item: #1 of 981 id: ijccc-10 author: Sun, Weifeng; Zhang, Peng; Qin, Zhenquan; Chen, Yuanfang; Teng, Da title: A Tight Coupling Cooperation Scheme with QoS Provisioning in WiFi/WiMAX Networks date: 2013-06-02 words: 4045 flesch: 60 summary: (7) • WFW processing module: this module is used to receive the mutual require-grant-confirm information between the WiMAX and WiFi MAC layer, and then delivers the related information to the other side. • WiFi Request Queue (WRQ), WiFi Available Queue (WAQ), and WiFi Grant/Confirm Queue (WGCQ): WRQ is used to store query information generated by WiFi MAC layer; WAQ is used to record the location information of the available time slots; WGCQ is used to store the grant and confirm information in responding to the neighbors. keywords: cooperation; dsch; grant; information; network; performance; scheme; wifi; wimax cache: ijccc-10.pdf plain text: ijccc-10.txt item: #2 of 981 id: ijccc-1013 author: Albu, Răzvan-Daniel; Dzitac, Ioan; Popentiu-Vlădicescu, Florin; Naghiu, Iuliana Maria title: Input Projection Algorithms Influence in Prediction and Optimization of QoS Accuracy date: 2014-02-28 words: 3631 flesch: 49 summary: Consequently, in this research work we have studied four input projections algorithms, in order to determine which one increases the prediction accuracy of a Multi-Layer Perceptron (MLP) with two hidden layers, trained with web services large data. The InputProjectionAxon will apply either linear or non-linear transformation to convert n input data set into m input data set, where n>=m. keywords: algorithm; data; input; optimization; prediction; projection; qos; rtmatrix; services; web cache: ijccc-1013.pdf plain text: ijccc-1013.txt item: #3 of 981 id: ijccc-1015 author: Dadelo, Stanislav; Krylovas, Aleksandras; Kosareva, Natalja; Zavadskas, Edmundas Kazimieras; Dadeliene, Ruta title: Algorithm of Maximizing the Set of Common Solutions for Several MCDM Problems and it’s Application for Security Personnel Scheduling date: 2014-02-28 words: 4017 flesch: 63 summary: [3] and for private security this process takes on a deeper meaning. Assessing the activities of private security, their complexity and the peculiarities of the hazard, the following complexity – hazard levels are distinguished: 1) protection of civil objects; 2) protection of critical and strategic objects, collection, and personal protection keywords: criteria; evaluation; guards; personnel; security cache: ijccc-1015.pdf plain text: ijccc-1015.txt item: #4 of 981 id: ijccc-1016 author: Dai, Liang; Xu, Hongke; Chen, Ting; Chao, Qian; Xie, Lijing title: A Multi-objective Optimization Algorithm of Task Scheduling in WSN date: 2014-02-28 words: 4994 flesch: 52 summary: The primary objective of task scheduling in wireless sensor networks is to find an optimal strategy of splitting the original tasks received by SINK into a number of sub-tasks as well as distributing these sub-tasks to the sensors in the right order. The directed acyclic graph [1], independent task sets[2] and divisible load theory [3] are usually used as modeling tools for task scheduling in wireless sensor networks, but these models only take the makespan as the main objective, and assign the task to sensors. keywords: algorithm; consumption; energy; networks; objective; optimization; scheduling; sensor; task; task scheduling; wireless cache: ijccc-1016.pdf plain text: ijccc-1016.txt item: #5 of 981 id: ijccc-1017 author: Tang, Chengpei title: Comprehensive Energy Efficient Algorithm for WSN date: 2014-02-28 words: 3473 flesch: 74 summary: (c2 − f2N)2.(8) Where, ci(i = 1,2) is the number of nodes in domain i. fi would be determined as the following: fi = Mi M ,i = (1,2).(9) Where, Mi is the expectation of number of cluster nodes in domain i. Cluster nodes send data or information to sink nodes, if need multi-hop would adopt this algorithm to find the nearest path. keywords: algorithm; ant; cluster; energy; head; leach; network; node; path cache: ijccc-1017.pdf plain text: ijccc-1017.txt item: #6 of 981 id: ijccc-102 author: Balanica, Victor; Dumitrache, Ioan; Preziosi, Luigi title: Breast cancer diagnosis based on spiculation feature and neural network techniques date: 2013-06-02 words: 4537 flesch: 34 summary: [3] computes a spiculation index that can classify tumours with 93% accuracy; [4] proposes three methods for morfological feature extraction and reaches 93% accuracy when classifying breast lesions; [5] explores the classification power of 6 contour algorithms on 349 masses using three popular classifiers (Bayesian Classifier, Fisher Linear Discriminant Analysis and Support Vector Machine) and shows that a big variation (14%) of the quality of the segmentation method influences only 4% of the classification performance given by the contour features. Keywords: breast cancer, spiculation feature extraction, neural network, diagnosis. keywords: breast; contour; feature; figure; lesion; malignant; neural; number; spiculation cache: ijccc-102.pdf plain text: ijccc-102.txt item: #7 of 981 id: ijccc-1074 author: Filip, Florin Gheorghe; Dzitac, Ioan title: Editorial Challenge: From a Quarterly to a Bimonthly Journal date: 2012-12-01 words: 835 flesch: 51 summary: To differentiate from other similar journals, the editorial policy of IJCCC encourages the submission of scientific papers that focus on the integration of the 3 C (Computing, Communication, Control). This decreasing of the last impact factor can be explained by increasing of the number of published papers in issue 5 (December, 2010). keywords: ijccc; issue; journal cache: ijccc-1074.pdf plain text: ijccc-1074.txt item: #8 of 981 id: ijccc-1075 author: Babarogić, Sladjan; Makajić-Nikolić, Dragana; Lečić-Cvetković, Danica; Atanasov, Nikola title: Multi-period Customer Service Level Maximization under Limited Production Capacity date: 2012-12-01 words: 4340 flesch: 57 summary: 1 Introduction The distribution of available finished products among customer orders requires an efficient distribution system aimed at improving the effectiveness of the entire business. Traditional approaches to fulfil orders based on the make-to-stock (MTS) production system are described in [1] by tak- ing into account the available supplies of finished products to satisfy customer orders following the principle of First Come - First Served (FCFS) without assigning priorities to customers and orders. keywords: algorithm; customer; customer service; demand; group; model; production; service level cache: ijccc-1075.pdf plain text: ijccc-1075.txt item: #9 of 981 id: ijccc-1076 author: Brumar, Cristina I.; Fabian, Ralf D.; Manolescu, Misu-Jan; Chis, Violeta title: Memetic Engineering for Permanent Education in Line with Sustainable Growth date: 2012-12-01 words: 4835 flesch: 39 summary: [19], [16], [20], [6] has been continued in line with the following objectives: a) adapting memetic engineering expressed in terms of General System Theory to the teaching component of permanent education based on Bounded Rationality and Just-in-Time as key tools for fighting cognitive chaoplexity in post-industrial era [16]; b) facilitating the use of memetic engineering based on his double faceted nature: as negative feedback (through memetic stability) and positive feedback (through intense spreading of memes); c) extending the applicability of memetic engineering from myths and metaphors, including (paleo)linguistics [16], to ecology as source of memes; d) exemplifying the above in primitive metamodels applying memetic engineering in ecology and highlighting the relevant design-space dimensions. Hence, the research about the role of permanent education for sustainable growth as well as Memetic Engineering for Permanent Education in Line with Sustainable Growth 809 the role of memetic engineering in permanent education keywords: ecology; education; engineering; environment; feedback; growth; learning; memes; rationality; stability; teaching; time cache: ijccc-1076.pdf plain text: ijccc-1076.txt item: #10 of 981 id: ijccc-1084 author: Kaplinski, Oleg; Peldschus, Friedel; Tupenaite, Laura title: Development of MCDM Methods — in Honour of Professor Edmundas Kazimieras Zavadskas on the Occasion of His 70th Birthday date: 2014-04-04 words: 3483 flesch: 33 summary: Professor E. K. Zavadskas continuously develops new and researches existing MCDM methods for further improvements. Professor E. K. Zavadskas, in collaboration with his colleagues, has also developed hybrid deci- sion making methods by combining MCDM methods TOPSIS, SAW, ELECTRE, AHP and the methods proposed by the Professor (see, i.e. [40] – [45]). keywords: construction; criteria; decision; e.k; mcdm; methods; professor; zavadskas cache: ijccc-1084.pdf plain text: ijccc-1084.txt item: #11 of 981 id: ijccc-1085 author: Zhao, Shuai; Zhang, Yang; Cheng, Bo; Chen, Jun-liang title: A Feedback-corrected Collaborative Filtering for Personalized Real-world Service Recommendation date: 2014-04-04 words: 5790 flesch: 54 summary: As the user-received performance of service is tightly related to the personalized information of specific users, identifying the optimal one for service users is difficult and costly in the case of many services with equivalent functions. In order to address these issues, this paper proposes a novel similarity-measurement for com- puting the similarity between service users and introduces a new personalized recommendation approach for real-world service based on collaborative filtering, which named feedback-corrected Tan-NED (Tanimoto Normalized Euclidean Distance). keywords: feedback; matrix; ned; prediction; qos; recommendation; service; similarity; tan; user; value cache: ijccc-1085.pdf plain text: ijccc-1085.txt item: #12 of 981 id: ijccc-111 author: Mathana, J. Magdalene; Badrinarayanan, S.; Rani Hemamalini, R. title: VLSI Architecture for High Performance 3GPP Interleaver/Deinterleaver for Turbo Codes date: 2014-02-28 words: 4112 flesch: 57 summary: This is called pruning of the interleaver and is needed for the case when interleaver block size is not exactly equal to R*C. The presented hardware in [6] enables the mapping of vital types of interleavers including multiple block interleavers and convolutional interleaver onto a single ar- chitecture. keywords: architecture; block; computation; data; hardware; phase; turbo cache: ijccc-111.pdf plain text: ijccc-111.txt item: #13 of 981 id: ijccc-112 author: Ang, Chun Kit; Tang, Sai Hong; Mashohor, Syamsiah; Arrifin, Mohd Khairol Anuar Mohd title: Solving Continuous Trajectory and Forward Kinematics Simultaneously Based on ANN date: 2014-04-04 words: 3329 flesch: 71 summary: 2 Preliminaries Forward kinematics (FK) can be used to determined the position and orientation of a robot’s hand if all the configurations are known and the equations can be derived by using Denavit- Hartenberg (DH) method because it is the standard way of modelling the robot motion due to its simplicity of modelling robot links and joints that is applicable for any robot configuration s regardless of its complexity. The theoretical results which obtained by using conventional FK and high order polynomial trajectory were compared to the artificial neural network (ANN) results. keywords: kinematics; link; robot; trajectory cache: ijccc-112.pdf plain text: ijccc-112.txt item: #14 of 981 id: ijccc-116 author: Kahloul, Laid; Grira, Messaouda title: Formal Specification and Verification of Mobile Agent Systems date: 2014-04-04 words: 4693 flesch: 58 summary: Formal Specification and Verification of Mobile Agent Systems L. Kahloul, M. Grira Laid Kahloul* LINFI Laboratory, Computer Science Department, University of Biskra, Biskra, 07000, Algeria *Corresponding author: kahloul2006@yahoo.fr Messaouda Grira Computer Science Department, University of Biskra Biskra, 07000, Algeria Abstract: Mobile agent systems offer efficiency and flexibility as a design paradigm. This paper presents a formal specification and verification of mobile agent systems using the High Order π-calculus. keywords: agent; calculus; mobile; service; slp; specification; spin; systems; uppaal; verification cache: ijccc-116.pdf plain text: ijccc-116.txt item: #15 of 981 id: ijccc-1165 author: Ergu, Daji; Kou, Gang; Peng, Yi; Yang, Xinfeng title: Simulation Experiments for Improving the Consistency Ratio of Reciprocal Matrices date: 2014-06-15 words: 3942 flesch: 55 summary: Modifying inconsistent comparison matrix in analytic hierarchy process: The goal of this paper is to conduct simulation experiments by randomly generating millions numbers of reciprocal matrices with different orders in order to validate the effectiveness of the induced bias matrix model. keywords: consistency; matrices; matrix; number; order; simulation cache: ijccc-1165.pdf plain text: ijccc-1165.txt item: #16 of 981 id: ijccc-1166 author: Popescu, Daniela; Dodescu, Anca; Filip, Petru title: Cloud Service Management System for Innovative Clusters. Application for North-West Region of Romania date: 2014-06-15 words: 4459 flesch: 28 summary: Realizing that technological progress is at the heart of regional development and decision-makers could support the development of technology clusters towards transforming them into regional innovative clusters, the application of our proposal aims to overcome existing bottlenecks in terms of business strategies and regional development policies in the North-West region of Romania. The most common response is by stimulating both innovation and entrepreneurship through innovative regional clusters [22], [23]]. keywords: cloud; clusters; csms; development; management; north; region; romania; service; system; west cache: ijccc-1166.pdf plain text: ijccc-1166.txt item: #17 of 981 id: ijccc-1167 author: Rehman, Zobia; Kifor, Stefania title: A Conceptual Architecture of Ontology Based KM System for Failure Mode and Effects Analysis date: 2014-06-15 words: 4019 flesch: 43 summary: This system was helpful for intelligent inquiry and reasoning from FMEA knowledge in order to make decisions timely, to handle qual- ity issues in manufacturing process. As ontologies use common understanding of concepts of a domain this is why FMEA knowledge stored in ontology will be general, comprehensive, machine readable and explicit. keywords: analysis; domain; failure; fmea; knowledge; management; ontology; risk; systems cache: ijccc-1167.pdf plain text: ijccc-1167.txt item: #18 of 981 id: ijccc-1168 author: Wang, Shigang; Li, Yingsong; Wu, Yi title: Observer-Based Non-Fragile Passive Control for Uncertain Nonlinear Sampled-Data System with Time-Delay date: 2014-06-15 words: 5334 flesch: 83 summary: R ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ 0 R ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ 0 keywords: control; data; non; observer; system; time cache: ijccc-1168.pdf plain text: ijccc-1168.txt item: #19 of 981 id: ijccc-1169 author: Wang, Ya-Wen; Xing, Ying; Gong, Yun-Zhan; Zhang, Xu-Zhou title: Optimized Branch and Bound for Path-wise Test Data Generation date: 2014-06-15 words: 5653 flesch: 61 summary: Experimental results prove the effectiveness of the optimized branching and bounding operations, and show that the proposed method outperformed some other methods used in test data generation. Keywords: test data generation, constraint satisfaction problem, branch and bound, state space search. keywords: bfs; branching; data; generation; methods; path; search; space; state; test; variables cache: ijccc-1169.pdf plain text: ijccc-1169.txt item: #20 of 981 id: ijccc-118 author: Kahloul, Laid; Chaoui, Allaoua; Djouani, Karim title: Modelling and Analysis of Mobile Computing Systems: An Extended Petri Nets Formalism date: 2015-02-15 words: 5800 flesch: 66 summary: State-transition based methods can be found in extensions of Petri nets model. Using Petri nets, one can analyse behavioural or structural properties of a system. keywords: mobile; mobility; model; nets; petri; reconfigurable; systems; transition cache: ijccc-118.pdf plain text: ijccc-118.txt item: #21 of 981 id: ijccc-12 author: Wu, Yahui; Deng, Su; Huang, Hongbin; Deng, Yiqi title: Performance Analysis of Epidemic Routing in Delay Tolerant Networks with Overlapping Communities and Selfish Nodes date: 2013-09-17 words: 5516 flesch: 69 summary: Abstract: Routing algorithms in delay tolerant networks (DTN) adopt the store- carry-forward way, and this needs the nodes to work in a cooperative way. [3] W. Gao, Q. Li, B. Zhao and G. Cao, Multicasting in delay tolerant networks: a social network perspective, In Proc. keywords: data; delay; networks; nodes; selfish; state cache: ijccc-12.pdf plain text: ijccc-12.txt item: #22 of 981 id: ijccc-1274 author: Baban, Marius; Baban, Calin Florin; Bungau, Constantin; Dragomir, George; Pancu, Rares Mihai title: Estimation of the Technical State of Automotive Disc Brakes Using Fuzzy Logic date: 2014-08-05 words: 2696 flesch: 51 summary: Keywords: disc brake, temperature, vibration, thickness variation, fuzzy logic ap- proach. Such replacement can occur even if maximum wear is not reached, which leads to higher exploitation costs due to unused of disc brakes for their entire lifetime. keywords: brake; disc; estimation; logic; state; system cache: ijccc-1274.pdf plain text: ijccc-1274.txt item: #23 of 981 id: ijccc-1275 author: Donoso, Yezid; Lozano-Garzon, Carlos; Camelo, Miguel; Vila, Pere title: A Fairness Load Balancing Algorithm in HWN Using a Multihoming Strategy date: 2014-08-05 words: 6653 flesch: 53 summary: miguel.camelo@udg.edu, pere.vila@udg.edu Abstract: Due to the growth of the number of intelligent devices and the broadband requirements, between others technical requirements, of the new applications, suppose a new challenge in planning, maintenance and resource allocation in mobile networks for the telecommunication operators. 0.531 300 0.659 0.341 0.515 0.485 400 0.624 0.376 0.589 0.411 500 0.682 0.278 0.646 0.316 600 0.709 0.273 0.686 0.296 700 0.783 0.210 0.712 0.282 800 0.815 0.183 0.758 0.240 900 0.829 0.171 0.781 0.219 1000 0.860 0.140 0.737 0.203 Table 7: Computed Jain’s Index: Round Robin and Least Connected Algorithms 566 Y. Donoso, C. Lozano-Garzon, M. Camelo, P. Vila Figure 3: Effectiveness of the proposed algorithm Figure 4: Relative error of the proposed algorithm Table 8: Final network load and the computed Jain’s Index for the instances of 30, 500 and 1000 mobiles Number of Mobiles 30 500 1000 Network PA RR LC PA RR LC PA RR LC HSPA 2.14% 5.22% 11.31% 24.83% 96.08% 99.89% 48.89% 93.81% 99.11% HSPA+ 1.52% 1.90% 1.78% 23.80% 32.72% 41.53% 48.25% 76.98% 70.10% WIMAX 1.74% 3.07% 2.53% 24.22% 39.37% 67.36% 47.89% 90.36% 99.63% LTE 1.35% 0.70% 0.50% 23.89% 14.57% 6.01% 48.16% 29.38% 19.41% EDGE 3.23% 68.75% 48.96% 43.75% 45.83% 94.79% 54.08% 54.17% 98.96% WiFi N 1.36% 0.99% 0.70% 24.18% 12.46% 5.36% 48.26% 29.07% 14.02% WiFi G 1.35% 0.74% 0.61% 24.18% 27.11% 28.72% 48.01% 55.69% 99.27% Jain-s Index 89.05% 19.84% 24.84% 93.94% 68.23% 64.61% 99.82% 86.01% 79.73% A Fairness Load keywords: algorithm; allocation; balancing; hspa; load; mobile; multihoming; networks; services; wimax cache: ijccc-1275.pdf plain text: ijccc-1275.txt item: #24 of 981 id: ijccc-1276 author: Gu, Lichuan; Wang, Chengji; Zhang, Youhua; Zhong, Jinqin; Ni, Zhiwei title: Trust Model in Cloud Computing Environment Based on Fuzzy Theory date: 2014-08-05 words: 4739 flesch: 61 summary: 580 L. Gu, J. Zhong, C. Wang, Z. Ni, Y. Zhang Figure 8: Trust value of four types with different number of transactions Figure 9: The ratio of successful execution with different numbers of tasks Trust Model in Cloud Computing Environment Based on Fuzzy Theory 581 Figure 10: Average schedule length with different numbers of tasks 5 Conclusion In this paper, we proposed a trust model in cloud computing environment. Keywords: Trust model, fuzzy theory, cloud computing. keywords: cloud; cloud computing; computing; environment; evaluation; figure; model; service; tpm; trust; user; value cache: ijccc-1276.pdf plain text: ijccc-1276.txt item: #25 of 981 id: ijccc-1277 author: Kuchta, Dorota; Skorupka, Dariusz title: Choice of Countermeasures in Project Risk Management Using Fuzzy Modelling date: 2014-08-05 words: 4187 flesch: 67 summary: What is more, nowhere in the literature the notion of risk levels (e.g. project level, closest environment level, further environment level, national level, international level etc., introduced in [8]) and the effort linked to an effective application of countermeasures on each of the different levels are combined with the choice of risk countermeasures, and this is done in the present paper. Keywords: project risk, risk mitigation, risk transfer, risk elimination, fuzzy logic- based optimisation. keywords: l k; level; project; risk cache: ijccc-1277.pdf plain text: ijccc-1277.txt item: #26 of 981 id: ijccc-1278 author: Oddershede, Astrid M.; Córdova, Felisa M.; Carrasco, Rolando; Watkins, Francisco J. title: Decision Model for Assessing Healthcare ICT Support Implications: User Perception date: 2014-08-05 words: 3326 flesch: 39 summary: Then, simulations are ran increasing the number of ICT network user, formulating scenarios, varying the number of users and/or varying the links (Ethernet connections) between workstations and switches, to obtain the point to point throughput in bits/secs. A pilot study has been carried out collecting data from health Institutions in Chile (private, public, regional) to examine ICT infrastructure, ICT network provision and stakeholders perception related to ICT network system. keywords: ahp; applications; health; healthcare; ict; network; service; support; system; user cache: ijccc-1278.pdf plain text: ijccc-1278.txt item: #27 of 981 id: ijccc-1279 author: Shao, Fei; Cheng, Binghua title: Optimal Routing Strategy Based on Specifying Shortest Path date: 2014-08-05 words: 3586 flesch: 68 summary: The definition of our routing strategies (the SSS routing strategy and the SSD routing strategy) is shown in Tab.1. However, the gap among the SHT and SSS and SSD routing strategies is narrowed. keywords: network; node; routing; routing strategy; strategies; strategy cache: ijccc-1279.pdf plain text: ijccc-1279.txt item: #28 of 981 id: ijccc-1280 author: Wei, Xianmin; Han, Liqi; Hong, Lu title: A Modified Ant Colony Algorithm for Traveling Salesman Problem date: 2014-08-05 words: 3560 flesch: 56 summary: The process of applying ACO algorithm for TSP can be described as follows. [19] provided the theoretical convergence analysis on the traditional ACO, and proved the feasibility of applying ACO algorithm for TSP. keywords: aco; algorithm; ant; belief; colony; population; problem; space cache: ijccc-1280.pdf plain text: ijccc-1280.txt item: #29 of 981 id: ijccc-1310 author: Bernataviciene, Jolita; Dzemyda, Gintautas; Bazilevicius, Gediminas; Medvedev, Viktor; Marcinkevicius, Virginijus; Treigys, Povilas title: Method for Visual Detection of Similarities in Medical Streaming Data date: 2014-11-17 words: 6812 flesch: 59 summary: [14] is the most widely used technique for comparison of time series data, where extensive a priori knowledge is not available. There are many topics in time series data mining, i.e., similarity search, clustering, classification, anomaly detection, motif discovery, etc. keywords: analysis; data; measures; multivariate; sample; series; similarity; subsequences; time; time series cache: ijccc-1310.pdf plain text: ijccc-1310.txt item: #30 of 981 id: ijccc-1333 author: Zhang, Weiping; Thurow, Kerstin; Stoll, Regina title: A Context-Aware mHealth System for Online Physiological Monitoring in Remote Healthcare date: 2015-11-16 words: 5945 flesch: 45 summary: Kurtosis is any measure of the peakedness of the prob- ability distribution of acceleration sensor data, an important statistical characteristic. Then, classification training for sensor data should be carried out under a different activity status. keywords: acceleration; activity; context; data; domain; information; mhealth; monitoring; patient; rate; running; sensor; system; time; walking cache: ijccc-1333.pdf plain text: ijccc-1333.txt item: #31 of 981 id: ijccc-1336 author: Cioca, Marius; Buraga, Sabin-Corneliu; Cioranu, Cosmin title: Disaster Prevention Integrated into Commonly Used Web Rendered Systems with GIS Capabilities date: 2014-09-13 words: 3064 flesch: 47 summary: The progress in decision-making theory and decision support systems have determined the emergence of methods Copyright c⃝ 2006-2012 by CCC Publications Disaster Prevention Integrated into Commonly Used Web Rendered Systems with GIS Capabilities 817 and tools that can assist the decision-maker in making the most adequate decisions. [14] - the server software requirements are the following: a. Operation system: Linux Based -provides very good stability in terms of security and performance; b. Programming language: PHP 5.x; c. SGBD: MySQL 5.x; d. Web Server WEB : Apache 2.x; e. GDAL and ImageMagick for data display. keywords: data; decision; disaster; elements; figure; impact; information; making; system cache: ijccc-1336.pdf plain text: ijccc-1336.txt item: #32 of 981 id: ijccc-1337 author: Danubianu, Mirela; Pentiuc, Stefan Gheorghe; Danubianu, Dragos Mircea title: Data Dimensionality Reduction for Data Mining: A Combined Filter-Wrapper Framework date: 2014-09-13 words: 3405 flesch: 44 summary: Sampling and filtering reduce the number of cases in a dataset, whereas features reduction can be achieved by feature selection. This paper aims to present a combined method for feature selection, where a filter based on correlation is applied on whole features set to find the relevant ones, and then, on these features a wrapper is applied in order to find the best features subset for a specified predictor. keywords: data; feature; mining; process; selection; set; wrapper cache: ijccc-1337.pdf plain text: ijccc-1337.txt item: #33 of 981 id: ijccc-1338 author: Gí®fu, Daniela; Cristea, Dan title: Public Discourse Semantics. A Method of Anticipating Economic Crisis date: 2014-09-13 words: 3651 flesch: 44 summary: A Method of Anticipating Economic Crisis 837 Figure 2: Difference between the occurrence of semantic classes in BNR editorials: one year before the economic recession versus three months before. used the DAT feature of performing comparative studies. We could say that BNR is caution to push too much on the distress pedal, because its voice could influence the fixing and, by that, worsen 838 D. Gîfu, D. Cristea Figure 3: Difference between the occurrence of semantic classes in BNR editorials: one year before the economic recession versus one month after the economic recession. keywords: analysis; classes; crisis; dat; discourse; language; public; text cache: ijccc-1338.pdf plain text: ijccc-1338.txt item: #34 of 981 id: ijccc-1339 author: Gí®rbacia, Florin; Beraru, Andreea; Talabă, Doru; Mogan, Gheorghe title: Visual Depth Perception of 3D CAD Models in Desktop and Immersive Virtual Environments date: 2014-09-13 words: 3621 flesch: 44 summary: From the performed experiment, we can emphasize that the perception of CAD model depth is significantly influenced by the stereoscopic visualization. The conclusion drawn from this experiment is that the precision of depth estimation for stereoscopic viewing is lower for CAD models with small depth values, but increases significantly when CAD models depth value is higher. keywords: cad; cad models; cave; depth; models; perception; system; visualization cache: ijccc-1339.pdf plain text: ijccc-1339.txt item: #35 of 981 id: ijccc-134 author: Korac, Vanja Miomir; Kratica, Jozef; Savić, Aleksandar title: An Improved Genetic Algorithm for the Multi Level Uncapacitated Facility Location Problem date: 2013-11-11 words: 4433 flesch: 53 summary: Established facilities are: f2 on the first and f3, f5 on the second level. Now, for any individual, through its genetic code, string of established facilities is given. keywords: costs; facilities; facility; instances; level; problem cache: ijccc-134.pdf plain text: ijccc-134.txt item: #36 of 981 id: ijccc-1340 author: Hancu, Lucian title: Strategic Decision Models Cross-Validation by Use of Decision Reports Information Extraction date: 2014-09-13 words: 3647 flesch: 42 summary: It is analyzed the context of such transactions - the Italian economy in the analyzed period, in which the small and medium entities occupy a large percentage of the total amount of business entities. A special role in these transactions are occupied by investment funds, business entities that acquire several percentages of companies, develop a new business, then sell the company to a third-party investor. keywords: acquisitions; boosting; business; decision; entities; mergers; model cache: ijccc-1340.pdf plain text: ijccc-1340.txt item: #37 of 981 id: ijccc-1344 author: Lozano-Garzon, Carlos; Ariza-Porras, Christian; Rivera-Dí­az, Sebastií¡n; Riveros-Ardila, Horacio; Donoso, Yezid title: Mobile Network QoE-QoS Decision Making Tool for Performance Optimization in Critical Web Service date: 2014-09-13 words: 3422 flesch: 39 summary: Figure 4: Relationship between the QoE assesment calculated and the test user to the video 7 Conclusions and Future Works In conclusion, through the decision making tool developed the mobile telecom operators could estimate the users’ subjective opinion based in network QoS parameters. Associated with the conceptualization of QoS Harry in [2] defines three concepts of QoS: intrinsic QoS perceived QoS and evaluated QoS, the definite relationship between these three concepts are general QoS model proposed by the ITU-T. Copyright c⃝ 2006-2012 by CCC Publications Mobile Network QoE-QoS Decision Making Tool for Performance Optimization in Critical Web Service 893 Stankiewicz, Cholda, & Jajszczyk in [3] describes the intrinsic QoS, it is known as network performance by the ITU and ETSI in Recommendation E.800, it covers all the features of service determined by the efficiency of the network. keywords: experience; making; mobile; network; qoe; qos; quality; service; tool cache: ijccc-1344.pdf plain text: ijccc-1344.txt item: #38 of 981 id: ijccc-1348 author: Munteanu, Victor Ion; FortiÅŸ, Teodor-Florin; Copie, Adrian title: Building a Cloud Governance Bus date: 2014-09-14 words: 2846 flesch: 50 summary: Cloud governance is complementary to cloud management through the services it provides. V.Pârvan 4 E-mail: vmunteanu@info.uvt.ro, fortis@info.uvt.ro adrian.copie@info.uvt.ro Abstract: Thought still at its first steps, cloud governance lays the foundation upon which business innovations can be built. keywords: architecture; bus; cloud; esb; governance; integration; management; service; system cache: ijccc-1348.pdf plain text: ijccc-1348.txt item: #39 of 981 id: ijccc-1350 author: Niño-Ruiz, Elias D. title: Evolutionary Algorithm based on the Automata Theory for the Multi-objective Optimization of Combinatorial Problems date: 2014-09-14 words: 3180 flesch: 60 summary: However, for the last test, all the algorithms have different solutions sets of non-dominated solutions, and those form the optimal solution set. Guess with dominated solutions. keywords: algorithm; combinatorial; objective; optimization; set; solutions cache: ijccc-1350.pdf plain text: ijccc-1350.txt item: #40 of 981 id: ijccc-1351 author: Oddershede, Astrid M.; Quezada, Luis E.; Cordova, Felisa M.; Carrasco, Rolando A. title: Decision Support for Healthcare ICT Network System Appraisal date: 2014-09-14 words: 3377 flesch: 41 summary: 2 Conceptual Model for Healthcare Service ICT Network A conceptual model is proposed for health ICT network system evaluation connecting QoS user perception (qualitative) with QoS technical aspects, (parameters, and network performance). This paper focuses on the second stage, which is the development of a model for evalu- ating ICT healthcare network quality of service (QoS) integrating user perception. keywords: applications; health; healthcare; ict; network; performance; qos; service; user cache: ijccc-1351.pdf plain text: ijccc-1351.txt item: #41 of 981 id: ijccc-1352 author: Radosav, Dragica; Brtka, Eleonora; Brtka, Vladimir title: Mining Association Rules from Empirical Data in the Domain of Education date: 2014-09-14 words: 5958 flesch: 57 summary: [41] A. Merceron, K. Yacef,Mining student data captured from a web-based tutoring tool: Initial exploration and results, Journal of Interactive Learning Research 15(4):319-346, 2004. [16] for association rule mining. keywords: association; computer; data; data mining; education; learning; mining; rules; student; system; techniques; yes cache: ijccc-1352.pdf plain text: ijccc-1352.txt item: #42 of 981 id: ijccc-1354 author: Resceanu, Ionut Cristian; Resceanu, Cristina Floriana; Bí®zdoacă, Nicu-George title: Cooperative Robot Structures Modeled After Whale Behavior and Social Structure date: 2014-09-14 words: 4262 flesch: 51 summary: Multiple sensor data fusion offers multiple advantages in comparison with information prel- evated through one sensor. [11] 2 Using Data Fusion for Process Surveillance and Diagnosis In the Modelling of Whale Communication Terms like data fusion, multi-sensor data fusion, sensor fusion and information fusion or multi-sensor integration are used frequently in literature to depict a variety of techniques, tech- nologies, systems and applications which use data provided by multiple sources. keywords: communication; data; data fusion; figure; fusion; order; res.ceanu; robot; sensor; structures; whale cache: ijccc-1354.pdf plain text: ijccc-1354.txt item: #43 of 981 id: ijccc-1355 author: Sasu, Lucian M.; Andonie, Răzvan title: Function Approximation with ARTMAP Architectures date: 2014-09-14 words: 5262 flesch: 58 summary: Input categories were considered to predict not real values, but real intervals. For “BA(2)”, we considered only BA models with similar number of input categories as for PROBART. keywords: approximation; category; fam; function; input; networks; neural; pattern cache: ijccc-1355.pdf plain text: ijccc-1355.txt item: #44 of 981 id: ijccc-1356 author: Vučković, Milica; Petrović, Marko; Turajlić, Nina; Stanojević, Milan title: The Specification of ETL Transformation Operations based on Weaving Models date: 2014-09-14 words: 5300 flesch: 52 summary: Section 3 describes the existing MDD approach used in the Eclipse Modeling Framework for the specification of model mappings. Taking into account the relationships which must exist between models from different abstraction levels in the OMG MDA, a mapping model at a given level of abstraction serves as a metamodel for mapping models from the lower abstraction level. keywords: concepts; mapping; models; process; specification; transformation cache: ijccc-1356.pdf plain text: ijccc-1356.txt item: #45 of 981 id: ijccc-1357 author: Wang, Bo; Shi, Yong title: Error Correction Method in Classification by Using Multiple-Criteria and Multiple-Constraint Levels Linear Programming date: 2014-09-14 words: 5745 flesch: 73 summary: 984 B. Wang, Y. Shi 4 A New Model based on Correcting of Two Types of Error In many classification models, including original MCLP model, two types of error is a big issue. 