Статьи журнала - International Journal of Intelligent Systems and Applications

Все статьи: 1126

Comparative study of convolutional neural network with word embedding technique for text classification

Comparative study of convolutional neural network with word embedding technique for text classification

Amol C. Adamuthe, Sneha Jagtap

Статья научная

This paper presents an investigation of the convolutional neural network (CNN) with Word2Vec word embedding technique for text classification. Performance of CNN is tested on seven benchmark datasets with a different number of classes, training and testing samples. Test classification results obtained from proposed CNN are compared with results of CNN models and other classifiers reported in the literature. Investigation shows that CNN models are better suitable for text classification than other techniques. The main objective of the paper is to identify best-fitted parameter values batch size, epochs, activation function, dropout rates and feature maps values. Results of proposed CNN are better than many other classification techniques reported in the literature for Yelp Review Polarity dataset and Amazon Review Polarity dataset. For all the seven datasets, accuracy obtained by proposed CNN is close to the best-known results from the literature.

Бесплатно

Comparing Performance of Supervised Learning Classifiers by Tuning the Hyperparameter on Face Recognition

Comparing Performance of Supervised Learning Classifiers by Tuning the Hyperparameter on Face Recognition

M. Ilham Rizqyawan, Ulfah Nadiya, Aris Munandar, Jony Winaryo Wibowo, Oka Mahendra, Irfan Asfy Fakhry Anto, Rian Putra Pratama, Muhammad Arifin, Hanif Fakhrurroja

Статья научная

In this era, face recognition technology is an important component that is widely used in various aspects of life, mostly for biometrics issues for personal identification. There are three main steps of a face recognition system: face detection, face embedding, and classification. Classification plays a vital role in making the system recognizes a face accurately. With the growing need for face recognition applications, the need for machine learning methods are required for accurate image classification is also increasing. One thing that can be done to increase the performance of the classifier is by tuning the hyperparameter. For this study, the evaluation performance of classification is conducted to obtain the best classifier among four different classifier algorithms (decision tree, SVM, random forest, and AdaBoost) for a specific dataset by tuning the hyperparameter. The best classifier is obtained by evaluating the performance of each classifier in terms of training time, accuracy, precision, recall, and F1-score. This study was using a dataset of 2267 facial data (128D vector space) derived from the face embedding process. The result showed that SVM is the best classifier with a training time of 0.5 s and the score for accuracy, precision, recall, and F1-score are about 98%.

Бесплатно

Comparing the Performance of Naive Bayes And Decision Tree Classification Using R

Comparing the Performance of Naive Bayes And Decision Tree Classification Using R

Kirtika Yadav, Reema Thareja

Статья научная

The use of technology is at its peak. Many companies try to reduce the work and get an efficient result in a specific amount of time. But a large amount of data is being processed each day that is being stored and turned into large datasets. To get useful information, the dataset needs to be analyzed so that one can extract knowledge by training the machine. Thus, it is important to analyze and extract knowledge from a large dataset. In this paper, we have used two popular classification techniques- Decision tree and Naive Bayes to compare the performance of the classification of our data set. We have taken student performance dataset that has 480 observations. We have classified these students into different groups and then calculated the accuracy of our classification by using the R language. Decision tree uses a divide and conquer method including some rules that makes it easy for humans to understand. The Naive Bayes theorem includes an assumption that the pair of features being classified are independent. It is based on the Bayes theorem.

Бесплатно

Comparison of New Multilevel Association Rule Algorithm with MAFIA

Comparison of New Multilevel Association Rule Algorithm with MAFIA

Arpna Shrivastava, R. C. Jain, Ajay Kumar Shrivastava

Статья научная

Multilevel association rules provide the more precise and specific information. Apriori algorithm is an established algorithm for finding association rules. Fast Apriori implementation is modified to develop new algorithm for finding frequent item sets and mining multilevel association rules. MAFIA is another established algorithm for finding frequent item sets. In this paper, the performance of this new algorithm is analyzed and compared with MAFIA algorithm.

