Year:

  1.  1
    An Intelligent System for Identifying Influential Words in Real-Estate Classifieds.Sherief Abdallah - 2018 - Journal of Intelligent Systems 27 (2):183-194.
    This paper focuses on the problem of quantifying how certain words in a text affect, positively or negatively, some numeric signal. These words can lead to important decisions for significant applications such as E-commerce. For example, consider the corpus of real-estate classifieds, which we developed as a case study. Each classified has a description of a real-estate property, along with simple features such as the location and the number of bedrooms. The problem then is to identify which keywords influence the (...)
    No categories
    Direct download  
     
    Export citation  
     
    My bibliography  
  2.  4
    An Extensive Review on Data Mining Methods and Clustering Models for Intelligent Transportation System.Sesham Anand, P. Padmanabham, A. Govardhan & Rajesh H. Kulkarni - 2018 - Journal of Intelligent Systems 27 (2):263-273.
    Data mining techniques support numerous applications of intelligent transportation systems. This paper critically reviews various data mining techniques for achieving trip planning in ITSs. The literature review starts with the discussion on the contributions of descriptive and predictive mining techniques in ITSs, and later continues on the contributions of the clustering techniques. Being the largely used approach, the use of cluster analysis in ITSs is assessed. However, big data analysis is risky with clustering methods. Thus, evolutionary computational algorithms are used (...)
    No categories
    Direct download  
     
    Export citation  
     
    My bibliography  
  3.  1
    Query-Specific Distance and Hybrid Tracking Model for Video Object Retrieval.C. A. Ghuge, Sachin D. Ruikar & V. Chandra Prakash - 2018 - Journal of Intelligent Systems 27 (2):195-212.
    In the area of modern intelligent systems, the retrieval process of video objects is still a challenging task because objects are usually affected by object confusion, similar appearance among objects, different posing, small size of objects, and interactions among multiple objects. In order to overcome these challenges, the video object is retrieved based on the trajectory points of the multiple-motion objects. However, if an object is in an occlusion situation, the calculation of trajectory points from the objects is considerably altered. (...)
    No categories
    Direct download  
     
    Export citation  
     
    My bibliography  
  4.  1
    Prediction Method of Railway Freight Volume Based on Genetic Algorithm Improved General Regression Neural Network.Zhi-da Guo & Jing-Yuan Fu - 2018 - Journal of Intelligent Systems 27 (2):291-302.
    Railway freight transportation is an important part of the national economy. Accurate forecast of railway freight volume is significant to the planning, construction, operation, and decision making of railways. After analyzing the application status of generalized regression neural network in the prediction method of railway freight volume, this paper improves the performance of this model by using improved neural network. In the improved method, genetic algorithm is adopted to search the optimal spread, which is the only factor of GRNN, and (...)
    No categories
    Direct download  
     
    Export citation  
     
    My bibliography  
  5.  2
    A Critical Analysis on the Security Architectures of Internet of Things: The Road Ahead.Vivek V. Jog & T. Senthil Murugan - 2018 - Journal of Intelligent Systems 27 (2):149-162.
    Internet of Things has been a most important research area for almost a decade now, where a huge network of billions or trillions of “things” communicating with one another is facing many technical and application challenges. Although there are many uncertainties about its security and privacy, the literature presents different techniques to handle the security issues and challenges in order to develop a well-defined security architecture. This paper reviews 50 research papers that are related to the security of IoT. The (...)
    No categories
    Direct download  
     
    Export citation  
     
    My bibliography  
  6.  1
    An Efficient Multiclass Medical Image CBIR System Based on Classification and Clustering.Mahabaleshwar S. Kabbur - 2018 - Journal of Intelligent Systems 27 (2):275-290.
    In this paper, we are going to present the multiclass medical image content-based image retrieval system based on classification and clustering. Images are segmented using hill climbing-based segmentation based on the extracted visual features. In the improved HCBS technique, a clustering that is based on kernel-based fuzzy C-means is employed. In the next step, features like color, texture, edge density, region area, and visual words from the segmented images are extracted. The visual word can be extracted by using the clustering (...)
    No categories
    Direct download  
     