986 B. Wang, Y. Shi Figure 6: solutions for new MC2LP model Actually, in statistics, Type I and Type II errors are two opposite objectives. keywords: aix; model; multiple; αmax cache: ijccc-1357.pdf plain text: ijccc-1357.txt item: #46 of 981 id: ijccc-1358 author: Yu, Xing-biao; Zhao, Jun-suo; Zheng, Chang-wen; Hu, Xiao-hui title: A Fault-Tolerant Scheduling Algorithm using Hybrid Overloading Technology for Dynamic Grouping based Multiprocessor Systems date: 2014-09-14 words: 4331 flesch: 58 summary: The result of task scheduling in real-time system lies on not only scheduling correctness but also time restriction. [1] for processor based on PB overloading and BB overloading dynamically divides processors into groups in the process of task scheduling so as to tolerate a processor fault in every group, which is more adaptable to apply practically. keywords: algorithm; group; grouping; overloading; processor; scheduling; task; time cache: ijccc-1358.pdf plain text: ijccc-1358.txt item: #47 of 981 id: ijccc-1361 author: Brasoveanu, Adrian M.P.; Dzitac, Ioan title: The Role of Visual Rhetoric in Semantic Multimedia: Strategies for Decision Making in Times of Crisis date: 2014-09-16 words: 5481 flesch: 51 summary: In both cases we show how techniques inspired by visual rhetoric (information linking, framing, composition) in conjunction with named entity recognition offer a lot of benefits. Keywords: semantic multimedia, visual rhetoric, text to visual matching, interactive documentary, crisis strategies, multimedia storytelling The progress of civilization can be read in the invention of visual artifacts, from writing to mathematics, to maps, to printing, to diagrams, to visual computing. keywords: crisis; decision; example; images; information; making; models; multimedia; new; rhetoric; semantic; strategies; visualization cache: ijccc-1361.pdf plain text: ijccc-1361.txt item: #48 of 981 id: ijccc-1362 author: Cheng, Zheng title: Nondeterministic Algorithm for Breaking Diffie-Hellman Key Exchange using Self-Assembly of DNA Tiles date: 2014-09-16 words: 8097 flesch: 63 summary: 617-631 Nondeterministic Algorithm for Breaking Diffie-Hellman Key Exchange using Self-Assembly of DNA Tiles Z. This work focuses on computing systems based on DNA molecules, especially the self-assembly of DNA tiles. keywords: = =; assembly; bit; dna; key; self; system; tile; value cache: ijccc-1362.pdf plain text: ijccc-1362.txt item: #49 of 981 id: ijccc-1363 author: Do, K.D. title: Formation Control of Multiple Agents with Preserving Connectivity and its Application to Gradient Climbing date: 2014-09-16 words: 6850 flesch: 71 summary: N in the group of N agents is equipped with a sensor that can measure Φ(t,qi) at the location qi. Do Department of Mechanical Engineering, Curtin University of Technology, Perth, WA 6845, Australia E-mail: duc@curtin.edu.au Abstract: A design of cooperative controllers that force a group of N mobile agents with limited communication ranges to perform a desired formation is presented. keywords: agents; control; formation; function; gradient; group; reference; set; trajectory cache: ijccc-1363.pdf plain text: ijccc-1363.txt item: #50 of 981 id: ijccc-1364 author: Elfelly, Nesrine; Dieulot, Jean-Yves; Benrejeb, Mohamed; Borne, Pierre title: A Multimodel Approach for Complex Systems Modeling based on Classification Algorithms date: 2014-09-16 words: 5536 flesch: 53 summary: [33] D. J. Leith, W. E. Leithead, Analytic framework for blended multiple model systems using linear local models, International Journal of Control, Vol. 72, pp. The main differences between the proposed studies are the selected method for models identification and the type of models. keywords: approach; classification; data; input; models; multimodel; number; output; systems cache: ijccc-1364.pdf plain text: ijccc-1364.txt item: #51 of 981 id: ijccc-1365 author: Gao, Ang; Pan, Quan; Hu, Yansu title: The Research of Differentiated Service and Load Balancing in Web Cluster date: 2014-09-16 words: 5928 flesch: 68 summary: But it is still a promising implementation of Web server cluster (see [11]). The Deployment of Web cluster system keeps increasing to meet the demand for availability, scalability and stability of the diversified performance demands of clients. keywords: balancing; class; cluster; delay; end; load; requests; server; service; system; time; web cache: ijccc-1365.pdf plain text: ijccc-1365.txt item: #52 of 981 id: ijccc-1366 author: Genge, Béla; Siaterlis, Christos; Hohenadel, Marc title: Impact of Network Infrastructure Parameters to the Effectiveness of Cyber Attacks Against Industrial Control Systems date: 2014-09-16 words: 7458 flesch: 52 summary: Steam valve: 3s emulated delay 0 0.2 0.4 0.6 0.8 1 0 1 2 3 4 5 6 7 8 9 1 0 Time (m) Feed-water valve: 0s emulated delay 0 0.2 0.4 0.6 0.8 1 0 1 2 3 4 5 6 7 8 9 1 0 Time (m) Feed-water valve: 0.5s emulated delay 0 0.2 0.4 0.6 0.8 1 0 1 2 3 4 5 6 7 8 9 1 0 Time (m) Feed-water valve: 3s emulated delay Figure 3: Effect of network delays on control valve positions for 100ms TS, 1% loss rate and 2.5Mbit/s background traffic the fuel valve as this has the lowest speed and the control code is running only once every 100ms, while the attacker sends one Modbus command every 10ms, i.e. 100/sec. Our experimental results presented in the next section show that the outcome of the attack is affected not only by network delays, packet losses and background traffic, but also by the execution of PLC control code and the speed of control valves. keywords: attacker; control; cyber; network; packet; physical; pressure; steam; steam valve; time; traffic; valve cache: ijccc-1366.pdf plain text: ijccc-1366.txt item: #53 of 981 id: ijccc-1367 author: Kratica, Jozef title: An Electromagnetism-Like Approach for Solving the Low Autocorrelation Binary Sequence Problem date: 2014-09-16 words: 2911 flesch: 57 summary: Local search algorithm described in [15], on the other hand, uses a quite different strategy compared to previous local search approaches, which is based on the randomized form of back- tracking. In the following text each member pk, k = 1,2, ...,m of the population maintained by the algorithm will be referred to as EM point (or solution), and the population itself will be referred as a solution set. keywords: autocorrelation; opt; problem; search; sequence; solution cache: ijccc-1367.pdf plain text: ijccc-1367.txt item: #54 of 981 id: ijccc-1368 author: Liao, Jianwei title: P2P Resource Sharing in Wired/Wireless Mixed Networks date: 2014-09-16 words: 5721 flesch: 52 summary: As a matter of fact, MBRP has been inspired by the hybrid P2P architecture, but in MBRP, the target sharing resources might be replicated and stored on the manager nodes, and the message forwarding may not conducted by manager nodes. Because wireless network is connected to the wired network via a gateway (also called access point), in our experiments, we selected such nodes as manager nodes for wireless groups. keywords: group; lookup; manager; manager node; mbrp; network; node; peer; routing; sharing; wireless cache: ijccc-1368.pdf plain text: ijccc-1368.txt item: #55 of 981 id: ijccc-1369 author: Mo, Lei; Xu, Bugong title: Distributed Collaborative Processing under Communication Delay over Wireless Sensor and Actuator Networks date: 2014-09-16 words: 5389 flesch: 64 summary: 5 Numerical Examples Let’s consider a simple Humility, Ventilation, Air Conditioning (HVAC) control system for temperature control with two sensor nodes (ns = 2) and two actuator nodes (na = 2). It is an important extension of wireless sensor net- works (WSNs), allowing actuator nodes within the network to make autonomous decisions and then perform appropriate actions in response to the sensor nodes measurements [1]. keywords: actuator; control; n ct; n s; nodes; o n; sensor cache: ijccc-1369.pdf plain text: ijccc-1369.txt item: #56 of 981 id: ijccc-1370 author: Pribeanu, Costin title: Specification and Validation of a Formative Index to Evaluate the Ergonomic Quality of an AR-based Educational Platform date: 2014-09-16 words: 6032 flesch: 52 summary: Keywords: formative measurement model, formative index, augmented reality, us- ability, ergonomic quality. The formative measurement model 2.1 Reflective vs. formative measurement models keywords: .001; construct; ease; erg; formative; index; measurement; model; quality; scenario; use cache: ijccc-1370.pdf plain text: ijccc-1370.txt item: #57 of 981 id: ijccc-1371 author: Qi, Zhiquan; Shi, Yong title: Structural Regular Multiple Criteria Linear Programming for Classification Problem date: 2014-09-16 words: 3861 flesch: 60 summary: Research Center on Fictitious Economy & Data Science, Chinese Academy of Sciences, Beijing 100190, China and 2.College of Information Science & Technology, University of Nebraska at Omaha Omaha, NE 68182, USA E-mail: yshi@gucas.ac.cn Abstract: Classification problem has attracted an increasing amount of interest. In this paper, inspired by the application potential of RMCLP, we propose a novel Structural RMCLP (called SRMCLP) method for classification problem. keywords: classification; criteria; data; linear; problem; programming; srmclp cache: ijccc-1371.pdf plain text: ijccc-1371.txt item: #58 of 981 id: ijccc-1372 author: Robert, Jérémy; Georges, Jean-Philippe; Rondeau, Eric; Divoux, Thierry title: Minimum Cycle Time Analysis of Ethernet-Based Real-Time Protocols date: 2014-09-16 words: 5499 flesch: 55 summary: Figure 1: PLC cycle time In the following section, the analytic models of minimum cycle time are elaborated for Ether- CAT, Profinet IRT, Modbus/TCP, and Ethernet/IP. Profinet IRT provided the best results at 1 Gb/s. Figure 13 shows that all the Ethernet solutions, with the exception of FastEthernet Mod- bus/TCP, could interconnect with more than 60 slaves in cycle times of less than 1 ms. keywords: bytes; cycle; ethercat; ethernet; figure; frame; modbus; profinet; tcp; time cache: ijccc-1372.pdf plain text: ijccc-1372.txt item: #59 of 981 id: ijccc-1373 author: Ryoo, Intae; Kim, Seokhoon title: Transmission Control for Future Internet including Error-prone Wireless Region date: 2014-09-16 words: 2914 flesch: 51 summary: The TCP EWR shows almost similar per- formances when link error rate is low. The backlog α≤x≤β implies that there is a high probability that packets will be lost due to either network congestion or wireless bit errors. keywords: congestion; control; error; ewr; new; tcp; transmission; wireless cache: ijccc-1373.pdf plain text: ijccc-1373.txt item: #60 of 981 id: ijccc-1375 author: Stojanovic, Sreten B.; Debeljkovic, Dragutin L.J.; Dimitrijevic, Nebojsa title: Stability of Discrete-Time Systems with Time-Varying Delay: Delay Decomposition Approach date: 2014-09-16 words: 3910 flesch: 73 summary: Tables 3 (Case 1) and 4 (Case 2) list the intervals of time delay for different methods. Interval of time delay for Case 1 Method Interval [1, Th. 3.1] 2 ≤ h(k) keywords: delay; stability; systems; time cache: ijccc-1375.pdf plain text: ijccc-1375.txt item: #61 of 981 id: ijccc-1376 author: Yu, Jiguo; Jiang, Honglu; Wang, Guanghui; Guo, Qiang title: Clustering-Based Energy-Efficient Broadcast Tree in Wireless Networks date: 2014-09-16 words: 3117 flesch: 66 summary: [6] A. K. Das, R. J. Marks, M. EI-Sharkawi, P. Arabshai, A. Gray, r-shrink: a heuristic for improving minimum power broadcast trees in wireless networks, in Proc. of GLOBECOM 523-527, 2003. The number of network nodes changes from 25 to 250 with each increment of 25. Fig 3a. keywords: algorithm; broadcast; energy; networks; node; power; problem cache: ijccc-1376.pdf plain text: ijccc-1376.txt item: #62 of 981 id: ijccc-1379 author: Yu, Changrui; Yan, Luo; Kecheng, Liu title: Multi-attribute Collaborative Filtering Recommendation based on Improved Group Decision-making date: 2015-07-24 words: 7111 flesch: 58 summary: With all the continuous revision of user matrixes, Si(t) decreases from 1 to 0, and S(t) increases from 0 to 1. This study addresses the issues on preference differences of similar users, incomplete values, and advanced converge of the algorithm, and realizes multi-attribute collaborative filtering. keywords: algorithm; attribute; compatibility; evaluation; filtering; group; interest; matrix; movie; multi; recommendation; set; target; user; value cache: ijccc-1379.pdf plain text: ijccc-1379.txt item: #63 of 981 id: ijccc-1383 author: Chen, Hao; Du, Qinghe; Ren, Pinyi title: A Joint Routing and Time-Slot Assignment Algorithm for Multi-Hop Cognitive Radio Networks with Primary-User Protection date: 2014-09-18 words: 6766 flesch: 63 summary: In cognitive radio networks, secondary users (SUs) must avoid causing any harmful interference to primary users (PUs) and transparently utilize the licensed spectrum bands. In cognitive radio networks, nodes are allowed to sense and explore a wide range of the frequency spectrum and identify currently underutilized spectrum blocks for data transmission. keywords: algorithm; interference; milp; networks; node; problem; routing; rsaa; slot; spectrum; sus; throughput; time cache: ijccc-1383.pdf plain text: ijccc-1383.txt item: #64 of 981 id: ijccc-1384 author: Damanafshan, Morteza; Khosrowshahi-Asl, Ehsan; Abbaspour, Maghsoud title: GASANT: An ant-inspired least-cost QoS multicast routing approach based on genetic and simulated annealing algorithms date: 2014-09-18 words: 7791 flesch: 58 summary: Also, note that ants are small packets and put low load burden on network nodes; their lightweight approach can be very effective for gathering information for generating QoS-aware initial population [23]. In this paper, the network is expressed as an undirected weighted graph namely G = (V, E), where V is the set of network nodes and E is the set of links connecting network nodes to each other. keywords: bandwidth; cost; delay; end; gasant; multicast; multicast tree; network; ngsa; node; qos; ratio; routing; tree cache: ijccc-1384.pdf plain text: ijccc-1384.txt item: #65 of 981 id: ijccc-1385 author: Ding, Zeliu; Guo, Deke; Luo, Xueshan; Chen, Xi title: Performing MapReduce on Data Centers with Hierarchical Structures date: 2014-09-18 words: 9338 flesch: 61 summary: First, we propose the schemes for designating master servers and worker servers, and storing data files on hierarchical data centers, so as to facilitate the execution of MapReduce. We utilize the advantages of DHT, including decentralization, fault tolerance and scalability, to ad- dress the main problems that face hierarchical data centers in supporting MapReduce. keywords: centers; data; data centers; file; key; keys; mapreduce; number; ransob; reduce; server; structure; tasks cache: ijccc-1385.pdf plain text: ijccc-1385.txt item: #66 of 981 id: ijccc-1386 author: Ergu, Daji; Kou, Gang; Peng, Yi; Li, Feixiong; Shi, Yong title: Data Consistency in Emergency Management date: 2014-09-18 words: 3935 flesch: 51 summary: To measure the consistency of a judgment matrix and determine a certain acceptable level of inconsistency, Saaty proposed a consistency index (CI), denoted as: CI = λmax − n n − 1 (1) where λmax is the maximum eigenvalue of matrix A, and n is the order of matrix A. To define a unique consistency test index that does not rely on the order of judgment matrices, the consistency index (CI) was extended and the consistency ratio (CR) method was further proposed by Saaty [17], CR = CI RI (2) where CI is the consistency index shown in equation (1) while RI is the average random index based on Matrix Size, as shown in Table 1. 452 D. Ergu, G. Kou, Y. Peng, F. Li, Y. Shi Table 1 The data of judgment matrix are usually provided by experts and collected through questionnaire survey [12]. keywords: data; judgment; k=1; matrix; mean; n∏ k=1 cache: ijccc-1386.pdf plain text: ijccc-1386.txt item: #67 of 981 id: ijccc-1387 author: Feng, Yin; Yao-nan, Wang; Yi-min, Yang title: Inverse Kinematics Solution for Robot Manipulator based on Neural Network under Joint Subspace date: 2014-09-18 words: 6129 flesch: 60 summary: Although neural network solutions are usually not suited for high precision robotic application, high precision results are achieved here. [5] Z Binggul, HM Ertunc and C Oysu, Comparison of inverse kinematics solutions using neural net- work for 6R robot manipulator with offset,In Proceedings of the 2005 Congress on Computational Intelligence Method and Application,pp:1-5. keywords: algorithm; error; figure; hidden; inverse; joint; kinematics; learning; network; neural; solution; training cache: ijccc-1387.pdf plain text: ijccc-1387.txt item: #68 of 981 id: ijccc-1388 author: Hou, Junhui; Wan, Shuai title: Optimal Bitstream Adaptation for Scalable Video Based On Two-Dimensional Rate and Quality Models date: 2014-09-18 words: 4382 flesch: 53 summary: Firstly, assuming that the spatial resolution can be any positive values, and then the practical case where spatial resolutions to be discrete is considered. 4.1 Optimal Solutions Assuming q and s Taking Continuous Values Assuming that both the spatial resolution and the quantization step can take continuous values. (6) Equation 6 is the achievable quality with different spatial resolutions under the targeted bit-rate Rt. keywords: data; model; optimal; quality; rate; resolution; video cache: ijccc-1388.pdf plain text: ijccc-1388.txt item: #69 of 981 id: ijccc-1389 author: Lee, Jungkyu; Yang, Jihoon title: A Fast and Scalable Re-routing Algorithm based on Shortest Path and Genetic Algorithms J. Lee, J. Yang Jungkyu Lee date: 2014-09-18 words: 5036 flesch: 63 summary: Shortest paths algorithms: theory and experi- mental evaluation. A genetic algorithm for shortest path routing problem and the sizing of populations. keywords: algorithm; chromosomes; dga; node; path; population; routing; time cache: ijccc-1389.pdf plain text: ijccc-1389.txt item: #70 of 981 id: ijccc-1390 author: Li, Naiqian; Yao, Xinhui; Tian, Dongpin title: Mining Temporal Sequential Patterns Based on Multi-granularities date: 2014-09-18 words: 7666 flesch: 58 summary: In order to formally define temporal sequence pattern that involves time granularities, we first review the notion of a time granularity [15]. Definition 1. We give a formal description of the problem of mining temporal sequence patterns based multiple granularities in section 3. keywords: algorithm; data; granularity; items; mining; multi; pattern; prefixspan; sequence; time cache: ijccc-1390.pdf plain text: ijccc-1390.txt item: #71 of 981 id: ijccc-1391 author: Liu, Ting; Wang, Zhiwen; Wang, Haijun; Lu, Ke title: An Entropy-based Method for Attack Detection in Large Scale Network date: 2014-09-18 words: 3811 flesch: 67 summary: The Shannon entropy and Renyi cross entropy are employed to analyze the distribution characteristics of alert features and detect network attack. We use Shannon entropy to examine the distribution of the source IP address, destination IP address, source threat and destination threat and datagram length of IDS alerts; employ Renyi cross entropy to fuse the Shannon entropy vector to detect network attack. keywords: alerts; attack; cross; detection; entropy; method; network; renyi; shannon cache: ijccc-1391.pdf plain text: ijccc-1391.txt item: #72 of 981 id: ijccc-1392 author: Ngo, ThanhQuyen; Nguyen, M. Hung; Wang, YaoNan; Ge, Ji; Wei, ShuNing; Mai, T. Long title: An Adaptive Iterative Learning Control for Robot Manipulator in Task Space date: 2014-09-18 words: 4364 flesch: 64 summary: In order to exhibit the superior control performance of AILC system, two extra control systems including an adaptive switching learning PD control system (ASL-PD) is represented in [8], an iterative learning control (ILC) is represented in [12]. In order to deal with this problem, the branches of current control theories are broad include classical control, robust control, adaptive control, optimal control, nonlinear control, neural network control, fuzzy logic and intelligent control. keywords: control; iteration; iterative; learning; position; robot; tracking cache: ijccc-1392.pdf plain text: ijccc-1392.txt item: #73 of 981 id: ijccc-1393 author: Rajendran, Arthanari; Dhanasekaran, Raghavan title: Brain Tumor Segmentation on MRI Brain Images with Fuzzy Clustering and GVF Snake Model date: 2014-09-18 words: 3811 flesch: 60 summary: The evaluation result with tumor MRI images shows that our method is more accurate and robust for brain tumor segmentation. 530-539 Brain Tumor Segmentation on MRI Brain Images with Fuzzy Clustering and GVF Snake Model A. Rajendran, R. Dhanasekaran Arthanari Rajendran Professor and HoD, Department of Electronics and Communication Engineering, Sriguru Institute of Technology, Coimbatore,Tamilnadu, India E-mail:rajendranav@gmail.com Raghavan Dhanasekaran Professor, Director-Research, Syed Ammal Engineering College, Ramanathapuram, Tamilnadu, India E-mail:rdhanashekar@yahoo.com Abstract: Deformable or snake models are extensively used for medical image seg- mentation, particularly to locate tumor boundaries in brain tumor MRI images. keywords: brain; gvf; images; method; mri; segmentation; snake; tumor cache: ijccc-1393.pdf plain text: ijccc-1393.txt item: #74 of 981 id: ijccc-1394 author: Rankovic, Vesna; Radulovic, Jasna; Grujovic, Nenad; Divac, Dejan title: Neural Network Model Predictive Control of Nonlinear Systems Using Genetic Algorithms date: 2014-09-18 words: 3746 flesch: 55 summary: In the designing of neural network model, the problem is how to determine an optimal architecture of network. [15] K. Laabidi, F. Bouani, M. Ksouri, Multi-criteria optimization in nonlinear predictive control, Math- ematics and Computers in Simulation, 76(5-6):363-374, 2008. keywords: control; model; network; neural; nonlinear; predictive cache: ijccc-1394.pdf plain text: ijccc-1394.txt item: #75 of 981 id: ijccc-1395 author: Satoh, Toshiyuki; Kaneko, Kotaro; Saito, Naoki title: Improving Tracking Performance of Predictive Functional Control Using Disturbance Observer and Its Application to Table Drive Systems date: 2014-09-18 words: 7931 flesch: 63 summary: Keywords: predictive functional control, disturbance observer, table drive system, model predictive control 1 Introduction The model-based predictive control (MPC) has been successfully applied mainly in the petrochemical industry since it was put into practical use in the 1970’s. [12] J. Richalet, Industrial applications of model based predictive control, Automatica, vol. 29, no. 5, pp. 1251-1274, 1993. keywords: control; disturbance; figure; loop; observer; output; pfc; plant; system; tracking cache: ijccc-1395.pdf plain text: ijccc-1395.txt item: #76 of 981 id: ijccc-1396 author: Su, Honglei; Yang, Fuzheng; Song, Jiarun title: Packet-Layer Quality Assessment for Networked Video date: 2014-09-18 words: 4054 flesch: 52 summary: However, video quality strongly depends on the video content. [14] K. Yamagishi, T. Hayashi, Parametric packet-layer model for monitoring video quality of IPTV services, Proc. keywords: bit; coding; complexity; layer; model; packet; quality; rate; video cache: ijccc-1396.pdf plain text: ijccc-1396.txt item: #77 of 981 id: ijccc-1397 author: Talbi, Mourad; Aicha, Anis Ben; Salhi, Lotfi; Cherif, Adnene title: BionicWavelet Based Denoising Using Source Separation date: 2014-09-18 words: 3762 flesch: 61 summary: In this paper we have used the source separation with Bionic Wavelet Transform (BWT) for enhancement of speech signal corrupted by white noise. Its goal is to extract from many signals mixture, the meaningful signals. keywords: bwt; method; mixture; separation; signal; source; speech; technique; wavelet cache: ijccc-1397.pdf plain text: ijccc-1397.txt item: #78 of 981 id: ijccc-14 author: Tanaka, Marcelo Costa; Fernandes, Josiane Maria de Macedo; Bessa, Wallace Moreira title: Feedback Linearization with Fuzzy Compensation for Uncertain Nonlinear Systems date: 2013-08-08 words: 3225 flesch: 63 summary: [7] Kosko, B. (1994); Fuzzy systems as universal approximators, IEEE Trans Comput, 43(11):1329-1333. The simulation study was performed with an implementation in C, with sampling rates of 500 Hz for control system and 1 kHz for the Van der Pol oscillator, and the differential equations were numerically solved using the fourth order Runge-Kutta method. keywords: control; feedback; linearization; system cache: ijccc-14.pdf plain text: ijccc-14.txt item: #79 of 981 id: ijccc-1403 author: Altinoz, O. Tolga; Yilmaz, A. Egemen; Weber, G. Wilhelm title: Application of Chaos Embedded PSO for PID Parameter Tuning date: 2014-09-20 words: 5127 flesch: 54 summary: 5.3 Results for Setup3 The PID parameters obtained for this type of problem are presented in Tables 10 and 11, and illustrated in Figure 8. Table 8: PID controller parameter values for Setup2a and Setup2b Parameter Value Obtained Value Obtained Value Obtained by CPSO by PSO by Ziegler-Nichols KP 93.6226 Table 9: PID controller parameter values for the Setup2c and Setup2d Parameter Value Obtained Value Obtained Value Obtained by CPSO by PSO by Ziegler-Nichols KP 162.9 169.7 190 KI 10 79.03 4.9 KD 10 10 5.12 Table 10: PID controller parameter values for Setup3a Parameter Value Obtained Value Obtained Value Obtained by CPSO by PSO by Ziegler-Nichols KP 395.33 219.20533 1.08 KI 1.1 55.2488 0.0314 KD 41.6245 1 6.22 216 O.T. Altinoz, A.E. Yilmaz, G.-W. Weber Figure 8: Transient response of the system for a) Setup3a and b) Setup3b. keywords: control; cpso; parameter; particle; pid; pso; system; tuning; value cache: ijccc-1403.pdf plain text: ijccc-1403.txt item: #80 of 981 id: ijccc-1404 author: Aruna, Elias; Moni, R.S. title: Optimization of Vertical Handoff Decision Algorithm for Wireless Networks date: 2014-09-20 words: 5892 flesch: 58 summary: Even if the channels in WLAN are used up and there are free channels in cellular networks, the call request in WLAN should not be admitted by cellular network would be blocked or dropped. Each cellular network has Cc channels and each WLAN has Cw channels and Cc − Ncn channels in cellular network are reserved only for handoff calls. keywords: area; calls; cell; handoff; k c; networks; probability; rate; wlan cache: ijccc-1404.pdf plain text: ijccc-1404.txt item: #81 of 981 id: ijccc-1405 author: Chu, K.-C.; Wang, Chun-Sheng; Jiang, Wey-Wen; Hsieh, Nan-Chen title: The Effect of Heterogeneous Traffic Distributions on Load Balancing in Mobile Communications: An Analytical Model date: 2014-09-20 words: 4750 flesch: 60 summary: A better scheme is needed to handle load balancing in cases of heterogeneous cells with light traffic loads. 231-240 The Effect of Heterogeneous Traffic Distributions on Load Balancing in Mobile Communications: An Analytical Model K.