Year:

  1.  3
    MAX-SAT Problem Using Hybrid Harmony Search Algorithm.Iyad Abu Doush, Amal Lutfi Quran, Mohammed Azmi Al-Betar & Mohammed A. Awadallah - 2018 - Journal of Intelligent Systems 27 (4):643-658.
    Maximum Satisfiability problem is an optimization variant of the Satisfiability problem denoted as MAX-SAT. The aim of this problem is to find Boolean variable assignment that maximizes the number of satisfied clauses in the Boolean formula. In case the number of variables per clause is equal or greater than three, then this problem is considered NP-complete. Hence, many researchers have developed techniques to deal with MAX-SAT. In this paper, we investigate the impact of different hybrid versions of binary harmony search (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  2.  4
    TA-ABC: Two-Archive Artificial Bee Colony for Multi-Objective Software Module Clustering Problem. Amarjeet & Jitender Kumar Chhabra - 2018 - Journal of Intelligent Systems 27 (4):619-641.
    Multi-objective software module clustering problem aims to automatically produce clustering solutions that optimize multiple conflicting clustering criteria simultaneously. Multi-objective evolutionary algorithms have been a most appropriate alternate for solving M-SMCPs. Recently, it has been observed that the performance of MOEAs based on Pareto dominance selection technique degrades with multi-objective optimization problem having more than three objective functions. To alleviate this issue for M-SMCPs containing more than three objective functions, we propose a two-archive based artificial bee colony algorithm. For this contribution, (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  3.  1
    FL-TOHIP in Mobile Ad Hoc Network.Rahul K. Ambekar & Uttam D. Kolekar - 2018 - Journal of Intelligent Systems 27 (4):523-536.
    Due to the dynamic nature of the mobile ad hoc network, all the nodes are mobile and generously connected to other nodes without the use of any fixed communications. Because of the random movement of nodes, the network topology is not predicted easily. Therefore, routing is one of the major challenging tasks in MANET. Significantly, the topology-hiding multipath routing protocol is used to eliminate the topological exposure problem by transmitting the information through disjoint paths from the source to the destination. (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  4. A Modified Intuitionistic Fuzzy Clustering Algorithm for Medical Image Segmentation.S. V. Aruna Kumar & B. S. Harish - 2018 - Journal of Intelligent Systems 27 (4):593-607.
    This paper presents a modified intuitionistic fuzzy clustering algorithm for medical image segmentation. IFCM is a variant of the conventional fuzzy C-means based on intuitionistic fuzzy set theory. Unlike FCM, IFCM considers both membership and nonmembership values. The existing IFCM method uses Sugeno’s and Yager’s IFS generators to compute nonmembership value. But for certain parameters, IFS constructed using above complement generators does not satisfy the elementary condition of intuitionism. To overcome this problem, this paper adopts a new IFS generator. Further, (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5. Effective Approach to Classify and Segment Retinal Hemorrhage Using ANFIS and Particle Swarm Optimization.Lawrence Livingston Godlin Atlas & Kumar Parasuraman - 2018 - Journal of Intelligent Systems 27 (4):681-697.
    The main objective of this study is to progress the structure and segment the images from hemorrhage recognition in retinal fundus images in ostensible. The abnormal bleeding of blood vessels in the retina which is the membrane in the back of the eye is called retinal hemorrhage. The image folders are deliberated, and the filter technique is utilized to decrease the images specifically adaptive median filter in our suggested proposal. Gray level co-occurrence matrix, grey level run length matrix and Scale (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  2
    A Database-Centric Framework for the Modeling, Simulation, and Control of Cyber-Physical Systems in the Factory of the Future.Andrea Bonci, Massimiliano Pirani & Sauro Longhi - 2018 - Journal of Intelligent Systems 27 (4):659-679.
