Статьи журнала - International Journal of Intelligent Systems and Applications

Все статьи: 1187

GPS based Advanced Vehicle Tracking and Vehicle Control System

GPS based Advanced Vehicle Tracking and Vehicle Control System

Mashood Mukhtar

Статья научная

Security systems and navigators have always been a necessity of human’s life. The developments of advanced electronics have brought revolutionary changes in these fields. In this paper, we will present a vehicle tracking system that employs a GPS module and a GSM modem to find the location of a vehicle and offers a range of control features. To complete the design successfully, a GPS unit, two relays, a GSM Modem and two MCU units are used. There are five features introduced in the project. The aim of this project is to remotely track a vehicle’s location, remotely switch ON and OFF the vehicle’s ignition system and remotely lock and unlock the doors of the vehicle. An SMS message is sent to the tracking system and the system responds to the users request by performing appropriate actions. Short text messages are assigned to each of these features. A webpage is specifically designed to view the vehicle’s location on Google maps. By using relay based control concept introduced in this paper, number of control features such as turning heater on/off, radio on/off etc. can be implemented in the same fashion.

Бесплатно

Game Theory based Resource Identification Scheme for Wireless Sensor Networks

Game Theory based Resource Identification Scheme for Wireless Sensor Networks

Gururaj S. Kori, Mahabaleshwar S. Kakkasageri

Статья научная

In modern world of sensing and distributive systems, traditional Wireless Sensor Networks (WSN) has to deal with new challenges, such as multiple application requirements, dynamic and heterogeneous networks. Senor nodes in WSN are resource constrained in terms of energy, communication range, bandwidth, processing delay and memory. Numerous solutions are proposed to optimize the performance and to increase the lifetime of WSN by introducing new resource management principles. Effective and intelligent resource management in WSN involves in resource identification, resource scheduling, and resource utilization. This paper proposes a Bayesian Game Model (BGM) approach to efficiently identify the best node with the maximum resource in WSN for data transmission, considering energy, bandwidth, and computational delay. The scheme operates as follows: (1) Sensor nodes information such as residual energy, available bandwidth, and node ID, etc., is gathered (2) Energy and bandwidth of each node are used to generate the payoff matrix (3) Implementation of node identification scheme is based on payoff matrix, utilities assigned, strategies and reputation of each node (4) Find Bayesian Nash Equilibrium condition using Starring algorithm (5) Solving the Bayesian Nash Equilibrium using Law of Total Probability and identifying the best node with maximum resources (6) Adding/Subtracting reward (reputation factor) to winner/looser node. Simulation results show that the performance of the proposed Bayesian game model approach for resource identification in WSN is better as compared with the Efficient Neighbour Discovery Scheme for Mobile WSN (ENDWSN). The results indicate that the proposed scheme has up to 12% more resource identification accuracy rate, 10% increase in the average number of efficient resources discovered and 8% less computational delay as compared to ENDWSN.

Бесплатно

Generalization of Magic Square (Numerical Logic) 3×3 and its Multiples (3×3) × (3×3)

Generalization of Magic Square (Numerical Logic) 3×3 and its Multiples (3×3) × (3×3)

B L Kaul, Ramveer Singh

Статья научная

A magic square of 3×3 and its multiples i.e. (9×9) squares and so on, of order N are composed of (n×n) matrix having filled with numbers in such a way that the totals sum along the rows ,columns and main diagonals adds up the same. By using a special geometrical figure developed.

Бесплатно

Generalized Method for Constructing Magic Cube by Folded Magic Squares

Generalized Method for Constructing Magic Cube by Folded Magic Squares

Omar A. Dawood, Abdul Monem S. Rahma, Abdul Mohsen J. Abdul Hossen

Статья научная

In the present paper we have developed a new method for constructing magic cube by using the folded magic square technique. The proposed method considers a new step towards the magic cube construction that applied a good insight and provides an easy generalized technique. This method generalized the design of magic cube with N order regardless the type of magic square whether odd order, singly even order or doubly even order. The proposed method is fairly easy, since it have depended mainly on the magic square construction methods, and all what the designer need is just how to builds six magic square sequentially or with constant difference value between each pair of the numbers in the square matrix, whereby each one of this magic square will represents the surface or dimension for magic cube configuration. The next step for the designer will be how to arrange each square in the proper order to constitute the regular cube in order to maintain the properties of magic cube, where the sum of rows, columns and the diagonals from all directions are the same.