-C. Chu, C.-S. Wang, W.-W. Jiang, N.-C. Hsieh Kuo-Chung Chu, Wey-Wen Jiang, Nan-Chen Hsieh Department of Information Management, National Taipei University of Nursing and Health Sciences No.365, Mingde Rd., Beitou Dist., Taipei City 11219, Taiwan (R.O.C.) {kcchu, jiang6, nchsie})@ntunhs.edu.tw Chun-Sheng Wang Department of Information Management, Jinwen University of Science and Technology No.99, Anzhong Rd., Xindian Dist., New Taipei City 23154, Taiwan (R.O.C.) seanwang@just.edu.tw Abstract: This paper investigates the load balancing problem in an environ- ment of heterogeneous traffic distributions. keywords: balancing; c(t; cells; load; model; sector; traffic cache: ijccc-1405.pdf plain text: ijccc-1405.txt item: #82 of 981 id: ijccc-1406 author: Fang, Weiwei; Liang, Xiangmin; Sun, Yantao; Vasilakos, Athanasios V. title: Network Element Scheduling for Achieving Energy-Aware Data Center Networks date: 2014-09-20 words: 5067 flesch: 56 summary: 241-251 Network Element Scheduling for Achieving Energy-Aware Data Center Networks W. Fang, X. Liang, Y. Sun, A.V. Vasilakos Weiwei Fang, Xiangmin Liang, Yantao Sun School of Computer and Information Technology Beijing Jiaotong University, Beijing 100044, China {wwfang, 11125116, ytsun}@bjtu.edu.cn Athanasios V. Vasilakos Department of Computer and Telecommunications Engineering University of Western Macedonia Kozani GR 50100, Greece vasilako@ath.forthnet.gr Abstract: The goal of data center network is to interconnect a massive number of servers so as to provide reliable and scalable computing and stor- age infrastructure for cloud-based Internet services and data-intensive scien- tific applications. Keywords: data center networks, green computing, energy aware, Steiner tree. keywords: center; data; data center; elements; energy; ness; network; power; servers; switches; traffic; tree cache: ijccc-1406.pdf plain text: ijccc-1406.txt item: #83 of 981 id: ijccc-1407 author: Fathima, G.; Wahidabanu, R.S.D. title: Prioritization of Traffic for Resource Constrained Delay Tolerant Networks date: 2014-09-20 words: 4918 flesch: 51 summary: There- fore the goal is to determine the policy which maximizes the delivery probability or equivalently minimizes the delivery latency of high priority messages. Furthermore, high priority messages with earliest deadline are forwarded first. keywords: buffer; bundle; delay; delivery; dtn; messages; networks; priority; queue; routing; size cache: ijccc-1407.pdf plain text: ijccc-1407.txt item: #84 of 981 id: ijccc-1408 author: Filip, Florin Gheorghe title: A Decision-Making Perspective for Designing and Building Information Systems date: 2014-09-20 words: 3708 flesch: 39 summary: Eng., 144(2):162-174, 1997 272 F.G. Filip [17] Ness D.N., Decision support systems: theory and design, One can notice, during the process of designing and implementing information systems, se- quences of decisions which should be made with respect to the choice of the most adequate alternatives concerning several critical aspects, such as system orientation, composition of the team, method to be adopted, IT&C tools to be utilized, resources to be allocated and so on. keywords: decision; design; designing; evaluation; information; it&c; making; process; project; software; system cache: ijccc-1408.pdf plain text: ijccc-1408.txt item: #85 of 981 id: ijccc-1409 author: Haghighatdoost, Vahid; Espandar, Maryam title: A General Approach for Minimizing the Maximum Interference of a Wireless Ad-Hoc Network in Plane date: 2014-09-20 words: 4539 flesch: 62 summary: One of the foremost approaches to achieve substantial energy conservation is by minimizing interfer- ence between network nodes. Experimental results show the effi- ciency of proposed algorithm not only for one dimensional known distribution like exponential node chain, but also for two dimensional distributions like two Exponential node chains and α-Spiral node chains. keywords: algorithm; edge; exponential; figure; graph; interference; node; topology cache: ijccc-1409.pdf plain text: ijccc-1409.txt item: #86 of 981 id: ijccc-1412 author: Longheu, Alessandro; Carchiolo, Vincenza; Malgeri, Michele; Mangioni, Giuseppe title: An Intelligent and Pervasive Surveillance System for Home Security date: 2014-09-20 words: 4707 flesch: 35 summary: Keywords: Home surveillance systems; pervasive systems; ZigBee protocol. According to this criterion, home security systems can be classified into four categories [7]: • hardware-based, the simplest systems where both monitoring and control are implemented in hardware, • passive systems, where only the monitoring is remote (the control is manual), • phone based systems, with monitoring and control performed through the phone (wired and/or cellular) network • web-based systems, identical to phone-based but using the Internet as the communication infrastructure. keywords: alarms; application; computing; control; figure; home; module; network; security; supervisor; surveillance; system; zigbee cache: ijccc-1412.pdf plain text: ijccc-1412.txt item: #87 of 981 id: ijccc-1413 author: Mohammadi, Aliakbar; Khaloozadeh, Hamid; Amjadifard, Roya title: Small Signal Monitoring of Power System using Subspace System Identification date: 2014-09-20 words: 7086 flesch: 59 summary: Classical small signal analysis methods for power systems are based on mathematical model- ing and linearized model of power system in an especial operating point. The benefits and drawbacks of subspace system identification methods and the presented suggestions are studied for small signal analysis of power systems and power system monitor- ing. keywords: algorithms; analysis; identification; methods; model; output; power; power system; signal; ssi; state; subspace; system cache: ijccc-1413.pdf plain text: ijccc-1413.txt item: #88 of 981 id: ijccc-1414 author: Ngo, ThanhQuyen; Wang, YaoNan; Mai, T. Long; Nguyen, M. Hung; Chen, Jun title: Robust Adaptive Neural-Fuzzy Network Tracking Control for Robot Manipulator date: 2014-09-20 words: 4711 flesch: 61 summary: Compared these results with the CTC, RFLC and PD control systems, the control torque of proposed RANFNC system is not chattering phenomenon. [9] L.X. Wang, A course in Fuzzy Systems and Control, Englewood Cliffs, NJ:Prentice Hall, 1997 [10] O. Omidvar and D.L. Elliott, Neural Systems for Control, Englewood Cliffs, NJ: Prentice- Hall, 1997 [11] B.S. Chen, H.J. Uang, and C.S. Tseng, Robust tracking enhancement of robot systems including motor dynamics: A fuzzy-based dynamic game approach, IEEE Trans. keywords: control; manipulator; network; neural; position; ranfnc; robot; system; time(s; tracking cache: ijccc-1414.pdf plain text: ijccc-1414.txt item: #89 of 981 id: ijccc-1415 author: Okumus, Ibrahim Taner; Dizdar, Ferhat Umut title: Advance and Immediate Request Admission: A Preemptable Service Definition for Bandwidth Brokers date: 2014-09-20 words: 6012 flesch: 68 summary: We define LC as the total link capacity, IRLC as the link capacity share of IR flows, CIRi as the capacity of the ith active IR flow,CARi as the capacity of the ith active AR flow, CIR(t0) as the total IR capacity used by IR flows at time t0, CAR(t0) as the total AR capacity used by AR flows at time t0. Keywords: admission control, IR Flows, AR flows,preemptable forwarding service, quality of services. keywords: admission; capacity; flows; network; preemption; throughput; time cache: ijccc-1415.pdf plain text: ijccc-1415.txt item: #90 of 981 id: ijccc-1416 author: Quiñones-Reyes, P.; Ortega-Arjona, J.; Méndez-Monroy, E.; Bení­tez-Pérez, H.; Durí¡n-Chavesti, A. title: Fuzzy Control Design for a Class of Nonlinear Network Control System: Helicopter Case Study date: 2014-09-20 words: 3462 flesch: 62 summary: For this, a Fuzzy Control law [1] is used, where time delays result from the deterministic reconfiguration of communications due to a scheduling algorithm. Fuzzy Control is used for managing extended horizons from system inputs and outputs, to de- termine several scenarios modified by time delays. keywords: control; delays; error; figure; helicopter; network; pitch; signal; time; yaw cache: ijccc-1416.pdf plain text: ijccc-1416.txt item: #91 of 981 id: ijccc-1417 author: Valenzuela, Claudio; Crawford, Broderick; Soto, Ricardo; Monfroy, Eric; Paredes, Fernando title: A 2-level Metaheuristic for the Set Covering Problem date: 2014-09-20 words: 5093 flesch: 50 summary: Time Taken to find the Best Solution (best represented by “Calls to Objective Function made before best solution is found”) Metaheuristics are solution methods which combine local improve- ment procedures and higher level strategies for solving combinatorial and non- linear optimization problems. keywords: covering; function; level; metaheuristic; parameter; problem; results; set; solution cache: ijccc-1417.pdf plain text: ijccc-1417.txt item: #92 of 981 id: ijccc-1418 author: Yamuna, B.; Padmanabhan, T.R. title: A Reliability Level List based SDD Algorithm for Binary Cyclic Block Codes date: 2014-09-20 words: 3365 flesch: 76 summary: Output: Sequential entries in RLL 3. In this paper we introduce the concept of a Reliability Level List (RLL); based on the RLL a new SDD algo- rithm for Binary Phase Shift Keying (BPSK) based binary cyclic block codes is proposed. keywords: algorithm; codeword; decoding; entry; reliability; rll cache: ijccc-1418.pdf plain text: ijccc-1418.txt item: #93 of 981 id: ijccc-1419 author: Assawinchaichote, Wudhichai title: A Non-Fragile H∞ Output Feedback Controller for Uncertain Fuzzy Dynamical Systems with Multiple Time-Scales date: 2012-03-01 words: 5529 flesch: 77 summary: [21] K. Tanaka and M. Sugeno, “Stability analysis and design of fuzzy control systems, Fuzzy Sets Systs., vol. [23] C. L. Chen, P. C. Chen, and C. K. Chen, “Analysis and design of fuzzy control system, Fuzzy Sets Systs., vol. keywords: control; controller; feedback; output; systems cache: ijccc-1419.pdf plain text: ijccc-1419.txt item: #94 of 981 id: ijccc-1420 author: Casanova, V.; Salt, J.; Piza, R.; Cuenca, A. title: Controlling the Double Rotary Inverted Pendulum with Multiple Feedback Delays date: 2012-03-01 words: 7157 flesch: 67 summary: [18] B.A. Ogunnaike, W.H. Ray, Multivariable controller design for linear systems having multiple time delays, AIChE Journal, vol. [26] G. Alevisakis, D.E. Seborg, An extension of the Smith predictor method to mul- tivariable linear systems containing time delays, International Journal of Control, vol. keywords: angle; control; controller; delays; figure; pendulum; plant; structure; time cache: ijccc-1420.pdf plain text: ijccc-1420.txt item: #95 of 981 id: ijccc-1421 author: Chen, Joy Iong-Zong; Chung, Yi-Nung title: A Data Fusion Methodology for Wireless Sensor Systems date: 2012-03-01 words: 5823 flesch: 56 summary: The proposed CHNN-based DFA algorithm might have a hardware complexity (number of neurons) in direct linear proportion to the number of tracked targets and the deployed mobile sensors in WSSs. With such a result, the operation of association between mobile sensor measurements and existing tracks can be obtained under global optimal consider- ation, which in turn can increase the accuracy of mobile sensor tracking systems. keywords: algorithm; association; chnn; data; dfa; fusion; measurements; mobile; network; sensor; target; tracking; wss cache: ijccc-1421.pdf plain text: ijccc-1421.txt item: #96 of 981 id: ijccc-1422 author: Cremene, Marcel; Riveill, Michel; Rarau, Anca; Miron, Costin; Benta, Iulian; Todica, Valeriu title: Adaptation Mechanism based on Service-Context Distance for Ubiquitous Computing date: 2012-03-01 words: 3740 flesch: 48 summary: 53-60 Adaptation Mechanism based on Service-Context Distance for Ubiquitous Computing M. Cremene, M. Riveill, A. Rarau, C. Miron, B. Iulian, V. Todica Marcel Cremene, Anca Rarau, Costin Miron, Benta Iulian, Valeriu Todica Technical University of Cluj-Napoca Romania, Cluj-Napoca, Memorandumului nr. 28, 400114 E-mail(s): cremene@com.utcluj.ro, anca.rarau@cs.utcluj.ro, miron@bel.utcluj.ro, iulian.benta@com.utcluj.ro, todicav23@yahoo.com Michel Riveill University of Nice, Sophia-Antipolis I3S, Route de Colles, BP 145 - F-06903, Sophia Antipolis CEDEX E-mail: riveil@unice.fr Abstract: Service adaptation is one of the main research subjects in Ubiq- uitous Computing. Service adaptation to the context (physical infrastruc- ture/resources, user needs, and environment) is one of the main research subjects in high interest domains such as Ubiquitous/Pervasive/Mobile Computing. keywords: adaptation; algorithm; component; composition; context; distance; model; service cache: ijccc-1422.pdf plain text: ijccc-1422.txt item: #97 of 981 id: ijccc-1423 author: Du, Zhenbin; Lin, Tsung-Chih; Balas, Valentina E. title: A New Approach to Nonlinear Tracking Control Based on Fuzzy Approximation date: 2012-03-01 words: 3905 flesch: 77 summary: Stability analysis and design of fuzzy control systems. The approximating error is eliminated by an adaptive compensator based on fuzzy logic systems. keywords: 1,2; control; controller; i=1; model; nonlinear; systems cache: ijccc-1423.pdf plain text: ijccc-1423.txt item: #98 of 981 id: ijccc-1425 author: Liu, Qing-Quan; Yang, Guang-Hong title: Quantized Feedback Control for Networked Control Systems Under Communication Constraints date: 2012-03-01 words: 3858 flesch: 69 summary: Information theory was employed in control systems as a powerful conceptual aid, which extended existing fundamental limitations of feedback systems, and was used to derive necessary and sufficient conditions for robust stabilization of uncertain Copyright c⃝ 2006-2012 by CCC Publications Quantized Feedback Control for Networked Control Systems Under Communication Constraints 91 linear systems, Markov jump linear systems and unstructured uncertain systems (see [12]- Control under communication constraints inevitably suffers signal transmission delay, date packet dropout and measurement quantization which might be potential sources of instability and poor performance of control systems (see [22] and [23]). keywords: communication; control; data; feedback; ieee; rate; stabilization; systems cache: ijccc-1425.pdf plain text: ijccc-1425.txt item: #99 of 981 id: ijccc-1426 author: Gharghory, Sawsan Morkos; Kamal, Hanan Ahmed title: Optimal Tuning of PID Controller using Adaptive Hybrid Particle Swarm Optimization Algorithm date: 2012-03-01 words: 5159 flesch: 53 summary: 0 5 10 15 20 25 30 0 0.2 0.4 0.6 0.8 1 1.2 1.4 Time(Sec) A m p li tu d e PSO Alone AHPSO Global Best AHPSO Local Best Figure 3: System response using IAE for PSO, AHPSO global particle, and AHPSO local particle Optimal Tuning of PID Controller using Adaptive Hybrid Particle Swarm Optimization Algorithm 109 0 5 10 15 20 25 30 0 0.2 0.4 0.6 0.8 1 1.2 1.4 Time(Sec) A m p lit u d e PSO Alone AHPSO Global Best AHPSO Local Best Figure 4: System response using ISE for PSO, AHPSO global particle, and AHPSO local particle 0 5 10 15 20 25 30 0 0.2 0.4 0.6 0.8 1 1.2 1.4 Time(Sec) A m p lit u d e PSO Alone AHPSO Global Best AHPSO Local Best Figure 5: System response using MSE forPSO, AHPSO global particle and AHPSO local particle 110 S. Morkos, H. Kamal 2 4 6 8 10 12 14 16 18 20 5 10 15 20 25 30 35 40 45 Generation C o s t F u n c ti o n PSO Alone AHPSO Global Best AHPSO Local Best Figure 6: Cost function using IAE for PSO, AHPSO global particle, and AHPSO local particles 2 4 6 8 10 12 14 16 18 20 5 10 15 20 25 30 35 40 45 50 Generation C o s t F u n c ti o n PSO Alone AHPSO Global Best AHPSO Local Best Figure 7: Cost function using ISE for PSO, AHPSO global particle, and AHPSO local particles Optimal Tuning of PID Controller using Adaptive Hybrid Particle Swarm Optimization Algorithm 111 2 4 6 8 10 12 14 16 18 20 0.025 0.03 0.035 0.04 0.045 Generation C o s t F u n c ti o n PSO Alone AHPSO Global Best AHPSO Local Best Figure 8: Cost function using MSE for PSO, AHPSO global particle, and AHPSO local particles Table 1: Transient response charteristics using IAE criteria Criteria IAE Standard PSO AHPSO Global AHPSO Local Rise Time Tr 1.12 1.29 1.17 To overcome premature convergence of the standard PSO algorithm, this paper presents an adaptive hybrid PSO, namely (AHPSO) by employing an adaptive mutation operator for local best particles instead of applying the mutation operator to the global best particle as has been done in previous work. keywords: ahpso; algorithm; controller; mutation; operator; optimization; particle; pid; pso; search; swarm cache: ijccc-1426.pdf plain text: ijccc-1426.txt item: #100 of 981 id: ijccc-1427 author: Mosić, Aleksandar V.; Perić, Zoran H.; Panić, Stefan R. title: Switched Nonuniform and Piecewise Uniform Scalar Quantization of Laplacian Source date: 2012-03-01 words: 3711 flesch: 62 summary: When the required hardware solution it is better to use piecewise uniform scalar quantizers, because they can be realized using linear electronic circuits. We also have presented 122 A.V. Mosic, Z.H. Peric, S.R. Panic L SQNRN=128 SQNRN=256 2 32.76 38.21 4 34.35 39.96 8 34.73 40.37 16 34.82 40.48 64 34.85 40.51 128 34.85 40.52 Table 1: Comparison between values of SQNR of piecewise uniform scalar quantizers for different values of bitrate R, i.e. N1 = 128, µ1 = 15 and N2 = 256, µ2 = 17. how they can accomplish high quality of SNRQ by optimization on maximal amplitude of input signal, by optimization on parameter µ, and by adaptation on input variance range length. keywords: input; quantization; quantizer; range; signal cache: ijccc-1427.pdf plain text: ijccc-1427.txt item: #101 of 981 id: ijccc-1428 author: Navarro, Miguel; Donoso, Yezid title: An IMS Architecture and Algorithm Proposal with QoS Parameters for Flexible Convergent Services with Dynamic Requirements date: 2012-03-01 words: 6614 flesch: 44 summary: On the other hand, when EF and AF sessions are relocated, they go to a lower QoS level, then the PEC parameter is set to 1 and the SFB is set to 0, so that the session that is being relocated can use resources from sessions with lower priority and with the PEV parameter activated. The relocation algorithms for EF and AF sessions are given in Algorithm 4. keywords: architecture; ims; level; network; new; qos; resources; session cache: ijccc-1428.pdf plain text: ijccc-1428.txt item: #102 of 981 id: ijccc-1429 author: Obe, Olumide; Dumitrache, Ioan title: Adaptive Neuro-Fuzzy Controler With Genetic Training For Mobile Robot Control date: 2012-03-01 words: 3685 flesch: 51 summary: Mobile robots are complex systems functioning in real world environments thus, making it uneasy to design an adaptive control system that can control robots to act as desired. [8] subsumption architecture that makes easy design of robots to realize mul- tiple behaviours, respond to multiple sensors and incrementally extension has been successfully applied in mobile robot keywords: controller; figure; mobile; neuro; output; performance; robot; training cache: ijccc-1429.pdf plain text: ijccc-1429.txt item: #103 of 981 id: ijccc-1430 author: Pinter, Robert; Radosav, Dragica; Čisar, Sanja Maravić title: Analyzing the Impact of Using Interactive Animations in Teaching date: 2012-03-01 words: 6746 flesch: 48 summary: Using animation in science instruction with young children. 147-162 Analyzing the Impact of Using Interactive Animations in Teaching R. Pinter, D. Radosav, S.M. Cisar Robert Pinter Subotica Tech-College of Applied Sciences Serbia, 24000 Subotica, Marka Oreškovića 16 E-mail: probi@vts.su.ac.rs Dragica Radosav University of Novi Sad, Technical faculty Mihajlo Pupin Zrenjanin Serbia, 23000 Zrenjanin, Djure Djakovica bb E-mail: radosav@tfzr.uns.ac.rs Sanja Maravić Čisar Subotica Tech-College of Applied Sciences Serbia, 24000 Subotica, Marka Oreškovića 16 E-mail: sanjam@vts.su.ac.rs Abstract: This study intends to measure the impact of interactive animations on the students’ performance. keywords: animations; application; course; figure; flash; group; information; learning; process; simulations; students; teaching cache: ijccc-1430.pdf plain text: ijccc-1430.txt item: #104 of 981 id: ijccc-1431 author: Lu, Wang; Lixiang, Liu; Xiaohui, Hu title: Load-aware and Position-aided Routing in Satellite IP Networks date: 2012-03-01 words: 4305 flesch: 54 summary: Keywords: satellite networks, load balancing, position, routing. Another type of satellite network routing protocol is based on geographical location, such as LPDB [6]. keywords: distribution; information; link; load; lpr; networks; routing; satellite; traffic cache: ijccc-1431.pdf plain text: ijccc-1431.txt item: #105 of 981 id: ijccc-1432 author: Zhang, Xingyi; Luo, Bin; Pan, Linqiang title: Small Universal Tissue P Systems with Symport/Antiport Rules date: 2012-03-01 words: 6670 flesch: 68 summary: In this note, we shall consider the following two restrictive versions of tissue P systems: (1) only one channel is allowed between two cells or between a cell and the environment, (2) two channels are allowed between a cell and the environment. Table 1: The computational completeness results for tissue P systems with only one channel between two cells, or between a cell and the environment; where ? indicates an open problem, † indicates that the result is obtained in this note, the other results are from [1]. keywords: cell; copies; label; symbol cache: ijccc-1432.pdf plain text: ijccc-1432.txt item: #106 of 981 id: ijccc-1433 author: Zhuang, Wei; Chen, Xi; Tan, Jindong title: Maintaining Communication Links Using a Team of Mobile Robots date: 2012-03-01 words: 5461 flesch: 59 summary: Though distributed control of multiple mobile robots have been intensively discussed, the cooperative control of mobile robots for communication links faces new challenges in the coupling of environment and communication factors. The assessment of link quality acts as the feedback for cooperative control of mobile robots. keywords: communication; control; end; link; mobile; network; quality; robots; rssi; speed; team; throughput cache: ijccc-1433.pdf plain text: ijccc-1433.txt item: #107 of 981 id: ijccc-1438 author: Marentes, Luis Andres; Wolf, Tilman; Nagurney, Anna; Donoso, Yezid title: Towards Pricing Mechanisms for Delay Tolerant Services date: 2015-11-16 words: 6030 flesch: 64 summary: There exists a correlation between real time costs and the traffic pattern used. Requests made at time t and using the mechanic backhaul must at least have a travel time equal to the vehicle cycle time T1. keywords: b(t; connection; delay; demand; mechanic; network; pricing; services; time cache: ijccc-1438.pdf plain text: ijccc-1438.txt item: #108 of 981 id: ijccc-1440 author: Sangeorzan, Livia; Parpalea, Mircea; Parpalea, Mihaela Marinela; Repanovici, Angela; Matefi, Roxana; Nicolae, Ioana title: A Preflow Approach to Maximum Flows in Parametric Networks Applied to Assessing the Legal Information date: 2015-11-16 words: 6803 flesch: 55 summary: Consequently, fundamental algorithms for computing maximum network flows were designed and efficient algorithms exist [1] to solve different instances [7] of the problem. [9] Ruhe, G. (1985); Characterization of all optimal solutions and parametric maximal flows in networks, Optimization, 16(1): 51–61. keywords: algorithm; flow; j;λ; maximum; network; node; parametric; partitioning; problem cache: ijccc-1440.pdf plain text: ijccc-1440.txt item: #109 of 981 id: ijccc-1442 author: Sklyarov, Valery; Skliarova, Iouliia; Rjabov, Artjom; Sudnitson, Alexander title: Computing Sorted Subsets for Data Processing in Communicating Software/Hardware Control Systems date: 2015-11-16 words: 7358 flesch: 58 summary: Data were taken from DDR memory and the maximum and minimum subsets were extracted with K data items where K varied from 256 to 1,024 (as before M = 32, N is equal to 256 KB). We would like to use the circuit in Fig. 3 only for such data items D that fall within the bounds keywords: computing; data; fig; hardware; items; maximum; minimum; software; subsets cache: ijccc-1442.pdf plain text: ijccc-1442.txt item: #110 of 981 id: ijccc-1454 author: DziekoÅ„ski, Andrzej Marek; Schoeneich, Radoslaw Olgierd title: DTN Routing Algorithm for Networks with Nodes Social Behavior date: 2016-07-03 words: 6720 flesch: 56 summary: Second essential information is table containing definitions of other nodes friends groups. DTN network is generally very dynamic - its elements can freely move, so constant connections between nodes exist very seldom. keywords: algorithm; delivery; destination; dtn; messages; networks; nodes; number; routing; social; solution cache: ijccc-1454.pdf plain text: ijccc-1454.txt item: #111 of 981 id: ijccc-1465 author: Kirsal-Ever, Yoney; Kirsal, Yonal; Ever, Enver; Gemikonakli, Orhan title: Analytical Modelling and Performability Evaluation of Multi-Channel WLANs with Global Failures date: 2015-06-23 words: 6287 flesch: 61 summary: Channel failures due to the environmental interference as Analytical Modelling and Performability Evaluation of Multi-Channel WLANs with Global Failures 553 well as from other wireless devices are considered in [15]. System and channel failures occurring in system is lead to degradation of the entire system performance. keywords: channel; failures; ieee; multi; number; performability; performance; state; system; wireless; wlans cache: ijccc-1465.pdf plain text: ijccc-1465.txt item: #112 of 981 id: ijccc-1473 author: Duta, Luminita; Zamfirescu, Constantin-Bala; Filip, Florin G. title: Mathematical Decision Model for Reverse Supply Chains Inventory date: 2014-12-01 words: 3628 flesch: 51 summary: Mathematical Decision Model for Reverse Supply Chains Inventory L. Duta, C.B. Zamfirescu, F.G. Filip Luminita Duta Automation and Computer Science Department Valahia University of Targoviste Romania, 130083, Targoviste, 24, Unirii Ave. duta@valahia.ro Constantin-Bala Zamfirescu Dept. of Computer Science and Automatic Control Lucian Blaga University of Sibiu Romania, 550024, Sibiu, 10, Victoriei Ave. zbc@acm.org Florin G. Filip The Romanian Academy Romania, Bucharest, 010071, 125 Calea Victoriei ffilip@acad.ro Abstract: In the reverse supply chain inventory theory, inventory models are con- cerned with the demand of reusable parts, stock replenishment, ordering cycle, de- livery lead time, number of disassembled products, ordering costs. Keywords: Reverse supply chains, decision aid, inventory models, Bayesian networks 1 Introduction A reverse supply chain is the process of moving End of Life (EOL) products from customer to distributor or manufacturer for the purpose of capturing the market leftover value, or for proper disposal. keywords: decision; demand; disassembly; inventory; model; order; parts; supply cache: ijccc-1473.pdf plain text: ijccc-1473.txt item: #113 of 981 id: ijccc-1474 author: Gí®fu, Daniela; Cioca, Marius title: Detecting Emotions in Comments on Forums date: 2014-12-01 words: 3832 flesch: 46 summary: Out attention is also take up by the classification of the degree of positivity of a text (document, sentence/clause, etc.), consisting in opinion words (e.g. angry, happy). For instance: the string p[oa]t can be interpreted as pot and pat. 13http://gate.ac.uk/ 14http://services.gate.ac.uk/annie/ 700 D. Gîfu, M. Cioca Figure 2: The architecture of the computational software Basically, the tool completes the following steps: - it identifies opinion words and phrases; - it assigns to every positive or negative word a value (+1) for the positive one and (-1) for the negative one; - the words which depend on context get also a value (0). keywords: analysis; classification; document; entities; forums; language; opinion; proceedings; sentiment; text; words cache: ijccc-1474.pdf plain text: ijccc-1474.txt item: #114 of 981 id: ijccc-1476 author: Makajić-Nikolić, Dragana; Babarogić, Sladjan; Lečić-Cvetković, Danica; Atanasov, Nikola title: An Algorithm for Production Planning Based on Supply Chain KPIs date: 2014-11-01 words: 4157 flesch: 55 summary: Keywords: production planning, stock cover, customer service level, heuristic algo- rithm. Available finished goods ready to be delivered to customer according to identified demand are in direct correlation with customer service level. keywords: algorithm; customer; level; period; production; products; service; stock cache: ijccc-1476.pdf plain text: ijccc-1476.txt item: #115 of 981 id: ijccc-1477 author: Mihăilă, Alin; Benţa, Dan; Rusu, Lucia title: Framework for Automated Reporting in EU funded Projects date: 2014-12-01 words: 3661 flesch: 47 summary: The preparatory stage during which the financial officials of all partners in the project pre- pare the financial data related to all expenditures made by partners and the project coordinator centralizes financial data collected from the financial officials of the partners; • Framework for Automated Reporting in EU funded Projects A. Mihăilă, D. Benţa, L. Rusu Alin Mihăilă*, Lucia Rusu Faculty of Economics and Business Administration Babes-Bolyai University of Cluj-Napoca alin.mihaila@econ.ubbcluj.ro, lucia.rusu@econ.ubbcluj.ro *Coresponding author: alin.mihaila@econ.ubbcluj.ro Dan Benţa Faculty of Law and Economics Agora University of Oradea dan.benta@univagora.ro Abstract: Reporting processes in EU funded projects involve a huge amount of financial operations. keywords: action; application; data; projects; reporting; software; time; web cache: ijccc-1477.pdf plain text: ijccc-1477.txt item: #116 of 981 id: ijccc-1478 author: Nino Ruiz, Elias D.; Miranda, Stella; Ardila, Carlos J.; Nieto, Wilson title: PARMODS: A Parallel Framework for MODS Metaheuristics date: 2014-12-01 words: 2981 flesch: 59 summary: ∈ [0, 1] 10: Compute γ = exp ( − J(α+)−J(α−) Tk ) (3) 11: if η < γ then 12: α+ ← α− 13: end if 14: end if 15: end for 16: Tk+1 ← ρ ·Tk 17: end for SAMODS is a Simulated-Annealing (SA) based MODS method which explores the feasible solution space S in a more “generous” manner. Now we are ready to present our parallel approach of MODS based methods. keywords: mods; parmods; sagamods; samods; solution cache: ijccc-1478.pdf plain text: ijccc-1478.txt item: #117 of 981 id: ijccc-1479 author: Paduraru, Ciprian I. title: An Online Load Balancing Algorithm for a Hierarchical Ring Topology date: 2014-12-01 words: 4165 flesch: 55 summary: The simulator creates random requests to simulate a high workload then checks how many of them were solved per interval of average response time. 756 C.I. Paduraru System workload Average delays in response time - proposed algorithm Average delays in response time algorithm in [1] 20 % 1.23 % 15 % 50 % 1.45 % 26.4 % 100 % 1.72 % 54.8 % 200 % 103.14 % 104.2 % Table 1: Shows average response times with different system workloads. Intervals of average response times Average number of requests solved in proposed algorithm Average number of requests solved in [1] 10-100 4233 1651 101-200 2397 1675 201-300 