    The factory of the future scenario asks for new approaches to cope with the incoming challenges and complexity of cyber-physical systems. The role of database management systems is becoming central for control and automation technology in this new industrial scenario. This article proposes database-centric technology and architecture that aims to seamlessly integrate networking, artificial intelligence, and real-time control issues into a unified model of computing. The proposed methodology is also viable for the development of a framework that features simulation and (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  7.  2
    Bacteria Foraging Algorithm Based Optimal Multi Sink Placement in Wireless Sensor Networks.Pitchaimanickam Bose & Murugaboopathi Gurusamy - 2018 - Journal of Intelligent Systems 27 (4):609-618.
    Wireless Sensor Networks are mainly utilized for time sensitive applications such as forest fire detection systems and health monitoring systems. Sensor nodes are operated on low power and limited computation process. It is essential to develop the solution for planning the topological area. Multiple sinks are located in the network and reduce the number of hops between the sensors and its sinks. We propose an efficient technique based on Bacteria Foraging Algorithm to identify the best optimal locations of sinks. The (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  8.  1
    Adaptive Gearbox Selection Method to Improve the Performance of Industrial Robotic Arms.Mohammad Athar Hayat & Ankush A. Mankar - 2018 - Journal of Intelligent Systems 27 (4):565-575.
    Robotic arms play a major role in today’s environment. Many robotic arms are used in industries, factories, and our surrounding environments. Many types of robotic arms are used for their particular purpose. Gearbox selection is very important in increasing the performance of robotic arms. Therefore, it is necessary to select the gearbox to improve the performance of robotic arms for everyday use. Thus, an efficient method is proposed to improve the performance of robotic arms for industries. This efficient method adaptively (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  9. Log Posterior Approach in Learning Rules Generated Using N-Gram Based Edit Distance for Keyword Search.M. Priya & R. Kalpana - 2018 - Journal of Intelligent Systems 27 (4):555-563.
    Challenging searching mechanisms are required to cater to the needs of search engine users in probing the voluminous web database. Searching the query matching keyword based on a probabilistic approach is attractive in most of the application areas, viz. spell checking and data cleaning, because it allows approximate search. A probabilistic approach with maximum likelihood estimation is used to handle real-world problems; however, it suffers from overfitting data. In this paper, a rule-based approach is presented for keyword searching. The process (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  10. Degree of Certainty in Students’ Academic Performance Evaluation Using a New Fuzzy Inference System.Satish S. Salunkhe, Ashok Deshpande & Yashwant Joshi - 2018 - Journal of Intelligent Systems 27 (4):537-554.
    The academic performance assessment of students helps teachers, administrators, and policymakers to initiate corrective measures on academically poor students. This paper revisits the Zadeh-Deshpande formalism for evaluating students’ answer scripts using the concept of the reliability of information via the “degree of match” and fuzzy inference system in students’ performance evaluation. The case study infers that the overall performance of all the students is “average”. Furthermore, 206 of 237 students are declared as “average” with “high degree of certainty” by the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  11.  2
    Deep Belief Network for the Enhancement of Ultrasound Images with Pelvic Lesions.Sadanand L. Shelgaonkar & Anil B. Nandgaonkar - 2018 - Journal of Intelligent Systems 27 (4):507-522.
    It is well known that ultrasound images are cost-efficient and exhibit hassle-free usage. However, very few works have focused on exploiting the ultrasound modality for lesion diagnosis. Moreover, there is no reliable contribution reported in the literature for diagnosing pelvic lesions from the pelvic portion of humans, especially females. While few contributions are found for diagnosis of lesions in the pelvic region, no effort has been made on enhancing the images. Inspired from the neural network, our methodology adopts deep belief (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  12. A Method of Partner Selection for Knowledge Collaboration Teams Using Weighted Social Network Analysis.Jiafu Su, Yu Yang, Kunpeng Yu & Na Zhang - 2018 - Journal of Intelligent Systems 27 (4):577-591.