Бесплатно

Genetic Algorithm Combination of Boolean Constraint Programming for Solving Course of Action Optimization in Influence Nets

Genetic Algorithm Combination of Boolean Constraint Programming for Solving Course of Action Optimization in Influence Nets

Yanguang Zhu, Dongliang Qin, Yifan Zhu, Xingping Cao

Статья научная

A military decision maker is typically confronted by the task of determining optimal course of action under some constraints in complex uncertain situation. Thus, a new class of Combinational Constraint Optimization Problem (CCOP) is formalized, that is utilized to solve this complex Operation Optimization Problem. The object function of CCOP is modeled by Influence net, and the constraints of CCOP relate to resource and collaboration. These constraints are expressed by Pseudo-Boolean and Boolean constraints. Thus CCOP holds a complex mathematical configuration, which is expressed as a 0 1 integer optimization problem with compositional constraints and unobvious optimal object function. A novel method of Genetic Algorithm (GA) combination of Boolean Constraint Programming (BCP) is proposed to solve CCOP. The constraints of CCOP can be easily reduced and transformed into Disjunctive Normal Form (DNF) by BCP. The DNF representation then can be used to drive GA so as to solve CCOP. Finally, a numerical experiment is given to demonstrate the effectiveness of above method.

Бесплатно

Genetic Algorithm for Biomarker Search Problem and Class Prediction

Genetic Algorithm for Biomarker Search Problem and Class Prediction

Shabia Shabir Khan, S.M.K. Quadri, M.A. Peer

Статья научная

In the field of optimization, Genetic Algorithm that incorporates the process of evolution plays an important role in finding the best solution to a problem. One of the main tasks that arise in the medical field is to search a finite number of factors or features that actually affect or predict the survival of the patients especially with poor prognosis disease, thus helping them in early diagnosis. This paper discusses the various steps that are performed in genetic algorithm and how it is going to help in extracting knowledge out of high dimensional medical dataset. The more the attributes or features, the more difficult it is to correctly predict the class of that sample or instance. This is because of inefficient, useless, noisy attributes in the dataset. So, here the main aim is to search the features or genes that can strongly predict the class of subject (patient) i.e. healthy or cancerous and thus help in early detection and treatment.

Бесплатно

Genetic-based Summarization for Local Outlier Detection in Data Stream

Genetic-based Summarization for Local Outlier Detection in Data Stream

Mohamed Sakr, Walid Atwa, Arabi Keshk

Статья научная

Outlier detection is one of the important tasks in data mining. Detecting outliers over streaming data has become an important task in many applications, such as network analysis, fraud detections, and environment monitoring. One of the well-known outlier detection algorithms called Local Outlier Factor (LOF). However, the original LOF has many drawbacks that can’t be used with data streams: 1- it needs a lot of processing power (CPU) and large memory to detect the outliers. 2- it deals with static data which mean that in any change in data the LOF recalculates the outliers from the beginning on the whole data. These drawbacks make big challenges for existing outlier detection algorithms in terms of their accuracies when they are implemented in the streaming environment. In this paper, we propose a new algorithm called GSILOF that focuses on detecting outliers from data streams using genetics. GSILOF solve the problem of large memory needed as it has fixed memory bound. GSILOF has two phases. First, the summarization phase that tries to summarize the past data arrived. Second, the detection phase detects the outliers from the new arriving data. The summarization phase uses a genetic algorithm to try to find the subset of points that can represent the whole original set. our experiments have been done over real datasets. Our experiments confirming the effectiveness of the proposed approach and the high quality of approximate solutions in a set of real-world streaming data.

Бесплатно

Geometrical Framework Application Directions in Identification Systems. Review

Geometrical Framework Application Directions in Identification Systems. Review

Nikolay Karabutov

Статья научная

The approaches review of the framework application in identification problems is fulfilled. It is showed that this concept can have different interpretations of identification problems. In particular, the framework is understood as a frame, structure, system, platform, concept, and basis. Two directions of this concept application are allocated: 1) the framework integrating the number of methods, approaches or procedures; b) the mapping describing in the generalized view processes and properties in a system. We give the review of approaches that are the basis of the second direction. They are based on the analysis of virtual geometric structures. These mappings (frameworks) differ in the theory of chaos, accidents, and the qualitative theory of dynamic systems. Introduced mappings (frameworks) are not set a priori, and they are determined based of the experimental data processing. The main directions analysis of geometrical frameworks application is fulfilled in structural identification problems of systems. The review includes following directions: i) structural identification of nonlinear systems; ii) an estimation of Lyapunov exponents; iii) structural identifiability of nonlinear systems; iv) the system structure choice with lag variables; v) system attractor reconstruction.

