Year:

  1.  1
    An Approach to Detect Vehicles in Multiple Climatic Conditions Using the Corner Point Approach.Mallikarjun Anandhalli & Vishwanath P. Baligar - 2018 - Journal of Intelligent Systems 27 (3):363-376.
    This paper presents a new method of detecting vehicles by using a simple and effective algorithm. The features of a vehicle are the most important aspects in detection of vehicles. The corner points are considered for the proposed algorithm. A large number of points are densely packed within the area of a vehicle, and the points are calculated by using the Harris corner detector. Making use of the fact that they are densely packed, grouping of these points is carried out. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  2. ADOFL: Multi-Kernel-Based Adaptive Directive Operative Fractional Lion Optimisation Algorithm for Data Clustering.Satish Chander, P. Vijaya & Praveen Dhyani - 2018 - Journal of Intelligent Systems 27 (3):317-329.
    The progress of databases in fields such as medical, business, education, marketing, etc., is colossal because of the developments in information technology. Knowledge discovery from such concealed bulk databases is a tedious task. For this, data mining is one of the promising solutions and clustering is one of its applications. The clustering process groups the data objects related to each other in a similar cluster and diverse objects in another cluster. The literature presents many clustering algorithms for data clustering. Optimisation-based (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  3.  2
    Models for Predicting Development Effort of Small-Scale Visualization Projects.M. A. Jayaram, T. M. Kiran Kumar & H. V. Raghavendra - 2018 - Journal of Intelligent Systems 27 (3):413-431.
    Software project effort estimation is one of the important aspects of software engineering. Researchers in this area are still striving hard to come out with the best predictive model that has befallen as a greatest challenge. In this work, the effort estimation for small-scale visualization projects all rendered on engineering, general science, and other allied areas developed by 60 postgraduate students in a supervised academic setting is modeled by three approaches, namely, linear regression, quadratic regression, and neural network. Seven unique (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  4.  1
    Mining DNA Sequence Patterns with Constraints Using Hybridization of Firefly and Group Search Optimization.Neelu Khare & Kuruva Lakshmanna - 2018 - Journal of Intelligent Systems 27 (3):349-362.
    DNA sequence mining is essential in the study of the structure and function of the DNA sequence. A few exploration works have been published in the literature concerning sequence mining in information mining task. Similarly, in our past paper, an effective sequence mining was performed on a DNA database utilizing constraint measures and group search optimization. In that study, GSO calculation was utilized to optimize the sequence extraction process from a given DNA database. However, it is apparent that, occasionally, such (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  5. Adaptive Algorithm for Solving the Load Flow Problem in Distribution System.Vipin Kumar, Shubham Swapnil & V. R. Singh - 2018 - Journal of Intelligent Systems 27 (3):377-391.
    This paper presents a fast and efficient method for load flow analysis of radial distribution networks. Here, an adaptive algorithm is proposed to analyze the load flow problem of distribution systems. An adaptive algorithm is the combination of backward/forward sweep and cuckoo search algorithms. In the proposed method, the optimum load flow analysis of the radial distribution system is attained, while optimizing the voltage and current computation of the BW/fw sweep algorithm. Now, by the CS, the output voltage of the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  6.  1
    A Novel Hybrid ABC-PSO Algorithm for Effort Estimation of Software Projects Using Agile Methodologies.My Hanh Le & Thanh Tung Khuat - 2018 - Journal of Intelligent Systems 27 (3):489-506.
    In modern software development processes, software effort estimation plays a crucial role. The success or failure of projects depends greatly on the accuracy of effort estimation and schedule results. Many studies focused on proposing novel models to enhance the accuracy of predicted results; however, the question of accurate estimation of effort has been a challenging issue with regards to researchers and practitioners, especially when it comes to projects using agile methodologies. This study aims at introducing a novel formula based on (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  7. An Effective Technique for Reducing Total Harmonics Distortion of Multilevel Inverter.G. Nageswara Rao, K. Chandra Sekhar & P. Sangameswararaju - 2018 - Journal of Intelligent Systems 27 (3):433-446.