    Partner selection is the primary aspect of the formation of knowledge collaboration teams. We propose a method of partner selection for KCTs based on a weighted social network analysis method in which the individual knowledge competence and the collaboration performance of candidates are both considered. To select the desired partners, a biobjective 0-1 model is built, integrating the knowledge competence and collaboration performance, which is an NP-hard problem. Then, a multiobjective genetic algorithm is developed to solve the proposed model. Finally, (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13.  2
    An Approach to Detect Vehicles in Multiple Climatic Conditions Using the Corner Point Approach.Mallikarjun Anandhalli & Vishwanath P. Baligar - 2018 - Journal of Intelligent Systems 27 (3):363-376.
    This paper presents a new method of detecting vehicles by using a simple and effective algorithm. The features of a vehicle are the most important aspects in detection of vehicles. The corner points are considered for the proposed algorithm. A large number of points are densely packed within the area of a vehicle, and the points are calculated by using the Harris corner detector. Making use of the fact that they are densely packed, grouping of these points is carried out. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14. ADOFL: Multi-Kernel-Based Adaptive Directive Operative Fractional Lion Optimisation Algorithm for Data Clustering.Satish Chander, P. Vijaya & Praveen Dhyani - 2018 - Journal of Intelligent Systems 27 (3):317-329.
    The progress of databases in fields such as medical, business, education, marketing, etc., is colossal because of the developments in information technology. Knowledge discovery from such concealed bulk databases is a tedious task. For this, data mining is one of the promising solutions and clustering is one of its applications. The clustering process groups the data objects related to each other in a similar cluster and diverse objects in another cluster. The literature presents many clustering algorithms for data clustering. Optimisation-based (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  2
    Models for Predicting Development Effort of Small-Scale Visualization Projects.M. A. Jayaram, T. M. Kiran Kumar & H. V. Raghavendra - 2018 - Journal of Intelligent Systems 27 (3):413-431.
    Software project effort estimation is one of the important aspects of software engineering. Researchers in this area are still striving hard to come out with the best predictive model that has befallen as a greatest challenge. In this work, the effort estimation for small-scale visualization projects all rendered on engineering, general science, and other allied areas developed by 60 postgraduate students in a supervised academic setting is modeled by three approaches, namely, linear regression, quadratic regression, and neural network. Seven unique (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  1
    Mining DNA Sequence Patterns with Constraints Using Hybridization of Firefly and Group Search Optimization.Neelu Khare & Kuruva Lakshmanna - 2018 - Journal of Intelligent Systems 27 (3):349-362.
    DNA sequence mining is essential in the study of the structure and function of the DNA sequence. A few exploration works have been published in the literature concerning sequence mining in information mining task. Similarly, in our past paper, an effective sequence mining was performed on a DNA database utilizing constraint measures and group search optimization. In that study, GSO calculation was utilized to optimize the sequence extraction process from a given DNA database. However, it is apparent that, occasionally, such (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17. Adaptive Algorithm for Solving the Load Flow Problem in Distribution System.Vipin Kumar, Shubham Swapnil & V. R. Singh - 2018 - Journal of Intelligent Systems 27 (3):377-391.
    This paper presents a fast and efficient method for load flow analysis of radial distribution networks. Here, an adaptive algorithm is proposed to analyze the load flow problem of distribution systems. An adaptive algorithm is the combination of backward/forward sweep and cuckoo search algorithms. In the proposed method, the optimum load flow analysis of the radial distribution system is attained, while optimizing the voltage and current computation of the BW/fw sweep algorithm. Now, by the CS, the output voltage of the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  2
    A Novel Hybrid ABC-PSO Algorithm for Effort Estimation of Software Projects Using Agile Methodologies.My Hanh Le & Thanh Tung Khuat - 2018 - Journal of Intelligent Systems 27 (3):489-506.