Бесплатно

Comparison of Predicting Student’s Performance using Machine Learning Algorithms

Comparison of Predicting Student’s Performance using Machine Learning Algorithms

V. Vijayalakshmi, K. Venkatachalapathy

Статья научная

Predicting the student performance is playing vital role in educational sector so that the analysis of student’s status helps to improve for better performance. Applying data mining concepts and algorithms in the field of education is Educational Data Mining. In recent days, Machine learning algorithms are very much useful in almost all the fields. Many researchers used machine learning algorithms only. In this paper we proposed the student performance prediction system using Deep Neural Network. We trained the model and tested with Kaggle dataset using different algorithms such as Decision Tree (C5.0), Naïve Bayes, Random Forest, Support Vector Machine, K-Nearest Neighbor and Deep neural network in R Programming and compared the accuracy of all other algorithms. Among six algorithms Deep Neural Network outperformed with 84% as accuracy.

Бесплатно

Computational Fluid Dynamics Verification and Noise Prediction of Ramjet with Wedge-shaped Flame Holder

Computational Fluid Dynamics Verification and Noise Prediction of Ramjet with Wedge-shaped Flame Holder

Wei Wang

Статья научная

The Lighthill acoustic analogy equation is adopted to research noise distribution at dissimilarity positions and the variations are conducted based on the numerical verification of flow field under different turbulence models, time step sizes and meshes. The results showed the proposed computation method is reliable and practicable to obtain the complex flow parameters in the ramjet combustion chamber; Most of the noise is higherfrequency,and the differences in the near and far field are proven. In addition, noise laws are identical with the same horizontal position

Бесплатно

Computer Implementation of Algorithmic Components of Redundant Measurement Methods

Computer Implementation of Algorithmic Components of Redundant Measurement Methods

Vladimir Y. Shcherban’, Ganna A. Korogod, Oksana Z. Kolysko, Mariana I. Sholudko, Gennady V. Melnik, Vitaliy V. Chaban, Yury Y. Shcherban’

Статья научная

This article demonstrates the implementation of the proposed algorithm for computer modeling of redundant measurement methods to solve problems to improve the accuracy of measurements of a controlled quantity with a nonlinear and unstable transformation function. Improving accuracy is achieved by processing the results of redundant measurements which are an array of data according to the proposed measurement equations. In addition, the article presents the possibility of determining the time variation of the parameters of the transformation function. A comparative analysis of the results of computer simulation of redundant and direct methods with unstable parameters of the linear and nonlinear sensor transformation functions is carried out. It was proved that, in the case of an increase in deviations of the parameters of the transformation function from the nominal values, the use of redundant methods provides a significantly higher measurement accuracy compared to direct methods. This became possible due to the automatic elimination of the systematic component of the error of the measurement result due to a change in the parameters of the transformation function under the influence of destabilizing factors. It was also found that, in contrast to direct methods, methods of redundant measurements allow working with a nonlinear transformation function without additional linearization or dividing it into linear sections, which also contributes to increased accuracy. In general, the application of the proposed approach in the modeling system proves its effectiveness and feasibility. Thus, there is reason to argue about the prospects of redundant measurements in the field of improving accuracy with a nonlinear and unstable transformation function, as well as the possibility of identifying deviations of the parameters of the transformation function from their nominal values.

Бесплатно

Computer Vision based Automation System for Detecting Objects

Computer Vision based Automation System for Detecting Objects

Rajibul Anam, Mostafizur Rahman, Mohammad Obaidul Haque, Md. Syeful Islam

Статья научная

Software Quality Assurance Testing time computer vision based automation tools are used to test the window based application and window based application is combined of many objects. Among them most of the automation tool detect window objects by comparing images. Most of the objects are visible in the window screen but some objects which are not visible to the screen at the first time. Proper interaction with the window application hidden objects get visible to the screen like dropdown list item, editor text object, list box item and slider. With the automation tools these hidden objects cannot be searched directly. In this paper proposes some methods which will enhance the automation tools to access the window application hidden objects.