    In this paper, an adaptive neuro fuzzy interference system is proposed for eliminating voltage harmonics present in the multilevel inverter. It is achieved by reducing the total harmonic distortion present in the multilevel inverter output voltage. Here, the voltage variation of the multilevel inverter is determined from the actual load voltage and the reference voltage. The voltage variations at different time intervals have been applied to the ANFIS. According to the voltage variations, the switching angles can be generated from the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  8.  1
    A Multiple Criteria-Based Cost Function Using Wavelet and Edge Transformation for Medical Image Steganography.S. I. Nipanikar & V. Hima Deepthi - 2018 - Journal of Intelligent Systems 27 (3):331-347.
    With the ever-increasing need for concealing messages within cover media like image, video, and audio, numerous attempts have been developed for steganography. Most of the steganographic techniques perform their embedding operation on the cover image without selecting a better location. The right selection of location for embedding the information can lead to high imperceptibility and robustness. Accordingly, in this paper, we develop a new cost function for estimating the cost of every pixel to identify the good location to embed the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  9. Neural Network Classifier for Fighter Aircraft Model Recognition.K. Roopa, T. V. Rama Murthy & P. Cyril Prasanna Raj - 2018 - Journal of Intelligent Systems 27 (3):447-463.
    Fighter aircraft recognition is important in military applications to make strategic decisions. The complexity lies in correctly identifying the unknown aircraft irrespective of its orientations. The work reported here is a research initiative in this regard. The database used here was obtained by using rapid prototyped physical models of four classes of fighter aircraft: P51 Mustang, G1-Fokker, MiG25-F, and Mirage 2000. The image database was divided into the training set and test set. Two feature sets, Feature Set1 and FS2, were (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  10.  1
    Modeling and Optimizing Boiler Design Using Neural Network and Firefly Algorithm.Sangram Bhagwanrao Savargave & Madhukar Jagannath Lengare - 2018 - Journal of Intelligent Systems 27 (3):393-412.
    The significance of researches in modeling of boiler design and its optimization is high for saving energy and minimizing emissions. Modeling the boiler plant with all demands is rather challenging. A lot of techniques are reported in the literature for enhancing the boiler efficiency. The neural network scheme has been proved for the boiler design, and it provides a framework for the non-linear system models. In this paper, a hybrid of artificial neural network and firefly algorithm is proposed. The proposed (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  11. Feature Selection Using Harmony Search for Script Identification From Handwritten Document Images.Pawan Kumar Singh, Supratim Das, Ram Sarkar & Mita Nasipuri - 2018 - Journal of Intelligent Systems 27 (3):465-488.
    The feature selection process can be considered a problem of global combinatorial optimization in machine learning, which reduces the irrelevant, noisy, and non-contributing features, resulting in acceptable classification accuracy. Harmony search algorithm is an evolutionary algorithm that is applied to various optimization problems such as scheduling, text summarization, water distribution networks, vehicle routing, etc. This paper presents a hybrid approach based on support vector machine and HSA for wrapper feature subset selection. This approach is used to select an optimized set (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  12.  1
    An Intelligent System for Identifying Influential Words in Real-Estate Classifieds.Sherief Abdallah - 2018 - Journal of Intelligent Systems 27 (2):183-194.
    This paper focuses on the problem of quantifying how certain words in a text affect, positively or negatively, some numeric signal. These words can lead to important decisions for significant applications such as E-commerce. For example, consider the corpus of real-estate classifieds, which we developed as a case study. Each classified has a description of a real-estate property, along with simple features such as the location and the number of bedrooms. The problem then is to identify which keywords influence the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  13.  5
    An Extensive Review on Data Mining Methods and Clustering Models for Intelligent Transportation System.Sesham Anand, P. Padmanabham, A. Govardhan & Rajesh H. Kulkarni - 2018 - Journal of Intelligent Systems 27 (2):263-273.
    Data mining techniques support numerous applications of intelligent transportation systems. This paper critically reviews various data mining techniques for achieving trip planning in ITSs. The literature review starts with the discussion on the contributions of descriptive and predictive mining techniques in ITSs, and later continues on the contributions of the clustering techniques. Being the largely used approach, the use of cluster analysis in ITSs is assessed. However, big data analysis is risky with clustering methods. Thus, evolutionary computational algorithms are used (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  14.  2
    Query-Specific Distance and Hybrid Tracking Model for Video Object Retrieval.C. A. Ghuge, Sachin D. Ruikar & V. Chandra Prakash - 2018 - Journal of Intelligent Systems 27 (2):195-212.
