Journal of Intelligent Systems

ISSNs: 0334-1860, 2191-026X

15 found

View year:

  1.  26
    Improving binary crow search algorithm for feature selection.Zakariya Yahya Algamal & Zakaria A. Hamed Alnaish - 2023 - Journal of Intelligent Systems 32 (1).
    The feature selection (FS) process has an essential effect in solving many problems such as prediction, regression, and classification to get the optimal solution. For solving classification problems, selecting the most relevant features of a dataset leads to better classification accuracy with low training time. In this work, a hybrid binary crow search algorithm (BCSA) based quasi-oppositional (QO) method is proposed as an FS method based on wrapper mode to solve a classification problem. The QO method was employed in tuning (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  2.  27
    Intelligent gloves: An IT intervention for deaf-mute people.Hanadi Almshjary, Amal Alghamdi, Amal Barsheed, Dimah Alahmadi, Ohoud Alzamzami, Hind Bitar & Amal Babour - 2023 - Journal of Intelligent Systems 32 (1).
    Deaf-mute people have much potential to contribute to society. However, communication between deaf-mutes and non-deaf-mutes is a problem that isolates deaf-mutes from society and prevents them from interacting with others. In this study, an information technology intervention, intelligent gloves (IG), a prototype of a two-way communication glove, was developed to facilitate communication between deaf-mutes and non-deaf-mutes. IG consists of a pair of gloves, flex sensors, an Arduino nano, a screen with a built-in microphone, a speaker, and an SD card module. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  42
    A new method for writer identification based on historical documents.Brahim Bouderah, Imran Siddiqi, Faycel Abbas, Chawki Djeddi & Abdeljalil Gattal - 2023 - Journal of Intelligent Systems 32 (1).
    Identifying the writer of a handwritten document has remained an interesting pattern classification problem for document examiners, forensic experts, and paleographers. While mature identification systems have been developed for handwriting in contemporary documents, the problem remains challenging from the viewpoint of historical manuscripts. Design and development of expert systems that can identify the writer of a questioned manuscript or retrieve samples belonging to a given writer can greatly help the paleographers in their practices. In this context, the current study exploits (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  4.  24
    Environmental landscape design and planning system based on computer vision and deep learning.Xiubo Chen - 2023 - Journal of Intelligent Systems 32 (1).
    Environmental landscaping is known to build, plan, and manage landscapes that consider the ecology of a site and produce gardens that benefit both people and the rest of the ecosystem. Landscaping and the environment are combined in landscape design planning to provide holistic answers to complex issues. Seeding native species and eradicating alien species are just a few ways humans influence the region’s ecosystem. Landscape architecture is the design of landscapes, urban areas, or gardens and their modification. It comprises the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  86
    Detecting biased user-product ratings for online products using opinion mining.Veer Sain Dixit & Akanksha Bansal Chopra - 2023 - Journal of Intelligent Systems 32 (1).
    Collaborative filtering recommender system (CFRS) plays a vital role in today’s e-commerce industry. CFRSs collect ratings from the users and predict recommendations for the targeted product. Conventionally, CFRS uses the user-product ratings to make recommendations. Often these user-product ratings are biased. The higher ratings are called push ratings (PRs) and the lower ratings are called nuke ratings (NRs). PRs and NRs are injected by factitious users with an intention either to aggravate or degrade the recommendations of a product. Hence, it (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  14
    Efficient mutual authentication using Kerberos for resource constraint smart meter in advanced metering infrastructure.Md Mehedi Hasan, Noor Afiza Mohd Ariffin & Nor Fazlida Mohd Sani - 2023 - Journal of Intelligent Systems 32 (1).
    The continuous development of information communication technology facilitates the conventional grid in transforming into an automated modern system. Internet-of-Things solutions are used along with the evolving services of end-users to the electricity service provider for smart grid applications. In terms of various devices and machine integration, adequate authentication is the key to an accurate source and destination in advanced metering infrastructure (AMI). Various protocols are deployed to lead the identification between two parties, which require high computation time and communicational bit (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  26
    Deep learning for content-based image retrieval in FHE algorithms.Mustafa Musa Jaber & Sura Mahmood Abdullah - 2023 - Journal of Intelligent Systems 32 (1).
    Content-based image retrieval (CBIR) is a technique used to retrieve image from an image database. However, the CBIR process suffers from less accuracy to retrieve many images from an extensive image database and prove the privacy of images. The aim of this article is to address the issues of accuracy utilizing deep learning techniques such as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon–Kim–Kim–Song (CKKS). The system has been proposed, namely (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  8.  93
    Salp swarm and gray wolf optimizer for improving the efficiency of power supply network in radial distribution systems.Bashar Ahmad Khalaf, Salama A. Mostafa, Hayder H. Safi, Khalid Mohammed Saffer & Ihsan Salman - 2023 - Journal of Intelligent Systems 32 (1).