    In modern software development processes, software effort estimation plays a crucial role. The success or failure of projects depends greatly on the accuracy of effort estimation and schedule results. Many studies focused on proposing novel models to enhance the accuracy of predicted results; however, the question of accurate estimation of effort has been a challenging issue with regards to researchers and practitioners, especially when it comes to projects using agile methodologies. This study aims at introducing a novel formula based on (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19. An Effective Technique for Reducing Total Harmonics Distortion of Multilevel Inverter.G. Nageswara Rao, K. Chandra Sekhar & P. Sangameswararaju - 2018 - Journal of Intelligent Systems 27 (3):433-446.
    In this paper, an adaptive neuro fuzzy interference system is proposed for eliminating voltage harmonics present in the multilevel inverter. It is achieved by reducing the total harmonic distortion present in the multilevel inverter output voltage. Here, the voltage variation of the multilevel inverter is determined from the actual load voltage and the reference voltage. The voltage variations at different time intervals have been applied to the ANFIS. According to the voltage variations, the switching angles can be generated from the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  1
    A Multiple Criteria-Based Cost Function Using Wavelet and Edge Transformation for Medical Image Steganography.S. I. Nipanikar & V. Hima Deepthi - 2018 - Journal of Intelligent Systems 27 (3):331-347.
    With the ever-increasing need for concealing messages within cover media like image, video, and audio, numerous attempts have been developed for steganography. Most of the steganographic techniques perform their embedding operation on the cover image without selecting a better location. The right selection of location for embedding the information can lead to high imperceptibility and robustness. Accordingly, in this paper, we develop a new cost function for estimating the cost of every pixel to identify the good location to embed the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  1
    Neural Network Classifier for Fighter Aircraft Model Recognition.K. Roopa, T. V. Rama Murthy & P. Cyril Prasanna Raj - 2018 - Journal of Intelligent Systems 27 (3):447-463.
    Fighter aircraft recognition is important in military applications to make strategic decisions. The complexity lies in correctly identifying the unknown aircraft irrespective of its orientations. The work reported here is a research initiative in this regard. The database used here was obtained by using rapid prototyped physical models of four classes of fighter aircraft: P51 Mustang, G1-Fokker, MiG25-F, and Mirage 2000. The image database was divided into the training set and test set. Two feature sets, Feature Set1 and FS2, were (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  1
    Modeling and Optimizing Boiler Design Using Neural Network and Firefly Algorithm.Sangram Bhagwanrao Savargave & Madhukar Jagannath Lengare - 2018 - Journal of Intelligent Systems 27 (3):393-412.
    The significance of researches in modeling of boiler design and its optimization is high for saving energy and minimizing emissions. Modeling the boiler plant with all demands is rather challenging. A lot of techniques are reported in the literature for enhancing the boiler efficiency. The neural network scheme has been proved for the boiler design, and it provides a framework for the non-linear system models. In this paper, a hybrid of artificial neural network and firefly algorithm is proposed. The proposed (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23. Feature Selection Using Harmony Search for Script Identification From Handwritten Document Images.Pawan Kumar Singh, Supratim Das, Ram Sarkar & Mita Nasipuri - 2018 - Journal of Intelligent Systems 27 (3):465-488.
    The feature selection process can be considered a problem of global combinatorial optimization in machine learning, which reduces the irrelevant, noisy, and non-contributing features, resulting in acceptable classification accuracy. Harmony search algorithm is an evolutionary algorithm that is applied to various optimization problems such as scheduling, text summarization, water distribution networks, vehicle routing, etc. This paper presents a hybrid approach based on support vector machine and HSA for wrapper feature subset selection. This approach is used to select an optimized set (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  1
    An Intelligent System for Identifying Influential Words in Real-Estate Classifieds.Sherief Abdallah - 2018 - Journal of Intelligent Systems 27 (2):183-194.
    This paper focuses on the problem of quantifying how certain words in a text affect, positively or negatively, some numeric signal. These words can lead to important decisions for significant applications such as E-commerce. For example, consider the corpus of real-estate classifieds, which we developed as a case study. Each classified has a description of a real-estate property, along with simple features such as the location and the number of bedrooms. The problem then is to identify which keywords influence the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  6
    An Extensive Review on Data Mining Methods and Clustering Models for Intelligent Transportation System.Sesham Anand, P. Padmanabham, A. Govardhan & Rajesh H. Kulkarni - 2018 - Journal of Intelligent Systems 27 (2):263-273.