    In the area of modern intelligent systems, the retrieval process of video objects is still a challenging task because objects are usually affected by object confusion, similar appearance among objects, different posing, small size of objects, and interactions among multiple objects. In order to overcome these challenges, the video object is retrieved based on the trajectory points of the multiple-motion objects. However, if an object is in an occlusion situation, the calculation of trajectory points from the objects is considerably altered. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  15.  1
    Prediction Method of Railway Freight Volume Based on Genetic Algorithm Improved General Regression Neural Network.Zhi-da Guo & Jing-Yuan Fu - 2018 - Journal of Intelligent Systems 27 (2):291-302.
    Railway freight transportation is an important part of the national economy. Accurate forecast of railway freight volume is significant to the planning, construction, operation, and decision making of railways. After analyzing the application status of generalized regression neural network in the prediction method of railway freight volume, this paper improves the performance of this model by using improved neural network. In the improved method, genetic algorithm is adopted to search the optimal spread, which is the only factor of GRNN, and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  16.  2
    A Critical Analysis on the Security Architectures of Internet of Things: The Road Ahead.Vivek V. Jog & T. Senthil Murugan - 2018 - Journal of Intelligent Systems 27 (2):149-162.
    Internet of Things has been a most important research area for almost a decade now, where a huge network of billions or trillions of “things” communicating with one another is facing many technical and application challenges. Although there are many uncertainties about its security and privacy, the literature presents different techniques to handle the security issues and challenges in order to develop a well-defined security architecture. This paper reviews 50 research papers that are related to the security of IoT. The (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  17.  1
    An Efficient Multiclass Medical Image CBIR System Based on Classification and Clustering.Mahabaleshwar S. Kabbur - 2018 - Journal of Intelligent Systems 27 (2):275-290.
    In this paper, we are going to present the multiclass medical image content-based image retrieval system based on classification and clustering. Images are segmented using hill climbing-based segmentation based on the extracted visual features. In the improved HCBS technique, a clustering that is based on kernel-based fuzzy C-means is employed. In the next step, features like color, texture, edge density, region area, and visual words from the segmented images are extracted. The visual word can be extracted by using the clustering (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  18.  2
    Double-Valued Neutrosophic Sets, Their Minimum Spanning Trees, and Clustering Algorithm.Ilanthenral Kandasamy - 2018 - Journal of Intelligent Systems 27 (2):163-182.
    Neutrosophy is used to represent uncertain, indeterminate, and inconsistent information available in the real world. This article proposes a method to provide more sensitivity and precision to indeterminacy, by classifying the indeterminate concept/value into two based on membership: one as indeterminacy leaning towards truth membership and the other as indeterminacy leaning towards false membership. This paper introduces a modified form of a neutrosophic set, called Double-Valued Neutrosophic Set, which has these two distinct indeterminate values. Its related properties and axioms are (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  19.  1
    BGFS: Design and Development of Brain Genetic Fuzzy System for Data Classification.Chandrasekar Ravi & Neelu Khare - 2018 - Journal of Intelligent Systems 27 (2):231-247.
    Recently, classification systems have received significant attention among researchers due to the important characteristics and behaviors of analysis required in real-time databases. Among the various classification-based methods suitable for real-time databases, fuzzy rule-based classification is effectively used by different researchers in various fields. An important issue in the design of fuzzy rule-based classification is the automatic generation of fuzzy if-then rules and the membership functions. The literature presents different techniques for automatic fuzzy design. Among the different techniques available in the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  20.  2
    Utilization of Co-Occurrence Pattern Mining with Optimal Fuzzy Classifier for Web Page Personalization.Pappu Srinivasa Rao & Devara Vasumathi - 2018 - Journal of Intelligent Systems 27 (2):249-262.
    Several users use metasearch engines directly or indirectly to access and gather data from more than one data source. The effectiveness of a metasearch engine is majorly determined by the quality of the results it returns in response to user queries. The rank aggregation methods that have been proposed until now exploit a very limited set of parameters, such as total number of used resources and the rankings they achieved from each individual resource. In this paper, we use the fuzzy-bat (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  21.  1
    A Member Selection Model of Collaboration New Product Development Teams Considering Knowledge and Collaboration.Jiafu Su, Yu Yang & Xuefeng Zhang - 2018 - Journal of Intelligent Systems 27 (2):213-229.