Бесплатно

Graph Coloring in University Timetable Scheduling

Graph Coloring in University Timetable Scheduling

Swapnil Biswas, Syeda Ajbina Nusrat, Nusrat Sharmin, Mahbubur Rahman

Статья научная

Addressing scheduling problems with the best graph coloring algorithm has always been very challenging. However, the university timetable scheduling problem can be formulated as a graph coloring problem where courses are represented as vertices and the presence of common students or teachers of the corresponding courses can be represented as edges. After that, the problem stands to color the vertices with lowest possible colors. In order to accomplish this task, the paper presents a comparative study of the use of graph coloring in university timetable scheduling, where five graph coloring algorithms were used: First Fit, Welsh Powell, Largest Degree Ordering, Incidence Degree Ordering, and DSATUR. We have taken the Military Institute of Science and Technology, Bangladesh as a test case. The results show that the Welsh-Powell algorithm and the DSATUR algorithm are the most effective in generating optimal schedules. The study also provides insights into the limitations and advantages of using graph coloring in timetable scheduling and suggests directions for future research with the use of these algorithms.

Бесплатно

Graphical Data Steganographic Protection Method Based on Bits Correspondence Scheme

Graphical Data Steganographic Protection Method Based on Bits Correspondence Scheme

Zhengbing Hu, Ivan Dychka, Yevgeniya Sulema, Yevhen Radchenko

Статья научная

The proposed method of graphical data protection is a combined crypto-steganographic method. It is based on a bit values transformation according to both a certain Boolean function and a specific scheme of correspondence between MSB and LSB. The scheme of correspondence is considered as a secret key. The proposed method should be used for protection of large amounts of secret graphical data.

Бесплатно

Grass Fibrous Root Optimization Algorithm

Grass Fibrous Root Optimization Algorithm

Hanan A. R. Akkar, Firas R. Mahdi

Статья научная

This paper proposes a novel meta-heuristic optimization algorithm inspired by general grass plants fibrous root system, asexual reproduction, and plant development. Grasses search for water and minerals randomly by developing its location, length, primary root, regenerated secondary roots, and small branches of roots called hair roots. The proposed algorithm explore the bounded solution domain globally and locally. Globally using the best grasses survived by the last iteration, and the root system of the best grass obtained so far by the iteration process and locally uses the primary roots, regenerated secondary roots and hair roots of the best global grass. Each grass represents a global candidate solution, while regenerated secondary roots stand for the locally obtained solution. Secondary generated hair roots are equal to the problem dimensions. The performance of the proposed algorithm is tested using seven standard benchmark test functions, comparing it with other meta-heuristic well-known and recently proposed algorithms.

Бесплатно

Guide Me: A Research Work Area Recommender System

Guide Me: A Research Work Area Recommender System

Richa Sharma, Sharu Vinayak, Rahul Singh

Статья научная

With the advent of Industrial Revolution, not only the choices in various fields increased but also the era of computer came into existence thereby revolutionizing the global market. People had numerous choices in front of them that often led to the confusion about what product might actually fulfill their requirements. So the need for having a system which could facilitate the selection criteria and eradicate the dilemma of masses, was realized and ultimately recommender systems of present day world were introduced. So we can refer recommender systems as software tools that narrow down our choices and provide us with the most suitable suggestions as per our requirements. In this paper, we propose a novel recommender system i.e. RWARS (Research Work Area Recommender System) that will recommend research work area to a user based on his/her characteristics similar to those of other users. The characteristics considered here are hobbies, subjects of interests, programming skills and future objectives. The proposed system will use Cosine Similarity approach of Collaborative Filtering.

