Статьи журнала - International Journal of Intelligent Systems and Applications

Все статьи: 1187

Development of Regression Models for Assessing Fire Risk of Some Indian Coals

Development of Regression Models for Assessing Fire Risk of Some Indian Coals

Devidas S. Nimaje, D.P. Tripathy, Santosh Kumar Nanda

Статья научная

Spontaneous combustion of coals leading to mine fires is a major problem in Indian coal mines that creates serious safety and mining risk. A number of experimental techniques based on petrological, thermal and oxygen avidity studies have been used for assessing the spontaneous heating liability of coals all over the world. Crossing point temperature (CPT) is one of the most common methods in India to assess the fire risk of coal so that appropriate strategies and effective action plans could be made in advance to prevent occurrence and spread of fire and hence minimize coal loss. In this paper, the spontaneous heating risks of some of the Indian coals covering few major coalfields were assessed using CPT apparatus. Statistical analysis was carried out between CPT and the proximate analysis parameters and it was found that the Mixture Surface Regression (MSR) model was more effective and gave very good residual values as compared to the polynomial and simple multiple regression models. The performance of Anderson-Darling testing was done between the prediction results of MSR model and measured value of CPT showed that the residual follows normal distribution hence justifies the suitability of model for the prediction of spontaneous heating liability of coal.

Бесплатно

Development of a Computational Model for Cassava Food Processing Using Coloured Petri Net

Development of a Computational Model for Cassava Food Processing Using Coloured Petri Net

Samuel M. Alade, Olufemi D. Ninan

Статья научная

A food system is composed of a complex network of activities and processes for production, distribution, transportation and consumption, which interact with each other, thus leading to changeable behaviour. Most existing empirical studies on cassava processing have focused on the technical efficiency analysis of the cassava crop processing techniques among processors indicating that the modelling of the events and operations involved in the processing of the cassava crop is highly limited. In this context, different strategies have been used to solve difficult environmental and agro-informatic systems model-based problems such as system dynamics, agent based, rule-based knowledge and mathematical modeling. However, the structural comprehension and behavioral investigation of this modeling are constrained. In this regard, formal computational modeling is a method that enables modeling and simulation of the dynamical characteristics of these food systems to be examined. In this study, the system specification is designed using Unified Modelling language (UML) to show the structural process and system design modelled and simulated using Coloured Petri Net (CPN), a formal method for analyzing the behavioural properties of complex system because of its efficient analysis. For the purpose of observing and analyzing the behaviour of the cassava food process, a series of simulation runs was proposed.

Бесплатно

Development of a Facenet Enhanced Secured Smart Office System

Development of a Facenet Enhanced Secured Smart Office System

Odeyemi C.S., Olaniyan O.M.

Статья научная

A secured smart office system is the one that is capable of recognizing and granting access to authorized persons only and manage the office appliances autonomously. The goals are access control, security and automation. Over the years, several studies have been carried out to meet these needs using RFID cards, access codes and biometrics resulting in weak security with long computational period. Switching of electrical appliances and smoke detection in case of fire outbreak were used but real time electrical appliances management that could prevent fire outbreak is yet to be achieved. This research focused its attention on the design and implementation of a smart office system that meet these needs. The system was developed using a raspberry pi 4 board. Ultrasonic sensor, camera, servo motor, relay, current and voltage sensors were interfaced with the raspberry pi for image capturing, opening the door, switching and power monitoring respectively. The system captures the image of an approaching person and process it for recognition using FaceNet; an open source model for face recognition. Information was transmitted via SIM800L GSM module as SMS to the administrator. The system shuts down the office electrical network once the supply voltage exceeds 220v ac or less than 161v ac, thus preventing any chance of fire outbreak due to irregular power supply. The accuracy of image recognition model was 93.13%. This research has shown a simple way of implementing an autonomous smart office system that is capable of providing adequate security, efficiency and convenience in offices.

