. In the last chapter, we compare the two algorithms IL and DRL based on a new approach, with metrics used in deep learning (Loss during training phase) and Self-driving car (the episode's duration before a crash and Average distance from the road center during the testing phase). The results of the training and testing on CARLA simulator reveals that the IL algorithm performs better than DRL algorithm when the agents are already trained on a given circuit, but DRL agents show better adaptability when they are on new roads.
Бесплатно
Статья научная
There are various noisy non-linear mathematical optimization problems that can be effectively solved by Metaheuristic Algorithms. These are iterative search processes that efficiently perform the exploration and exploitation in the solution space, aiming to efficiently find near optimal solutions. Considering the solution space in a specified region, some models contain global optimum and multiple local optima. In this context, two types of meta-heuristics called Particle Swarm Optimization (PSO) and Firefly algorithms were devised to find optimal solutions of noisy non-linear continuous mathematical models. Firefly Algorithm is one of the recent evolutionary computing models which is inspired by fireflies behavior in nature. PSO is population based optimization technique inspired by social behavior of bird flocking or fish schooling. A series of computational experiments using each algorithm were conducted. The results of this experiment were analyzed and compared to the best solutions found so far on the basis of mean of execution time to converge to the optimum. The Firefly algorithm seems to perform better for higher levels of noise.
Бесплатно
Статья научная
Today, in computer science, a computational challenge exists in finding a globally optimized solution from an enormously large search space. Various meta-heuristic methods can be used for finding the solution in a large search space. These methods can be explained as iterative search processes that efficiently perform the exploration and exploitation in the solution space. In this context, three such nature inspired meta-heuristic algorithms namely Krill Herd Algorithm (KH), Firefly Algorithm (FA) and Cuckoo search Algorithm (CS) can be used to find optimal solutions of various mathematical optimization problems. In this paper, the proposed algorithms were used to find the optimal solution of fifteen unimodal and multimodal benchmark test functions commonly used in the field of optimization and then compare their performances on the basis of efficiency, convergence, time and conclude that for both unimodal and multimodal optimization Cuckoo Search Algorithm via Lévy flight has outperformed others and for multimodal optimization Krill Herd algorithm is superior than Firefly algorithm but for unimodal optimization Firefly is superior than Krill Herd algorithm.
Бесплатно
Статья научная
The concept of entropy as a measure of information has been extensively applied in information theory and related fields. The complex nature of information has resulted in some proposed entropy definitions. In image processing, the entropy concept has been used in developing thresholding techniques based on maximum entropy principles for image segmentation, enhancement and object detection purposes. In this article, entropy definitions are analysed to establish their relationship and after that evaluate their performance in image thresholding. Static simulated data from Electrical Capacitance Tomography measurement system for annular and stratified flows in multiphase hydrocarbons production has been used. Performance evaluation results of thresholding algorithms using Renyi entropy has shown to improve the measurements, particularly for stratified flow regimes. The improvement is solely based on the entropy definition, and it has been observed the introduced controlling parameters do not affect its performance. Renyi entropic thresholding algorithm is relatively robust as it is independent of the controlling parameter q and the grey level resolution. Therefore, there is the potential possibility of using Renyi entropic thresholding to improve measurements in hydrocarbons flow measurement using Electrical Capacitance Tomography measurement system.
Бесплатно
Статья научная
This paper presents an investigation of the convolutional neural network (CNN) with Word2Vec word embedding technique for text classification. Performance of CNN is tested on seven benchmark datasets with a different number of classes, training and testing samples. Test classification results obtained from proposed CNN are compared with results of CNN models and other classifiers reported in the literature. Investigation shows that CNN models are better suitable for text classification than other techniques. The main objective of the paper is to identify best-fitted parameter values batch size, epochs, activation function, dropout rates and feature maps values. Results of proposed CNN are better than many other classification techniques reported in the literature for Yelp Review Polarity dataset and Amazon Review Polarity dataset. For all the seven datasets, accuracy obtained by proposed CNN is close to the best-known results from the literature.
Бесплатно
Статья научная
In this era, face recognition technology is an important component that is widely used in various aspects of life, mostly for biometrics issues for personal identification. There are three main steps of a face recognition system: face detection, face embedding, and classification. Classification plays a vital role in making the system recognizes a face accurately. With the growing need for face recognition applications, the need for machine learning methods are required for accurate image classification is also increasing. One thing that can be done to increase the performance of the classifier is by tuning the hyperparameter. For this study, the evaluation performance of classification is conducted to obtain the best classifier among four different classifier algorithms (decision tree, SVM, random forest, and AdaBoost) for a specific dataset by tuning the hyperparameter. The best classifier is obtained by evaluating the performance of each classifier in terms of training time, accuracy, precision, recall, and F1-score. This study was using a dataset of 2267 facial data (128D vector space) derived from the face embedding process. The result showed that SVM is the best classifier with a training time of 0.5 s and the score for accuracy, precision, recall, and F1-score are about 98%.