    Data mining techniques support numerous applications of intelligent transportation systems. This paper critically reviews various data mining techniques for achieving trip planning in ITSs. The literature review starts with the discussion on the contributions of descriptive and predictive mining techniques in ITSs, and later continues on the contributions of the clustering techniques. Being the largely used approach, the use of cluster analysis in ITSs is assessed. However, big data analysis is risky with clustering methods. Thus, evolutionary computational algorithms are used (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  3
    Query-Specific Distance and Hybrid Tracking Model for Video Object Retrieval.C. A. Ghuge, Sachin D. Ruikar & V. Chandra Prakash - 2018 - Journal of Intelligent Systems 27 (2):195-212.
    In the area of modern intelligent systems, the retrieval process of video objects is still a challenging task because objects are usually affected by object confusion, similar appearance among objects, different posing, small size of objects, and interactions among multiple objects. In order to overcome these challenges, the video object is retrieved based on the trajectory points of the multiple-motion objects. However, if an object is in an occlusion situation, the calculation of trajectory points from the objects is considerably altered. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  2
    Prediction Method of Railway Freight Volume Based on Genetic Algorithm Improved General Regression Neural Network.Zhi-da Guo & Jing-Yuan Fu - 2018 - Journal of Intelligent Systems 27 (2):291-302.
    Railway freight transportation is an important part of the national economy. Accurate forecast of railway freight volume is significant to the planning, construction, operation, and decision making of railways. After analyzing the application status of generalized regression neural network in the prediction method of railway freight volume, this paper improves the performance of this model by using improved neural network. In the improved method, genetic algorithm is adopted to search the optimal spread, which is the only factor of GRNN, and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  2
    A Critical Analysis on the Security Architectures of Internet of Things: The Road Ahead.Vivek V. Jog & T. Senthil Murugan - 2018 - Journal of Intelligent Systems 27 (2):149-162.
    Internet of Things has been a most important research area for almost a decade now, where a huge network of billions or trillions of “things” communicating with one another is facing many technical and application challenges. Although there are many uncertainties about its security and privacy, the literature presents different techniques to handle the security issues and challenges in order to develop a well-defined security architecture. This paper reviews 50 research papers that are related to the security of IoT. The (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  3
    An Efficient Multiclass Medical Image CBIR System Based on Classification and Clustering.Mahabaleshwar S. Kabbur - 2018 - Journal of Intelligent Systems 27 (2):275-290.
    In this paper, we are going to present the multiclass medical image content-based image retrieval system based on classification and clustering. Images are segmented using hill climbing-based segmentation based on the extracted visual features. In the improved HCBS technique, a clustering that is based on kernel-based fuzzy C-means is employed. In the next step, features like color, texture, edge density, region area, and visual words from the segmented images are extracted. The visual word can be extracted by using the clustering (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  3
    Double-Valued Neutrosophic Sets, Their Minimum Spanning Trees, and Clustering Algorithm.Ilanthenral Kandasamy - 2018 - Journal of Intelligent Systems 27 (2):163-182.
    Neutrosophy is used to represent uncertain, indeterminate, and inconsistent information available in the real world. This article proposes a method to provide more sensitivity and precision to indeterminacy, by classifying the indeterminate concept/value into two based on membership: one as indeterminacy leaning towards truth membership and the other as indeterminacy leaning towards false membership. This paper introduces a modified form of a neutrosophic set, called Double-Valued Neutrosophic Set, which has these two distinct indeterminate values. Its related properties and axioms are (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  1
    BGFS: Design and Development of Brain Genetic Fuzzy System for Data Classification.Chandrasekar Ravi & Neelu Khare - 2018 - Journal of Intelligent Systems 27 (2):231-247.