    Export citation  
     
    My bibliography  
  7.  2
    Double-Valued Neutrosophic Sets, Their Minimum Spanning Trees, and Clustering Algorithm.Ilanthenral Kandasamy - 2018 - Journal of Intelligent Systems 27 (2):163-182.
    Neutrosophy is used to represent uncertain, indeterminate, and inconsistent information available in the real world. This article proposes a method to provide more sensitivity and precision to indeterminacy, by classifying the indeterminate concept/value into two based on membership: one as indeterminacy leaning towards truth membership and the other as indeterminacy leaning towards false membership. This paper introduces a modified form of a neutrosophic set, called Double-Valued Neutrosophic Set, which has these two distinct indeterminate values. Its related properties and axioms are (...)
    No categories
    Direct download  
     
    Export citation  
     
    My bibliography  
  8.  1
    BGFS: Design and Development of Brain Genetic Fuzzy System for Data Classification.Chandrasekar Ravi & Neelu Khare - 2018 - Journal of Intelligent Systems 27 (2):231-247.
    Recently, classification systems have received significant attention among researchers due to the important characteristics and behaviors of analysis required in real-time databases. Among the various classification-based methods suitable for real-time databases, fuzzy rule-based classification is effectively used by different researchers in various fields. An important issue in the design of fuzzy rule-based classification is the automatic generation of fuzzy if-then rules and the membership functions. The literature presents different techniques for automatic fuzzy design. Among the different techniques available in the (...)
    No categories
    Direct download  
     
    Export citation  
     
    My bibliography  
  9.  2
    Utilization of Co-Occurrence Pattern Mining with Optimal Fuzzy Classifier for Web Page Personalization.Pappu Srinivasa Rao & Devara Vasumathi - 2018 - Journal of Intelligent Systems 27 (2):249-262.
    Several users use metasearch engines directly or indirectly to access and gather data from more than one data source. The effectiveness of a metasearch engine is majorly determined by the quality of the results it returns in response to user queries. The rank aggregation methods that have been proposed until now exploit a very limited set of parameters, such as total number of used resources and the rankings they achieved from each individual resource. In this paper, we use the fuzzy-bat (...)
    No categories
    Direct download  
     
    Export citation  
     
    My bibliography  
  10.  1
    A Member Selection Model of Collaboration New Product Development Teams Considering Knowledge and Collaboration.Jiafu Su, Yu Yang & Xuefeng Zhang - 2018 - Journal of Intelligent Systems 27 (2):213-229.
    Member selection to form an effective collaboration new product development team is crucial for a successful NPD. Existing researches on member selection mostly focus on the individual attributes of candidates. However, under the background of collaboration, knowledge complementarity and collaboration performance among candidates are important but overlooked. In this paper, we propose a multi-objective optimization model for member selection of a Co-NPD team, considering comprehensively the individual knowledge competence, knowledge complementarity, and collaboration performance. Then, to solve the model, an improved (...)
    No categories
    Direct download  
     
    Export citation  
     
    My bibliography  
  11.  3
    Hybrid Weighted K-Means Clustering and Artificial Neural Network for an Anomaly-Based Network Intrusion Detection System.Devara Vasumathi & Rafath Samrin - 2018 - Journal of Intelligent Systems 27 (2):135-147.
    Despite the rapid developments in data technology, intruders are among the most revealed threats to security. Network intrusion detection systems are now a typical constituent of network security structures. In this paper, we present a combined weighted K-means clustering algorithm with artificial neural network -based intrusion identification scheme. This paper comprises two modules: clustering and intrusion detection. The input dataset is gathered into clusters with the usage of WKMC in clustering module. In the intrusion detection module, the clustered information is (...)
    No categories
    Direct download  
     