Бесплатно

Development of a Low-Cost GSM-Bluetooth Home Automation System

Development of a Low-Cost GSM-Bluetooth Home Automation System

Salihu Aliyu, Abdulazeez Yusuf, Umar Abdullahi, Mustapha Hafiz, Lukman A. Ajao

Статья научная

In today's age of digital technology and intelligent systems, home automation has become one of the fastest developing technology in the world as more and more people begin to see the idea of remotely monitoring and controlling their home appliances more as a necessity rather than a luxury. This paper presents the design and development of a smart home system that allows control of home appliances using both Bluetooth and GSM technology. The use of multiple control mediums gives more robustness to the system as appliance control and monitoring is made cheaper and possible regardless of the distance from which control is being effected. The system is controlled using a dedicated android based application which ensures convenience and ease of use. In addition, it is equipped with a security feature which is activated when the user is away from home. This enables the user to detect intrusion while the user is away.

Бесплатно

Development of a Model for Electronic Toll-Collection System

Development of a Model for Electronic Toll-Collection System

Md. Farhad Ismail, M.A.R. Sarkar

Статья научная

The paper presents a new method for electronic toll collection system and to match car number plate detection system. The electronic toll collection system (ETS) has been fabricated based on microcontroller. Here a system is developed to collect tolls according to the weight of the vehicle. The car number plate detection method utilizes template matching technique to approximate the location of car number plate. Then, using this output from the template matching method, color information is used to eliminate the unwanted color areas from the approximate number plate region without affecting the correct color regions. Hence, the number plate region can be determined more accurately. This work can easily be done by image processing system using MATLAB. The method has low complexity and reduced the processing time magnificently. This automated system also shows a better performance in highway traffic management. This paper shows the gateway to fabricate a highly automated toll-plaza.

Бесплатно

Development of hybrid learning machine in complex domain for human identification

Development of hybrid learning machine in complex domain for human identification

Swati Srivastava, Bipin K. Tripathi

Статья научная

This paper presents a hybrid learning machine for human identification. It is a merger of eigenface with fisherface method, genetic fuzzy clustering and complex neural network. The non-linear aggregation based summation and radial basis function neural networks (NLA-SRBF NNs) are proposed as one of the functional component of the novel learning machine. The architecture of NLA-SRBF NNs incorporates hidden neurons, with summation and radial basis aggregation, and output neurons with only summation aggregation, along with complex resilient propagation (ČRPROP) learning procedure. The improved learning and speedy convergence of NLA-SRBF NN enables the hybrid machine to provide better recognition accuracy. The learning machine consists of feature extraction, unsupervised clustering and supervised classification module. The aim of our proposal is to enhance the performance of biometric based recognition system. The efficacy and potency of our hybrid learning machine demonstrated on three benchmark biometric datasets-extended Cohn-Kanade, FERET and AR face datasets to comprehend the motivation. The performance comparisons of different variations of hidden neuron and learning algorithm thoroughly presented the superiority of the proposed NN based hybrid learning machine.

Бесплатно

Development of robust multiple face tracking algorithm and novel performance evaluation metrics for different background video sequences

Development of robust multiple face tracking algorithm and novel performance evaluation metrics for different background video sequences

Ranganatha S., Y. P. Gowramma

Статья научная

In computer vision, face tracking is having wider opportunities for research activities using different background video sequences because of various factors and constraints. Due to the challenges that are increasing day by day, old/existing algorithms are becoming obsolete. There are many powerful algorithms that are limited to certain set of video sequences. In this paper, we are proposing an algorithm that detect and track multiple faces in different background video sequences. Viola-Jones face detection algorithm is used in such a way that, new face/first face need not to be in the starting frame of the selected video sequence. The proposed algorithm successfully detect new face(s) along with existing face(s) by keeping track of the facial data using BRISK feature points. The mean of the old points and new points are calculated based on the area of the facial data. The detected face(s) in further frames undergoes similarity check with existing facial data. If detected facial data and existing facial data mismatches, then the detected facial data is entered into face tracks structure. By using point tracker method, the proposed algorithm track those points that has been set for each of the facial data.