    The efficiency of distribution networks is hugely affected by active and reactive power flows in distribution electric power systems. Currently, distributed generators (DGs) of energy are extensively applied to minimize power loss and improve voltage deviancies on power distribution systems. The best position and volume of DGs produce better power outcomes. This work prepares a new hybrid SSA–GWO metaheuristic optimization algorithm that combines the salp swarm algorithm (SSA) and the gray wolf optimizer (GWO) algorithm. The SSA–GWO algorithm ensures generating the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  9.  42
    A novel deep learning-based brain tumor detection using the Bagging ensemble with K-nearest neighbor.G. Komarasamy & K. V. Archana - 2023 - Journal of Intelligent Systems 32 (1).
    In the case of magnetic resonance imaging (MRI) imaging, image processing is crucial. In the medical industry, MRI images are commonly used to analyze and diagnose tumor growth in the body. A number of successful brain tumor identification and classification procedures have been developed by various experts. Existing approaches face a number of obstacles, including detection time, accuracy, and tumor size. Early detection of brain tumors improves options for treatment and patient survival rates. Manually segmenting brain tumors from a significant (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  10.  59
    Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks.Salama A. Mostafa, Bashar Ahmad Khalaf, Nafea Ali Majeed Alhammadi, Ali Mohammed Saleh Ahmed & Firas Mohammed Aswad - 2023 - Journal of Intelligent Systems 32 (1).
    With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things (IoT) has become more valuable and vital to everyday life in many ways. IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  28
    Enhancement of K-means clustering in big data based on equilibrium optimizer algorithm.Omar Saber Qasim, Zakariya Yahya Algamal & Sarah Ghanim Mahmood Al-Kababchee - 2023 - Journal of Intelligent Systems 32 (1).
    Data mining’s primary clustering method has several uses, including gene analysis. A set of unlabeled data is divided into clusters using data features in a clustering study, which is an unsupervised learning problem. Data in a cluster are more comparable to one another than to those in other groups. However, the number of clusters has a direct impact on how well the K-means algorithm performs. In order to find the best solutions for these real-world optimization issues, it is necessary to (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  21
    HWCD: A hybrid approach for image compression using wavelet, encryption using confusion, and decryption using diffusion scheme.Alagarswamy Ramaprasath & Heggere Rangaswamaiah Latha - 2023 - Journal of Intelligent Systems 32 (1).
    Image data play important role in various real-time online and offline applications. Biomedical field has adopted the imaging system to detect, diagnose, and prevent several types of diseases and abnormalities. The biomedical imaging data contain huge information which requires huge storage space. Moreover, currently telemedicine and IoT based remote health monitoring systems are widely developed where data is transmitted from one place to another. Transmission of this type of huge data consumes more bandwidth. Along with this, during this transmission, the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  13.  18
    Recognition of English speech – using a deep learning algorithm.Shuyan Wang - 2023 - Journal of Intelligent Systems 32 (1).
    The accurate recognition of speech is beneficial to the fields of machine translation and intelligent human–computer interaction. After briefly introducing speech recognition algorithms, this study proposed to recognize speech with a recurrent neural network (RNN) and adopted the connectionist temporal classification (CTC) algorithm to align input speech sequences and output text sequences forcibly. Simulation experiments compared the RNN-CTC algorithm with the Gaussian mixture model–hidden Markov model and convolutional neural network-CTC algorithms. The results demonstrated that the more training samples the speech (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  14.  17
    On numerical characterizations of the topological reduction of incomplete information systems based on evidence theory.Yanlan Zhang & Changqing Li - 2023 - Journal of Intelligent Systems 32 (1).
    Knowledge reduction of information systems is one of the most important parts of rough set theory in real-world applications. Based on the connections between the rough set theory and the theory of topology, a kind of topological reduction of incomplete information systems is discussed. In this study, the topological reduction of incomplete information systems is characterized by belief and plausibility functions from evidence theory. First, we present that a topological space induced by a pair of approximation operators in an incomplete (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  15.  14
    Evaluation and analysis of teaching quality of university teachers using machine learning algorithms.Ying Zhong - 2023 - Journal of Intelligent Systems 32 (1).
    In order to better improve the teaching quality of university teachers, an effective method should be adopted for evaluation and analysis. This work studied the machine learning algorithms and selected the support vector machine (SVM) algorithm to evaluate teaching quality. First, the principles of selecting evaluation indexes were briefly introduced, and 16 evaluation indexes were selected from different aspects. Then, the SVM algorithm was used for evaluation. A genetic algorithm (GA)-SVM algorithm was designed and experimentally analyzed. It was found that (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
 Previous issues
  
Next issues