Бесплатно

Computing Method and Hardware Circuit Implementation of Neural Network on Finite Element Analysis

Computing Method and Hardware Circuit Implementation of Neural Network on Finite Element Analysis

Likun Cui, Wei Wang, Zhuo Li

Статья научная

The finite element analysis in theory of elasticity is corresponded to the quadratic programming with equality constraint, which can be further transformed into the unconstrained optimization. In the paper, the neural network of finite element solving was obtained on the basis of Hopfield neural network that was reformed. And the no error solving of finite element neural net computation was realized in theory. And a design method to construct an artificial neuron by using electronic devices such as operational amplifier, digital controlled potentiometer and so on was presented. A programmable hardware neural network of finite element can be build up by using analog switches to interconnect inputs/outputs of hardware neurons. The weights, biases and connection in the hardware neural network of finite element can be adjusted automatically by microprocessor according to the results of train to controlling system, This programmable hardware neural network of finite element has some more adaptability for different systems. In addition, the authors present the computer simulation and analogue circuit experiment to verify this method. The results are revealed that: 1) The results of improved Hopfield neural network are reliable and accuracy; 2) The improved Hopfield neural network model has an advantage on circuit realization and the computing time, which is unrelated with complexity of the structure, is constant. It is practical significance for the research and calculation.

Бесплатно

Conceptual analysis of different clustering techniques for static security investigation

Conceptual analysis of different clustering techniques for static security investigation

Bassam A. Hemade, Hamed A. Ibrahim, Hossam E. A. Talaat

Статья научная

Power system contingency studies play a pivotal role in maintaining the security and integrity of modern power system operation. However, the number of possible contingencies is enormous and mostly vague. Therefore, in this paper, two well-known clustering techniques namely K-Means (KM) and Fuzzy C-Means (FCM) are used for contingency screening and ranking. The performance of both algorithms is comparatively investigated using IEEE 118-bus test system. Considering various loading conditions and multiple outages, the IEEE 118-bus contingencies have been generated using fast-decoupled power flow (FDPF). Silhouette analysis and fuzzy partition coefficient techniques have been profitably exploited to offer an insight view of the number of centroids. Moreover, the principal component analysis (PCA) has been used to extract the dominant features and ensure the consistency of passed data with artificial intelligence algorithms’ requirements. Although analysis of comparison results showed excellent compatibility between the two clustering algorithms, the FCM model was found more suitable for power system static security investigation.

Бесплатно

Context-aware recommendation methods

Context-aware recommendation methods

Tosin Agagu, Thomas Tran

Статья научная

A context-aware recommender system attempts to generate better recommendations using contextual information. However, generating recommendations for specific contexts have been challenging because of the difficulties in using contextual information to enhance the capabilities of recommender systems. Several methods have been used to incorporate contextual information into traditional recommendation algorithms and data modeling techniques. These methods focus on incorporating contextual information to improve general recommendations for users rather than identifying the different context applicable to the user and providing recommendations geared towards those specific contexts. We develop two methods: the first method attaches user preference across multiple contextual conditions, assuming that user preference remains the same, but the suitability of items differs across different contextual conditions. The second method assumes that item suitability remains the same across different contextual conditions but user preference changes. We perform some experiments on the last.fm dataset to evaluate our methods. We also compared our work to other context-aware recommendation approaches. Our results show that grouping ratings by context and jointly factorizing with common factors improves prediction accuracy.