    Member selection to form an effective collaboration new product development team is crucial for a successful NPD. Existing researches on member selection mostly focus on the individual attributes of candidates. However, under the background of collaboration, knowledge complementarity and collaboration performance among candidates are important but overlooked. In this paper, we propose a multi-objective optimization model for member selection of a Co-NPD team, considering comprehensively the individual knowledge competence, knowledge complementarity, and collaboration performance. Then, to solve the model, an improved (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  22.  3
    Hybrid Weighted K-Means Clustering and Artificial Neural Network for an Anomaly-Based Network Intrusion Detection System.Devara Vasumathi & Rafath Samrin - 2018 - Journal of Intelligent Systems 27 (2):135-147.
    Despite the rapid developments in data technology, intruders are among the most revealed threats to security. Network intrusion detection systems are now a typical constituent of network security structures. In this paper, we present a combined weighted K-means clustering algorithm with artificial neural network -based intrusion identification scheme. This paper comprises two modules: clustering and intrusion detection. The input dataset is gathered into clusters with the usage of WKMC in clustering module. In the intrusion detection module, the clustered information is (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  23.  1
    A Grain Output Combination Forecast Model Modified by Data Fusion Algorithm.Xiang Wan, Bing-Xiang Liu & Xing Xu - 2018 - Journal of Intelligent Systems 27 (2):303-315.
    To deal with the lack of accuracy and generalization ability in some single models, grain output models were built with lots of relevant data, based on the powerful non-linear reflection of the back-propagation neural network. Three kinds of grain output models were built and took advantage of – particle swarm optimization algorithm, mind evolutionary algorithm, and genetic algorithm – to optimize the BP neural network. By the use of data fusion algorithm, the outcomes of different models can be modified and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  24.  3
    An Efficient Medical Image Watermarking Technique in E-Healthcare Application Using Hybridization of Compression and Cryptography Algorithm.Puvvadi Aparna & Polurie Venkata Vijay Kishore - 2018 - Journal of Intelligent Systems 27 (1):115-133.
    The main objective of this paper is to propose a medical image watermarking technique in E-healthcare application based on the hybridization of compression and cryptography algorithm. Basically, the proposed system consists of two stages: watermark embedding process and watermark extraction process. In the embedding process, at first, we segment the tumor part separately using a region growing algorithm. Then, we encrypt the region of interest part using Secure Hash Algorithm-256 and encrypt the electronic health record using the elliptical curve cryptography (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  25.  3
    Introduction to the Special Issue on Recent Developments in Multimedia Watermarking Using Machine Learning.Amit Kumar Singh - 2018 - Journal of Intelligent Systems 27 (1):1-3.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  26.  2
    Novel Relevance Feedback Approach for Color Trademark Recognition Using Optimization and Learning Strategy.Latika Pinjarkar, Manisha Sharma & Smita Selot - 2018 - Journal of Intelligent Systems 27 (1):67-79.
    The trademark registration process, apparent in all organizations nowadays, deals with recognition and retrieval of similar trademark images from trademark databases. Trademark retrieval is an imperative application area of content-based image retrieval. The main challenges in designing and developing this application area are reducing the semantic gap, obtaining higher accuracy, reducing computation complexity, and subsequently the execution time. The proposed work focuses on these challenges. This paper proposes the relevance feedback system embedded with optimization and unsupervised learning technique as the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  27.  4
    Machine Learning-Based Robust Watermarking Technique for Medical Image Transmitted Over LTE Network.Ankur Rai & Harsh Vikram Singh - 2018 - Journal of Intelligent Systems 27 (1):105-114.
    This paper discusses a safe and secure watermarking technique using a machine learning algorithm. In this paper, the propagation of a watermarked image is simulated over the third-generation partnership project /long-term evolution downlink physical layer. The watermark data are scrambled and a transform domain-based hybrid watermarking technique is used to embed this watermark into the transform coefficients of the host image and transmitted over the orthogonal frequency division multiplexing downlink physical layer. Support vector machine is used as a classifier for (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  28.  1
    Medical Image Reliability Verification Using Hash Signatures and Sequential Square Encoding.J. Jennifer Ranjani & M. Babu - 2018 - Journal of Intelligent Systems 27 (1):19-30.