1683 1649 301-400 779 1693 401-500 541 1680 Table 2: Number of requests solved for different average response time intervals. keywords: algorithm; average; network; node; request; response; ring; time cache: ijccc-1479.pdf plain text: ijccc-1479.txt item: #118 of 981 id: ijccc-1480 author: Pajić, Ana; Pantelić, Ognjen; Stanojević, Bogdana title: Representing IT Performance Management as Metamodel date: 2014-12-01 words: 4845 flesch: 44 summary: The paper points out the necessity of analyzing, comparing and integrating IT governance frameworks in order to complement different knowl- edge and generate ontological metamodel of IT performance management. Strong emphasis is now placed on developing IT governance frameworks to help the management to ensure that organizations realize optimal value from IT business investments at an affordable cost with a known and acceptable level of risk. keywords: business; framework; goals; governance; investments; management; metamodel; performance; process; value cache: ijccc-1480.pdf plain text: ijccc-1480.txt item: #119 of 981 id: ijccc-1482 author: Å¢ugui, Andrei title: GLM Analysis for fMRI using Connex Array date: 2014-12-01 words: 2826 flesch: 55 summary: We mention that image registration is the most time consuming preprocessing step (about 95% from total time computation time used for a single volume), but using Connex’s computational power, we showed once again (see Table 1) 772 A. Ţugui that time bottleneck can be eliminated using Connex Array. We show this discrete time slice acquisition of one voxel in Figure 2. Figure 2: fMRI slice time acquisition keywords: analysis; connex; data; fmri; glm; time; vector cache: ijccc-1482.pdf plain text: ijccc-1482.txt item: #120 of 981 id: ijccc-1484 author: Vanderhaegen, Frédéric title: Dissonance Engineering: A New Challenge to Analyse Risky Knowledge When using a System date: 2014-12-01 words: 4340 flesch: 48 summary: This simple example has shown the interest of such a new approach to analysis risks involving rule based knowledge. Two modules are in- tegrated: the module that detects possible erroneous affordances and the module that detects possible contradictory knowledge, Figure 1. keywords: asc; car; control; dissonance; knowledge; rules; speed; system cache: ijccc-1484.pdf plain text: ijccc-1484.txt item: #121 of 981 id: ijccc-1485 author: Wang, Tao; Zhang, Gexiang; Rong, Haina; Pérez-Jiménez, Mario J. title: Application of Fuzzy Reasoning Spiking Neural P Systems to Fault Diagnosis date: 2014-12-01 words: 6157 flesch: 66 summary: ronghaina@126.com *Corresponding author: wangtaocdu@gmail.com Mario J. Pérez-Jiménez Research Group on Natural Computing Department of Computer Science and Artificial Intelligence University of Sevilla, Sevilla, 41012, Spain marper@us.es Abstract: This paper discusses the application of fuzzy reasoning spiking neural P systems with trapezoidal fuzzy numbers (tFRSN P systems) to fault diagnosis of power systems, where a matrix-based fuzzy reasoning algorithm based on the dynamic firing mechanism of neurons is used to develop the inference ability of tFRSN P systems from classical reasoning to fuzzy reasoning. This paper discusses the extended version of rFRSN P systems, i.e., fuzzy reasoning spiking neural P systems with trapezoidal fuzzy numbers (tFRSN P systems), and its application to fault diagnosis of power systems. keywords: diagnosis; fault; neurons; p systems; power; reasoning; rule; systems; tfrsn cache: ijccc-1485.pdf plain text: ijccc-1485.txt item: #122 of 981 id: ijccc-1514 author: Chandanapalli, S. Babu; Reddy, E. Sreenivasa; Davuluri, D. Rajya Lakshmi title: Efficient Design and Deployment of Aqua Monitoring Systems Using WSNs and Correlation Analysis date: 2015-08-01 words: 2910 flesch: 47 summary: We propose the implementation of wireless sensor networks to have a distributed collection of sensor nodes networked together to transfer the raw data to a central location known as base station through GSM. • User interface design in local language 2.2 Design of transmitter station We propose the implementation of wireless sensor networks to have a distributed collection of sensor nodes networked together to transfer the raw data to a central location known as base station through GSM. keywords: aquaculture; data; design; monitoring; parameters; sensor; system; temperature; water cache: ijccc-1514.pdf plain text: ijccc-1514.txt item: #123 of 981 id: ijccc-152 author: Hamidi, Faiçal; Jerbi, Houcem; Aggoune, Wahida; DJEMAI, Mohamed; Abdelkrim, Mohamed Naceur title: Enlarging the Domain of Attraction in Nonlinear Polynomial Systems date: 2013-08-01 words: 4115 flesch: 67 summary: ( [3]) The lower bound ĉ∗ is given by ĉ∗ = −λ∗ (U) 1 + µλ∗ (U) (13) where λ∗ (U) is the solution of the following GEVP λ∗ (U) = inf U∈U,α,S>0,λ λ (14) such that    1 + µλ > 0; U ∈ U; S > 0 λW (S) > ∈ R , c ≤ c∗ if there exists U ∈ U and s(x) a positive definite polynomial such that V̇ (x, U) + keywords: function; lmi; lyapunov; polynomial cache: ijccc-152.pdf plain text: ijccc-152.txt item: #124 of 981 id: ijccc-1543 author: Lung, Rodica Ioana title: Direct Evolutionary Search for Nash Equilibria Detection date: 2016-07-03 words: 2770 flesch: 66 summary: It can be said that strategy profile P is more stable (closer to equilibrium) either Q Nash ascends P, 3. keywords: avg; nash; player; strategy cache: ijccc-1543.pdf plain text: ijccc-1543.txt item: #125 of 981 id: ijccc-1561 author: Csokmai, Lehel Szabolcs; Å¢arcă, Radu Cătălin; Bungău, Constantin; Husi, Géza title: A Comprehensive Approach to Off-line Advanced Error Troubleshooting in Intelligent Manufacturing Systems date: 2014-11-17 words: 2226 flesch: 38 summary: [3] Kao, J.F., (1995), Optimal recovery strategies for manufacturing systems, European Journal of Operational Research, 80(2):252-263. Nowadays, in flexible manufacturing systems, smart products and FMSs components (equipped with embedded smart devices) are wirelessly networked and remotely monitored in a real-time, using for this intelligent control systems. keywords: device; error; fms; line; manufacturing; system; troubleshooting cache: ijccc-1561.pdf plain text: ijccc-1561.txt item: #126 of 981 id: ijccc-1562 author: Dale, Sanda; Silaghi, Helga; Zmaranda, Doina; Rohde, Ulrich title: Intelligent Design Environment for Second-Order Positioning Systems date: 2014-11-17 words: 4536 flesch: 36 summary: As it can be observed from the description above, the usage of the proposed design envi- ronment presumes that the user has some minimal knowledge about control systems and their performances evaluation (for reconfiguration of the schemes and parameters correction) with- out implying detailed knowledge regarding control system design. Keywords: interpolative control algorithms, intelligent optimization, design envi- ronment, mechatronic positioning system. keywords: algorithms; control; controller; design; environment; interpolation; state; structure; system; table cache: ijccc-1562.pdf plain text: ijccc-1562.txt item: #127 of 981 id: ijccc-1563 author: Millí¡n, Ginno; Lefranc, Gastón title: Application of the Analysis of Self-similar Teletraffic with Long-range Dependence (LRD) at the Network Layer Level date: 2014-11-11 words: 3719 flesch: 43 summary: With the purpose of answering these questions, that same paper states and then gives the foundation for the validity of the following working hypothesis:It is completely feasible to restrict the evolution of a statistically self-similar process to a well defined application setting without altering its nature and its more important properties, in that way highlighting the validity of its postulates and giving greater plausibility to its physical interpretation”, clarifying that the plausibility refers to the action of conferring an admissible, and therefore worth considering, character to one or various parameters that compose an analytical model whose interpretations are not only mathematical idealizations, and that the theoretical proof of that hypothesis is based essentially on the proposal of Ryu and Lowen [2], which consists in making a distinction between the self-similarity observed at the application level and the self-similarity observed at the network level, but with the substantial difference of not considering any particular traffic model as in the case of the authors, in which the proposal is developed to support the analysis of the results obtained from using the fractal point process (FPP) model proposed in [3], to carry Copyright © 2006-2015 by CCC Publications Application of the Analysis of Self-similar Teletraffic with Long-range Dependence (LRD) at the Network Layer Level 63 out the characterization of traffic flow in high speed networks. In this paper this novel concept is applied to the study of traffic recorded in an IEEE 802.3u network environment with the aim of proving its validity as a simple and efficient tool for high speed computer network traffic flow analysis. keywords: analysis; application; level; network; self; time; traffic cache: ijccc-1563.pdf plain text: ijccc-1563.txt item: #128 of 981 id: ijccc-1567 author: Song, Xiaoxiao; Wang, Jun title: An Approximate Algorithm Combining P Systems and Active Evolutionary Algorithms for Traveling Salesman Problems date: 2014-11-17 words: 4662 flesch: 62 summary: Membrane algorithm is one of the research hotspots after Nishida Conclusions are drawn in Section 5. 2 P Systems and membrane algorithm 2.1 P Systems P systems could be divided into three groups: cell-like P systems, tissue-like P systems and neural-like P systems keywords: aeaps; algorithm; evolution; membrane; problems; region; solutions; systems cache: ijccc-1567.pdf plain text: ijccc-1567.txt item: #129 of 981 id: ijccc-1569 author: Velí¡squez-Villada, Carlos; Solano, Fernando; Donoso, Yezid title: Routing Optimization for Delay Tolerant Networks in Rural Applications Using a Distributed Algorithm date: 2014-11-17 words: 5094 flesch: 45 summary: [4] Johnson D. L. & Roux, K. (2008), Building rural wireless networks: Lessons learnt and future directions, Proceedings of the 2008 ACM workshop on Wireless networks and systems for developing regions. These assumptions are that there are end-to-end paths be- tween source and destination; that retransmissions based on feedback from data receivers are effective for errors correction; that end-to-end loss is relatively small; that all network nodes support the TCP/IP protocols; that applications does not need to be aware of the communica- tions performance; that security can be achieved through mechanisms on end nodes; that packet switching is the most appropriate abstraction for interoperability and performance; and, that a single route is sufficient for acceptable performance. keywords: algorithm; applications; availability; delay; dtn; information; internet; message; network; node; probability; time cache: ijccc-1569.pdf plain text: ijccc-1569.txt item: #130 of 981 id: ijccc-1570 author: Wu, Bin; Zuo, Jiakuo; Zhao, Li; Zou, Cairong title: Energy-Efficient Design for Relay-Aided MIMO-OFDM Cognitive Radio Networks date: 2014-11-17 words: 4991 flesch: 57 summary: Keywords: cognitive radio, power allocation, MIMO, relay, fractional programming. [8] investigated subcarrier pairing and power allocation for MIMO-OFDM relay-aided CR networks and used environmental learning algorithm to mitigate the interference of the PUs. keywords: energy; mimo; power; problem; psm; relay cache: ijccc-1570.pdf plain text: ijccc-1570.txt item: #131 of 981 id: ijccc-1571 author: Zhang, Qiang; Li, Shu-Rong; Guo, Jian-Xin; Gao, Xiao-Shan title: Tractable Algorithm for Robust Time-Optimal Trajectory Planning of Robotic Manipulators under Confined Torque date: 2014-11-17 words: 5928 flesch: 69 summary: From the approximation theory, quadratic splines can approximate the solution of optimal control problems to any given precision when K is large enough [21]. [14] Diehl, M.; Gerhard, J.; Marquardt, W.; Monnigmann, M.(2008); Numerical solution ap- proaches for robust nonlinear optimal control problems, Computers & Chemical Engineer- ing, ISSN 0098-1354, 32(6): 1279-1292. keywords: control; joint; linear; path; problem; time; torque; trajectory cache: ijccc-1571.pdf plain text: ijccc-1571.txt item: #132 of 981 id: ijccc-1572 author: Zhang, X.Z.; Wang, Y.N. title: Design of Robust Fuzzy Sliding-Mode Controller for a Class of Uncertain Takagi-Sugeno Nonlinear Systems date: 2014-11-17 words: 4678 flesch: 67 summary: Then, the robustly stabilized control to uncertainties of nonlinear fuzzy systems is required. Recently, the SMC has been successfully applied into solving the stabilization problems for uncertain fuzzy systems [11, 12]. keywords: control; controller; design; fuzzy; i=1; systems; uncertainties cache: ijccc-1572.pdf plain text: ijccc-1572.txt item: #133 of 981 id: ijccc-1577 author: Kuzu, Ahmet; Bogosyan, Seta; Gokasan, Metin title: Predictive Input Delay Compensation with Grey Predictor for Networked Control System date: 2015-11-16 words: 3383 flesch: 52 summary: 1 Introduction Because of their huge potential to contribute to human life in many different ways, tele- operation and bilateral control systems have been attracting significant interest in control and Copyright © 2006-2016 by CCC Publications - Agora University 68 A. Kuzu, S. Bogosyan, M. Gokasan communication communities. Time delay compensation problem in bilateral control systems has been addressed by many different approaches. keywords: control; delay; grey; joint; prediction; system cache: ijccc-1577.pdf plain text: ijccc-1577.txt item: #134 of 981 id: ijccc-160 author: Boiangiu, Costin Anton; Tanase, Mihai Cristian; Ioanitescu, Radu title: Handwritten Documents Text Line Segmentation based on Information Energy date: 2014-01-03 words: 2655 flesch: 45 summary: Keywords: text line segmentation, text recognition, information energy, OCR. Only after text lines are correctly identified can the process proceed to the recognition of individual characters. keywords: documents; energy; information; line; segmentation; text cache: ijccc-160.pdf plain text: ijccc-160.txt item: #135 of 981 id: ijccc-161 author: Yousefikhoshbakht, Majid; Didehvar, Farzad; Rahmati, Farhad title: An Efficient Solution for the VRP by Using a Hybrid Elite Ant System date: 2014-04-04 words: 3812 flesch: 64 summary: − c(s∗∗) c(s∗) × 100 (4) Table 1: Computational results for standard VRP problems Instance n m SA TS GA SS-ACO PSO GAPSO HEAS mHEAS PD BKS C1 50 5 528 524 524.61 524.61 524.61 524.61 524.61 5 0 524.61 C2 75 10 838 844 849.77 835.26 844.42 835.26 847.14 10 -1.42 835.26 C3 100 8 829 835 840.72 830.14 829.40 826.14 712.36 8 13.77 826.14 C4 150 12 1058 1052 1055.85 1038.20 1048.89 1028.42 1066.89 12 -3.74 1028.42 C5 199 17 1376 1354 1378.73 1307.18 1323.89 1294.21 1311.35 17 -1.54 1291.45 C6 50 6 555 555 560.29 559.12 555.43 555.43 555.43 6 0 555.43 C7 75 11 909 913 914.13 912.68 917.68 909.68 909.68 11 0 909.68 C8 100 9 866 866 872.82 869.34 867.01 865.94 865.94 9 0 865.94 C9 150 14 1164 1188 1193.05 1179.4 1181.14 1163.41 1162.89 14 -0.03 1162.55 C10 199 18 1418 1422 1483.06 1410.26 1428.46 1397.51 1404.75 18 -0.64 1395.85 C11 120 7 1176 1042 1060.24 1044.12 1051.87 1042.11 1042.11 7 0 1042.11 C12 100 10 826 819 877.8 824.31 819.56 819.56 840.64 10 -2.57 819.56 C13 120 11 1545 1547 1562.25 1556.52 1546.20 1544.57 1545.93 11 -0.31 1541.14 C14 100 11 890 866 872.34 870.26 866.37 866.37 866.37 11 0 866.37 It was found out that using polynomial k2 can generate better solutions for the algorithm. keywords: algorithm; ant; pheromone; problem; solution; vehicle; vrp cache: ijccc-161.pdf plain text: ijccc-161.txt item: #136 of 981 id: ijccc-1628 author: Gudoniene, Daina; Maskeliunas, Rytis; Rutkauskiene, Danguole title: The Model for Learning Objects Design Based on Semantic Technologies date: 2017-03-01 words: 5007 flesch: 34 summary: In fact, the Semantic Web could be treated as a very suitable platform for implementation of e-learning objects since it provides all means for (e-learning) ontology development, ontology-based annotation of learning materials, their com- position in learning courses and (pro)active delivery of the learning materials through e-learning portals. danguole.rutkauskiene@ktu.lt Abstract: The paper presents a comparison of state of the art methods and tech- niques on implementation of learning objects (LO) in the field of information and communication technologies (ICT) using semantic web services for e-learning. keywords: content; design; learning; model; objects; semantic; services; system; user; web cache: ijccc-1628.pdf plain text: ijccc-1628.txt item: #137 of 981 id: ijccc-163 author: Alfaro, Miguel D.; Sepúlveda, Juan M.; Ulloa, Jasmí­n A. title: Forecasting Chaotic Series in Manufacturing Systems by Vector Support Machine Regression and Neural Networks date: 2012-11-13 words: 3235 flesch: 53 summary: When dealing with chaotic systems, the management, control, and forecasting are very difficult tasks. For the case of chaotic systems, the very theory on NLDS provides forecasting methods [16]. keywords: figure; forecasting; input; manufacturing; number; systems; time; vector cache: ijccc-163.pdf plain text: ijccc-163.txt item: #138 of 981 id: ijccc-164 author: Arivudainambi, D.; Rekha, D. title: Broadcast Scheduling Problem in TDMA Ad Hoc Networks using Immune Genetic Algorithm date: 2012-11-13 words: 5762 flesch: 54 summary: Immune genetic algorithm (IGA) does not perform mutation in a normal way and mutation operator is carried out by two steps in this algorithm 1) Immune selec- tion and 2) Vaccination. The method based on immune genetic algorithm for the broadcast scheduling problem in Ad hoc networks has not been studied so far. keywords: algorithm; broadcast; iga; network; nodes; number; population; problem; scheduling; time cache: ijccc-164.pdf plain text: ijccc-164.txt item: #139 of 981 id: ijccc-165 author: Breaban, Mihaela; Luchian, Henri title: Outlier Detection with Nonlinear Projection Pursuit date: 2012-11-13 words: 3770 flesch: 45 summary: Keywords: outlier detection, nonlinear projections, genetic algorithms 1 Introduction Mining for outliers is of great importance in many domains: fraud detection, disease identi- fication,intrusion detection, fault diagnosis and so on. This paper proposes and investigates a new framework for outlier detection derived from the classical projection pursuit methodology, aiming at alleviating some of the drawbacks of the standard approach. keywords: algorithm; data; detection; linear; methods; outliers; projection; pursuit cache: ijccc-165.pdf plain text: ijccc-165.txt item: #140 of 981 id: ijccc-1656 author: Jiang, Wen; Yang, Yan; Luo, Yu; Qin, Xiyun title: Determining Basic Probability Assignment Based on the Improved Similarity Measures of Generalized Fuzzy Numbers date: 2015-04-28 words: 6182 flesch: 68 summary: Then, we propose a new method for obtaining basic probability assignment (BPA) based on the proposed similarity measure method between generalized fuzzy numbers. Then, a new method to obtain basic probability assignment (BPA) is proposed based on the improved similarity measure between generalized fuzzy numbers. keywords: method; numbers; set; similarity cache: ijccc-1656.pdf plain text: ijccc-1656.txt item: #141 of 981 id: ijccc-166 author: Canete, Lucio title: Bio-inspired Sensory Systems in Automata for Hazardous Environments date: 2012-11-13 words: 1934 flesch: 51 summary: This behavior is shown in Figure 3. Figure 2 shows how decreased the percentage the achievements (identification of cryptic elements) cause of reduction Attention Level. 40 L. Canete Figure 2: The rover which worked in Patagonia Figure 3: Variation observed of Attention Level in two kinds of environments in Patagonia Bio-inspired Sensory Systems in Automata for Hazardous Environments 41 5 Conclusions Given the syntax, semantics and praxis of the model, it was possible tested it with computer simulations to study the performance of automatic machines in hostile environments. keywords: attention; automata; environments; level; performance cache: ijccc-166.pdf plain text: ijccc-166.txt item: #142 of 981 id: ijccc-1667 author: Wang, Shuang; Wu, Lina; Zhou, Fuchai; Zheng, Cuicui; Wang, Haibo title: Group Pattern Mining on Moving Objects’ Uncertain Trajectories date: 2015-04-28 words: 6580 flesch: 57 summary: A novel concept, uncertain group pattern, is proposed, and then a two-step approach is introduced to deal with it. In Section 4, we give the definitions of uncertain group patterns, and then introduce our efficient algorithm based on breath-first search strategy. keywords: algorithm; data; group; group pattern; mining; objects; pattern; probability; time; timestamp; trajectories; trajectory; uncertain cache: ijccc-1667.pdf plain text: ijccc-1667.txt item: #143 of 981 id: ijccc-1668 author: Huang, Xinyan; Wang, Xinjun; Zhang, Yan; Zhao, Jinxin title: Mining Periodic Traces of an Entity on Web date: 2015-07-24 words: 5039 flesch: 62 summary: Event relationship graph is to link all the events of an entity according to the relationship between them. In addition, a periodic trace can be loosely defined as the repetitive events series with several kinds of event relationship between them, such as causal, part of and following relationship etc. keywords: algorithm; entity; event; graph; mining; patterns; periodic; relationship; traces; vertice cache: ijccc-1668.pdf plain text: ijccc-1668.txt item: #144 of 981 id: ijccc-167 author: Copie, Adrian; FortiÅŸ, Teodor-Florin; Munteanu, Victor Ion title: Datastores in Cloud Governance date: 2012-11-13 words: 3250 flesch: 46 summary: We have proposed a Cloud Governance architecture based on mOSAIC’s Cloud Management components that aims to manage and govern the services infrastructure. We have proposed a Cloud Governance architecture based on mOSAIC’s multi-agent Cloud Management solution. keywords: cloud; cloud governance; datastore; governance; information; management; security; service cache: ijccc-167.pdf plain text: ijccc-167.txt item: #145 of 981 id: ijccc-1672 author: Filatovas, Ernestas; Podkopaev, Dmitry; Kurasova, Olga title: A Visualization Technique for Accessing Solution Pool in Interactive Methods of Multiobjective Optimization date: 2015-06-23 words: 5986 flesch: 46 summary: We propose to enhance interactive methods with visualization of the set of solution outcomes using dimensionality reduction and interactive mechanisms for exploration of the solution pool. After adding them to the solution pool and recalculating low-dimensional points by minimizing (2), the points corresponding to already mapped solution outcomes will also change. keywords: methods; optimal; optimization; outcomes; pareto; pool; solution; visualization cache: ijccc-1672.pdf plain text: ijccc-1672.txt item: #146 of 981 id: ijccc-1674 author: Rehman, Zobia; Kifor, Claudiu Vasile title: An Ontology to Support Semantic Management of FMEA Knowledge date: 2016-07-03 words: 3949 flesch: 50 summary: 4 Development of FMEA ontology According to classic definition by [3] the ontology is an explicit specification of conceptualiza- tion. Whereas figure 11 shows a few instances of FMEA ontology in RDF form. keywords: class; domain; failure; figure; fmea; information; knowledge; management; mode; ontology; process cache: ijccc-1674.pdf plain text: ijccc-1674.txt item: #147 of 981 id: ijccc-168 author: Cordova, Felisa M.; Yanine, Franco F. title: Homeostatic Control of Sustainable Energy Grid Applied to Natural Disasters date: 2012-11-13 words: 5932 flesch: 38 summary: In the last 20 years, DG and the decentralization of electric power systems in general has gained substantial ground, especially with the rapid ad- vancement in renewable energy technologies (RET), power electronics for system interfacing, and the continuous efforts and great strides, especially in developed countries, to integrate NCRE/al- ternative energies into their power generation matrices. Also aiding this trend is the rapid growth of the power electronics techniques, the photovoltaic (PV) and wind power generations systems have increased rapidly (see [21], [22], and [23]).For a microgrid it is essential that the energy management system (EMS) employed delivers active and reactive power generation by means of set-points for the generation sources, including the battery bank used in this particular case, and sends information to con- sumers about changes in energy supply and consumption. keywords: battery; control; electric; energy; generation; grid; homes; hybrid; microgrid; power; power systems; storage; supply; system; wind cache: ijccc-168.pdf plain text: ijccc-168.txt item: #148 of 981 id: ijccc-1682 author: Libnik, Rok; Svigelj, Ales title: Adaptive probe-based congestion-aware handover procedure using SIP protocol date: 2015-07-24 words: 7220 flesch: 53 summary: [24] J. Hautakorpi, G. Camarillo, R. Penfield, A. Hawrylyshen, M. Bhatia, Requirements from SIP (Session Initiation Protocol) Session Border Control Deployments, Internet-Draft, Octo- ber 23, 2008, URL: http://www.ietf.org/internet-drafts/draft-ietf-sipping-sbc-funcs-07.txt Adaptive Probe-based Congestion-aware Handover Procedure Using SIP Protocol 701 [25] R. Libnik, A. Svigelj, G. Kandus (2008); Performance evaluation of SIP based handover in heterogeneous access networks, WSEAS transactions on communications, 7(5): 448-458. However, the results can be easily applied to the scenario with several users that are making calls with the total sum of conversation time 28,800 s. In defined network architecture WLAN network access link was randomly congested with ad- ditional UDP traffic, which was generated by additional VoIP clients. keywords: adaptive; congestion; delay; end; handover; messages; mobility; network; procedure; protocol; signalling; simulation; sip; tmid; wlan cache: ijccc-1682.pdf plain text: ijccc-1682.txt item: #149 of 981 id: ijccc-169 author: Ghorbannia Delavar, Arash; Abbas Baradaran, Amir title: CRCWSN: Presenting a Routing Algorithm by using Re-clustering to Reduce Energy Consumption in WSN date: 2012-11-13 words: 3042 flesch: 57 summary: Also the base energy of nodes differs and sensor nodes are informed of situation , i.e. they need hardware ,s such as GPS to do this. Keywords: Genetic algorithm, wireless sensor network (WSN), routing, reduce energy consumption, re-clustering. keywords: algorithm; energy; nodes; number; population; sensor cache: ijccc-169.pdf plain text: ijccc-169.txt item: #150 of 981 id: ijccc-17 author: Jiang, Nan; Jin, Sixin; Guo, Yan; He, Yueshun title: Localization of Wireless Sensor Network Based on Genetic Algorithm date: 2013-11-11 words: 5600 flesch: 55 summary: In this method, we use a new way to approximate the distance between anchor node and unknown node which is out of the anchor nodes’ communication radius. There are two kinds of nodes, one is anchor node such as node A, the other is unknown node such as node C. Node K is either kind of nodes in the network. keywords: coordinate; localization; nodes; o rd; y c cache: ijccc-17.pdf plain text: ijccc-17.txt item: #151 of 981 id: ijccc-170 author: Lonea, Alina Madalina; Popescu, Daniela Elena; Tianfield, Huaglory title: Detecting DDoS Attacks in Cloud Computing Environment date: 2012-11-13 words: 4057 flesch: 52 summary: However, IDS sensors have the limitations that they yield massive amount of alerts and produce high false positive rates and false negative rates [3]. (2009) in their theoretical IDS architecture for cloud, which utilizing an IDS Management Unit. keywords: attacks; cloud; computing; ddos; dempster; detection; dst; ids cache: ijccc-170.pdf plain text: ijccc-170.txt item: #152 of 981 id: ijccc-171 author: Maldonado-Lopez, Ferney A.; Donoso, Yezid title: Reliable Critical Infrastructure: Multiple Failures for Multicast using Multi-Objective Approach date: 2012-11-13 words: 3102 flesch: 53 summary: Due to multicast applications demand important amount of traffic, they need a mechanism to protect them from network failures. SPEA has been widely used to solve network optimization problems [11]. keywords: algorithm; cost; failures; multicast; network; problem cache: ijccc-171.pdf plain text: ijccc-171.txt item: #153 of 981 id: ijccc-173 author: Neghina, Diana-Elena; Scarlat, Emil title: Managing Information Technology Security in the Context of Cyber Crime Trends date: 2012-11-13 words: 3578 flesch: 23 summary: IT personnel must have specialized knowledge about cyber threat risk; moreover, as a required competency security feeds from operational units must be centrally coordinated to manage and 102 D. Neghina, E. Scarlat keep cyber threat risks within defined acceptance levels. Due to the fact that cyber threats are a relatively new and constant source of risk, continu- ously changing, entities are not as capable at managing cyber threat risk as they are at managing any other operational risk related to business activities. keywords: attacks; cyber; data; information; management; organization; risk; security; threat cache: ijccc-173.pdf plain text: ijccc-173.txt item: #154 of 981 id: ijccc-174 author: Peulic, Aleksandar; Dragicevic, Snezana; Jovanovic, Zeljko; Krneta, Radojka title: Flexible GPS/GPRS based System for Parameters Monitoring in the District Heating System date: 2012-11-13 words: 2668 flesch: 49 summary: To control the energy transfer in the district heating substation, some kind of control system is needed. District heating substations, as a link between hot-water network and internal heating installations in buildings, are used to adapt high- pressure hot water to temperature and pressure conditions required by space heating systems of buildings as well as by the systems for the preparation of hot service water in buildings. keywords: control; data; district; gps; heating; monitoring; parameters; power; system cache: ijccc-174.pdf plain text: ijccc-174.txt item: #155 of 981 id: ijccc-1751 author: Deivamani, M.; Murugaiyan, S.R.; Ravisankar, V.; Victer Paul, P.; Baskaran, R.; Dhavachelvan, P. title: Web Service Composition Framework using Petrinet and Web Service Data Cache in MANET date: 2015-04-01 words: 6218 flesch: 55 summary: Best Case: The total number of message hops required to access the cached data item is minimum, when service item is being cached in any LN which is under the HN of the requesting node. • n be the number of service items cached in mth LN and 0 < m < k. • Sid is web service index entry in LN_TABLE of a LN. keywords: aco; cache; data; dst; item; manet; network; number; service; web cache: ijccc-1751.pdf plain text: ijccc-1751.txt item: #156 of 981 id: ijccc-1752 author: Han, Baoru; Li, Jingbing; Li, Yujia title: Zero-watermarking Algorithm for Medical Volume Data Based on Difference Hashing date: 2015-04-01 words: 3335 flesch: 53 summary: The emergence of medical image digital