    Recently, classification systems have received significant attention among researchers due to the important characteristics and behaviors of analysis required in real-time databases. Among the various classification-based methods suitable for real-time databases, fuzzy rule-based classification is effectively used by different researchers in various fields. An important issue in the design of fuzzy rule-based classification is the automatic generation of fuzzy if-then rules and the membership functions. The literature presents different techniques for automatic fuzzy design. Among the different techniques available in the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  2
    Utilization of Co-Occurrence Pattern Mining with Optimal Fuzzy Classifier for Web Page Personalization.Pappu Srinivasa Rao & Devara Vasumathi - 2018 - Journal of Intelligent Systems 27 (2):249-262.
    Several users use metasearch engines directly or indirectly to access and gather data from more than one data source. The effectiveness of a metasearch engine is majorly determined by the quality of the results it returns in response to user queries. The rank aggregation methods that have been proposed until now exploit a very limited set of parameters, such as total number of used resources and the rankings they achieved from each individual resource. In this paper, we use the fuzzy-bat (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  2
    A Member Selection Model of Collaboration New Product Development Teams Considering Knowledge and Collaboration.Jiafu Su, Yu Yang & Xuefeng Zhang - 2018 - Journal of Intelligent Systems 27 (2):213-229.
    Member selection to form an effective collaboration new product development team is crucial for a successful NPD. Existing researches on member selection mostly focus on the individual attributes of candidates. However, under the background of collaboration, knowledge complementarity and collaboration performance among candidates are important but overlooked. In this paper, we propose a multi-objective optimization model for member selection of a Co-NPD team, considering comprehensively the individual knowledge competence, knowledge complementarity, and collaboration performance. Then, to solve the model, an improved (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  7
    Hybrid Weighted K-Means Clustering and Artificial Neural Network for an Anomaly-Based Network Intrusion Detection System.Devara Vasumathi & Rafath Samrin - 2018 - Journal of Intelligent Systems 27 (2):135-147.
    Despite the rapid developments in data technology, intruders are among the most revealed threats to security. Network intrusion detection systems are now a typical constituent of network security structures. In this paper, we present a combined weighted K-means clustering algorithm with artificial neural network -based intrusion identification scheme. This paper comprises two modules: clustering and intrusion detection. The input dataset is gathered into clusters with the usage of WKMC in clustering module. In the intrusion detection module, the clustered information is (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  1
    A Grain Output Combination Forecast Model Modified by Data Fusion Algorithm.Xiang Wan, Bing-Xiang Liu & Xing Xu - 2018 - Journal of Intelligent Systems 27 (2):303-315.
    To deal with the lack of accuracy and generalization ability in some single models, grain output models were built with lots of relevant data, based on the powerful non-linear reflection of the back-propagation neural network. Three kinds of grain output models were built and took advantage of – particle swarm optimization algorithm, mind evolutionary algorithm, and genetic algorithm – to optimize the BP neural network. By the use of data fusion algorithm, the outcomes of different models can be modified and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  4
    An Efficient Medical Image Watermarking Technique in E-Healthcare Application Using Hybridization of Compression and Cryptography Algorithm.Puvvadi Aparna & Polurie Venkata Vijay Kishore - 2018 - Journal of Intelligent Systems 27 (1):115-133.
    The main objective of this paper is to propose a medical image watermarking technique in E-healthcare application based on the hybridization of compression and cryptography algorithm. Basically, the proposed system consists of two stages: watermark embedding process and watermark extraction process. In the embedding process, at first, we segment the tumor part separately using a region growing algorithm. Then, we encrypt the region of interest part using Secure Hash Algorithm-256 and encrypt the electronic health record using the elliptical curve cryptography (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  4
    Introduction to the Special Issue on Recent Developments in Multimedia Watermarking Using Machine Learning.Amit Kumar Singh - 2018 - Journal of Intelligent Systems 27 (1):1-3.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  2
    Novel Relevance Feedback Approach for Color Trademark Recognition Using Optimization and Learning Strategy.Latika Pinjarkar, Manisha Sharma & Smita Selot - 2018 - Journal of Intelligent Systems 27 (1):67-79.