    Increased growth of information technology in healthcare has led to a situation where the security of patient information is more important and is a critical issue. The aim of the proposed algorithm is to provide a framework to verify the integrity of the medical images. In this paper, the integrity of the medical images is verified by embedding hash signatures using the sequential square embedding technique. This technique is as efficient as the diamond encoding technique but with increased payload capability. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  29.  1
    Combining Haar Wavelet and Karhunen-Loeve Transform for Robust and Imperceptible Data Hiding Using Digital Images.Akankasha Sharma, Amit Kumar Singh & Pardeep Kumar - 2018 - Journal of Intelligent Systems 27 (1):91-103.
    In this paper, we present an introduction of digital image watermarking followed by important characteristics and potential applications of digital watermarks. Further, recent state-of-the-art watermarking techniques as reported by noted authors are discussed in brief. It includes the performance comparison of reported transform/spatial domain based watermarking techniques presented in tabular form. This comprehensive survey will be significant for researchers who will be able to implement more efficient watermarking techniques. Moreover, we present a robust watermarking technique using fusion of discrete wavelet (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  30.  6
    A Novel Scene-Based Video Watermarking Scheme for Copyright Protection.Manisha Sharma & Dolley Shukla - 2018 - Journal of Intelligent Systems 27 (1):47-66.
    Many illegal copies of original digital videos are being made, as they can be replicated perfectly through the Internet. Thus, it is extremely necessary to protect the copyrights of the owner and prevent illegal copying. This paper presents a novel approach to digital video watermarking for copyright protection using two different algorithms, whereby successive estimation of a statistical measure was used to detect scene boundaries and watermark was embedded in the detected scenes with discrete wavelet transform. Haar wavelet was used (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  31.  2
    A Parallel Algorithm for Wavelet Transform-Based Color Image Compression.Piyush Kumar Singh, Ravi Shankar Singh & Kabindra Nath Rai - 2018 - Journal of Intelligent Systems 27 (1):81-90.
    Wavelet transforms emerge as one of the popular techniques in image compression. This technique is accepted by the JPEG Committee for the next-generation image compression standard JPEG-2000. Convolution-based strategy is widely used in calculating the wavelet transform of the image. A convolution-based wavelet transform consists of a large number of multiplications and additions. A color image consists of a two-dimensional matrix each for red, green, and blue colors. An ordinary way to calculate the wavelet transform of a color image includes (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  32.  1
    An Image Authentication Algorithm Using Combined Approach of Watermarking and Vector Quantization.Archana Tiwari & Manisha Sharma - 2018 - Journal of Intelligent Systems 27 (1):31-45.
    This paper presents a two-stage watermarking technique for image authentication adapting the advantages of vector quantization. In the proposed algorithm, robust watermark and semifragile watermark are embedded independently in two successive stages. Robust watermark and VQ enhance the security of the system by providing double protection to the designed system, while semifragile watermark helps in authenticating the received image. Watermarks of varying sizes are embedded in the cover image, and their performance is measured in terms of peak signal-to-noise ratio, weighted (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  33.  2
    Multiple Watermarking for Healthcare Applications.Aditi Zear, Amit Kumar Singh & Pardeep Kumar - 2018 - Journal of Intelligent Systems 27 (1):5-18.
    In this paper, an algorithm for multiple digital watermarking based on discrete wavelet transform, discrete cosine transform, and singular value decomposition was proposed for healthcare applications such as tele-ophthalmology, tele-medicine, tele-diagnosis, and tele-consultancy services. Multiple watermarks were used in this algorithm to reduce the consequences of medical identity thefts. In the embedding process, the cover medical image was decomposed into third-level DWT. Low-frequency bands were transformed by DCT, and then SVD was applied to DCT coefficients. Two watermarks in the form (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  34. Classification of Masses in Digital Mammograms Using the Genetic Ensemble Method.Shankar Thawkar & Ranjana Ingolikar - 2018 - Journal of Intelligent Systems.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
 Previous issues
  
Next issues