watermarking can solve this problem [11]. Medical image is not only an important basis for doctors to diagnose the disease, but also involving the patient’s privacy. keywords: algorithm; attack; data; figure; hashing; image; volume; watermarking cache: ijccc-1752.pdf plain text: ijccc-1752.txt item: #157 of 981 id: ijccc-1753 author: Ivanović, Mirjana; Mitrović, Dejan; Budimac, Zoran; Jerinić, Ljubomir; Bădică, Costin title: HAPA: Harvester and Pedagogical Agents in E-learning Environments date: 2015-04-01 words: 5809 flesch: 57 summary: Harvester and Pedagogical Agents in E-learning Environments M. Ivanović, D. Mitrović, Z. Budimac, L. Jerinić, C. Bădică Mirjana Ivanović*, Dejan Mitrović, Zoran Budimac, Ljubomir Jerinić Department of Mathematics and Informatics Faculty of Sciences, University of Novi Sad, Serbia mira@dmi.uns.ac.rs, dejan@dmi.uns.ac.rs, zjb@dmi.uns.ac.rs, jerinic@dmi.uns.ac.rs *Corresponding author: mira@dmi.uns.ac.rs Costin Bădică Computer and Information Technology Department Faculty of Automatics, Computers and Electronics, University of Craiova, Romania cbadica@software.ucv.ro Abstract: In the field of e-learning and tutoring systems two categories of soft- ware agents are of the special interest: harvester and pedagogical agents. This paper proposes a novel e-learning system that successfully combines both of these agent categories and introduces two distinct sub-types of pedagogical agents helpful and misleading. keywords: agents; code; hapa; harvester; hints; java; learning; programming; students; system cache: ijccc-1753.pdf plain text: ijccc-1753.txt item: #158 of 981 id: ijccc-1754 author: Rusu, Lucia; Cramariuc, Bogdan; Benţa, Dan; Mailat, Marinela title: Implementing BPMN 2.0 Scenarios for AAL@Home Solution date: 2015-04-01 words: 3707 flesch: 43 summary: 232 L. Rusu, B. Cramariuc, D. Benta, M. Mailat Another solution for Ambient Intelligence based home care systems (AHCS) was offered by amiCA (AmI Care and Assistance) prototype for monitoring Monitoring drinking, Monitoring Food Quality, Location Tracking and Fall detection, using different amiCA services intercon- nected by service platform which was developed in BelAmI project (Bilateral German-Hungarian Collaboration Project on Ambient Intelligence System), based on SOA paradigm. When it receives an alarm from one of the sites, it creates a device notification and follows the chain of tasks assigned for each type of alarm process diagrams, from active to complete execution of that process. keywords: alarm; bed; bpmn; care; home; monitoring; needs; process; sensor; services; solution cache: ijccc-1754.pdf plain text: ijccc-1754.txt item: #159 of 981 id: ijccc-1755 author: Sepulveda, Juan M.; Derpich, Ivan S. title: Multicriteria Supplier Classification for DSS: Comparative Analysis of Two Methods date: 2015-04-01 words: 3750 flesch: 50 summary: However, in supplier management a more strategic task is classifying suppliers into categories for deciding the relational approach to be followed. Multicriteria Supplier Classification for DSS: Comparative Analysis of Two Methods J.M. Sepulveda, I.S. Derpich Juan M. Sepulveda*, Ivan S. Derpich University of Santiago 3769 Ecuador Ave., Santiago, Chile, CP 7254758 *Corresponding author: juan.sepulveda@usach.cl ivan.derpich@usach.cl Abstract: In this paper the analysis of two multicriteria decision making (MCDM) methods for sorting suppliers in industrial environments is presented. keywords: categories; category; collaborative; flowsort; integrated; matrix; method; supplier; transactional cache: ijccc-1755.pdf plain text: ijccc-1755.txt item: #160 of 981 id: ijccc-1756 author: Wang, Na; Chen, Yixiang title: A Comprehensive Trust Model Based on Multi-factors for WSNs date: 2005-04-01 words: 5678 flesch: 62 summary: When trust value reserved as an attribute of a node, the detection of fault node and outlier during data aggregation can deduce from trust values. Direct trust value on each neighbor node is calculated by considering trust factors which are defined according to node behaviors in order to detect malicious attacks. keywords: data; energy; factors; fault; model; node; routing; sensor; trust; value cache: ijccc-1756.pdf plain text: ijccc-1756.txt item: #161 of 981 id: ijccc-1757 author: Zhang, Gexiang; Cheng, Jixiang; Gheorghe, Marian; Ipate, Florentin; Wang, Xueyuan title: QEAM: An Approximate Algorithm Using P Systems with Active Membranes date: 2015-04-01 words: 8513 flesch: 61 summary: Being the successful instances of this interaction, membrane algorithms can be regarded as a class of hybrid optimization algorithms using the concepts and principles of metaheuristic search methodologies and the hierarchical or network structures of membranes and, to some extent, rules of P systems. According to the investigations in the literature, there are two main types of membrane algorithms in terms of membrane structures: hierarchical and network. keywords: algorithm; elementary; issn; membrane; number; problems; qeam; qeps; qiea; quantum; rules; sat; systems cache: ijccc-1757.pdf plain text: ijccc-1757.txt item: #162 of 981 id: ijccc-176 author: Shin, Soo Young title: A Novel Method for Service Differentiation in IEEE 802.15.4 : Priority Jamming date: 2012-11-13 words: 3041 flesch: 58 summary: As the ratio of high priority packets increases, the collision probabilities of high priority packets and those of normal priority packets increase and decrease because the node numbers of high priority and normal priority increases and decreases, respectively. The main idea of PJ is to provide high priority packets with greater possibility to access the channel compared to normal priority packets. keywords: 802.15.4; high; ieee; packets; priority cache: ijccc-176.pdf plain text: ijccc-176.txt item: #163 of 981 id: ijccc-178 author: Stanojević, Bogdana; Stanojević, Milan title: Solving Method for Linear Fractional Optimization Problem with Fuzzy Coefficients in the Objective Function date: 2012-11-13 words: 3060 flesch: 61 summary: We have applied recent concepts of fuzzy solution based on α-cuts and Pareto optimal solutions of a bi- objective optimization problem. 4 Example To complete the discussion we describe the procedure of finding fuzzy solution for one simple example. keywords: linear; objective; problem cache: ijccc-178.pdf plain text: ijccc-178.txt item: #164 of 981 id: ijccc-179 author: Thangam, P.; Thanushkodi, K.; Mahendiran, T.V. title: PSO for Graph-Based Segmentation of Wrist Bones in Bone Age Assessment date: 2012-11-13 words: 3270 flesch: 52 summary: Abstract: Skeletal maturity is a reliable indicator of growth and skeletal bone age assessment (BAA) is used in the management and diagnosis of endocrine disorders. The PSO algorithm is implemented with the following parameters, Population size: 50, max min w = 0.6, w = 0.1, C1 = C2 = 1.5, Iteration: 50. PSO for Graph-Based Segmentation of Wrist Bones in Bone Age Assessment 159 5 Conclusion PSO algorithm was used for graph-based segmentation of left hand wrist radiograph images, which can be further used for skeletal bone age assessment. keywords: age; assessment; bone; graph; image; method; pso; segmentation; wrist cache: ijccc-179.pdf plain text: ijccc-179.txt item: #165 of 981 id: ijccc-18 author: Yue, Ming; Wang, Shuang; Yang, Xiaoli title: Backstepping-based Robust Control for WMR with A Boundary in Prior for the Uncertain Rolling Resistance date: 2014-04-04 words: 3856 flesch: 55 summary: [11] K. Watanabe, J. Tang, M. Nakamura, S. Koga and T. Fukuda, Fuzzy-Gaussian neural network and its application to mobile robot control, IEEE Transactions on Control Systems Technology, 4(2): 193-199, 1996. [v ϕ]T , a new dynamic model for control system design can be rewritten by:{ ẋ = Ax + Bu + Dτ̃d y = keywords: control; resistance; robot; rolling; system; tracking; wmr cache: ijccc-18.pdf plain text: ijccc-18.txt item: #166 of 981 id: ijccc-180 author: Watkins, Francisco J.; Hinojosa, Ricardo A.; Oddershede, Astrid M. title: Alternative Wireless Network Technology Implementation for Rural Zones date: 2012-11-13 words: 2070 flesch: 59 summary: There are certain routers that allow the programming of its firmware to form network nodes. Keywords: wireless mesh network. keywords: internet; mesh; network; nodes; wireless cache: ijccc-180.pdf plain text: ijccc-180.txt item: #167 of 981 id: ijccc-181 author: Zmaranda, Doina; Silaghi, Helga; Gabor, Gianina; Vancea, Codruta title: Issues on Applying Knowledge-Based Techniques in Real-Time Control Systems date: 2012-11-13 words: 4654 flesch: 39 summary: There is an important concern when using knowledge-based techniques for real-time control systems: the need for validating systems knowledge, allowing determination if it accurately represents an experts knowledge in the particular domain. Moreover, there is the need for validating systems knowledge, that means determination if it accurately represents an experts knowledge in the particular domain. keywords: control; diagnosis; expert; knowledge; model; plant; plc; process; system; techniques; time cache: ijccc-181.pdf plain text: ijccc-181.txt item: #168 of 981 id: ijccc-185 author: Gholami, Mohammadreza; Panahi, Abdorreza title: Enhancing Nodes Lifetime Optimum Protocol for Dissemination of Information in WSN date: 2014-04-04 words: 2272 flesch: 60 summary: In this case, if virtual node is still working, a message will Enhancing Nodes Lifetime Optimum Protocol for Dissemination of Information in WSN281 be sent over the network to request source nodes for overlooking the virtual node and sending individual packets of exploratory data over the network to find a path to the destination node. In these techniques no global information is available regard the path, making it difficult to create multi- path routes from sources nodes to destination nodes. keywords: data; energy; information; node cache: ijccc-185.pdf plain text: ijccc-185.txt item: #169 of 981 id: ijccc-19 author: Arumugam, Subramanian; Sabeen, S. title: Association Rule Mining using Path Systems in Directed Graphs date: 2013-11-11 words: 3605 flesch: 74 summary: We give efficient algorithms for generating the data structure, for extracting frequent patterns and for association rule mining. Keywords: Directed graphs, path system, in-degree, out-degree, association rule mining, frequent patterns, data mining. keywords: association; patterns; transaction cache: ijccc-19.pdf plain text: ijccc-19.txt item: #170 of 981 id: ijccc-1914 author: BoloÅŸ, Marcel Ioan; Sabău-Popa, Diana-Claudia; Filip, Petru; Manolescu, Adriana title: Development of a Fuzzy Logic System to Identify the Risk of Projects Financed from Structural Funds date: 2015-06-22 words: 4601 flesch: 45 summary: Moreover, the classical statistical indicators provide insight into project financial risk without taking into account the influence factors or Copyright © 2006-2015 by CCC Publications Development of a Fuzzy Logic System to Identify the Risk of Projects Financed from Structural Funds 481 correlations that exist between the various projects [3]. This increase in financial risk value becomes in time proportional to changes in the input variables in the system; 3. keywords: duration; exceeding; implementation; project; project implementation; risk; value cache: ijccc-1914.pdf plain text: ijccc-1914.txt item: #171 of 981 id: ijccc-1923 author: Kou, Gang; Peng, Yi title: An Application of Latent Semantic Analysis for Text Categorization date: 2015-06-01 words: 5978 flesch: 47 summary: A critical survey on the status of multiple criteria decision making theory and practice, OMEGA, 20(5/6): 569-586. Multiple criteria decision making, multiattribute utility theory: the next ten years, Management Science, 38(5): 645¨C654. keywords: analysis; criteria; decision; ejor; factor; journal; lsa; making; matrix; mcdm; multi; multicriteria; research; term; text cache: ijccc-1923.pdf plain text: ijccc-1923.txt item: #172 of 981 id: ijccc-1924 author: Singh, Raman; Kumar, Harish; Singla, R.K. title: A Reference Dataset for Network Traffic Activity Based Intrusion Detection System date: 2015-04-27 words: 4465 flesch: 50 summary: In this paper, University of New Brunswick Network Security Laboratory - Knowledge Disscovery Copyright © 2006-2015 by CCC Publications A Reference Dataset for Network Traffic Activity Based Intrusion Detection System 391 in Databases (NSL KDD) network traffic dataset is taken as a base and Panjab University - Intrusion Dataset (PU-IDS) network traffic dataset is generated synthetically. The Cyber Systems and Technology Group (formerly the DARPA Intrusion Detection Evaluation Group) of MIT Lincoln Laboratory has collected network traffic dataset in 1998 and 1999. keywords: attributes; dataset; detection; ids; instances; network; normal; profiles; protocol_service; traffic cache: ijccc-1924.pdf plain text: ijccc-1924.txt item: #173 of 981 id: ijccc-194 author: Srinivasan, P.; Kamalakkannan, P. title: REAQ-AODV: Route Stability and Energy Aware QoS Routing in Mobile Ad hoc Networks date: 2013-11-11 words: 3764 flesch: 63 summary: The variance of residual node energy is depicted in Figures 5. Keywords: MANET, reliable routing, route stability, biobjective optimization. keywords: aodv; energy; node; packet; route; routing; rsea; stability cache: ijccc-194.pdf plain text: ijccc-194.txt item: #174 of 981 id: ijccc-1962 author: Moldovan, Liviu; Grif, Horațiu-Ștefan; Gligor, Adrian title: ANN Based Inverse Dynamic Model of the 6-PGK Parallel Robot Manipulator date: 2015-11-16 words: 6699 flesch: 51 summary: We consider that this direction of research may find applicability in the case of parallel robots, for the potential offered in solving many complex problems such as those in the case of parallel robot control discussed in this paper. Therefore in current industrial exploitation, parallel robots control requires the use of simple and effective control methods. keywords: control; fann; manipulator; model; neural; parallel; parameters; robot; values;   cache: ijccc-1962.pdf plain text: ijccc-1962.txt item: #175 of 981 id: ijccc-1990 author: Donoso, Yezid; Montoya, Germí¡n A.; Solano, Fernando title: An Energy-Efficient and Routing Approach for Position Estimation using Kalman Filter Techniques in Mobile WSNs date: 2015-08-01 words: 3432 flesch: 50 summary: In addition, it is necessary to determine how many control packets should be sent in order to obtain suitable distance estimations and, at the same time, saving energy consumption to extend the lifetime of the sensor, and avoiding the noise negative effects. In terms of energy consumption, it is necessary to consider consumption by transmission and reception in the sensor. keywords: energy; filter; kalman; position; sensor; sink; target cache: ijccc-1990.pdf plain text: ijccc-1990.txt item: #176 of 981 id: ijccc-1991 author: Hu, Duan; Huang, Benxiong; Tu, Lai; Chen, Shu title: Understanding Social Characteristic from Spatial Proximity in Mobile Social Network date: 2015-08-01 words: 5055 flesch: 39 summary: Compared with sensing applications in traditional sensor network, Social sensing application in mobile social network, as in which all individuals are regarded as numerous sensors, would result in the fusion of mobile, social and sensor data. We first propose a new measurement called geographic community for clustering spatial proximity in mobile social networks. keywords: communities; community; individuals; matrix; mining; network; properties; proximity; structure cache: ijccc-1991.pdf plain text: ijccc-1991.txt item: #177 of 981 id: ijccc-1992 author: Wu, Kehe; Chen, Long; Li, Yi title: A Trusted-based Cloud Computing Virtual Storage System and Key Technologies date: 2015-08-01 words: 6678 flesch: 48 summary: In order to protect con- fidentiality and integrity of user data in Cloud Computing, this paper firstly studies the relevant research works in fields of trusted computing and Cloud Computing data protection and secondly introduces the concept of trusted into Cloud Computing data protection, presents the concept of Trusted Virtual Block Storage Device (TVBSD) and designs the Trusted Cloud Computing Virtual Storage System (TCCVSS). Finally, the result of experiments shows that the system and the related technologies can not only effectively ensure the secu- rity of user data, but also control the consequent performance overhead in a proper range. keywords: cloud; computing; data; device; key; storage; storage device; storage system; system; tvbsd; user; user data cache: ijccc-1992.pdf plain text: ijccc-1992.txt item: #178 of 981 id: ijccc-200 author: Samadi Gharajeh, Mohammad title: Determining the State of the Sensor Nodes Based on Fuzzy Theory in WSNs date: 2014-06-15 words: 3800 flesch: 55 summary: Meanwhile, the coverage is specified as an area that can be accessed by active nodes. The node with highest crisp value is selected as active node, and other nodes are selected as sleep nodes. keywords: energy; method; network; nodes; number; sensor; state cache: ijccc-200.pdf plain text: ijccc-200.txt item: #179 of 981 id: ijccc-2009 author: Sivalingam, Kumar Chandar; Mahendran, Sumathi; Natarajan, Sivanandam title: Forecasting Gold Prices Based on Extreme Learning Machine date: 2016-03-24 words: 3451 flesch: 60 summary: A hike in oil prices will have positive impact on gold prices and vice versa. When there is a hike in equities, gold prices goes down. keywords: data; feed; forecasting; gold; learning; networks; neural; prices cache: ijccc-2009.pdf plain text: ijccc-2009.txt item: #180 of 981 id: ijccc-2010 author: Gharbi, Amira; Benrejeb, Mohamed; Borne, Pierre title: A Taboo Search Optimization of the Control Law of Nonlinear Systems with Bounded Uncertainties date: 2016-01-26 words: 3030 flesch: 66 summary: For this, eight solutions ⋆ will be tested starting from θ = (2,0) θ = [ 0.0796 0.0899 ] , The best non taboo solution minimizing ∥p(x)∥ : pM(2.2,0.1) is obtained for θ = (2.2,0.1), and the solution for θ = (2,0) becomes taboo. keywords: borne; p(x; search; solution; taboo cache: ijccc-2010.pdf plain text: ijccc-2010.txt item: #181 of 981 id: ijccc-202 author: Nadi, Farhad; Khader, Ahamad Tajudin title: An Adaptive GA in Partitioned Search Space date: 2014-04-04 words: 6914 flesch: 65 summary: Adjust region population sizes. − ŕD(i)), (5) where, ŕD(i) and rD(i) are diversification ranks of region Gi at previous and current iterations respectively. keywords: agapss; algorithms; individual; method; number; population; problem; regions; search; space cache: ijccc-202.pdf plain text: ijccc-202.txt item: #182 of 981 id: ijccc-2020 author: Jeong, Gu-Min; Park, Chang-Woo; Choi, Sang-Il; Lee, Kyoungwoo; Dutt, Nikil title: Robust Face Recognition Against Soft-errors Using a Cross-layer Approach date: 2016-08-31 words: 3457 flesch: 54 summary: Simulation results show that the proposed system effectively compensates for the performance degradation due to soft errors and improves the performance by 2.11 % in case of the Yale database and by 10.43 % in case of the ORL database on average as compared to that with the soft-errors induced. Further, soft errors brought a billion-dollar automotive factory to halt every month [4]. keywords: errors; face; layer; method; performance; recognition; system cache: ijccc-2020.pdf plain text: ijccc-2020.txt item: #183 of 981 id: ijccc-2021 author: Janulevicius, Justinas; Ramanauskaite, Simona; Goranin, Nikolaj; Cenys, Antanas title: Content Based Model Transformations: Solutions to Existing Issues with Application in Information Security date: 2016-01-26 words: 6012 flesch: 68 summary: Therefore the accuracy of model transformations plays a key role in ensuring the quality of the process. Model transformation is a very actual problem in practice as well as research as new types of models appear and more accuracy is needed. keywords: b e; c t; e c; e l; e n; e r; l l; n t; s e; s t; t e; t r cache: ijccc-2021.pdf plain text: ijccc-2021.txt item: #184 of 981 id: ijccc-2024 author: Dzitac, Ioan title: Impact of Membrane Computing and P Systems in ISI WoS. Celebrating the 65th Birthday of Gheorghe Păun date: 2015-07-18 words: 4268 flesch: 52 summary: 2 G. Păun and Membrane Computing Gheorghe Păun is the founder of the Membrane Computing area of Computer Science, a research field inspired from the bio-chemistry of the cell (a more suitable name can be Cell Computing). (with G. Rozenberg, A. Salomaa, C. Zandron) Membrane Computing. keywords: berlin; computer; computing; gheorghe; membrane; membrane computing; proceedings; păun; science; systems cache: ijccc-2024.pdf plain text: ijccc-2024.txt item: #185 of 981 id: ijccc-2028 author: Gudauskas, Renaldas; Budryte, Loreta; Kaklauskas, Arturas; Cerkauskas, Justas; Kuzminske, Agne; Jokubauskiene, Saule; Targamadze, Vilija title: Advisory, Negotiation and Intelligent Decision Support System for Leadership Analysis date: 2015-07-01 words: 5014 flesch: 40 summary: At the beginning, a grouped decision making matrix for leader multiple criteria analysis is developed, the first criterion of which is based on the actual salary of the leader compared and the value of a leader being valuated. In this case, the corrected valuex11 = x11−p of a leader being valuated is substituted into a grouped decision making matrix of leader multiple criteria analysis and the calculations according to the formulae 1-12 should be repeated until the inequation 2.20 is satisfied. keywords: analysis; andes; criteria; decision; information; leader; leadership; model; support; system cache: ijccc-2028.pdf plain text: ijccc-2028.txt item: #186 of 981 id: ijccc-2029 author: Karamchandani, Sunil H.; Gandhi, Krutarth J.; Gosalia, Siddharth R.; Madan, Vinod K.; Merchant, Shabbir N.; Desai, Uday B. title: PCA Encrypted Short Acoustic Data Inculcated in Digital Color Images date: 2015-07-01 words: 3206 flesch: 46 summary: We propose to inculcate audio information in color images following the encryption of the short audio messages using the Principal Component Analysis (PCA). The compression ratio between the data to be hidden and original audio signal are calculated as (8) CompressionRatio = OriginalData−CompressedData OriginalData (8) PCA Encrypted Short Acoustic Data Inculcated in Digital Color Images 683 Table 1: Number of principal components and Compression Ratios achieved for various thresholds of Eigen value for cover image (Barbara) E igen Threshold Principal Components Array C ompression Ratio 10−2 171×5 0.9707 10−3 171×11 0.9355 0.8×10−3 171×12 0.9297 10−4 171×31 0.8183 0.75×10−4 171×35 0.7948 The number of principal components exhibits an inverse relation with the Eigen threshold as observed in Table 1, causing the compression ratio to decrease. keywords: audio; components; data; eigen; image; information; steganography; value cache: ijccc-2029.pdf plain text: ijccc-2029.txt item: #187 of 981 id: ijccc-2030 author: Wang, Xueyuan; Zhang, Gexiang; Zhao, Junbo; Rong, Haina; Ipate, Florentin; Lefticaru, Raluca title: A Modified Membrane-Inspired Algorithm Based on Particle Swarm Optimization for Mobile Robot Path Planning date: 2015-06-01 words: 7482 flesch: 60 summary: [15] A. Tuncer, M. Yildirim (2012); Dynamic path planning of mobile robots with improved genetic algorithm, Comput Electr Eng, ISSN 0045-7906, 38: 1564-1572. To the best of our knowledge, there is not any work focusing on the use of a MIEA to solve mobile robot path planning problems (MR3P), which is one of very important real-world applications. keywords: algorithm; fig; membrane; mmpso; obstacles; optimization; particle; path; robot; step cache: ijccc-2030.pdf plain text: ijccc-2030.txt item: #188 of 981 id: ijccc-2049 author: Fan, Zuzhi; Liu, Xiaoli title: Energy Synchronized Transmission Control for Energy-harvesting Sensor Networks date: 2016-01-26 words: 7445 flesch: 58 summary: [11] A. Kansal et al (2007), Power management in energy harvesting sensor networks, ACM Transactions on Embedded Computing Systems, 6(4):32. [5] Berbakov, Lazar et al (2014), Joint optimization of transmission policies for collaborative beamforming with energy harvesting sensors, IEEE Transactions on Wireless Communica- tions, 13(7):3496-3509. keywords: control; data; delay; energy; estc; harvesting; network; node; power; routing; sensor; time; transmission cache: ijccc-2049.pdf plain text: ijccc-2049.txt item: #189 of 981 id: ijccc-2054 author: Ma, Ji; Ni, Wei; Yin, Jie; Liu, Ren Ping; Yuan, Yuyu; Fang, Binxing title: Modeling Mobile Cellular Networks Based on Social Characteristics date: 2016-07-03 words: 5483 flesch: 55 summary: [5] Y. Zhang, A. Årvidsson (2012), Understanding the characteristics of cellular data traffic, ACM SIGCOMM Computer Communication Review, 42(4): 461-466. Previous works has explored that data traffic has significant spatial-temporal pattern in access network. keywords: characteristics; cluster; clustering; data; fluctuation; homogeneity; mobile; model; networks; rbss; traffic; user cache: ijccc-2054.pdf plain text: ijccc-2054.txt item: #190 of 981 id: ijccc-2062 author: Niu, Baozhuang; Chen, Kanglin; Huang, Huizhong; Li, Yuan; Chen, Lei title: System Selection and Performance Evaluation for Manufacturing Company’s ERP Adoption date: 2017-04-23 words: 7146 flesch: 46 summary: (1) Evaluator 1 ERP system ERP vendor final score System 1 0.4957 0.3129 0.4043 System 2 0.1185 0.323 0.22075 System 3 0.3858 0.3641 0.37495 (1) Equal weights to ERP system and ERP vendor Table 12: Evaluation score of ERP systems (2) Evaluator 1 Evaluator 2 Evaluator 3 final score System 1 0.40430(1) 0.37155(2) 0.27362(2) 0.34982(2) Academia also try to identify the factors affecting the performance of ERP system through empirical study, and then construct the evaluation system to evaluate the performance of ERP system implementation ( [5], [15]). keywords: attributes; business; company; erp; erp system; evaluation; implementation; matrix; performance; project; selection; system cache: ijccc-2062.pdf plain text: ijccc-2062.txt item: #191 of 981 id: ijccc-2068 author: Yager, Ronald R. title: Foreword date: 2015-10-03 words: 699 flesch: 47 summary: The editors of this Special Issue of the International Journal of Computers Communications & Control dedicated to the 50th anniversary of the publication of Lotfi Zadeh’s pioneering paper Fuzzy Sets have provided a collection of papers representative of the current state of the field of fuzzy sets. The capacity of fuzzy sets to represent and manage imprecise linguistic concepts has proven to be of great use in the modern technological world where there is now a great interest in building intelligent systems that can model human reasoning but take advantage of the vast amount of information available on the Internet. keywords: fuzzy; sets; zadeh cache: ijccc-2068.pdf plain text: ijccc-2068.txt item: #192 of 981 id: ijccc-2069 author: Dzitac, Ioan title: The Fuzzification of Classical Structures: A General View date: 2015-10-03 words: 8181 flesch: 77 summary: 5 Fuzzy topological spaces From the notion of fuzzy set, to the notion of fuzzy topological space, there was one more step to be taken. This survey contains: various approaches to the definition of fuzzy topology, fundamental interrela- tions between the categories of fuzzy topology and the category of topological spaces, the notion of a fuzzy point, the convergence structure in fuzzy spaces, important topological properties for fuzzy spaces etc. keywords: definition; fuzzy; linear; metric; set; sets; space cache: ijccc-2069.pdf plain text: ijccc-2069.txt item: #193 of 981 id: ijccc-207 author: Pakzad, Mohammad Ali; Nekui, Mohammad Ali title: Direct Method for Stability Analysis of Fractional Delay Systems date: 2013-11-11 words: 2876 flesch: 65 summary: Keywords: Control, fractional delay systems, stability windows, Root-Locus. [6] Bonnet, C.; Partington, J.R. (2002), Analysis of fractional delay systems of retarded and neutral type, Automatica, 38(7):1133-1138. keywords: delay; systems cache: ijccc-207.pdf plain text: ijccc-207.txt item: #194 of 981 id: ijccc-2070 author: Ashraf, Samina; Rehman, Atiq ur; Kerre, Etienne E. title: Group Decision Making with Incomplete Interval-valued Fuzzy Preference Relations Based on the Minimum Operator date: 2015-10-03 words: 5888 flesch: 81 summary: [18] Let R = (rij)n×n be a fuzzy preference relation over the set of alternatives X = {x1, x2, x3, ..., xn} where rij = Let R = (rij)4×4 be an incomplete IVFPR for the alternatives x1, x2, x3 and x4, given as follows: R =   [0.5, 0.5] r12 keywords: preference cache: ijccc-2070.pdf plain text: ijccc-2070.txt item: #195 of 981 id: ijccc-2071 author: Bologa, Octavian; Breaz, Radu Eugen; Racz, Gabriel Sever title: A Fuzzy-based Decision Support Tool for Engineering Curriculum Design date: 2015-10-03 words: 3360 flesch: 40 summary: The inputs of each fuzzy model were the set of customized competences selected from the list and the output was the percent of inclusion in the curriculum. The approach is based on building a list of competences that should be acquired through the study of the specialty subjects. keywords: competences; curriculum; engineering; process; specialty; subjects;   cache: ijccc-2071.pdf plain text: ijccc-2071.txt item: #196 of 981 id: ijccc-2072 author: Du, Zhenbin; Lin, Tsung Chih; Zhao, Tiebiao title: Fuzzy Robust Tracking Control for Uncertain Nonlinear Time-Delay System date: 2015-10-03 words: 4941 flesch: 79 summary: The nonlinear time-delay system is modeled as fuzzy Takagi-Sugeno (T-S) system, and fuzzy logic systems are used to eliminate the uncertainties of the system. Keywords: fuzzy T-S model; fuzzy logic systems; nonlinear system; time-delay; tracking control. keywords: control; nonlinear; system; x(t cache: ijccc-2072.pdf plain text: ijccc-2072.txt item: #197 of 981 id: ijccc-2073 author: Kreinovich, Vladik; Stylios, Chrysostomos D. title: Why Fuzzy Cognitive Maps Are Efficient date: 2015-10-03 words: 4556 flesch: 62 summary: [28] C. Stylios, P. Groumpos (2004), Modeling Complex Systems Using Fuzzy Cognitive Maps, IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 34(1): 155-162. Why Fuzzy Cognitive Maps Are Efficient V. Kreinovich, C. Stylios Vladik Kreinovich* Department of Computer Science University of Texas at El Paso 500 W. University El Paso, Texas 79968, USA *Corresponding author: vladik@utep.edu Chrysostomos D. Stylios Laboratory of Knowledge and Intelligent Computing Department of Computer Engineering Technological Educational Institute of Epirus 47100 Kostakioi, Arta, Greece stylios@teiep.gr Abstract: In many practical situations, the relation between the experts’ degrees of confidence in different related statements is well described by Fuzzy Cognitive Maps (FCM). keywords: accuracy; corresponding; expert; maps; neuron cache: ijccc-2073.pdf plain text: ijccc-2073.txt item: #198 of 981 id: ijccc-2074 author: Nadaban, Sorin title: Fuzzy Continuous Mappings in Fuzzy Normed Linear Spaces date: 2015-10-03 words: 3855 flesch: 87 summary: + y, t + s) ≥ N(x, t) ∗ N(y, s), (∀)x, y ∈ X, (∀)t, s ≥ 0; (N5) (∀)x ∈ X, N(x, ·) is left continuous and lim t→∞ N(x, t) = 1. Copyright © 2006-2015 by CCC Publications Fuzzy Continuous Mappings in Fuzzy Normed Linear Spaces 835 (M5) (∀)x, y ∈ X, M(x, y, ·) : keywords: fuzzy cache: ijccc-2074.pdf plain text: ijccc-2074.txt item: #199 of 981 id: ijccc-2075 author: Precup, Radu Emil; Tomescu, Marius L.; Petriu, Emil M. title: A Unified Anti-Windup Technique for Fuzzy and Sliding Mode Controllers date: 2015-10-03 words: 5021 flesch: 50 summary: The anti-windup is applied to nonlinear systems including sliding mode control systems and fuzzy control systems, with representative examples given in [6–9]. This paper represents a step forward in the systematic design of fuzzy control systems, pointed out by Prof. Zadeh in [26] and [27]. keywords: control; controllers; feedback; figure; mode; precup; r.