Бесплатно

Difference of the Absolute Differences – A New Method for Motion Detection

Difference of the Absolute Differences – A New Method for Motion Detection

Khalid Youssef, Peng-Yung Woo

Статья научная

This article presents a new method, which reduces costs and processing time for spatial object motion detection by focusing on the bare-hand motion that mimics computer mouse functions to allow the user to move the mouse pointer in real-time by the motion of his/her hand without any gloves worn, any object carried, or any key hit. In this article, the study of this topic is from the viewpoint of computer vision and image processing. The principals of the difference of the absolute differences (DAD) are investigated. A new method based on the DAD principles, which is conceptually different from all the existing approaches to spatial object motion detection, is developed and applied successfully to the bare-hand motion. The real-time implementation of the bare-hand motion detection demonstrates the accuracy and efficiency of the DAD method.

Бесплатно

Differential Evolution Algorithm with Space Partitioning for Large-Scale Optimization Problems

Differential Evolution Algorithm with Space Partitioning for Large-Scale Optimization Problems

Ahmed Fouad Ali, Nashwa Nageh Ahmed

Статья научная

Differential evolution algorithm (DE) constitutes one of the most applied meta-heuristics algorithm for solving global optimization problems. However, the contributions of applying DE for large-scale global optimization problems are still limited compared with those problems for low and middle dimensions. DE suffers from slow convergence and stagnation, specifically when it applies to solve global optimization problems with high dimensions. In this paper, we propose a new differential evolution algorithm to solve large-scale optimization problems. The proposed algorithm is called differential evolution with space partitioning (DESP). In DESP algorithm, the search variables are divided into small groups of partitions. Each partition contains a certain number of variables and this partition is manipulated as a subspace in the search process. Selecting different subspaces in consequent iterations maintains the search diversity. Moreover, searching a limited number of variables in each partition prevents the DESP algorithm from wandering in the search space especially in large-scale spaces. The proposed algorithm is tested on 15 large- scale benchmark functions and the obtained results are compared against the results of three variants DE algorithms. The results show that the proposed algorithm is a promising algorithm and can obtain the optimal or near optimal solutions in a reasonable time.

Бесплатно

Differential evolution algorithm for optimizing virtual machine placement problem in cloud computing

Differential evolution algorithm for optimizing virtual machine placement problem in cloud computing

Amol C. Adamuthe, Jayshree T. Patil

Статья научная

Primary concern of any cloud provider is to improve resource utilization and minimize cost of service. Different mapping relations among virtual machines and physical machines effect on resource utilization, load balancing and cost for cloud data center. Paper addresses the virtual machine placement as optimization problem with resource constraints on CPU, memory and bandwidth. In experimentations, datasets are formed using random data generator. Paper presents random fit algorithm, best fit algorithm based on resource wastage and an evolutionary algorithm- Differential Evolution. Paper presents results of Differential Evolution algorithm with three different mutation approaches. Results show that Differential Evolution algorithm with DE/best/2 mutation operator works efficient than basic DE, best fit and random fit algorithms.

Бесплатно

Digital Control and Management of Water Supply Infrastructure Using Embedded Systems and Machine Learning

Digital Control and Management of Water Supply Infrastructure Using Embedded Systems and Machine Learning

Martin C. Peter, Steve Adeshina, Olabode Idowu-Bismark, Opeyemi Osanaiye, Oluseun Oyeleke