    Export citation  
     
    My bibliography  
  12.  1
    A Grain Output Combination Forecast Model Modified by Data Fusion Algorithm.Xiang Wan, Bing-Xiang Liu & Xing Xu - 2018 - Journal of Intelligent Systems 27 (2):303-315.
    To deal with the lack of accuracy and generalization ability in some single models, grain output models were built with lots of relevant data, based on the powerful non-linear reflection of the back-propagation neural network. Three kinds of grain output models were built and took advantage of – particle swarm optimization algorithm, mind evolutionary algorithm, and genetic algorithm – to optimize the BP neural network. By the use of data fusion algorithm, the outcomes of different models can be modified and (...)
    No categories
    Direct download  
     
    Export citation  
     
    My bibliography  
  13.  3
    An Efficient Medical Image Watermarking Technique in E-Healthcare Application Using Hybridization of Compression and Cryptography Algorithm.Puvvadi Aparna & Polurie Venkata Vijay Kishore - 2018 - Journal of Intelligent Systems 27 (1):115-133.
    The main objective of this paper is to propose a medical image watermarking technique in E-healthcare application based on the hybridization of compression and cryptography algorithm. Basically, the proposed system consists of two stages: watermark embedding process and watermark extraction process. In the embedding process, at first, we segment the tumor part separately using a region growing algorithm. Then, we encrypt the region of interest part using Secure Hash Algorithm-256 and encrypt the electronic health record using the elliptical curve cryptography (...)
    No categories
    Direct download  
     
    Export citation  
     
    My bibliography  
  14.  3
    Introduction to the Special Issue on Recent Developments in Multimedia Watermarking Using Machine Learning.Amit Kumar Singh - 2018 - Journal of Intelligent Systems 27 (1):1-3.
    No categories
    Direct download  
     
    Export citation  
     
    My bibliography  
  15.  1
    Novel Relevance Feedback Approach for Color Trademark Recognition Using Optimization and Learning Strategy.Latika Pinjarkar, Manisha Sharma & Smita Selot - 2018 - Journal of Intelligent Systems 27 (1):67-79.
    The trademark registration process, apparent in all organizations nowadays, deals with recognition and retrieval of similar trademark images from trademark databases. Trademark retrieval is an imperative application area of content-based image retrieval. The main challenges in designing and developing this application area are reducing the semantic gap, obtaining higher accuracy, reducing computation complexity, and subsequently the execution time. The proposed work focuses on these challenges. This paper proposes the relevance feedback system embedded with optimization and unsupervised learning technique as the (...)
    No categories
    Direct download  
     
    Export citation  
     
    My bibliography  
  16.  4
    Machine Learning-Based Robust Watermarking Technique for Medical Image Transmitted Over LTE Network.Ankur Rai & Harsh Vikram Singh - 2018 - Journal of Intelligent Systems 27 (1):105-114.
    This paper discusses a safe and secure watermarking technique using a machine learning algorithm. In this paper, the propagation of a watermarked image is simulated over the third-generation partnership project /long-term evolution downlink physical layer. The watermark data are scrambled and a transform domain-based hybrid watermarking technique is used to embed this watermark into the transform coefficients of the host image and transmitted over the orthogonal frequency division multiplexing downlink physical layer. Support vector machine is used as a classifier for (...)
    No categories
    Direct download  
     
    Export citation  
     
    My bibliography  
  17.  1
    Medical Image Reliability Verification Using Hash Signatures and Sequential Square Encoding.J. Jennifer Ranjani & M. Babu - 2018 - Journal of Intelligent Systems 27 (1):19-30.
    Increased growth of information technology in healthcare has led to a situation where the security of patient information is more important and is a critical issue. The aim of the proposed algorithm is to provide a framework to verify the integrity of the medical images. In this paper, the integrity of the medical images is verified by embedding hash signatures using the sequential square embedding technique. This technique is as efficient as the diamond encoding technique but with increased payload capability. (...)
    No categories
    Direct download  
     