-e; scheme; state; systems; windup cache: ijccc-2075.pdf plain text: ijccc-2075.txt item: #200 of 981 id: ijccc-2076 author: Tang, Xiao; Shu, Lan title: An Improved Attribute Reduction Algorithm based on Granular Computing date: 2015-10-03 words: 4525 flesch: 73 summary: Granular com- puting based attribute reduction method is an important application of Granular computing. Reference [9] defined the concept of the difference of granularity and granularity entropy on the basis of fuzzy set’s algebraic method and information theory approach, and proposes attribute reduction algorithm based on granular computing. keywords: attribute; core(a; gd(a; reduction cache: ijccc-2076.pdf plain text: ijccc-2076.txt item: #201 of 981 id: ijccc-2077 author: Teodorescu, Horia-Nicolai L. title: A Retrospective Assessment of Fuzzy Logic Applications in Voice Communications and Speech Analytics date: 2015-10-03 words: 4387 flesch: 54 summary: DOI: 10.1109/IVS.2010.5548124 [27] Kamaruddin N., Wahab A., Quek C. (2012); Cultural dependency analysis for understanding speech emotion. [28] Kamaruddin N., Wahab A. (2009); Features extraction for speech emotion. keywords: activity; analytics; applications; coding; communications; detection; ieee; logic; segmentation; signal; speech; voice cache: ijccc-2077.pdf plain text: ijccc-2077.txt item: #202 of 981 id: ijccc-2078 author: Turskis, Zenonas; Zavadskas, Edmundas Kazimieras; Antucheviciene, Jurgita; Kosareva, Natalja title: A Hybrid Model Based on Fuzzy AHP and Fuzzy WASPAS for Construction Site Selection date: 2015-10-03 words: 6274 flesch: 61 summary: Calculate the weighted normalised fuzzy decision matrix ˜̂Xp for WPM: ˜̂ The weighted normalised fuzzy decision matrix for WSM is obtained by using Eq. keywords: ahp; attributes; construction; decision; fuzzy; method; selection; site; waspas cache: ijccc-2078.pdf plain text: ijccc-2078.txt item: #203 of 981 id: ijccc-2079 author: Wang, Hua -Dong; Guo, Si -Cong; Hosseini Bamakan, Seyed Mojtaba; Shi, Yong title: Homeomorphism Problems of Fuzzy Real Number Space and The Space of Bounded Functions with Same Monotonicity on [-1,1] date: 2015-10-03 words: 6760 flesch: 79 summary: Finally, according to the proof of homeomorphism between fuzzy number space ε1 and the space B[−1, 1], it’s argued that not only does it give a new way to study the fuzzy analysis theory, but also makes the study of fuzzy number space easier. [12, 13] embedded fuzzy number space into the concrete Banach space C[0, 1] × C[0, 1] (C[0, 1] = {f : f is a bounded left-continuous function on (0, 1], and f has right limit on (0, 1], especially f is right-continuous at 0}), and present a specific isometrically isomorphic operator. keywords: b[−1; element; function; number; space cache: ijccc-2079.pdf plain text: ijccc-2079.txt item: #204 of 981 id: ijccc-2081 author: Xu, Hongyang; Vilanova, Ramon title: PI and Fuzzy Control for P-removal in Wastewater Treatment Plant date: 2015-10-03 words: 6853 flesch: 56 summary: The simulation results of fuzzy control strategy are showed in Table.3, to make a clear comparison, in Table.3 we also repeat the situation of applying PI-based controllers. Based on this assumption, the real concentration of DO in the fuzzy-based S1 at the moment that N keeps the same could draw more interest, because under this condition we can get better removal of P and at the same time do not affect the removal of N. From the simulation results, we can see that by applying Fuzzy control strategies the perfor- mance of WWTP is improved, and fuzzy control strategy could get a better operation result for the wastewater treatment process in some degree. keywords: control; controllers; effluent; performance; plant; removal; set; strategies; tank; treatment cache: ijccc-2081.pdf plain text: ijccc-2081.txt item: #205 of 981 id: ijccc-2082 author: Filip, Florin Gheorghe title: Book Review: "Biometric and Intelligent Decision Making Support" date: 2015-10-03 words: 689 flesch: 40 summary: This book is meant to familiarize the reader with the state-of-art of research and application results obtained in the domain of Intelligent Decision Support Systems (IDSS), biometric tech- nologies and their integration. A. Kaklauskas, the head of the Department of Construction Economics and Real Estate Management of the Vilnius Gediminas Technical University, Faculty of Engineering, Vilnius, Lithuania, a reputed author in the domain of Intelligent Decision Support Systems, Multi-criteria Decision Making (MCDM) methods and their applications in the construction, property management and the related fields. keywords: book; chapter; decision cache: ijccc-2082.pdf plain text: ijccc-2082.txt item: #206 of 981 id: ijccc-2083 author: ElSayed, Ahmed; Kongar, Elif; Gupta, Surendra M. title: Fuzzy Linear Physical Programming for Multiple Criteria Decision-Making Under Uncertainty date: 2015-11-16 words: 4765 flesch: 49 summary: Fuzzy Linear Physical Programming for Multiple Criteria Decision-Making Under Uncertainty 37 5 Conclusions Unlike conventional goal programming techniques, fuzzy goal programming, including the proposed fuzzy linear physical programming model, implies a fuzzy system. Furthermore, the weight for each goal is also calculated based on the fuzzy relationship prior to problem solving via fuzzy goal programming. keywords: class; decision; function; goal; linear; membership; physical; programming;   cache: ijccc-2083.pdf plain text: ijccc-2083.txt item: #207 of 981 id: ijccc-2087 author: Dai, Liang; Chang, Yilin; Shen, Zhong title: A Non-cooperative Game Algorithm for Task Scheduling in Wireless Sensor Networks date: 2011-12-01 words: 4947 flesch: 66 summary: The original tasks received by SINK are divided into two stages: inter-cluster task scheduling and intra-cluster task scheduling. First, inter-cluster task scheduling partitions the entire tasks into each cluster, and then the sub-tasks in a cluster are assigned to each intra-cluster node by intra-cluster task scheduling. 1) Intra-cluster task scheduling Fig.2 illustrates the timing diagram for a set of intra-cluster nodes, indexed from n1 to nk, in one cluster. keywords: cluster; energy; intra; networks; nodes; scheduling; sensor; task cache: ijccc-2087.pdf plain text: ijccc-2087.txt item: #208 of 981 id: ijccc-2088 author: Dan, Jingpei; Dong, Fangyan; Hirota, Kaoru title: Fuzzy Local Trend Transform based Fuzzy Time Series Forecasting Model date: 2011-12-01 words: 5988 flesch: 66 summary: Step 4: Fuzzify the local trend time series T(t) as fuzzy local trend time series FT (t). The proposed model differs from Chen’ model in Step 1 and Step 4 as described in the following: Step 1: Transform original time series into fuzzy local trend time series by the proposed fuzzy local trend transform as stated in section 3.2. keywords: data; forecasting; model; series forecasting; time series; transform; trend; trend time; variations cache: ijccc-2088.pdf plain text: ijccc-2088.txt item: #209 of 981 id: ijccc-2089 author: Doloca, Adrian; Å¢ănculescu, Oana title: Floating License Management - Automation Using Web Technologies date: 2011-12-01 words: 2608 flesch: 40 summary: Floating licenses (roaming licenses) allow multiple users to share access to a software product. This paper presents an original software system that provides flexibility in the management of floating licenses in enterprise environments, attaining a high degree of automation by using the latest Internet development technologies. keywords: application; client; license; management; server; software cache: ijccc-2089.pdf plain text: ijccc-2089.txt item: #210 of 981 id: ijccc-2090 author: Hasanagas, Nikolaos D. title: Network Analysis Functionality in Environmental Policy: Combining Abstract Software Engineering with Field Empiricism date: 2011-12-01 words: 6374 flesch: 44 summary: Environmental policy networks are used as a case study. Figure 2: Examples of environmental policy networks by VISONE keywords: actors; ambiguity; analysis; conflicts; density; information; network; oligarchy; policy; power; pressure; software; trust cache: ijccc-2090.pdf plain text: ijccc-2090.txt item: #211 of 981 id: ijccc-2091 author: Hu, Yansu; Mu, Dejun; Gao, Ang; Dai, Guanzhong title: The Research of QoS Approach in Web Servers date: 2011-11-01 words: 4504 flesch: 65 summary: Based on the queuing feature of Web server and the HTTP 1.1 persistent connection, the improved approach predicts the delay by calculating the queue length and service rate and achieves the relative delay guarantee of different classes by adjusting their quota of worker threads. Although the algorithms are different, the QoS architecture of Web server they used is non-distinctive. keywords: class; control; delay; predictive; quota; service; thread; time; web cache: ijccc-2091.pdf plain text: ijccc-2091.txt item: #212 of 981 id: ijccc-2092 author: Ionescu, Mihai; Păun, Gheorghe; Pérez-Jiménez, Mario J.; Rodrí­guez-Patón, Alfonso title: Spiking Neural P Systems with Several Types of Spikes date: 2011-11-01 words: 4753 flesch: 67 summary: Before passing to investigate the power of the previously defined systems, let us mention that we have introduced here SN P systems of the standard type in what concerns the rules, i.e., producing only one spike, and without delay; extended rules are natural (E/u → v, with both u and v multisets), but this is a too general case from a computability point of view, corresponding to cooperating P systems. Târgu din Vale, nr. 1, 110040 Piteşti, Romania E-mail: armandmihai.ionescu@gmail.com Gheorghe Păun Institute of Mathematics of the Romanian Academy PO Box 1-764, 014700 Bucharest, Romania, and Research Group on Natural Computing Department of Computer Science and AI University of Sevilla Avda Reina Mercedes s/n, 41012 Sevilla, Spain E-mail: george.paun@imar.ro, gpaun@us.es Mario J. Pérez-Jiménez Research Group on Natural Computing Department of Computer Science and AI University of Sevilla Avda Reina Mercedes s/n, 41012 Sevilla, Spain E-mail: marper@us.es Alfonso Rodríguez-Patón Department of Artificial Intelligence, Faculty of Computer Science Polytechnical University of Madrid, Campus de Montegancedo Boadilla del Monte 28660, Madrid, Spain E-mail: arpaton@fi.upm.es Abstract: With a motivation related to gene expression, where enzymes act in series, somewhat similar to the train spikes traveling along the axons of neu- rons, we consider an extension of spiking neural P systems, where several types of “spikes are allowed. keywords: neuron; number; spikes; systems cache: ijccc-2092.pdf plain text: ijccc-2092.txt item: #213 of 981 id: ijccc-2093 author: Li, Shiyong; Sun, Wei; Zhang, Yaming; Zhang, Hongke title: An Optimal Rate Control and Routing Scheme for Multipath Networks date: 2011-11-01 words: 5096 flesch: 63 summary: The primal algorithms have a dynamical law for adjusting user rate and a static law for generating link price, and conversely, the dual algorithms have a dynamical law for adjusting link price and a Copyright c⃝ 2006-2011 by CCC Publications An Optimal Rate Control and Routing Scheme for Multipath Networks 657 static law for generating user rate. 656-667 An Optimal Rate Control and Routing Scheme for Multipath Networks S. Li, W. Sun, Y. Zhang, H. Zhang Shiyong Li, Wei Sun, Yaming Zhang School of Economics and Management, Yanshan University, Qinhuangdao, 066004, P.R. China E-mail(s): shiyongli@ysu.edu.cn, wsun@ysu.edu.cn, yaming99@ysu.edu.cn Hongke Zhang School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, P.R. China E-mail: hkzhang@bjtu.edu.cn Abstract: This paper considers optimal rate control and routing schemes for multipath networks which can be formulated as multipath network utility max- imization problems. keywords: algorithm; control; multipath; price; problem; rate; user; utility cache: ijccc-2093.pdf plain text: ijccc-2093.txt item: #214 of 981 id: ijccc-2094 author: Maravić Čisar, Sanja; Pinter, Robert; Radosav, Dragica title: Effectiveness of Program Visualization in Learning Java: a Case Study with Jeliot 3 date: 2011-12-01 words: 5980 flesch: 50 summary: Students who were in the experimental groups after completing the course filled out the survey in order to obtain information about their opinion on learning using visualization software. [5] presented their experiences with three empirical methodologies to study human behavior, inter- action and learning with program visualization. keywords: control; experimental; group; java; jeliot; learning; programming; research; results; software; students; visualization cache: ijccc-2094.pdf plain text: ijccc-2094.txt item: #215 of 981 id: ijccc-2095 author: Ming-Cheng, QU; Xiang-Hu, WU; Xiao-Zong, Yang title: A Novel Parallel Transmission Strategy for Data Grid date: 2011-12-01 words: 8565 flesch: 68 summary: If data storage meets Distributed Storage Model, when there are arbitrary p nodes are not available, the merger of data at the remaining k-p nodes is still equivalent to M, that is, the data is complete, this property is called p integrity. Firstly, deploy two copies for GridTorrent system; secondly, given p=1, k=5,6,7 as the input of data dispatcher of VPG-Torrent, so the information of data storage is stored into RLS server later. keywords: data; download; figure; grid; node; parallel; peers; performance; speed; storage; time; transmission; trer cache: ijccc-2095.pdf plain text: ijccc-2095.txt item: #216 of 981 id: ijccc-2096 author: Muntean, Ioan Lucian; Badiu, Alexandra Ioana title: Application Plugins for Distributed Simulations on the Grid date: 2011-12-01 words: 6281 flesch: 53 summary: We address in this work the challenge of developing grid applications that keep pace with the rapid evolution of grid middleware. In this context, the development of grid applications that keep pace with the continuous evolution of the different middleware still remains a big challenge that complements the approach to the integration of the middleware. keywords: applications; client; framework; grid; grid applications; gridsfea; job; jobs; level; middleware; plugins; results; simulation; user cache: ijccc-2096.pdf plain text: ijccc-2096.txt item: #217 of 981 id: ijccc-2097 author: Park, Eun-Chan; Moon, Bongkyo; Kim, In-Hwan; Jeong, Gu-Min title: Quality of Service Control for WLAN-based Converged Personal Network Service date: 2011-12-01 words: 9000 flesch: 59 summary: These simulation results confirm that (i) the QoS of DL service is highly vulnerable to the UL service while the QoS of UL service is little affected by the DL service, (ii) the channel capacity is unfairly shared among BE services; the UL service is favored over the DL service. The proposed mechanism differentiates QoS service from best-effort (BE) service such that the QoS service is preferentially served to satisfy its QoS requirements and the BE service is served to share the remain- ing resource in a fair manner. keywords: capacity; channel; control; mechanism; packet; qos; qos service; rate; service; size; tcp; throughput; wlan cache: ijccc-2097.pdf plain text: ijccc-2097.txt item: #218 of 981 id: ijccc-2098 author: Pintea, Camelia-M.; Chira, Camelia; Dumitrescu, Dan title: Sensitive Ants in Solving the Generalized Vehicle Routing Problem date: 2011-12-01 words: 3361 flesch: 55 summary: We report numerical results of the SAM model for several GVRP benchmark problems and discuss the performance of SAM compared to the standard ACS technique. Recently, Pop [12] provided a new efficient transformation of the GVRP into the classical vehicle routing problem (VRP). keywords: acs; ant; gvrp; problem; routing; sam; vehicle cache: ijccc-2098.pdf plain text: ijccc-2098.txt item: #219 of 981 id: ijccc-210 author: Lu, Wei; Yang, Jianhua; Liu, Xiaodong title: Numerical Prediction of Time Series Based on FCMs with Information Granules date: 2014-04-04 words: 5571 flesch: 58 summary: [5–7] defined the concept of fuzzy time series and developed two fuzzy time series prediction models — the time-invariant model [6] and the time-variant model [7]. Following the work of Song and Chissom, many the improved prediction models associated with fuzzy time series are emerged such as the Markov model [8 keywords: fcm; granules; information; method; model; number; prediction; series; time; time series cache: ijccc-210.pdf plain text: ijccc-210.txt item: #220 of 981 id: ijccc-2106 author: Sburlan, DragoÅŸ title: Computing by Folding date: 2011-12-01 words: 4643 flesch: 72 summary: ∈ L1 and si = uvit ∈ L2, for any i ≥ 0. Then, if we take L1 = L1 ∩ ∆2(LB) and L2 = L2 ∩ ∆3(LB) keywords: context; folding; languages; reg cache: ijccc-2106.pdf plain text: ijccc-2106.txt item: #221 of 981 id: ijccc-2107 author: Teodorescu, Horia Nicolai title: On Fuzzy Sequences, Fixed Points and Periodicity in Iterated Fuzzy Maps date: 2011-12-01 words: 5525 flesch: 74 summary: 2 Elementary examples of fuzzy sequences 2.1 Games based on fuzzy sequences produced by logic operations over fuzzy sets I start illustrating the topic of fuzzy sequence by a simple example based on logic operations with fuzzy sets. However, few recent papers, like [24], addressed fuzzy sequences and the problem of fixed points in fuzzy mappings with relation to fuzzy systems and control. keywords: ã0; function; input; logic; membership; output; sequence; sets; system cache: ijccc-2107.pdf plain text: ijccc-2107.txt item: #222 of 981 id: ijccc-2108 author: Wu, Jiang; Tzoneva, Raynitchka title: A Multi-Agent System Architecture for Coordination of the Real-Time Control Functions in Complex Industrial Systems date: 2011-12-01 words: 7041 flesch: 58 summary: A task releases the computation resource which is used for execution after it completes the execution and output results of the execution at the end time point. Figure 1: Task with Start and End Time Point of Execution Almost all of the interaction packets between the tasks (exclude Loosely Coupled Message Communication) make task to pause and continue its execution when the condition is satisfied, see Figure 2. Task status change interaction; * keywords: agent; interaction; interaction packet; middleware; status; tasks; time control; time system cache: ijccc-2108.pdf plain text: ijccc-2108.txt item: #223 of 981 id: ijccc-2123 author: Zadeh, L.A. title: Foreword date: 2011-09-01 words: 806 flesch: 55 summary: The first step toward linking fuzzy logic and natural languages was my 1973 paper, Outline of a New Approach to the Analysis of Complex Systems and Decision Processes. In the early nineties, a thought that began to crystallize in my mind was that in most of the applications of fuzzy logic linguistic concepts play an important, if not very visible role. keywords: language; logic cache: ijccc-2123.pdf plain text: ijccc-2123.txt item: #224 of 981 id: ijccc-2124 author: Bení­tez-Pérez, Hector; Cí¡rdenas-Flores, F.; Garcí­a-Nocetti, F. title: Reconfigurable Takagi-Sugeno Fuzzy Logic Control for a Class of Nonlinear System considering Communication Time Delays on Peripheral Elements date: 2010-09-01 words: 5165 flesch: 63 summary: This approach is pursued as reconfigurable strategy according to communication time delays within a real-time distributed system. The local response presented in the third scenario is performed due to modification of the response and dynamic conditions with respect to communication time delays. keywords: communication; control; delays; fault; logic; system; time; x(k cache: ijccc-2124.pdf plain text: ijccc-2124.txt item: #225 of 981 id: ijccc-2126 author: Dzitac, Ioan; Vesselényi, Tiberiu; Å¢arcă, Radu Cătălin title: Identification of ERD using Fuzzy Inference Systems for Brain-Computer Interface date: 2011-09-01 words: 6173 flesch: 47 summary: For example in [10] a study was made in order to determine the most discriminative features for a BCI system based on statistically significant differences between two energy density maps calculated from EEG signals during two different motor tasks. 3 Considerations on EEG signals and signal processing methods used in BCI Most of the BCI devices developed by now are based on the electric potentials of scalp known as EEG, which is noninvasive opposing to those based on cortical potentials where the electrodes are in direct contact with the cortex (electrocorticography - ECoG). keywords: amplitude; applications; bci; brain; computer; data; eeg; erd; figure; frequency; identification; inference; interface; method; motor; order; signal; system; time cache: ijccc-2126.pdf plain text: ijccc-2126.txt item: #226 of 981 id: ijccc-2127 author: Lin, Tsung-Chih; Kuo, Chia-Hao; Balas, Valentina E. title: Uncertain Fractional Order Chaotic Systems Tracking Design via Adaptive Hybrid Fuzzy Sliding Mode Control date: 2011-09-10 words: 4266 flesch: 65 summary: − j)q+1 − 2(n A new adaptive hybrid fuzzy SMC algorithm incorporated Lyapunov stability criterion is proposed so that not only the stability of adaptive fuzzy control system is guaranteed but also the influence of the approximation error and external disturbance on the tracking error can be attenuated to an arbitrarily prescribed level. keywords: adaptive; control; fractional; order; systems cache: ijccc-2127.pdf plain text: ijccc-2127.txt item: #227 of 981 id: ijccc-2128 author: Meyer, Andreas; Zimmermann, Hans-Jí¼rgen title: Applications of Fuzzy Technology in Business Intelligence date: 2011-09-01 words: 6440 flesch: 49 summary: Regarding the use of fuzzy technology RiskShield supports its users e.g. through graphical editors to define membership functions, to determine operators, to automatically perform the inference process and to determine a suitable defuzzyfication process. Keywords: fuzzy technology in business intelligence, fraud detection, risk assessment, intelligent data mining, fuzzy expert systems 1 Introduction In his first paper on Fuzzy Sets L.A. Zadeh keywords: applications; claims; customer; data; decision; fraud; information; insurance; riskshield; software; systems; technology; zimmermann cache: ijccc-2128.pdf plain text: ijccc-2128.txt item: #228 of 981 id: ijccc-2129 author: Molní¡rka, Gergely I.; Kóczy, Lí¡szló T. title: Decision Support System for Evaluating Existing Apartment Buildings Based on Fuzzy Signatures date: 2011-09-01 words: 5363 flesch: 47 summary: The condition and the energetic performance of building constructions determine heavily the overall quality of the buildings. The two components of this quality descriptor are as follows: Consistence of building constructions (x31;w31=0.8) keywords: apartment; attributes; buildings; decision; figure; kóczy; nodes; quality; signatures; structure; support; system cache: ijccc-2129.pdf plain text: ijccc-2129.txt item: #229 of 981 id: ijccc-2130 author: Negoita, Constantin Virgil title: Remembering the Beginnings date: 2011-09-10 words: 2453 flesch: 63 summary: 458-461 Remembering the Beginnings C.V. Negoita Constantin Virgil Negoita Computer Science, Hunter College, City University of New York http://www.hunter.cuny.edu/cs/Faculty/Negoita E-mail: cnegoita@hunter.cuny.edu Abstract: This paper wants to provide a personal view of the beginnings of fuzzy logic which was first introduced in the 1960’s by Lotfi Zadeh, when fuzzy sets were presented as models of any vague concept, making possible the computation with words. Keywords: fuzzy sets, fuzzy systems, vagueness 1 Introduction We know Zadeh as we know no other eminent man who have made the last half of the last century memorable in science history. keywords: logic; set; sets; theory; zadeh cache: ijccc-2130.pdf plain text: ijccc-2130.txt item: #230 of 981 id: ijccc-2131 author: Nyirenda, Clement N.; Dong, Fangyan; Hirota, Kaoru title: Distance Based Triggering and Dynamic Sampling Rate Estimation for Fuzzy Systems in Communication Networks date: 2011-09-10 words: 4809 flesch: 62 summary: E-mail: {nyirendac, tou, hirota}@hrt.dis.titech.ac.jp Abstract: To reduce computational cost in fuzzy systems in communication networks, distance based triggering and sampling rate adaptation probabilities are proposed based on the concept of probability via expectation. Keywords: communication networks, fuzzy systems, sampling rate. keywords: distance; flcd; mechanism; p(tr; probability; rate; sampling; sampling rate; system; triggering cache: ijccc-2131.pdf plain text: ijccc-2131.txt item: #231 of 981 id: ijccc-2132 author: Reformat, Marek Z.; Yager, Ronald R.; Li, Zhan; Alajlan, Naif title: Human-inspired Identification of High-level Concepts using OWA and Linguistic Quantifiers date: 2011-09-10 words: 12848 flesch: 54 summary: The process of identifying high-level concepts in a document depends on the ability to de- termine if HofC concepts can be inferred based on the texts of the document. KnUP works with a knowledge base to provide extra definitions of concepts and updates of single keywords importance in defining concepts. keywords: aggregation; chelsea; club; concepts; document; drogba; hofc; identification; importance; information; knowledge; obkb; ontology; owa; player; quantifiers; satisfaction; terms cache: ijccc-2132.pdf plain text: ijccc-2132.txt item: #232 of 981 id: ijccc-2133 author: Sahab, Nazanin; Hagras, Hani title: Adaptive Non-singleton Type-2 Fuzzy Logic Systems: A Way Forward for Handling Numerical Uncertainties in Real World Applications date: 2011-09-10 words: 11276 flesch: 58 summary: The structure of singleton type-2 FLS is shown in Figure 5 where crisp inputs are first fuzzified into input type-2 fuzzy sets (in singleton fuzzification) which then activate the inference engine and the rule base to produce output type-2 fuzzy sets. Section 5 will provide an overview on modeling a data based type-2 fuzzy input. keywords: figure; flss; input; interval type-2; logic; membership; non; sets; singleton; singleton type-2; systems; type-2; type-2 fls; type-2 input; uncertainties; uncertainty; value cache: ijccc-2133.pdf plain text: ijccc-2133.txt item: #233 of 981 id: ijccc-2135 author: Tamir, Dan E.; Kandel, Abraham title: Axiomatic Theory of Complex Fuzzy Logic and Complex Fuzzy Classes date: 2011-09-01 words: 7769 flesch: 60 summary: The paper surveys the current state of complex fuzzy sets, complex fuzzy classes, and complex fuzzy logic; and provides an axiomatic basis for first order predicate complex fuzzy logic and complex class theory. In this paper we expand the definition of complex fuzzy logic to include axiomatic based definition of first order predicate complex fuzzy logic and use the new formalism to establish an axiomatic framework for complex fuzzy classes. keywords: class; classes; complex; logic; membership; order; sets; theory cache: ijccc-2135.pdf plain text: ijccc-2135.txt item: #234 of 981 id: ijccc-2136 author: Teodorescu, Horia-Nicolai L. title: On the meaning of approximate reasoning − An unassuming subsidiary to Lotfi Zadeh’s paper dedicated to the memory of Grigore Moisil − date: 2011-09-01 words: 1818 flesch: 55 summary: Denoting the set of truth values by T , the above remark by Zadeh has no effect. Moreover, when defining the truth-valuation function we already need to know the set of truth values, which again makes ineffective Zadeh’s remark. keywords: logic; set; truth; zadeh cache: ijccc-2136.pdf plain text: ijccc-2136.txt item: #235 of 981 id: ijccc-2137 author: Filip, Florin Gheorghe title: The Disassembly Line: Balancing and Modeling - Book Review date: 2011-09-01 words: 1148 flesch: 40 summary: Various information concerning disassembly processes, assembly lines, disassembly lines, other related researches, graphical representations and computational complexity of combinato- rial problems are provided. As a result, to make the picture complete, Part III addresses other areas of disassembly research such as product planning, line and facility design, operations scheduling and sequencing, inventory, just-in-time, revenue and unbalanced lines (chapter 22 through 29). keywords: book; disassembly; line; techniques cache: ijccc-2137.pdf plain text: ijccc-2137.txt item: #236 of 981 id: ijccc-2144 author: Lin, Fan; Zhou, Xiuze; Zeng, Wenhua title: Sparse Online Learning for Collaborative Filtering date: 2016-01-26 words: 4673 flesch: 58 summary: To address the weakness of these first order or second order online CF ap- proaches and reduce data storage space and increase computing speed, we propose such Sparse Online Collaborative Filtering (SOCF) as First Order Sparse Collaborative Filtering (SOCFI) and Second Order Sparse Online Collaborative Filtering (SOCFII). Model-based CF techniques aim at building a model to represent user rating data, and use that model to predict user preference for a specific item. keywords: algorithm; data; filtering; item; matrix; online; order; user cache: ijccc-2144.pdf plain text: ijccc-2144.txt item: #237 of 981 id: ijccc-2148 author: Ferlin, Antoine; Wiels, Virginie; Bon, Philippe title: Statistical Automaton for Verifying Temporal Properties and Computing Information on Traces date: 2016-08-31 words: 5477 flesch: 57 summary: The approach presented in this paper is composed of three steps: formal- ization of temporal properties using an adequate language, generation of execution traces from a given property and verification of this property on execution traces. This paper presents a dynamic analysis approach to formally verify temporal properties on execution traces generated by simulation. keywords: approach; automaton; büchi; execution; information; properties; property; software; time; trace; verification cache: ijccc-2148.pdf plain text: ijccc-2148.txt item: #238 of 981 id: ijccc-2152 author: Choi, Keunho; Suh, Yongmoo; Yoo, Donghee title: Extended Collaborative Filtering Technique for Mitigating the Sparsity Problem date: 2016-08-31 words: 6800 flesch: 46 summary: In the example of table 2, item similarity is defined to include all pairs of commonly rated items by users A and B when the user similarity between users A and B is to be computed (i.e., nine item pairs: (item 2, item 1), (item 2, item 3), (item 2, item 5), (item 3, item 1), (item 3, item 3), (item 3, item 5), (item 4, item 1), (item 4, item 3), and (item 4, item 5)). Instead, our new user similarity function computes user similarity if they rated similar items which include common items. keywords: filtering; information; items; number; recommendation; similarity; user; yoo � cache: ijccc-2152.pdf plain text: ijccc-2152.txt item: #239 of 981 id: ijccc-2158 author: Bení­tez-Pérez, Héctor; Ortega-Arjona, Jorge; Esquivel-Flores, Oscar; Rojas-Vargas, Jared A.; ílvarez-Cid, Andrés title: A Fuzzy Networked Control System Following Frequency Transmission Strategy date: 2015-11-16 words: 4714 flesch: 54 summary: 2 Frequency control As presented in [17], a fuzzy approach to network control systems allows a real representation of bounded time delays and control design. In control systems, several modeling strategies for managing time delay within control laws have been studied by different research groups. keywords: control; delays; figure; frequency; network; pérez; system; time; transmission;   cache: ijccc-2158.pdf plain text: ijccc-2158.txt item: #240 of 981 id: ijccc-2159 author: Kosareva, Natalja; Kazimieras Zavadskas, Edmundas; Krylovas, Aleksandras; Dadelo, Stanislav title: Personnel Ranking and Selection Problem Solution by Application of KEMIRA Method date: 2015-11-16 words: 8472 flesch: 63 summary: Similarly calculate criteria values for the remaining 4 objects. Therefore criteria values were transformed to values xj∗i ,y j∗ i , belonging to the range [0; 1] by the transformations (2). keywords: criteria; decision; experts; mcdm; method; personnel; problem; selection; values cache: ijccc-2159.pdf plain text: ijccc-2159.txt item: #241 of 981 id: ijccc-2160 author: Păun, Gheorghe title: Membrane Computing and Economics: A General View date: 2015-11-16 words: 3925 flesch: 56 summary: O. Arsene, C. Buiu, N. Popescu: SNUPS, A simulator for numerical membrane computing. Intern. Keywords: membrane computing, P system, economics, numerical P system. keywords: computing; economics; membrane; membrane computing; numerical; p systems; păun; rules; systems cache: ijccc-2160.pdf plain text: ijccc-2160.txt item: #242 of 981 id: ijccc-2166 author: Shen, Gui-lan; Yang, Xiao-ping; Sun, Jie title: Detecting Topic-oriented Overlapping Community Using Hybrid Hypergraph Model date: 2016-07-03 words: 6064 flesch: 56 summary: [6] Ahn Y. Y., Bagrow J. P., Lehmann S. (2010), Link communities reveal multiscale complexity in networks, Nature, doi:10.1038/nature09182, 466: 761-764. In topology detecting community methods, it has shown a good performance, and was expanded or applied by more researchers [23, 24]. keywords: communities; community; connection; content; hybrid; hyperedge; hypergraph; information; method; network; nodes; similarity; topic cache: ijccc-2166.pdf plain text: ijccc-2166.txt item: #243 of 981 id: ijccc-2167 author: Akinboro, S.A.; Olaniyan, O.M; Aderounmu, G.A.; Olajubu, E.A.; Ajayi, A.O.; Ogundoyin, I.K. title: An Improved Computational Model for Adaptive Communication Channel Estimation date: 2011-06-01 words: 3531 flesch: 48 summary: The behavior of three variants of variable step size LMS algorithm for training based multi-user detection in a CDMA system was studied by [10]. The proposed algorithm called variable partial update LMS algorithm. keywords: adaptive; algorithm; channel; filter; lms; model; signal; update cache: ijccc-2167.pdf plain text: ijccc-2167.txt item: #244 of 981 id: ijccc-2168 author: Aseri, Trilok C.; Singla, Neha title: Enhanced Security Protocol in Wireless Sensor Networks date: 2011-06-01 words: 3512 flesch: 56 summary: Nodes in sensor networks have restricted storage, computational and energy resources; these restrictions place a limit on the types of deployable routing mechanisms. 