Статья научная

Water supply infrastructure operational efficiency has a direct impact on the quantity of portable water available to end users. It is commonplace to find water supply infrastructure in a declining operational state in rural and some urban centers in developing countries. Maintenance issues result in unabated wastage and shortage of supply to users. This work proposes a cost-effective solution to the problem of water distribution losses using a Microcontroller-based digital control method and Machine Learning (ML) to forecast and manage portable water production and system maintenance. A fundamental concept of hydrostatic pressure equilibrium was used for the detection and control of leakages from pipeline segments. The results obtained from the analysis of collated data show a linear direct relationship between water distribution loss and production quantity; an inverse relationship between Mean Time Between Failure (MTBF) and yearly failure rates, which are the key problem factors affecting water supply efficiency and availability. Results from the prototype system test show water supply efficiency of 99% as distribution loss was reduced to 1% due to Line Control Unit (LCU) installed on the prototype pipeline. Hydrostatic pressure equilibrium being used as the logic criteria for leak detection and control indeed proved potent for significant efficiency improvement in the water supply infrastructure.

Бесплатно

Dimension reduction using orthogonal local preserving projection in big data

Dimension reduction using orthogonal local preserving projection in big data

Ummadi Sathish Kumar, E. Srinivasa Reddy

Статья научная

Big Data is unstructured data that overcome the processing complexity of conventional database systems. The dimensionality reduction approach, which is a fundamental technique for the large-scale data-processing, try to maintain the performance of the classifier while reduce the number of required features. The pedestrian data includes a number of features compare to the other data, so pedestrian detection is the complex task. The accuracy of detection and location directly affect the performance of the entire system. Moreover, the pedestrian based approaches mainly suffer from huge training samples and increase the computation complexity. In this paper, an efficient dimensionality reduction model and pedestrian data classification approach has been proposed. The proposed model has three steps Histogram of Oriented Gradients (HOG) descriptor used for feature extraction, Orthogonal Locality Preserving Projection (OLPP) approach for feature dimensionality reduction. Finally, the relevant features are forwarded to the Support Vector Machine (SVM) to classify the pedestrian data and non-pedestrian data. The proposed HOG+OLPP+SVM model performance was measured using evaluation metrics such as precision, accuracy, recall and f-measure. The proposed model used the Penn-Fudan Database and compare to the existing research the proposed model improved approximately 6% of pedestrian data classification accuracy.

Бесплатно

Dimensionality Reduction using Genetic Algorithm for Improving Accuracy in Medical Diagnosis

Dimensionality Reduction using Genetic Algorithm for Improving Accuracy in Medical Diagnosis

D. Asir Antony Gnana Singh, E. Jebamalar Leavline, R. Priyanka, P. Padma Priya

Статья научная

The technological growth generates the massive data in all the fields. Classifying these high-dimensional data is a challenging task among the researchers. The high-dimensionality is reduced by a technique is known as attribute reduction or feature selection. This paper proposes a genetic algorithm (GA)-based features selection to improve the accuracy of medical data classification. The main purpose of the proposed method is to select the significant feature subset which gives the higher classification accuracy with the different classifiers. The proposed genetic algorithm-based feature selection removes the irrelevant features and selects the relevant features from original dataset in order to improve the performance of the classifiers in terms of time to build the model, reduced dimension and increased accuracy. The proposed method is implemented using MATLAB and tested using the medical dataset with various classifiers namely Naïve Bayes, J48, and k-NN and it is evident that the proposed method outperforms other methods compared.

Бесплатно

Dimensionality reduction for classification and clustering

Dimensionality reduction for classification and clustering

D. Asir Antony Gnana Singh, E. Jebamalar Leavline

Статья научная

Now-a-days, data are generated massively from various sectors such as medical, educational, commercial, etc. Processing these data is a challenging task since the massive data take more time to process and make decision. Therefore, reducing the size of data for processing is a pressing need. The size of the data can be reduced using dimensionality reduction methods. The dimensionality reduction is known as feature selection or variable selection. The dimensionality reduction reduces the number of features present in the dataset by removing the irrelevant and redundant variables to improve the accuracy of the classification and clustering tasks. The classification and clustering techniques play a significant role in decision making. Improving accuracy of classification and clustering is an essential task of the researchers to improve the quality of decision making. Therefore, this paper presents a dimensionality reduction method with wrapper approach to improve the accuracy of classification and clustering.