    The trademark registration process, apparent in all organizations nowadays, deals with recognition and retrieval of similar trademark images from trademark databases. Trademark retrieval is an imperative application area of content-based image retrieval. The main challenges in designing and developing this application area are reducing the semantic gap, obtaining higher accuracy, reducing computation complexity, and subsequently the execution time. The proposed work focuses on these challenges. This paper proposes the relevance feedback system embedded with optimization and unsupervised learning technique as the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  6
    Machine Learning-Based Robust Watermarking Technique for Medical Image Transmitted Over LTE Network.Ankur Rai & Harsh Vikram Singh - 2018 - Journal of Intelligent Systems 27 (1):105-114.
    This paper discusses a safe and secure watermarking technique using a machine learning algorithm. In this paper, the propagation of a watermarked image is simulated over the third-generation partnership project /long-term evolution downlink physical layer. The watermark data are scrambled and a transform domain-based hybrid watermarking technique is used to embed this watermark into the transform coefficients of the host image and transmitted over the orthogonal frequency division multiplexing downlink physical layer. Support vector machine is used as a classifier for (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  1
    Medical Image Reliability Verification Using Hash Signatures and Sequential Square Encoding.J. Jennifer Ranjani & M. Babu - 2018 - Journal of Intelligent Systems 27 (1):19-30.
    Increased growth of information technology in healthcare has led to a situation where the security of patient information is more important and is a critical issue. The aim of the proposed algorithm is to provide a framework to verify the integrity of the medical images. In this paper, the integrity of the medical images is verified by embedding hash signatures using the sequential square embedding technique. This technique is as efficient as the diamond encoding technique but with increased payload capability. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  2
    Combining Haar Wavelet and Karhunen-Loeve Transform for Robust and Imperceptible Data Hiding Using Digital Images.Akankasha Sharma, Amit Kumar Singh & Pardeep Kumar - 2018 - Journal of Intelligent Systems 27 (1):91-103.
    In this paper, we present an introduction of digital image watermarking followed by important characteristics and potential applications of digital watermarks. Further, recent state-of-the-art watermarking techniques as reported by noted authors are discussed in brief. It includes the performance comparison of reported transform/spatial domain based watermarking techniques presented in tabular form. This comprehensive survey will be significant for researchers who will be able to implement more efficient watermarking techniques. Moreover, we present a robust watermarking technique using fusion of discrete wavelet (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  7
    A Novel Scene-Based Video Watermarking Scheme for Copyright Protection.Manisha Sharma & Dolley Shukla - 2018 - Journal of Intelligent Systems 27 (1):47-66.
    Many illegal copies of original digital videos are being made, as they can be replicated perfectly through the Internet. Thus, it is extremely necessary to protect the copyrights of the owner and prevent illegal copying. This paper presents a novel approach to digital video watermarking for copyright protection using two different algorithms, whereby successive estimation of a statistical measure was used to detect scene boundaries and watermark was embedded in the detected scenes with discrete wavelet transform. Haar wavelet was used (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  2
    A Parallel Algorithm for Wavelet Transform-Based Color Image Compression.Piyush Kumar Singh, Ravi Shankar Singh & Kabindra Nath Rai - 2018 - Journal of Intelligent Systems 27 (1):81-90.
    Wavelet transforms emerge as one of the popular techniques in image compression. This technique is accepted by the JPEG Committee for the next-generation image compression standard JPEG-2000. Convolution-based strategy is widely used in calculating the wavelet transform of the image. A convolution-based wavelet transform consists of a large number of multiplications and additions. A color image consists of a two-dimensional matrix each for red, green, and blue colors. An ordinary way to calculate the wavelet transform of a color image includes (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  2
    An Image Authentication Algorithm Using Combined Approach of Watermarking and Vector Quantization.Archana Tiwari & Manisha Sharma - 2018 - Journal of Intelligent Systems 27 (1):31-45.