2.4 Freshness One of the many attacks launched against sensor networks is the message replay attack where an adversary may capture messages exchanged between nodes and replay them later to cause confusion to the network. keywords: data; freshness; keys; message; network; protocol; security; sensor cache: ijccc-2168.pdf plain text: ijccc-2168.txt item: #245 of 981 id: ijccc-2169 author: Bartha, Attila; Dumitrescu, D. title: Perturbation in Population of Pulse-Coupled Oscillators Leads to Emergence of Structure date: 2011-01-06 words: 2020 flesch: 49 summary: The emergence of a synchronized front of firing oscillators can be observed in this sequence. [2], syn- chronous flashing of fireflies [3] and heart pacemaker cells [4]. Pulse-coupled oscillators are a special case when the interaction between oscillators is pul- satile. keywords: firing; model; oscillator; pulse; value cache: ijccc-2169.pdf plain text: ijccc-2169.txt item: #246 of 981 id: ijccc-2170 author: Hao, Zhuo; Zhong, Sheng; Yu, Nenghai title: A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing date: 2011-06-10 words: 4590 flesch: 70 summary: By security analysis, we show that the proposed scheme is secure against lost smart card attack, lost ticket attack, masquerade attack, replay attack, etc. and sends {IDi, IPBi, t} to the server, in which t is the number of digital tickets Ui needs. keywords: authentication; card; scheme; server; ticket cache: ijccc-2170.pdf plain text: ijccc-2170.txt item: #247 of 981 id: ijccc-2171 author: Haoliang, Sun; Lixiang, Liu; Xiaohui, Hu title: A Network Coding based DTN Convergence Layer Reliable Transport Mechanism over InterPlaNetary Networks date: 2011-06-10 words: 4848 flesch: 64 summary: During the first round,N · e bundles are lost and will need to be retransmitted during the second round. Considering original bundles are liner independent with each other,the coefficients can be set to 1 to all original bundles in the coded bundle. keywords: bundle; dtn; file; frtp; layer; original; transport cache: ijccc-2171.pdf plain text: ijccc-2171.txt item: #248 of 981 id: ijccc-2172 author: Dridi, Imen Harbaoui; Kammarti, Ryan; Ksouri, Mekki; Borne, Pierre title: Multi-Objective Optimization for the m-PDPTW: Aggregation Method With Use of Genetic Algorithm and Lower Bounds date: 2011-06-01 words: 4136 flesch: 65 summary: [9] Savelsbergh M.P.W. and SOL M., The general pickup and delivery problem, Transportation Science 1995. M. A new hybrid evolutionary approach for the pickup and delivery problem with time windows. keywords: algorithm; method; objective; pdptw; problem; routing; time; total; vehicle; vertex cache: ijccc-2172.pdf plain text: ijccc-2172.txt item: #249 of 981 id: ijccc-2174 author: He, Debiao; Chen, Jianhua; Hu, Jin title: An Authenticated Key Agreement Protocol Using Isogenies Between Elliptic Curves date: 2011-06-01 words: 4076 flesch: 67 summary: Keywords: public-key cryptosystem; quantum computer; isogeny; elliptic curve; key agreement protocol. Development of key agreement protocols, which would be strong against a quantum computer, is necessary. keywords: agreement; isogeny; key; protocol; security; session cache: ijccc-2174.pdf plain text: ijccc-2174.txt item: #250 of 981 id: ijccc-2175 author: Krassovitskiy, Alexander title: On the Power of Small Size Insertion P Systems date: 2011-06-10 words: 7059 flesch: 74 summary: Unlike the previous works, our article considers the encoding as a part of insertion P systems. We denote by LSPk(ins m,m′ n )(see [17]) the family of languages L(Π) generated by insertion P systems of degree at most k ≥ 1, having weight at most (n, m, m′). keywords: context; insertion; membrane; systems cache: ijccc-2175.pdf plain text: ijccc-2175.txt item: #251 of 981 id: ijccc-2176 author: Leigthon, Felipe; Osorio, Romí¡n; Lefranc, Gastón title: Modelling, Implementation and Application of a Flexible Manufacturing Cell date: 2011-06-01 words: 2468 flesch: 53 summary: A small mobile robots is used to move the pallet to the right place, using two walls to put the pallet in 284 F. Leighton, R. Osorio, G. Lefranc the desired position, the best place for stereo vision system (Fig.11). [4] Andrada I., Lefranc G. Sistema Experimental de un sistema de almacenamiento automatizado. keywords: assembly; cell; flexible; manipulator; system; vision cache: ijccc-2176.pdf plain text: ijccc-2176.txt item: #252 of 981 id: ijccc-2177 author: Li, Jun-qing; Xie, Sheng-xian; Pan, Quan-ke; Wang, Song title: A Hybrid Artificial Bee Colony Algorithm for Flexible Job Shop Scheduling Problems date: 2011-06-01 words: 4621 flesch: 63 summary: Furthermore, an external Pareto archive set is introduced to record non-dominated solutions found so far. 4.5 Multi-objective optimizer The Pareto archive set AS To provide a set of solutions with good diversity, a Pareto archive set (AS) was introduced in this study, which is used to maintain a limited number of non-dominated solutions found so far. keywords: algorithm; bee; food; job; pareto; scheduling; search; shop; solution cache: ijccc-2177.pdf plain text: ijccc-2177.txt item: #253 of 981 id: ijccc-2178 author: Lupu, Valeriu; Tiliute, Doru E. title: The Communication in Distributed Client - Server Systems Used for Management of Flexible Manufacturing Systems date: 2011-06-01 words: 3238 flesch: 60 summary: This port number can be changed, but if is changed in the server class it also has to be changed in client class. In this case the modif variable from network class will become 1 and the repaint method from the same class will be called. keywords: class; client; image; method; network; number; server cache: ijccc-2178.pdf plain text: ijccc-2178.txt item: #254 of 981 id: ijccc-2179 author: Mallapur, Jayashree D.; Manvi, Sunilkumar S.; Rao, D.H. title: Fuzzy Based Packet Dropping Scheme in Wireless Cellular Networks date: 2011-06-01 words: 5453 flesch: 63 summary: The status information of the base station include queue length, queue length threshold, max- imum bandwidth, bandwidth available, maximum buffers, buffers available, channel condition, aggregated flow rate, aggregated departure rate, correction factor, etc. Computational unit computes queue length, queue length threshold and dropping factor for an application packet request by using the data such as correction factor, priority, etc., available in the database. keywords: calls; channel; dropping; factor; handoff; length; new; number; packet; queue; rate; threshold; time cache: ijccc-2179.pdf plain text: ijccc-2179.txt item: #255 of 981 id: ijccc-218 author: Claudia-Adina, DragoÅŸ; Radu-Emil, Precup; Marius, Tomescu; Stefan, Preitl; Emil M., Petriu; M.-Bogdan, Rădac title: An Approach to Fuzzy Modeling of Electromagnetic Actuated Clutch Systems date: 2013-06-02 words: 4242 flesch: 59 summary: The nonlinear system behavior is modeled in [7] by the division of the phase plane into sub-regions and a linear model represented either in state-space or ARX model form is assigned for each regions; the linear models are next expressed as fuzzy models. The modeling approach presented in the previous sections is applied and exemplified in this section in order to obtain fuzzy models for the electromagnetic actuated clutch system. keywords: functions; membership; model; system; time cache: ijccc-218.pdf plain text: ijccc-218.txt item: #256 of 981 id: ijccc-2180 author: Novakovic, Jasmina; Rankov, Sinisa title: Classification Performance Using Principal Component Analysis and Different Value of the Ratio R date: 2011-06-01 words: 4760 flesch: 47 summary: 3.3 C4.5 Decision Tree Different methods exist to build decision trees, but all of them summarize given training data in a tree structure, with each branch representing an association between feature values and a class label. The C4.5 tree works by recursively partitioning the training data set according to tests on the Classification Performance Using Principal Component Analysis and Different Value of the Ratio R 321 potential of feature values in separating the classes. keywords: classification; classifiers; component; credit; data; extraction; feature; pca; ratio; rbf; set; value cache: ijccc-2180.pdf plain text: ijccc-2180.txt item: #257 of 981 id: ijccc-2181 author: Parpucea, Ilie; Pí¢rv, Bazil; Socaciu, Tiberiu title: Modeling Uncertainty in a Decision Problem by Externalizing Information date: 2011-06-01 words: 4129 flesch: 62 summary: The paper proposes a new way of predicting the Bayesian- Nash equilibrium which uses information sources to measure new information received by information consumers. Keywords: Bayesian-Nash equilibrium, information source, conditional prob- ability distribution. keywords: information; probability; source cache: ijccc-2181.pdf plain text: ijccc-2181.txt item: #258 of 981 id: ijccc-2182 author: Perera, Indika title: Impact of Poor Requirement Engineering in Software Outsourcing: A Study on Software Developers’ Experience date: 2011-06-01 words: 5662 flesch: 52 summary: This research primarily focuses on the problems that software developers encounter during their project activities, due to the poor software require- ment practices of the projects. The above individual analyses of questions provide a clear view on how the poor Requirement Engineering practices affect to software developers in outsourced projects. keywords: developers; development; engineering; hours; impact; outsourcing; process; requirement; software; study; time cache: ijccc-2182.pdf plain text: ijccc-2182.txt item: #259 of 981 id: ijccc-2184 author: Vilanova, Ramón; Rojas, José David; Alfaro, Ví­ctor M. title: Digital Control of a Waste Water Treatment Plant date: 2011-06-01 words: 3207 flesch: 65 summary: 6 Conclusions This paper has presented the application of a purely data based approach for tuning of discrete time PI controllers. On the basis of these data the discrete time PI controllers are tuned. keywords: controllers; imc; rate; time; vrft cache: ijccc-2184.pdf plain text: ijccc-2184.txt item: #260 of 981 id: ijccc-2192 author: Susnea, Ioan; Vasiliu, Grigore title: A Fuzzy Logic Software Instrument and a New Scale for the Assessment of Creativity date: 2016-03-24 words: 3913 flesch: 54 summary: Other, more comprehensive reviews of the state of the art in the field of creativity assessment are available in ( [24], [13], [4]). In other words, there’s not much divergence in the history of creativity assessment. keywords: assessment; creativity; journal; medium; research; scale; tests; thinking; tool cache: ijccc-2192.pdf plain text: ijccc-2192.txt item: #261 of 981 id: ijccc-2196 author: Arotaritei, Dragos title: Genetic Algorithm for Fuzzy Neural Networks using Locally Crossover date: 2011-03-01 words: 4385 flesch: 63 summary: Architecture of multilayer feedforward algebraic neural network for fuzzy input vectors, fuzzy outputs and fuzzy weights is proposed in (see [7] and [8]). Copyright c⃝ 2006-2011 by CCC Publications Genetic Algorithm for Fuzzy Neural Networks using Locally Crossover 9 Few papers refer to GA for adjusting fuzzy weights. keywords: algorithm; crossover; function; inputs; learning; networks; numbers; output; weights cache: ijccc-2196.pdf plain text: ijccc-2196.txt item: #262 of 981 id: ijccc-2197 author: Barbu, Tudor title: An Automatic Face Detection System for RGB Images date: 2011-03-01 words: 4593 flesch: 61 summary: Keywords: color image, color space, RGB, HSV, skin region, face detection, cross-correlation coefficient, edge detection, template matching, threshold. Face detection represents a computer technology that determines the locations and sizes of human faces in arbitrary digital images. keywords: detection; face; face detection; figure; human; image; process; regions; rgb; set; skin cache: ijccc-2197.pdf plain text: ijccc-2197.txt item: #263 of 981 id: ijccc-2198 author: Bocu, Razvan; Tabirca, Sabin title: The Flag-based Algorithm - A Novel Greedy Method that Optimizes Protein Communities Detection date: 2011-03-01 words: 5707 flesch: 46 summary: In this context, the proper detection of protein communities is of utmost importance, because it is one of the fewer methods that allows an in-depth and informative analysis of protein networks, through the isolation of functionally-related protein communities. [20] P.F. Jonsson et al., Cluster analysis of networks generated through homology: automatic identification of important protein communities involved in cancer metastasis: BMC Bioin- formatics, 7, 2, 2006. keywords: algorithm; communities; community; data; detection; flag; networks; node; protein; structure cache: ijccc-2198.pdf plain text: ijccc-2198.txt item: #264 of 981 id: ijccc-2199 author: Bogdan, Crenguţa Mădălina title: Domain Ontology of the VirDenT System date: 2011-03-01 words: 2580 flesch: 48 summary: The methodology of ontology construction is based on the few existent methodologies, like ontology development 101 Keywords: knowledge, ontology, taxonomy, information system, UML dia- gram. keywords: business; class; domain; figure; information; ontology; system; virdent cache: ijccc-2199.pdf plain text: ijccc-2199.txt item: #265 of 981 id: ijccc-2200 author: Chen, Jing; Liu, Lixiang; Hu, Xiaohui; Tan, Wei title: Effective Retransmission in Network Coding for TCP date: 2011-03-01 words: 5183 flesch: 63 summary: The core idea is that the sender transmits coded packets combined with unacknowledged original packets rather than transmitting individual packets. It acknowledges the total number of coding packets required to repair a loss and then decodes all packets. keywords: coding; delay; losses; network; packets; retransmission; scheme; tcp cache: ijccc-2200.pdf plain text: ijccc-2200.txt item: #266 of 981 id: ijccc-2201 author: Crisan, Nicolae; Cremene, Ligia Chira; Cremene, Marcel title: Software Components for Signal Fishing based on GA Element Position Optimizer date: 2011-03-01 words: 3010 flesch: 47 summary: Figure 1: Adaptive techniques operating at different levels of the wireless Tx-Rx chain 2 Smart antenna interdisciplinary aspect Classical smart antennas are based on antenna arrays of different configurations and con- trolled by means of a specialized signal processor. The position of the antenna array in Software Components for Signal Fishing based on GA Element Position Optimizer 65 the field and the spacing between array elements are the main parameters that can influence the channel matrix. keywords: antenna; array; channel; cremene; element; figure; fishing; optimizer; signal cache: ijccc-2201.pdf plain text: ijccc-2201.txt item: #267 of 981 id: ijccc-2202 author: Czibula, Gabriela; Cojocar, Grigoreta Sofia; Czibula, Istvan Gergely title: Evaluation Measures for Partitioning based Aspect Mining Techniques date: 2011-03-01 words: 4244 flesch: 63 summary: In this paper we propose two new evaluation measures for evaluating the results of partitioning based aspect mining techniques. In order to compare two partitions obtained by partitioning based aspect mining techniques, we introduce Definition 9. keywords: aspect; concerns; crosscutting; mining; partition; software; system cache: ijccc-2202.pdf plain text: ijccc-2202.txt item: #268 of 981 id: ijccc-2203 author: Guidi-Polanco, Franco; Cubillos, Claudio title: Architecting Robotics and Automation Societies over Reusable Software Frameworks: the Case of the G++ Agent Platform date: 2011-03-01 words: 4320 flesch: 44 summary: The adoption of agent systems as enabling technologies for the development of distributed organizations’ infrastructures is currently matter of research. The independence between the agent implementation and its environment makes it possible to follow an evolutionary approach in the development of software agents. keywords: agent; architecture; automation; communication; container; environment; platform; robots; services; software; systems cache: ijccc-2203.pdf plain text: ijccc-2203.txt item: #269 of 981 id: ijccc-2204 author: Khedri, Jamel; Chaabane, Mohamed; Souissi, Mansour title: Speed Control of a Permanent Magnet Synchronous Machine Powered by an Inverter Voltage Moment Approach date: 2011-03-01 words: 3508 flesch: 64 summary: The results show that the closed loop system with Speed Control of a Permanent Magnet Synchronous Machine Powered by an Inverter Voltage Moment Approach 99 the synthesized controller have a good behaviour: indeed, the measured speed and dq-axis cur- rents track well the trajectory of reference one with good accuracy over the whole speed range, moreover, the time constraint imposed with the help of time moments has permitted to keep the closed loop outputs very close to those of the reference model. Practically, a first LMI is used to insure closed-loop stability, a second one permits, by minimizing the norm 2 of time moments cost, to identify time specifications (overshoot, response time ...). keywords: control; loop; model; moments; reference; system; time cache: ijccc-2204.pdf plain text: ijccc-2204.txt item: #270 of 981 id: ijccc-2205 author: Dai, Liang; Chang, Yilin; Shen, Zhong title: An Optimal Task Scheduling Algorithm in Wireless Sensor Networks date: 2011-03-01 words: 3978 flesch: 64 summary: The algorithm consists of two phases: intra-cluster task scheduling and inter-cluster task scheduling. The original tasks received by SINK are divided into two stages: inter-cluster task scheduling and intra-cluster task scheduling. keywords: cluster; energy; nodes; scheduling; sensor; task; time cache: ijccc-2205.pdf plain text: ijccc-2205.txt item: #271 of 981 id: ijccc-2206 author: Kumar, Dilip; Aseri, Trilok C.; Patel, R.B. title: EECDA: Energy Efficient Clustering and Data Aggregation Protocol for Heterogeneous Wireless Sensor Networks date: 2011-03-01 words: 5064 flesch: 55 summary: However, heterogeneous WSN is becoming more and more popular because the benefits of using heterogeneous WSNs with different capabilities in order to meet the demands of various applications have been presented in recent literature [1], [2]. One of the crucial challenges in the organization of the WSNs is energy efficiency and stability because battery capacities of sensor nodes are limited and replacing them are impractical. Since, sensor nodes use a large amount of energy for data transmission and aggregation. keywords: clustering; data; energy; equation; network; nodes; round; sensor; wireless cache: ijccc-2206.pdf plain text: ijccc-2206.txt item: #272 of 981 id: ijccc-2207 author: Latorre, Homero; Harispe, Karina; Salinas, Renato; Lefranc, Gastón title: Ontology Model of a Robotics Agents Community date: 2011-03-01 words: 3846 flesch: 49 summary: 1 Introduction Collaborative and Cooperative tasks are used in robotic agents, where the knowledge is shared; there exist communication to talk to the others robots where the area to the tasks is located and which decision that they have make, according to the necessities. In the execution of a cooperative and collaborative work, the communities of robotic agents face problems that need of rapid solution, even if its behavior is intrinsic in them and present certain characteristics of collective memory. keywords: agents; community; decisions; individual; information; ontology; robots; system cache: ijccc-2207.pdf plain text: ijccc-2207.txt item: #273 of 981 id: ijccc-2209 author: Moise, Gabriela; Cangea, Otilia title: Intelligent Management of the Cryptographic Keys date: 2011-03-01 words: 3225 flesch: 48 summary: The process of cryptographic keys management consists in the following operations: keys generation, distribution, update, revocation, storage, back- up/ recovery, import and export, usage control, expiration, and destruction. i (mod mi) Step 3 Calculate x=a1×y1×z 1+...+ak×yk×z k, Return x. 4 Intelligent Key Management In this paper it is proposed a model of cryptographic keys management that may be used in the architecture of SDG type. keywords: domain; entities; key; keys; keys management; management; model; security cache: ijccc-2209.pdf plain text: ijccc-2209.txt item: #274 of 981 id: ijccc-2210 author: Pop, Petrică Claudiu; Zelina, Ioana; LupÅŸe, Vasile; Sitar, Corina Pop; Chira, Camelia title: Heuristic Algorithms for Solving the Generalized Vehicle Routing Problem date: 2011-03-01 words: 3718 flesch: 55 summary: In this way, it is introduced the class of generalized combinatorial optimization problems. In the next figure we present the collection of generalized routes corresponding to the a global collection of routes. keywords: gvrp; heuristic; problem; routes; routing; string; vehicle cache: ijccc-2210.pdf plain text: ijccc-2210.txt item: #275 of 981 id: ijccc-2211 author: Ponsa, Pere; Vilanova, Ramón; Amante, Beatriz title: Human Intervention and Interface Design in Automation Systems date: 2010-03-01 words: 4072 flesch: 46 summary: The indicators have been defined from extracted concepts of other generic human factors guidelines and from aspects of human interface design in human-computer interaction. [18] K. Li, S. Thompson, P. Wieringa, and J. Xeng, “A study on the role on human operators in supervisory automation system and its implications,” Proceedings of the 4th World Intelligent Control and Automation, pp. keywords: automation; control; design; hmi; human; interface; level; operator; production; station; system cache: ijccc-2211.pdf plain text: ijccc-2211.txt item: #276 of 981 id: ijccc-2212 author: State, Luminiţa; Paraschiv-Munteanu, Iuliana title: A New Linear Classifier Based on Combining Supervised and Unsupervised Techniques date: 2011-03-01 words: 5518 flesch: 60 summary: Compute the matrix D = (dik) of entries dik = yiyk (xi) T xk , i, k = 1, N ; Step 2. Compute the matrix D = (dik) of entries, dik = yiyk (xi) T xk , i, k = 1, N ; Step 2. keywords: algorithm; clusters; data; figure; linear; means; separable cache: ijccc-2212.pdf plain text: ijccc-2212.txt item: #277 of 981 id: ijccc-2213 author: Zmaranda, Doina; Gabor, Gianina; Popescu, Daniela Elena; Vancea, Codruta; Vancea, Florin title: Using Fixed Priority Pre-emptive Scheduling in Real-Time Systems date: 2011-03-01 words: 4145 flesch: 49 summary: 190 D. Zmaranda, G. Gabor, D.E. Popescu, C. Vancea, F. Vancea The common ways to consider these times into a system model implies adding the overhead times to the known times according to the following [6]: for context switching times, the simplest way to do it is to increase task computation time Ci of all tasks with the double of estimated time needed to do of doing the context switch Csw : The queues are ordered in different ways: the ready queue is ordered based on task priority (the most priority task first - for Rate Monotonic the task with lower period Ti is the most priority task) and the waiting queue is ordered based on the starting time of the task Ri. keywords: monotonic; pre; priority; scheduling; systems; task; time cache: ijccc-2213.pdf plain text: ijccc-2213.txt item: #278 of 981 id: ijccc-2215 author: Ciobanu, Gabriel title: Writing as a Form of Freedom and Happiness Celebrating the 60th birthday of Gheorghe Păun date: 2010-12-01 words: 940 flesch: 51 summary: The trio Gheorghe Păun, Grzegorz Rozenberg and Arto Salomaa is well-known for several successful books. Another aspect of his life is related to the intellectual seduction of games; he was the promoter of GO in Romania, writing many books about GO and other mathematical games. keywords: gheorghe; păun; writing cache: ijccc-2215.pdf plain text: ijccc-2215.txt item: #279 of 981 id: ijccc-2218 author: BraÅŸoveanu, Adrian; Manolescu, Adriana; Spí®nu, Marian Nicu title: Generic Multimodal Ontologies for Human-Agent Interaction date: 2010-12-01 words: 4377 flesch: 54 summary: Since anthropocentric systems entail nowadays multimodal interfaces, it seems suitable to build multimodal ontologies. Multimodal ontologies should be designed taking into account our way of thinking (mind maps, visual thinking, feedback, logic, emotions, etc.) keywords: agents; communication; human; matching; multimodal; ontologies; ontology; research; use; web cache: ijccc-2218.pdf plain text: ijccc-2218.txt item: #280 of 981 id: ijccc-2219 author: Caraiman, Simona; Manta, Vasile title: Parallel Simulation of Quantum Search date: 2010-12-01 words: 4119 flesch: 59 summary: Our simulator relies on paralel processing for storing quantum states and applying quantum operators. Using a specific scheme for partitioning the terms describing quantum states and efficient parallelization of the general singe qubit operator and of the controlled operators, very good speed-ups were obtained for the simulation of the quantum search problem. keywords: computer; operator; processing; quantum; qubit; register; simulation; state cache: ijccc-2219.pdf plain text: ijccc-2219.txt item: #281 of 981 id: ijccc-2220 author: Chiriţă, Carmen title: Tense θ-valued Moisil propositional logic date: 2010-12-01 words: 6395 flesch: 80 summary: (2.24) {p ∧ q →k r, p, q} ⊢k p {p ∧ q →k r, p, q} ⊢k q →k (p ∧ q) (m.p) {p ∧ q →k r, p, q} ⊢k q {p ∧ q →k r, p, q} ⊢k p ∧ q (m.p) {p ∧ q →k r, p, q} ⊢k p ∧ q →k r {p ∧ q →k r, p, q} ⊢k r (m.p) {p ∧ q →k r, p} ⊢k q →k r (Deduction Theorem) {p ∧ q →k r} ⊢k p →k (q →k r) (Deduction Theorem) ⊢k (p ∧ q →k r) →k (p →k (q →k r)) (Deduction Theorem) (2.28) We shall use k-axioms (2.3), (2.4), modus ponens, k-theorem (2.24) and the Deduction Theorem. {p →k q, r →k t, p ∧ r} ⊢k p ∧ r {p →k q, r →k t, p ∧ r} ⊢k p ∧ r →k p (2.3) {p →k q, r →k t, p ∧ r} ⊢k p (m.p) {p →k q, r →k t, p ∧ r} ⊢k p →k q {p →k q, r →k t, p ∧ r} ⊢k q (m.p) {p →k q, r →k t, p ∧ r} ⊢k p ∧ r →k r (2.4) {p →k q, r →k t, p ∧ r} ⊢k r (m.p) {p →k q, r →k t, p ∧ r} ⊢k r →k t {p →k q, r →k t, p ∧ r} ⊢k t (m.p) {p →k q, r →k t, p ∧ r} ⊢k q →k (t →k (q ∧ t)) (2.24) {p →k q, r →k t, p ∧ r} ⊢k t →k (q ∧ t) (m.p) {p →k q, r →k t, p ∧ r} ⊢k q ∧ t (m.p) Applying the Deduction Theorem three times we obtain that ⊢k (p →k q) → ((r →k t) →k (p ∧ r →k q ∧ t)). i.e. G(α ∧ β) ∼k Gα ∧ Gβ which is equivalent with ⊢k φiG(α ∧ β) ↔k φi(Gα ∧ Gβ) for all i ∈ I. Let i ∈ I. By using Proposition 21(4.6) for α = φiα and β = φiβ, we obtain that (i) ⊢k G(φiα ∧ ∧φiβ) ↔k (Gφiα ∧ Gφiβ). keywords: moisil cache: ijccc-2220.pdf plain text: ijccc-2220.txt item: #282 of 981 id: ijccc-2222 author: Cordova, Felisa M.; Leyton, Guillermo title: A Fuzzy Control Heuristic Applied to Non-linear Dynamic System Using a Fuzzy Knowledge Representation date: 2010-12-01 words: 4661 flesch: 58 summary: [9] W. Silder, J. Buckley, Fuzzy expert system and fuzzy reasoning, John Wiley and Sons Inc., New Jersey, 416, 2005. The continuum of fuzzy sets is in the cube. keywords: dynamic; kbmfi; knowledge; level; subsystems; system cache: ijccc-2222.pdf plain text: ijccc-2222.txt item: #283 of 981 id: ijccc-2223 author: Cubillos, Claudio; Donoso, Makarena; Rodrí­guez, Nibaldo; Guidi-Polanco, Franco; Cabrera-Paniagua, Daniel title: Towards Open Agent Systems Through Dynamic Incorporation date: 2010-12-01 words: 3654 flesch: 46 summary: 3.1 Interaction Level The highest level is the interaction one, tackling the conversations among pair of agents through agent interaction protocols (AIP’s) that specify the underlying coordination / coopera- Towards Open Agent Systems Through Dynamic Incorporation 677 tion mechanism. In recent years, agent systems have evolved to the use of agreed protocols and languages thanks to a huge standardization effort (FIPA, OMG, W3C). keywords: agent; communication; interaction; mas; message; systems; work cache: ijccc-2223.pdf plain text: ijccc-2223.txt item: #284 of 981 id: ijccc-2224 author: Danubianu, Mirela; Pentiuc, Stefan Gheorghe; Schipor, Ovidiu Andrei; Tobolcea, Iolanda title: Advanced Information Technology - Support of Improved Personalized Therapy of Speech Disorders date: 2010-12-01 words: 3729 flesch: 46 summary: Keywords: personalized therapy, data mining, classification, clustering, as- sociations rules. As exploration and analysis technique of large amounts of data in order to de-tect patterns or rules with a specific meaning, data mining may facilitate the discovery from appar-ently unrelated data, relationships that can anticipate future problems or might solve the studied problems. keywords: data; disorders; figure; information; mining; speech; system; therapy cache: ijccc-2224.pdf plain text: ijccc-2224.txt item: #285 of 981 id: ijccc-2225 author: Dumitrescu, Dan Dumitru; Lung, Rodica Ioana; Mihoc, Tudor Dan title: Meta-Rationality in Normal Form Games date: 2010-12-01 words: 2953 flesch: 58 summary: 693-700 Meta-Rationality in Normal Form Games D. Dumitrescu, R.I. Lung, T.