Бесплатно

Discovering Hidden Networks in On-line Social Networks

Discovering Hidden Networks in On-line Social Networks

Pooja Wadhwa, M.P.S Bhatia

Статья научная

Rapid developments in information technology and Web 2.0 have provided a platform for the evolution of terrorist organizations, extremists from a traditional pyramidal structure to a technology enabled networked structure. Growing presence of these subversive groups on social networking sites has emerged as one of the prominent threats to the society, governments and law enforcement agencies across the world. Identifying messages relevant to the domain of security can serve as a stepping stone in criminal network analysis. In this paper, we deploy a rule based approach for classifying messages in Twitter which can also successfully reveal overlapping clusters. The approach incorporates dictionaries of enriched themes where each theme is categorized by semantically related words. The message is vectorized according to the security dictionaries and is termed as ‘Security Vector’. The documents are classified in categories on the basis of security associations. Further, the approach can also be used along the temporal dimension for classifying messages into topics and rank the most prominent topics of conversation at a particular instance of time. We further employ social network analysis techniques to visualize the hidden network at a particular time. Some of the results of our approach obtained through experiment with information network of Twitter are also discussed.

Бесплатно

Discrete Wavelet Transform and Cross Bilateral Filter based Image Fusion

Discrete Wavelet Transform and Cross Bilateral Filter based Image Fusion

Sonam, Manoj Kumar

Статья научная

The main objective of image fusion is to obtain an enhanced image with more relevant information by integrating complimentary information from two source images. In this paper, a novel image fusion algorithm based on discrete wavelet transform (DWT) and cross bilateral filter (CBF) is proposed. In the proposed framework, source images are decomposed into low and high frequency subbands using DWT. The low frequency subbands of the transformed images are combined using pixel averaging method. Meanwhile, the high frequency subbands of the transformed images are fused with weighted average fusion rule where, the weights are computed using CBF on both the images. Finally, to reconstruct the fused image inverse DWT is performed over the fused coefficients. The proposed method has been extensively tested on several pairs of multi-focus and multisensor images. To compare the results of proposed method with different existing methods, a variety of image fusion quality metrics are employed for the qualitative measurement. The analysis of comparison results demonstrates that the proposed method exhibits better results than many other fusion methods, qualitatively as well as quantitatively..

Бесплатно

Discussion on Damping Factor Value in PageRank Computation

Discussion on Damping Factor Value in PageRank Computation

Atul Kumar Srivastava, Rakhi Garg, P. K. Mishra

Статья научная

Web search engines use various ranking methods to determine the order of web pages displayed on the Search Engine Result Page (SERP). PageRank is one of the popular and widely used ranking method. PageRank of any web page can be defined as a fraction of time a random web surfer spends on that web page on average. The PageRank method is a stationary distribution of a stochastic method whose states are web pages of the Web graph. This stochastic method is acquired by combining the hyperlink matrix of the web graph and a trivial uniform process. This combination is needed to make primitive so that stationary distribution is well defined. The combination depends on the value of damping factor α∈[0,1] in the computation of PageRank. The damping factor parameter state that how much time random web surfer follow hyperlink structure than teleporting. The value of α is exceptionally empirical and in current scenario α = 0.85 is considered as suggested by Brin and Page. If we take α =0.8 then we can say that out of total time, 80% of time is taken by the random web surfer to follow the hyperlink structure and 20% time they teleport to new web pages randomly. Today web surfer gets worn out too early on the web because of non-availability of relevant information and they can easily teleport to new web pages rather than following hyperlink structure. So we have to choose some value of damping factor other than 0.85. In this paper, we have given an experimental analysis of PageRank computation for different value of the damping factor. We have observed that for value of α=0.7, PageRank method takes fewer numbers of iterations to converge than α=0.85, and for these values of α the top 25 web pages returned by PageRank method in the SERP are almost same, only some of them exchange their positions. From the experimental results it is observed that value of damping factor α=0.7 takes approximate 25-30% fewer numbers of iterations than α=0.85 to get closely identical web pages in top 25 result pages for personalized web search, selective crawling, intra-web search engine.