Бесплатно
Comparing the Performance of Naive Bayes And Decision Tree Classification Using R
Статья научная
The use of technology is at its peak. Many companies try to reduce the work and get an efficient result in a specific amount of time. But a large amount of data is being processed each day that is being stored and turned into large datasets. To get useful information, the dataset needs to be analyzed so that one can extract knowledge by training the machine. Thus, it is important to analyze and extract knowledge from a large dataset. In this paper, we have used two popular classification techniques- Decision tree and Naive Bayes to compare the performance of the classification of our data set. We have taken student performance dataset that has 480 observations. We have classified these students into different groups and then calculated the accuracy of our classification by using the R language. Decision tree uses a divide and conquer method including some rules that makes it easy for humans to understand. The Naive Bayes theorem includes an assumption that the pair of features being classified are independent. It is based on the Bayes theorem.
Бесплатно
Comparison of New Multilevel Association Rule Algorithm with MAFIA
Статья научная
Multilevel association rules provide the more precise and specific information. Apriori algorithm is an established algorithm for finding association rules. Fast Apriori implementation is modified to develop new algorithm for finding frequent item sets and mining multilevel association rules. MAFIA is another established algorithm for finding frequent item sets. In this paper, the performance of this new algorithm is analyzed and compared with MAFIA algorithm.
Бесплатно
Comparison of Predicting Student’s Performance using Machine Learning Algorithms
Статья научная
Predicting the student performance is playing vital role in educational sector so that the analysis of student’s status helps to improve for better performance. Applying data mining concepts and algorithms in the field of education is Educational Data Mining. In recent days, Machine learning algorithms are very much useful in almost all the fields. Many researchers used machine learning algorithms only. In this paper we proposed the student performance prediction system using Deep Neural Network. We trained the model and tested with Kaggle dataset using different algorithms such as Decision Tree (C5.0), Naïve Bayes, Random Forest, Support Vector Machine, K-Nearest Neighbor and Deep neural network in R Programming and compared the accuracy of all other algorithms. Among six algorithms Deep Neural Network outperformed with 84% as accuracy.
Бесплатно
Статья научная
The Lighthill acoustic analogy equation is adopted to research noise distribution at dissimilarity positions and the variations are conducted based on the numerical verification of flow field under different turbulence models, time step sizes and meshes. The results showed the proposed computation method is reliable and practicable to obtain the complex flow parameters in the ramjet combustion chamber; Most of the noise is higherfrequency,and the differences in the near and far field are proven. In addition, noise laws are identical with the same horizontal position
Бесплатно
Computer Implementation of Algorithmic Components of Redundant Measurement Methods
Статья научная
This article demonstrates the implementation of the proposed algorithm for computer modeling of redundant measurement methods to solve problems to improve the accuracy of measurements of a controlled quantity with a nonlinear and unstable transformation function. Improving accuracy is achieved by processing the results of redundant measurements which are an array of data according to the proposed measurement equations. In addition, the article presents the possibility of determining the time variation of the parameters of the transformation function. A comparative analysis of the results of computer simulation of redundant and direct methods with unstable parameters of the linear and nonlinear sensor transformation functions is carried out. It was proved that, in the case of an increase in deviations of the parameters of the transformation function from the nominal values, the use of redundant methods provides a significantly higher measurement accuracy compared to direct methods. This became possible due to the automatic elimination of the systematic component of the error of the measurement result due to a change in the parameters of the transformation function under the influence of destabilizing factors. It was also found that, in contrast to direct methods, methods of redundant measurements allow working with a nonlinear transformation function without additional linearization or dividing it into linear sections, which also contributes to increased accuracy. In general, the application of the proposed approach in the modeling system proves its effectiveness and feasibility. Thus, there is reason to argue about the prospects of redundant measurements in the field of improving accuracy with a nonlinear and unstable transformation function, as well as the possibility of identifying deviations of the parameters of the transformation function from their nominal values.
Бесплатно
Computer Vision based Automation System for Detecting Objects
Статья научная
Software Quality Assurance Testing time computer vision based automation tools are used to test the window based application and window based application is combined of many objects. Among them most of the automation tool detect window objects by comparing images. Most of the objects are visible in the window screen but some objects which are not visible to the screen at the first time. Proper interaction with the window application hidden objects get visible to the screen like dropdown list item, editor text object, list box item and slider. With the automation tools these hidden objects cannot be searched directly. In this paper proposes some methods which will enhance the automation tools to access the window application hidden objects.