Бесплатно

Control of an uncertain robot manipulator using an observation-based modified fuzzy sliding mode controller

Control of an uncertain robot manipulator using an observation-based modified fuzzy sliding mode controller

Shahnaz Tayebihaghighi, Farzin Piltan, Jong-Myon Kim

Статья научная

The main contribution of this paper is the design of a robust model reference fuzzy sliding mode observation technique to control multi-input, multi-output (MIMO) nonlinear uncertain dynamical robot manipulators. A fuzzy sliding mode controller was used in this study to control the robot manipulator in the presence of uncertainty and disturbance. To address the challenges of robustness, chattering phenomenon, and error convergence under uncertain conditions, the proposed sliding mode observer was applied to the fuzzy sliding mode controller. This theory was applied to a six-degrees-of-freedom (DOF) PUMA robot manipulator to verify the power of the proposed method.

Бесплатно

Controlling and Synchronizing of Fractional-Order Chaotic Systems via Simple and Optimal Fractional-Order Feedback Controller

Controlling and Synchronizing of Fractional-Order Chaotic Systems via Simple and Optimal Fractional-Order Feedback Controller

Ammar Soukkou, Salah Leulmi

Статья научная

In this paper, a simple and optimal form of fractional-order feedback approach assigned for the control and synchronization of a class of fractional-order chaotic systems is proposed. The proposed control law can be viewed as a distributed network of linear regulators wherein each node is modeled by a PI controller with moderate gains. The multiobjective genetic algorithm with chaotic mutation, adopted in this work, can be visualized as a combination of structural and parametric genes of a controller orchestrated in a hierarchical fashion. Then, it is applied to select an optimal knowledge base, which characterizes the developed controller, and satisfies various design specifications. The proposed design and optimization of the developed controller represents a simple powerful approach to provide a reasonable tradeoff between computational overhead, storage space, numerical accuracy and stability criterion in control and synchronization of a class of fractional-order chaotic systems. Simulation results show the satisfactory performance of the proposed approach.

Бесплатно

Cooperative Medium Access Control Protocol for Mobile Ad-hoc Networks using Spatial Diversity

Cooperative Medium Access Control Protocol for Mobile Ad-hoc Networks using Spatial Diversity

Tazeem Ahmad Khan, M T Beg, M A Khan

Статья научная

Enhancement the Performance of MANET (Mobile Ad-hoc Network) using spatial diversity. Spatial diversity implemented using cooperative transmission technique in Medium access control (MAC) layer level protocol. In noisy environment limit the network performance like coverage area, limit number of node, degrade packet transmission rate, increase packet loss rate etc. In this paper enhance the source to destination transmission range, minimize the packet loss, improve packet transmission rate and appropriate end to end delay. When direct link is fail to transmit packet then Cooperative scheme help to transmit packet. Cooperative scheme is to help the packet transmission with five handshakes instead of four. This scheme implemented in MANET network on MAC layer protocol. Cooperative scheme improve the performance with help of intermediate node between sources to destination. We are performance analysis using discrete simulator NS-2 in MANET. Our performance based on MAC layer level with cooperative scheme in IEEE WLAN standard CSMA/CA protocol.

Бесплатно

Cosine-Based Clustering Algorithm Approach

Cosine-Based Clustering Algorithm Approach

Mohammed A. H. Lubbad, Wesam M. Ashour

Статья научная

Due to many applications need the management of spatial data; clustering large spatial databases is an important problem which tries to find the densely populated regions in the feature space to be used in data mining, knowledge discovery, or efficient information retrieval. A good clustering approach should be efficient and detect clusters of arbitrary shapes. It must be insensitive to the outliers (noise) and the order of input data. In this paper Cosine Cluster is proposed based on cosine transformation, which satisfies all the above requirements. Using multi-resolution property of cosine transforms, arbitrary shape clusters can be effectively identified at different degrees of accuracy. Cosine Cluster is also approved to be highly efficient in terms of time complexity. Experimental results on very large data sets are presented, which show the efficiency and effectiveness of the proposed approach compared to other recent clustering methods.

Бесплатно

Журнал