Бесплатно

Handling Fuzzy Image Clustering with a Modified ABC Algorithm

Handling Fuzzy Image Clustering with a Modified ABC Algorithm

Salima Ouadfel, Souham Meshoul

Статья научная

Image segmentation can be cast as a clustering task where the image is partitioned into clusters. Pixels within the same cluster are as homogenous as possible whereas pixels belonging to different clusters are not similar in terms of an appropriate similarity measure. Several clustering methods have been proposed for image segmentation purpose among which the Fuzzy C-Means clustering algorithm. However this algorithm still suffers from some drawbacks, such as local optima and sensitivity to initialization. Artificial Bees Colony algorithm is a recent population-based optimization method which has been successfully used in many complex problems. In this paper, we propose a new fuzzy clustering algorithm based on a modified Artificial Bees Colony algorithm, in which a new mutation strategy inspired from the Differential Evolution is introduced in order to improve the exploitation process. Experimental results show that our proposed approach improves the performance of the basic fuzzy C-Means clustering algorithm and outperforms other population based optimization methods.

Бесплатно

Handwritten character recognition on focused on the segmentation of character prototypes in small strips

Handwritten character recognition on focused on the segmentation of character prototypes in small strips

Ali Benafia, Smaine Mazouzi, Benafia Sara

Статья научная

The automatic recognition of handwriting is a particularly complex operation. Until now, there is no algorithm able to recognize handwriting without that; there are assumptions to take in advance to facilitate the task of the process. A handwritten text can contain letters lowercase, uppercase letters, characters sticks and digits. Therefore, it is capital to know extract and separate all these different units in order to process them with specific algorithms to their class handwriting. In this paper, we present a system for unconstrained handwritten text recognition, which allows to achieve this operation thanks to an intelligent segmentation based on an iterative cutting in a multi-script environment. The results obtained from the experimental protocol reach an "equal error rate" (EER) neighboring to 6%. These calculations were calculated with a relatively small base; however this same rate can be decreased with great bases. Our results are extremely encouraging for the simple reason that our approach is situated in a more general context unlike other approaches which define several non-rigid assumptions; this clearly makes the problem simpler and may make it trivial.

Бесплатно

Hardware-in-the-loop of Simulation for a Hydraulic Antilock Brake System

Hardware-in-the-loop of Simulation for a Hydraulic Antilock Brake System

Ayman A. Aly

Статья научная

Hardware-In-the-Loop (HIL) of simulation policy is used as a rapid and economical tool for developing automotive systems effectively and for dangerous situations tests such as extreme road conditions or high travelling speeds. A method for building a HIL of simulation a hydraulic Antilock Braking System (ABS) based on MATLAB/Simulink is presented in this paper. The system is implemented for research purposes as well as for the application in educational process. It can help the user heightening the efficiency when developing the electronic device. Also, the system can be used as teaching demo software. Experiment tests of HIL scheme were carried to ensure the feasibility and effectiveness of the system.

Бесплатно

Healthcare Vulnerability Mapping Using K-means ++ Algorithm and Entropy Method: A Case Study of Ratnanagar Municipality

Healthcare Vulnerability Mapping Using K-means ++ Algorithm and Entropy Method: A Case Study of Ratnanagar Municipality

Apurwa Singh, Roshan Koju

Статья научная

Healthcare is a fundamental human right. Vulnerable populations in healthcare refer to those who are at greater risk of suffering from health hazards due to various socio-economic factors, geographical barriers, and medical conditions. Mapping of this vulnerable population is a vital part of healthcare planning for any region. Very few such research regarding the distribution of healthcare service providers was carried out in the Nepali context previously. Thus, the results of vulnerability mapping can help with meaningful interventions for healthcare demands. This study focused on combining geo-analytics, unsupervised machine learning algorithms, and entropy methods for performing vulnerability mapping. K-means++ clustering algorithm was applied to household data of Ratnanagar municipality for the purpose of creating multiple clusters of households. An open-source routing machine was used to compute the distance to the nearest health service provider from each household in Ratnanagar municipality. The entropy method was used to evaluate the vulnerability measure of each cluster. Later, based on the population of different clusters in each ward and their respective vulnerability measures, each ward’s vulnerability measure was quantified. It can be observed that wards that are farther away from the east-west highway have higher vulnerability indices. This study found that machine learning algorithms can be effectively used in combination with the weighting method for vulnerability mapping. Using an unsupervised machine learning algorithm made sure that dimensions of vulnerability are visible.