    This paper presents a two-stage watermarking technique for image authentication adapting the advantages of vector quantization. In the proposed algorithm, robust watermark and semifragile watermark are embedded independently in two successive stages. Robust watermark and VQ enhance the security of the system by providing double protection to the designed system, while semifragile watermark helps in authenticating the received image. Watermarks of varying sizes are embedded in the cover image, and their performance is measured in terms of peak signal-to-noise ratio, weighted (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  3
    Multiple Watermarking for Healthcare Applications.Aditi Zear, Amit Kumar Singh & Pardeep Kumar - 2018 - Journal of Intelligent Systems 27 (1):5-18.
    In this paper, an algorithm for multiple digital watermarking based on discrete wavelet transform, discrete cosine transform, and singular value decomposition was proposed for healthcare applications such as tele-ophthalmology, tele-medicine, tele-diagnosis, and tele-consultancy services. Multiple watermarks were used in this algorithm to reduce the consequences of medical identity thefts. In the embedding process, the cover medical image was decomposed into third-level DWT. Low-frequency bands were transformed by DCT, and then SVD was applied to DCT coefficients. Two watermarks in the form (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  1
    Multi-Agent System Based on the Extreme Learning Machine and Fuzzy Control for Intelligent Energy Management in Microgrid.Dounia El Bourakadi, Ali Yahyaouy & Jaouad Boumhidi - 2018 - Journal of Intelligent Systems.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47. Cognitively Motivated Query Abstraction Model Based on Associative Root-Pattern Networks.Bassam Haddad - 2018 - Journal of Intelligent Systems.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48. Predicting Automatic Trigger Speed for Vehicle-Activated Signs.Diala Jomaa & Siril Yella - 2018 - Journal of Intelligent Systems.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  4
    Gray Method for Multiple Attribute Decision Making with Incomplete Weight Information Under the Pythagorean Fuzzy Setting.Muhammad Sajjad Ali Khan, Saleem Abdullah & Peide Lui - 2018 - Journal of Intelligent Systems.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  3
    A New Feature Selection Method for Sentiment Analysis in Short Text.H. M. Keerthi Kumar & B. S. Harish - 2018 - Journal of Intelligent Systems.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  51. An Overview of the Shared Task on Machine Translation in Indian Languages – 2017.M. Anand Kumar, B. Premjith, Shivkaran Singh, S. Rajendran & K. P. Soman - 2018 - Journal of Intelligent Systems.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  52. Group Recommender Systems – An Evolutionary Approach Based on Multi-Expert System for Consensus.Ritu Meena & Sonajharia Minz - 2018 - Journal of Intelligent Systems.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  53. Machine Translation in Indian Languages: Challenges and Resolution.Raj Nath Patel, Prakash B. Pimpale & M. Sasikumar - 2018 - Journal of Intelligent Systems.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  54.  1
    Deep CNN Combined With Relevance Feedback for Trademark Image Retrieval.Latika Pinjarkar, Manisha Sharma & Smita Selot - 2018 - Journal of Intelligent Systems.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  55. Enriching Documents by Linking Salient Entities and Lexical-Semantic Expansion.Mohsen Pourvali & Salvatore Orlando - 2018 - Journal of Intelligent Systems.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  56. Optimizing Software Modularity with Minimum Possible Variations.Amarjeet Prajapati & Jitender Kumar Chhabra - 2018 - Journal of Intelligent Systems.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  57.  1
    An Efficient Lossless ROI Image Compression Using Wavelet-Based Modified Region Growing Algorithm.P. Sreenivasulu & S. Varadarajan - 2018 - Journal of Intelligent Systems.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  58. Classification of Masses in Digital Mammograms Using the Genetic Ensemble Method.Shankar Thawkar & Ranjana Ingolikar - 2018 - Journal of Intelligent Systems.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
 Previous issues
  
Next issues