Бесплатно

Distance Protection Settings Based Artificial Neural Network in Presence of TCSR on Electrical Transmission Line

Distance Protection Settings Based Artificial Neural Network in Presence of TCSR on Electrical Transmission Line

Mohamed Zellagui, Abdelaziz Chaghi

Статья научная

This research paper study the performance of distance relays setting based analytic (AM) and artificial neural network (ANN) method for a 400 kV high voltage transmission line in Eastern Algerian transmission networks at Sonelgaz Group compensated by series Flexible AC Transmission System (FACTS) i.e. Thyristor Controlled Series Reactor (TCSR) connected at midpoint of the electrical transmission line. The facts are used for controlling transmission voltage, power flow, reactive power, and damping of power system oscillations in high power transfer levels. This paper studies the effects of TCSR insertion on the total impedance of a transmission line protected by distance relay and the modified setting zone protection in capacitive and inductive boost mode for three zones. Two different techniques have been investigated in order to prevent circuit breaker nuisance tripping to improve the performances of the distance relay protection.

Бесплатно

Distributed Computer System Resources Control Mechanism Based on Network-Centric Approach

Distributed Computer System Resources Control Mechanism Based on Network-Centric Approach

Zhenbing Hu, Vadym Mukhin, Yaroslav Kornaga, Yaroslav Lavrenko, Oksana Herasymenko

Статья научная

In this paper, we present the development of a decentralized mechanism for the resources control in a distributed computer system based on a network-centric approach. Intially, the network-centric approach was proposed for the military purposes, and now its principles are successfully introduced in the other applications of the complex systems control. Due to the features of control systems based on the network-centric approach, namely adding the horizontal links between components of the same level, adding the general knowledge control in the system, etc., there are new properties and characteristics. The concept of implementing of resource control module for a distributed computer system based on a network-centric approach is proposed in this study. We, basing on this concept, realized the resource control module and perform the analysis of its operation parameters in compare with resource control modules implemented on the hierarchical approach and on the decentralized approach with the creation of the communities of the computing resources. The experiments showed the advantages of the proposed mechanism for resources control in compare with the control mechanisms based on the hierarchical and decentralized approaches.

Бесплатно

Diversity Based on Entropy: A Novel Evaluation Criterion in Multi-objective Optimization Algorithm

Diversity Based on Entropy: A Novel Evaluation Criterion in Multi-objective Optimization Algorithm

Wang LinLin, Chen Yunfang

Статья научная

Quality assessment of Multi-objective Optimization algorithms has been a major concern in the scientific field during the last decades. The entropy metric is introduced and highlighted in computing the diversity of Multi-objective Optimization Algorithms. In this paper, the definition of the entropy metric and the approach of diversity measurement based on entropy are presented. This measurement is adopted to not only Multi-objective Evolutionary Algorithm but also Multi-objective Immune Algorithm. Besides, the key techniques of entropy metric, such as the appropriate principle of grid method, the reasonable parameter selection and the simplification of density function, are discussed and analyzed. Moreover, experimental results prove the validity and efficiency of the entropy metric. The computational effort of entropy increases at a linear rate with the number of points in the solution set, which is indeed superior to other quality indicators. Compared with Generational Distance, it is proved that the entropy metric have the capability of describing the diversity performance on a quantitative basis. Therefore, the entropy criterion can serve as a high-efficient diversity criterion of Multi-objective optimization algorithms.

Бесплатно

Журнал