Бесплатно

Heart Beat Classification Using Particle Swarm Optimization

Heart Beat Classification Using Particle Swarm Optimization

Ali Khazaee

Статья научная

This paper proposes a novel system to classify three types of electrocardiogram beats, namely normal beats and two manifestations of heart arrhythmia. This system includes three main modules: a feature extraction module, a classifier module, and an optimization module. In the feature extraction module, a proper set combining the shape features and timing features is proposed as the efficient characteristic of the patterns. In the classifier module, a multi-class support vector machine (SVM)-based classifier is proposed. For the optimization module, a particle swarm optimization algorithm is proposed to search for the best value of the SVM parameters and upstream by looking for the best subset of features that feed the classifier. Simulation results show that the proposed algorithm has very high recognition accuracy. This high efficiency is achieved with only little features, which have been selected using particle swarm optimizer.

Бесплатно

Heart Disease Prediction Using Modified Version of LeNet-5 Model

Heart Disease Prediction Using Modified Version of LeNet-5 Model

Shaimaa Mahmoud, Mohamed Gaber, Gamal Farouk, Arabi Keshk

Статья научная

Particularly compared to other diseases, heart disease (HD) claims the lives of the greatest number of people worldwide. Many priceless lives can be saved with the help of early and effective disease identification. Medical tests, an electrocardiogram (ECG) signal, heart sounds, computed tomography (CT) images, etc. can all be used to identify HD. Of all sorts, HD signal recognition from ECG signals is crucial. The ECG samples from the participants were taken into consideration as the necessary inputs for the HD detection model in this study. Many researchers analyzed the risk factors of heart disease and used machine learning or deep learning techniques for the early detection of heart patients. In this paper, we propose a modified version of the LeNet-5 model to be used as a transfer model for cardiovascular disease patients. The modified version is compared to the standard version using four evaluation metrics: accuracy, precision, recall, and F1-score. The achieved results indicated that when the LeNet-5 model was modified by increasing the number of used filters, this increased the model's ability to handle the ECGs dataset and extract the most important features from it. The results also showed that the modified version of the LeNet-5 model based on the ECGs image dataset improved accuracy by 9.14 percentage points compared to the standard LeNet-5 model.

Бесплатно

Heart Diseases Diagnosis Using Neural Networks Arbitration

Heart Diseases Diagnosis Using Neural Networks Arbitration

Ebenezer Obaloluwa Olaniyi, Oyebade Kayode Oyedotun, Khashman Adnan

Статья научная

There is an increase in death rate yearly as a result of heart diseases. One of the major factors that cause this increase is misdiagnoses on the part of medical doctors or ignorance on the part of the patient. Heart diseases can be described as any kind of disorder that affects the heart. In this research work, causes of heart diseases, the complications and the remedies for the diseases have been considered. An intelligent system which can diagnose heart diseases has been implemented. This system will prevent misdiagnosis which is the major error that may occur by medical doctors. The dataset of statlog heart disease has been used to carry out this experiment. The dataset comprises attributes of patients diagnosed for heart diseases. The diagnosis was used to confirm whether heart disease is present or absent in the patient. The datasets were obtained from the UCI Machine Learning. This dataset was divided into training, validation set and testing set, to be fed into the network. The intelligent system was modeled on feed forward multilayer perceptron, and support vector machine. The recognition rate obtained from these models were later compared to ascertain the best model for the intelligent system due to its significance in medical field. The results obtained are 85%, 87.5% for feedforward multilayer perceptron, and support vector machine respectively. From this experiment we discovered that support vector machine is the best network for the diagnosis of heart disease.

Бесплатно

Helicopter Control Using Fuzzy Logic and Narma-L2 Techniques

Helicopter Control Using Fuzzy Logic and Narma-L2 Techniques

Noor Salam Al-Fallooji, Maysam Abbod

Статья научная

Helicopter instability is one of the most limitations that should be addressed in a nonlinear application. Accordingly, researchers are invited to design a robust and reliable controller to obtain a stable system and enhance its overall performance. The present study focuses on the use of the intelligent system in controlling the pitch and yaw angles. This lead to controlling the elevation and the direction of the helicopter. Further to the application of the Linear Quadratic Regulator (LQR) controller, this research implemented the Proportional Integral Derivative (PID), Fuzzy Logic Control (FLC), and Artificial Neural Network (ANN). The results show that FLC achieved a good controllability for both angles, particularly for the pitch angle in comparison to the nonlinear auto regressive moving average (NARMA-L2). Moreover, NARMA-L2 requires further improvement by using, for example, the swarm optimization method to provide better controllability. The PID controller, on the other hand, had a greater capability in controlling the yaw angle in comparison to the other controllers implemented. Accordingly, it is suggested that the integration of PID and FLC may lead to more optimal outcomes.

Бесплатно

Журнал