    Export citation  
     
    My bibliography  
  18.  1
    Combining Haar Wavelet and Karhunen-Loeve Transform for Robust and Imperceptible Data Hiding Using Digital Images.Akankasha Sharma, Amit Kumar Singh & Pardeep Kumar - 2018 - Journal of Intelligent Systems 27 (1):91-103.
    In this paper, we present an introduction of digital image watermarking followed by important characteristics and potential applications of digital watermarks. Further, recent state-of-the-art watermarking techniques as reported by noted authors are discussed in brief. It includes the performance comparison of reported transform/spatial domain based watermarking techniques presented in tabular form. This comprehensive survey will be significant for researchers who will be able to implement more efficient watermarking techniques. Moreover, we present a robust watermarking technique using fusion of discrete wavelet (...)
    No categories
    Direct download  
     
    Export citation  
     
    My bibliography  
  19.  5
    A Novel Scene-Based Video Watermarking Scheme for Copyright Protection.Manisha Sharma & Dolley Shukla - 2018 - Journal of Intelligent Systems 27 (1):47-66.
    Many illegal copies of original digital videos are being made, as they can be replicated perfectly through the Internet. Thus, it is extremely necessary to protect the copyrights of the owner and prevent illegal copying. This paper presents a novel approach to digital video watermarking for copyright protection using two different algorithms, whereby successive estimation of a statistical measure was used to detect scene boundaries and watermark was embedded in the detected scenes with discrete wavelet transform. Haar wavelet was used (...)
    No categories
    Direct download  
     
    Export citation  
     
    My bibliography  
  20.  2
    A Parallel Algorithm for Wavelet Transform-Based Color Image Compression.Piyush Kumar Singh, Ravi Shankar Singh & Kabindra Nath Rai - 2018 - Journal of Intelligent Systems 27 (1):81-90.
    Wavelet transforms emerge as one of the popular techniques in image compression. This technique is accepted by the JPEG Committee for the next-generation image compression standard JPEG-2000. Convolution-based strategy is widely used in calculating the wavelet transform of the image. A convolution-based wavelet transform consists of a large number of multiplications and additions. A color image consists of a two-dimensional matrix each for red, green, and blue colors. An ordinary way to calculate the wavelet transform of a color image includes (...)
    No categories
    Direct download  
     
    Export citation  
     
    My bibliography  
  21.  1
    An Image Authentication Algorithm Using Combined Approach of Watermarking and Vector Quantization.Archana Tiwari & Manisha Sharma - 2018 - Journal of Intelligent Systems 27 (1):31-45.
    This paper presents a two-stage watermarking technique for image authentication adapting the advantages of vector quantization. In the proposed algorithm, robust watermark and semifragile watermark are embedded independently in two successive stages. Robust watermark and VQ enhance the security of the system by providing double protection to the designed system, while semifragile watermark helps in authenticating the received image. Watermarks of varying sizes are embedded in the cover image, and their performance is measured in terms of peak signal-to-noise ratio, weighted (...)
    No categories
    Direct download  
     
    Export citation  
     
    My bibliography  
  22.  1
    Multiple Watermarking for Healthcare Applications.Aditi Zear, Amit Kumar Singh & Pardeep Kumar - 2018 - Journal of Intelligent Systems 27 (1):5-18.
    In this paper, an algorithm for multiple digital watermarking based on discrete wavelet transform, discrete cosine transform, and singular value decomposition was proposed for healthcare applications such as tele-ophthalmology, tele-medicine, tele-diagnosis, and tele-consultancy services. Multiple watermarks were used in this algorithm to reduce the consequences of medical identity thefts. In the embedding process, the cover medical image was decomposed into third-level DWT. Low-frequency bands were transformed by DCT, and then SVD was applied to DCT coefficients. Two watermarks in the form (...)
    No categories
    Direct download  
     
    Export citation  
     
    My bibliography  
 Previous issues
  
Next issues