Бесплатно
Computing Method and Hardware Circuit Implementation of Neural Network on Finite Element Analysis
Статья научная
The finite element analysis in theory of elasticity is corresponded to the quadratic programming with equality constraint, which can be further transformed into the unconstrained optimization. In the paper, the neural network of finite element solving was obtained on the basis of Hopfield neural network that was reformed. And the no error solving of finite element neural net computation was realized in theory. And a design method to construct an artificial neuron by using electronic devices such as operational amplifier, digital controlled potentiometer and so on was presented. A programmable hardware neural network of finite element can be build up by using analog switches to interconnect inputs/outputs of hardware neurons. The weights, biases and connection in the hardware neural network of finite element can be adjusted automatically by microprocessor according to the results of train to controlling system, This programmable hardware neural network of finite element has some more adaptability for different systems. In addition, the authors present the computer simulation and analogue circuit experiment to verify this method. The results are revealed that: 1) The results of improved Hopfield neural network are reliable and accuracy; 2) The improved Hopfield neural network model has an advantage on circuit realization and the computing time, which is unrelated with complexity of the structure, is constant. It is practical significance for the research and calculation.
Бесплатно
Conceptual analysis of different clustering techniques for static security investigation
Статья научная
Power system contingency studies play a pivotal role in maintaining the security and integrity of modern power system operation. However, the number of possible contingencies is enormous and mostly vague. Therefore, in this paper, two well-known clustering techniques namely K-Means (KM) and Fuzzy C-Means (FCM) are used for contingency screening and ranking. The performance of both algorithms is comparatively investigated using IEEE 118-bus test system. Considering various loading conditions and multiple outages, the IEEE 118-bus contingencies have been generated using fast-decoupled power flow (FDPF). Silhouette analysis and fuzzy partition coefficient techniques have been profitably exploited to offer an insight view of the number of centroids. Moreover, the principal component analysis (PCA) has been used to extract the dominant features and ensure the consistency of passed data with artificial intelligence algorithms’ requirements. Although analysis of comparison results showed excellent compatibility between the two clustering algorithms, the FCM model was found more suitable for power system static security investigation.
Бесплатно
Context-aware recommendation methods
Статья научная
A context-aware recommender system attempts to generate better recommendations using contextual information. However, generating recommendations for specific contexts have been challenging because of the difficulties in using contextual information to enhance the capabilities of recommender systems. Several methods have been used to incorporate contextual information into traditional recommendation algorithms and data modeling techniques. These methods focus on incorporating contextual information to improve general recommendations for users rather than identifying the different context applicable to the user and providing recommendations geared towards those specific contexts. We develop two methods: the first method attaches user preference across multiple contextual conditions, assuming that user preference remains the same, but the suitability of items differs across different contextual conditions. The second method assumes that item suitability remains the same across different contextual conditions but user preference changes. We perform some experiments on the last.fm dataset to evaluate our methods. We also compared our work to other context-aware recommendation approaches. Our results show that grouping ratings by context and jointly factorizing with common factors improves prediction accuracy.
Бесплатно
Статья научная
The main contribution of this paper is the design of a robust model reference fuzzy sliding mode observation technique to control multi-input, multi-output (MIMO) nonlinear uncertain dynamical robot manipulators. A fuzzy sliding mode controller was used in this study to control the robot manipulator in the presence of uncertainty and disturbance. To address the challenges of robustness, chattering phenomenon, and error convergence under uncertain conditions, the proposed sliding mode observer was applied to the fuzzy sliding mode controller. This theory was applied to a six-degrees-of-freedom (DOF) PUMA robot manipulator to verify the power of the proposed method.
Бесплатно
Статья научная
In this paper, a simple and optimal form of fractional-order feedback approach assigned for the control and synchronization of a class of fractional-order chaotic systems is proposed. The proposed control law can be viewed as a distributed network of linear regulators wherein each node is modeled by a PI controller with moderate gains. The multiobjective genetic algorithm with chaotic mutation, adopted in this work, can be visualized as a combination of structural and parametric genes of a controller orchestrated in a hierarchical fashion. Then, it is applied to select an optimal knowledge base, which characterizes the developed controller, and satisfies various design specifications. The proposed design and optimization of the developed controller represents a simple powerful approach to provide a reasonable tradeoff between computational overhead, storage space, numerical accuracy and stability criterion in control and synchronization of a class of fractional-order chaotic systems. Simulation results show the satisfactory performance of the proposed approach.
Бесплатно
Cooperative Medium Access Control Protocol for Mobile Ad-hoc Networks using Spatial Diversity
Статья научная
Enhancement the Performance of MANET (Mobile Ad-hoc Network) using spatial diversity. Spatial diversity implemented using cooperative transmission technique in Medium access control (MAC) layer level protocol. In noisy environment limit the network performance like coverage area, limit number of node, degrade packet transmission rate, increase packet loss rate etc. In this paper enhance the source to destination transmission range, minimize the packet loss, improve packet transmission rate and appropriate end to end delay. When direct link is fail to transmit packet then Cooperative scheme help to transmit packet. Cooperative scheme is to help the packet transmission with five handshakes instead of four. This scheme implemented in MANET network on MAC layer protocol. Cooperative scheme improve the performance with help of intermediate node between sources to destination. We are performance analysis using discrete simulator NS-2 in MANET. Our performance based on MAC layer level with cooperative scheme in IEEE WLAN standard CSMA/CA protocol.
Бесплатно