-D. Mihoc Dan Dumitru Dumitrescu, Rodica Ioana Lung, Tudor Dan Mihoc “Babes Bolyai” University Romania, Cluj-Napoca, St. Universitatii 5, E-mail: {ddumitr, mihoct}@cs.ubbcluj.ro, rodica.lung@econ.ubbcluj.ro Abstract: A new generative relation for Nash equilibrium is proposed. For example, the concept of Nash equilibrium, alone, sometimes can lead to deceptive results so we need to cope with more complex situations. keywords: equilibrium; meta; nash; pareto; relation cache: ijccc-2225.pdf plain text: ijccc-2225.txt item: #286 of 981 id: ijccc-2229 author: EÄŸecioÄŸlu, Ömer; Yarman, B. Siddik title: Stable Factorization of Strictly Hurwitz Polynomials date: 2010-12-01 words: 4111 flesch: 74 summary: This would make possible the generation of scattering Hurwitz polynomials, which are the two- dimensional analogues of strict Hurwitz polynomials. It is hoped that this factorization technique will provide a motivation to perform the factorization of two-variable positive function to generate scattering Hurwitz polynomials in two variables for which root finding methods are not applicable. keywords: hurwitz; polynomial; roots cache: ijccc-2229.pdf plain text: ijccc-2229.txt item: #287 of 981 id: ijccc-2230 author: Fabian, Ralf; Manolescu, Misu-Jan; Galea, Loredana; Bologa, Gabriela title: Bounded Rationality Through the Filter of the Lisbon Objectives date: 2010-12-01 words: 4938 flesch: 40 summary: Keywords: knowledge society paradigms, bounded rationality, just in time paradigm, uncertain knowledge processing. Abstract: Information and Communication Technologies (ICT) have created best conditions for grows of knowledge societies. keywords: agent; approach; approximation; decision; ict; information; knowledge; modelling; new; rationality; society; uncertainty; world cache: ijccc-2230.pdf plain text: ijccc-2230.txt item: #288 of 981 id: ijccc-2231 author: Grava, Cristian; Gacsí¡di, Alexandru; Buciu, Ioan title: A Homogeneous Algorithm for Motion Estimation and Compensation by Using Cellular Neural Networks date: 2010-12-01 words: 3417 flesch: 47 summary: 719-726 A Homogeneous Algorithm for Motion Estimation and Compensation by Using Cellular Neural Networks C. Grava, A. Gacsádi, I. Buciu Cristian Grava, Alexandru Gacsádi, Ioan Buciu University of Oradea Faculty of Electrical Engineering and Information Technology Oradea, Romania E-mail: {cgrava,agacsadi,ibuciu}@uoradea.ro Abstract: In this paper we present an original implementation of a homoge- neous algorithm for motion estimation and compensation in image sequences, by using Cellular Neural Networks (CNN). In order to illustrate the implemented method in the case of real images and in the case of a complex movement, starting from an initial image of a well-known “tennis-table” sequence, we have simulated a complex motion, using the Free Form Deformation principle, resulting (see Fig. 5) three real images of a sequence (Φ1, Φ2, Φ3). keywords: algorithm; cnn; compensation; estimation; image; methods; motion; pixels cache: ijccc-2231.pdf plain text: ijccc-2231.txt item: #289 of 981 id: ijccc-2232 author: Guofu, Wu; Qiang, Dou; Jiqing, Wu; Dongsong, Ban; Dou, Wenhua title: Towards Low Delay Sub-Stream Scheduling date: 2010-12-01 words: 3814 flesch: 71 summary: In this section, we study the problem of sub-stream scheduling, that is to say a 730 W. Guofu, D. Qiang, W. Jiqing, B. Dongsong, D. Wenhua node subscribe which sub-stream from which neighbor. The main drawback of pull-based scheduling strategy is that content blocks suffer from long delay. keywords: content; delay; matching; neighbor; node; scheduling; stream; sub cache: ijccc-2232.pdf plain text: ijccc-2232.txt item: #290 of 981 id: ijccc-2233 author: Gyorodi, Cornelia; Gyorodi, Robert; Pecherle, George; Cornea, George Mihai title: Full-Text Search Engine using MySQL date: 2010-12-01 words: 4325 flesch: 69 summary: [1] Fine-Tuning MySQL Full-Text Search - http://dev.mysql.com/doc/refman/5.0/en/fulltext- fine-tuning.html [2] Full text search - by Wikipedia - http://en.wikipedia.org/wiki/Full_text_search [3] MySQL’s Full-Text Formulas - by Database Journals - http://www.databasejournal.com/ features/mysql/article.php/3512461/MySQLs-Full-Text-Formulas.htm In a full-text search, the search engine examines all of the words in every stored document as it tries to match search words supplied by the user. keywords: mysql; results; row; search; table; text; text search cache: ijccc-2233.pdf plain text: ijccc-2233.txt item: #291 of 981 id: ijccc-2234 author: Iordache, Dan-Alexandru; Sterian, Paul; Sterian, Andreea Rodica; Pop, Florin title: Complex Computer Simulations, Numerical Artifacts, and Numerical Phenomena date: 2010-12-01 words: 4390 flesch: 45 summary: (6) There were studied the numerical artifacts corresponding to the 2 main types of nonlinear solitary waves (which can propagate keeping their shapes): the bell-shaped (or breathers) and 748 D.-A. Iordache, P. Sterian, F. Pop, A.R. Sterian Figure 4: FD simulation of a Korteweg-de Vries (KdV) solitary wave breather propagation the kink-shaped waves [16]. Figure 6: Structure of FD simulations of the propagation of pulses of different shapes 6 From the Numerical Artifacts to the Numerical Phenomena 6.1 Difficulties and main methods used to study the numerical artifact mech- anisms Because many problems in the field of Numbers Theory are extremely difficult, the aim of this study is to point out the main features of the mechanisms leading to some numerical arti- facts intervening in the computer simulations of pulses propagation. keywords: artifacts; computer; iordache; numerical; propagation; simulations; wave cache: ijccc-2234.pdf plain text: ijccc-2234.txt item: #292 of 981 id: ijccc-2236 author: Lascu, Alina E.; Negulescu, Sorin C.; Butaci, Casian; Creţ, Vasile title: Towards the implementation of Computer-Aided Semiosis date: 2010-12-01 words: 3610 flesch: 50 summary: Among the conclusions, one is already easily remarked: at the online level, communication can be impaired not only by the cultural differences but also by a wide range of differences such as race, age, sex, profession, religion or disabilities; in this regard, if the transcultural ontology will prove its efficiency in disambiguating cultural concepts, consequently other ontologies could be also implemented for aiding the online communication process between different users. Since it is a promising domain due to the fact that responds to actual trans-cultural communication needed in the broad-band society - where often the message behind the words does not come clear - the subject ought being inquired more detailed as promised in other papers of the same authors. keywords: a.e; agent; cas; communication; interface; lascu; ontology; web; word cache: ijccc-2236.pdf plain text: ijccc-2236.txt item: #293 of 981 id: ijccc-2237 author: Lazăr, Codruţ-Lucian; Lazăr, Ioan; Pí¢rv, Bazil; Motogna, Simona; Czibula, Iství¡n-Gergely title: Tool Support for fUML Models date: 2010-12-01 words: 3456 flesch: 55 summary: This is not necessarily an issue, because the Action Languages can be used in conjunction to construct UML models and because the templates only need to be written once. Available: http://www.omg.org/spec/UML/2.2/Superstructure/PDF/ [3] C.-L. Lazăr, I. Lazăr, B. Pârv, S. Motogna, and I.-G. Czibula, “Using a fUML Action Language to construct UML models,” Proceedings of the 11th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2009. keywords: action; code; editor; fuml; language; lazăr; models cache: ijccc-2237.pdf plain text: ijccc-2237.txt item: #294 of 981 id: ijccc-2238 author: Lečić-Cvetković, Danica; Atanasov, Nikola; Babarogić, Sladan title: An Algorithm for Customer Order Fulfillment in a Make-to-Stock Manufacturing System date: 2010-12-01 words: 3861 flesch: 42 summary: Dynamic allocation of demands is very im- portant in case of customer order allocations. Available-to-promise (ATP) calculating from master production schedule (MPS) exhibits availability of finished goods that can be used to support customer order allocation. keywords: algorithm; allocation; customer; order; priority; production; products; system cache: ijccc-2238.pdf plain text: ijccc-2238.txt item: #295 of 981 id: ijccc-2239 author: Mara, Daniel title: The Development of Students’ Metacognitive Competences. A Case Study date: 2010-12-01 words: 2722 flesch: 42 summary: A Web based application has been developed in order to enable students to self-evaluate their metacognitive competencies and to acquire self-regulatory abilities. 1 Introduction Metacognitive skills are a must for students preparing to have a career in the information/- knowledge society. keywords: application; competences; development; program; skills; students; training cache: ijccc-2239.pdf plain text: ijccc-2239.txt item: #296 of 981 id: ijccc-2240 author: Millí¡n, Ginno; Kaschel, Héctor; Lefranc, Gastón title: Discussion of the Analysis of Self-similar Teletraffic with Long-range Dependence (LRD) at the Network Layer Level date: 2010-12-01 words: 8312 flesch: 51 summary: Keywords: Long-range-dependent, network layer, network traffic, self-similar process. This paper presents the theoretical foundations to justify that the behavior of traffic in a high-speed computer network can be modeled from a self-similar perspective by limiting its scope of analysis to the network layer, since the most relevant properties of self-similar processes are consistent for use in the formulation of traffic models when performing this specific task. keywords: analysis; behavior; dependence; ieee; lrd; models; network; performance; processes; range; self; similarity; traffic; video; vol; wireless cache: ijccc-2240.pdf plain text: ijccc-2240.txt item: #297 of 981 id: ijccc-2241 author: Moise, Maria; Zingale, Marilena; Condea, Alexandru Ioan title: Software Solution for Monitoring Street Traffic and Generating Optimum Routes using Graph Theory Algorithms date: 2010-12-01 words: 2075 flesch: 62 summary: In this context, the paper presents a software solution, which determines the optimum route, taking street traffic into regard, thus contributing to a sub- stantial reduction of time spent in traffic by drivers. In this context, the paper presents a software solution, which determines the optimum route, taking street traffic into regard, thus contributing to a substantial reduction of time drivers spend in traffic. keywords: map; node; route; street; traffic cache: ijccc-2241.pdf plain text: ijccc-2241.txt item: #298 of 981 id: ijccc-2242 author: Moisil, Ioana; Pitic, Alina; Dzitac, Simona; Popper, Laurentiu title: Adaptive Web Applications for Citizens’ Education. Case Study: Teaching Children the Value of Electrical Energy date: 2010-12-01 words: 2326 flesch: 61 summary: Keywords: adaptive web, electrical energy saving, citizens education, inter- action design, user-centred design. We had presented a first case study with the educational software for electrical energy saving. keywords: age; children; design; energy; system; user cache: ijccc-2242.pdf plain text: ijccc-2242.txt item: #299 of 981 id: ijccc-2243 author: Niño, Elías; Ardila, Carlos; Perez, Alfredo; Donoso, Yezid title: A Genetic Algorithm for Multiobjective Hard Scheduling Optimization date: 2010-12-01 words: 3926 flesch: 61 summary: Process 2 does not require processes. Process10 Process11 Prod A Level 0: Processes 1, 2 and 3 Level 1: Processes 4, 5 and 7 Level 2: Processes 6, 8 and 9 Level 3: Process 10 Level 4: Process 11 Figure 8: A view of the precedence tree of Product A group by level. keywords: algorithm; execution; figure; gamhso; process; processes; scheduling; solutions; time cache: ijccc-2243.pdf plain text: ijccc-2243.txt item: #300 of 981 id: ijccc-2244 author: Olteanu, Marius; Paraschiv, Nicolae; Cangea, Otilia title: Modeling Gilliland Correlation using Genetic Programming date: 2010-12-01 words: 2405 flesch: 34 summary: The designers establishes the set of functions / operators and the set of terminals for the specific problem Modeling Gilliland Correlation using Genetic Programming 839 2. t=0, t - being the generation counter 3. The present article attempts to address this problem by using the technique of Genetic Programming, a branch of Evolutionary Algorithms that belongs to Artificial Intelligence, a recently developed technique that has recorded successful applications espe- cially in process modeling. keywords: correlation; functions; number; programming; set cache: ijccc-2244.pdf plain text: ijccc-2244.txt item: #301 of 981 id: ijccc-2245 author: Oprea, Mihaela; Buruiana, Vasile; Matei, Alexandra title: A Microcontroller-based Intelligent System for Real-time Flood Alerting date: 2010-12-01 words: 3005 flesch: 44 summary: Some related work reported by the research community in the area of real time alert systems provides solutions such as the embedded controller systems (see [2]), the microprocessor systems (see [3]), and the mobile sensor nodes for alert systems applications (see [9]). mihaela@upg-ploiesti.ro, bvasea@gmail.com, matei.alexandra@hotmail.com Abstract: The development of efficient flood alerting systems became more demanding in the last years. keywords: alert; basin; flood; flow; microcontroller; river; system; time cache: ijccc-2245.pdf plain text: ijccc-2245.txt item: #302 of 981 id: ijccc-2246 author: Pătruţ, Bogdan; Tomozei, Cosmin title: Agent Technology in Monitoring Systems date: 2010-12-01 words: 5179 flesch: 58 summary: Reduction algorithm(s-agent S, s-agent T); {Local Variables: A, s, e, Ai, blockage, obj_realized, M, T = ∅; STEP 1: for each Ai from S ; if st(Ai) ̸= λ then (A, s, e) ← (Ai, st(Ai), st(E)); end for ; STEP 2: M = ∅; cycle = False; blockage = False; obj_realized = False; while (not cycle) and (not obj_realized) and (not blockage); {M = M ∪ (A, s, e); if in S exists edge (A, s)→ (B, t) labeled with (e, f) then {; Add T in Vertex s in agent A; Vertex t in agent B ; Add edge (A, s) → (B, t) between s and t; Label edge (A, s) → (B, t) with (e, f); if f = en then obj_realized = True else; if ¬ ∋ f’ > If agent A is in state s, then we express this by st(A) keywords: agent; environment; evolution; state cache: ijccc-2246.pdf plain text: ijccc-2246.txt item: #303 of 981 id: ijccc-2247 author: Peculea, Adrian; Iancu, Bogdan; Dadarlat, Vasile; Ignat, Iosif title: A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration date: 2010-12-01 words: 4052 flesch: 46 summary: 864 A. Peculea, B. Iancu, V. Dadarlat, I. Ignat 3 The Architecture of the Framework The proposed framework serves the user networks and defines two types of routers, edge and core, and entities for common bandwidth control. Function of the entities for common bandwidth control there are three possible approaches: Central Control (CC), Router-Aided (RA) and Edge-to-Edge (EE). keywords: bandwidth; control; end; flow; framework; table; trunks cache: ijccc-2247.pdf plain text: ijccc-2247.txt item: #304 of 981 id: ijccc-2248 author: Pop, Florin-Claudiu; Cremene, Marcel; Vaida, Mircea; Riveill, Michel; Tigli, Jean-Yves; Lavirotte, Stéphane title: Natural Language based On-demand Service Composition date: 2010-12-01 words: 6215 flesch: 52 summary: 871-883 Natural Language based On-demand Service Composition F.-C. Pop, M. Cremene, J.-Y. Tigli, S. Lavirotte, M. Riveill, M. Vaida Florin-Claudiu Pop, Marcel Cremene, Mircea Vaida Technical University of Cluj-Napoca, Faculty of Electronics, Telecommunications and IT, Cluj-Napoca, Romania E-mail: {florin.pop, marcel.cremene, mircea.vaida}@com.utcluj.ro Michel Riveill, Jean-Yves Tigli, Stéphane Lavirotte Université de Nice - Sophia Antipolis, Sophia Antipolis CEDEX, France E-mail:{riveill, tigli, lavirott}@unice.fr Abstract: The widespread of Web services in the ubiquitous computing era and the impossibility to predict a priori all possible user needs generates the necessity for on-demand service composition. The implementation is based on the WComp middleware that enables us to use regular Web services but also Web services for devices. keywords: composition; concepts; devices; language; mobile; phone; request; semantic; service; service composition; user; web cache: ijccc-2248.pdf plain text: ijccc-2248.txt item: #305 of 981 id: ijccc-225 author: Ayub, Qaisar; Zahid, Soperi Mohd; Rashid, Sulma; Abdullah, Abdul Hanan title: Threshold Based Best Custodian Routing Protocol for Delay Tolerant Network date: 2015-04-27 words: 4491 flesch: 55 summary: The control on creation of message copies can reduce the resource requirement. In this background, qouta based routing protocols were emerged where each node was given the opportunity to transmit the n number of message copies for example Spray and Wait[10], Spray and Focus[11], Spray and Wait binary QoN Spray and Wait[26]. keywords: delay; forwarding; message; network; node; number; protocol; quality; routing; value cache: ijccc-225.pdf plain text: ijccc-225.txt item: #306 of 981 id: ijccc-2252 author: Rahim, Aneel; Khan, Zeeshan Shafi; Muhaya, Fahad Bin; Sher, Muhammad; Khan, Muhammad Khurram title: Information Sharing in Vehicular AdHoc Network date: 2010-12-01 words: 2965 flesch: 50 summary: Enhanced relevance based approach has higher global benefit because it resolves the problem of priority mechanism and ignorance of network control traffic. Figure 1(a) shows the global benefit with enhanced relevance based approach. keywords: approach; benefit; model; network; queue; relevance; scenario; traffic cache: ijccc-2252.pdf plain text: ijccc-2252.txt item: #307 of 981 id: ijccc-2254 author: Rusan, Andrei; Amarandei, Cristian-Mihai title: A New Model for Cluster Communications Optimization date: 2010-12-01 words: 3662 flesch: 51 summary: Keywords: cluster communications optimization, network performance 1 Introduction The computing performance of a cluster is dependent on the performance of cluster compo- nents: computing nodes and communication infrastructure. Dimitrie Mangeron, Nr. 53A, 700050, Iaşi, Romania E-mail: andrei.rusan@tuiasi.ro, camarand@cs.tuiasi.ro Abstract: Performance losses of cluster applications can arise from various sources in the communications network of computer clusters. keywords: cluster; kernel; network; performance; set; size; tcp; test; values cache: ijccc-2254.pdf plain text: ijccc-2254.txt item: #308 of 981 id: ijccc-2255 author: Sepulveda, Juan; Gonzalez, Javier; Alfaro, Miguel; Camargo, Mauricio title: A Metrics-based Diagnosis Tool for Enhancing Innovation Capabilities in SMEs date: 2010-12-01 words: 4483 flesch: 51 summary: A classification into new innovation levels can be made by using the proposed method. In this paper we propose a new method to make the evaluation of innovation levels in the small and medium enterprises by using a specified frame- work. keywords: categories; category; enterprise; flow; innovation; management; method; profiles; values cache: ijccc-2255.pdf plain text: ijccc-2255.txt item: #309 of 981 id: ijccc-2256 author: Stoian, Rodica; Raileanu, Adrian Victor; Perisoara, Lucian Andrei title: Network Coded Transmission in a Wireless Grid Network with an Energy Constraint date: 2010-12-01 words: 3797 flesch: 57 summary: The current study focuses on the optimization of reception and decoding, analyzing how classical energy saving schemes affect performance of network coded transmissions. J. of Computers, Communications & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. V (2010), No. 5, pp. 929-938 Network Coded Transmission in a Wireless Grid Network with an Energy Constraint R. Stoian, A.V. Raileanu, L.A. Perisoara Rodica Stoian, Adrian Victor Raileanu, Lucian Andrei Perisoara Politehnica University of Bucharest Romania, 061071 Bucharest, 1-3 Iuliu Maniu E-mail: {rodicastoian2004, adrianrai, lperisoara}@yahoo.com Abstract: In wireless networks, routing based on packet forwarding does hardly yield optimum transmission performance in terms of network utiliza- tion and throughput. keywords: coding; delay; end; energy; network; node; packets; transmission cache: ijccc-2256.pdf plain text: ijccc-2256.txt item: #310 of 981 id: ijccc-2257 author: Talmaciu, Mihai; Nechita, Elena title: On Polar, Trivially Perfect Graphs date: 2010-12-01 words: 3390 flesch: 70 summary: Polar graphs are a natural extension of some classes of graphs like bipartite graphs, split graphs and complements of bipartite graphs. Keywords: Polar graphs, trivial perfect graphs, weakly decomposition, recog- nition algorithms, optimization algorithms. keywords: graph; set cache: ijccc-2257.pdf plain text: ijccc-2257.txt item: #311 of 981 id: ijccc-2258 author: Toma, Iulian-Florin title: Contributions to the Study of Semantic Interoperability in Multi-Agent Environments - An Ontology Based Approach date: 2010-12-01 words: 2193 flesch: 43 summary: AGO starts a matching process to obtain an alignment between the AGU request (cfp), AGU ontology (OntU) and AGS ontology. Current studies relieve the fact that using ontologies associated with the agents allows for building semantic-aware distributed multi-agent systems. keywords: agent; ags; interoperability; ontologies; ontology; semantic cache: ijccc-2258.pdf plain text: ijccc-2258.txt item: #312 of 981 id: ijccc-2259 author: Tudor, Nicolae; Kifor, Vasile Claudiu; Oprean, Constantin title: Using QSPS in Developing and Realization of a Production Line in Automotive Industry date: 2010-12-01 words: 3142 flesch: 47 summary: 8 Conclusions Using the QSPS system, the downtime of the line (containing the 56 production equipments) because of production software is decreased to almost 0%. 2 Internal software release compliance to technical requirements 3 compliance to the software ISO norms 2 calibration and adjustments(bug solving) 3 capability measurements 2 usage work instruction 2 user manual 2 ergonomics and design 2 Customer software release efficiency analyze 3 defects analyze 3 corrective actions 2 analyze after corrective actions 2 customer release reports 2 Validation and verification of the implemented software package lifetime test 3 test procedure for modification issues 2 Continued on next page Using QSPS in Developing and Realization of a Production Line in Automotive Industry955 Table 1 – continued from previous page Subproject Work packages Difficulty level approval procedure 2 final releases 2 Functional follow up of the software during production software audit 2 statistical rate of the occurred errors 2 Customer claims Problem recording 1 Analyze and solving procedure 2 Analyze report 1 Table 1 - Project segmentation With this information the time evaluation can be done more accurate using the PERT algo- rithm. keywords: 0,0; line; process; production; project; qsps; software; system; time cache: ijccc-2259.pdf plain text: ijccc-2259.txt item: #313 of 981 id: ijccc-2260 author: Vancea, Florin; Vancea, Codruţa; Popescu, Daniela Elena; Zmaranda, Doina; Gabor, Gianina title: Secure Data Retention of Call Detail Records date: 2010-12-01 words: 3688 flesch: 51 summary: The attacks on CDR data during the query may be: The attacks after supposed deletion are disclosure attacks and would attempt to extract protected information from media used to store CDR data in the retention system. keywords: data; database; query; retention; storage; system; time; vancea cache: ijccc-2260.pdf plain text: ijccc-2260.txt item: #314 of 981 id: ijccc-2261 author: Vilanova, Ramón; Alfaro, Ví­ctor M. title: Robust 2-DoF PID control for Congestion control of TCP/IP Networks date: 2010-12-01 words: 3072 flesch: 66 summary: 968-975 Robust 2-DoF PID control for Congestion control of TCP/IP Networks R. Vilanova, V. M. Alfaro Ramón Vilanova Department de Telecomunicació i Enginyeria de Sistemes Universitat Autònoma de Barcelona 08193, Bellaterra, Spain, E-mail: ramon.vilanova@uab.cat Víctor M. Alfaro Escuela de Ingeniería Eléctrica Universidad de Costa Rica San José, 11501-2060, Costa Rica. Keywords: Congestion control, Active Queue Management, PID Control. keywords: congestion; control; pid; queue; red; tcp cache: ijccc-2261.pdf plain text: ijccc-2261.txt item: #315 of 981 id: ijccc-2262 author: Zhang, Zhiqiang; Pan, Linqiang title: Numerical P Systems with Thresholds date: 2016-01-26 words: 6736 flesch: 66 summary: The present work deals with a class of cell-like P systems, called numerical P systems [10]. Numerical P systems are motivated by the cell structure and the economic reality. lqpan@mail.hust.edu.cn Abstract: Numerical P systems are a class of P systems inspired both from the structure of living cells and from economics. keywords: numerical; program; systems; threshold; values; variables cache: ijccc-2262.pdf plain text: ijccc-2262.txt item: #316 of 981 id: ijccc-2265 author: Filip, Florin-Gheorghe; Dzițac, Ioan; Manolescu, Mișu-Jan title: Editorial date: 2006-01-01 words: 877 flesch: 30 summary: To this new editorial project have subscribed as members of the Editorial Board, the following professors and specialists in Computer Science: • Pierre Borne, Ecole Centrale de Lille, France; • Antonio Di Nola, University of Salerno, Italy; • Ioan Dziţac, Agora University, Oradea, Romania (Executive Editor); • Ömer Egecioglu, University of California, Santa Barbara, USA; • Florin Gheorghe Filip, Romania Academy, Romania (Editor in Chief); • Constantin Gaindric, Institute of Mathematics and Computer Science of the Academy of Sciences of the Republic of Moldova; • Kaoru Hirota, Tokyo Institute of Technology, Japan; • Mişu-Jan Manolescu, Agora University, Oradea, Romania (Managing Editor); • George Metakides, University of Patras, Greece; • Shimon Y Nof, Purdue University, USA; • Gheorghe Păun, IMAR, Romanian Academy, Romania; • Mario J. Perez-Jimenez, University of Seville, Spain; • Imre J. Rudas, Budapest Tech, Hungary; • Athanasios D. Styliadis, Alexander Institute of Technology, Thessaloniki, Greece; • Gheorghe Tecuci, George Mason University, USA; • Horia-Nicolai Teodorescu, Institute of Computer Science, Romanian Academy, Iasi, Romania; • Dan Tufiş, RACAI, Romanian Academy, Romania. Florin-Gheorghe Filip and continued in 20062 under the name of International Conference on Computers, Communications & Control (www.iccc.univagora.ro) at Agora University of Oradea (president Mişu-Jan Manolescu), gave us the courage and confidence to start this new journal, entitled International Journal of Computers, Communications & Control (IJCCC). keywords: ijccc; journal; romania; university cache: ijccc-2265.pdf plain text: ijccc-2265.txt item: #317 of 981 id: ijccc-2266 author: Dzițac, Ioan title: Introduction to the first issue date: 2006-01-01 words: 797 flesch: 40 summary: George Georgescu, Afrodita Iorgulescu, Sergiu Rudeanu, three remarkable Moisil’s disciples, presents, in their technical paper7, a very concise and updated survey emphasizing the research done by Grigore C. Moisil and his school in algebraic logic (n-valued Lukasiewicz-Moisil algebra, θ -valued Lukasiewicz-Moisil algebra, Post algebra etc.). 7-8 Introduction to the first issue Ioan Dziţac In this inaugural issue we present: • an editorial article, with a general presentation of IJCCC and this introduction with short description of the papers published in this first issue; • one anniversary article dedicated to centenary of Kurt Gödel (1906-1978) and two anniversary articles dedi- cated to centenary of Grigore C. Moisil (1906-1973); • some selected papers from the International Conference on Computers, Communications & Control, June 1-3, 2006, Băile Felix - Oradea, Romania, ICCCC 2006; • two regular papers. keywords: icccc; moisil; paper cache: ijccc-2266.pdf plain text: ijccc-2266.txt item: #318 of 981 id: ijccc-2267 author: Doolan, Daniel C.; Tabirca, Sabin title: Visualising Infinity on a Mobile Device date: 2006-01-01 words: 3617 flesch: 66 summary: The 2D and 3D visualisation of fractal images is one interesting topic that is coming into the realm of reality within the mobile computing domain. However it was capable of generating images of 1002 and 1502 pixels, but with considerable processing times, 56,503ms keywords: fractal; image; mandelbrot; mobile; number; prime; set cache: ijccc-2267.pdf plain text: ijccc-2267.txt item: #319 of 981 id: ijccc-2268 author: Majhi, Banshider; Reddy, Y Santhosh; Babu, D Prasanna title: Novel Features for Off-line Signature Verification date: 2006-01-01 words: 2654 flesch: 54 summary: Feature points based vertical splitting are vnew,1, vnew,2, vnew,3, vnew,4, vnew,5, vnew,6. 3 shows the feature points retrieved from signature image and O is the center of image. keywords: feature; image; points; signature; splitting; verification cache: ijccc-2268.pdf plain text: ijccc-2268.txt item: #320 of 981 id: ijccc-2269 author: Păun, Gheorghe title: One More Universality Result for P Systems with Objects on Membranes date: 2006-01-01 words: 4611 flesch: 72 summary: Keywords: Membrane computing, Brane calculi, Matrix grammar, Universality 1 Introduction This paper is a direct continuation of [2], where a first step was made to bridge membrane computing [4], [5], [6] and brane calculi The operations pino, exo, mate, drip were formalized in [2] as membrane computing rules, and used in defining P systems based on them. keywords: membranes; step cache: ijccc-2269.pdf plain text: ijccc-2269.txt item: #321 of 981 id: ijccc-227 author: Tong, Shiwen; Qian, Dianwei; Liu, Guo-Ping title: Networked Predictive Fuzzy Control of Systems with Forward Channel Delays based on a Linear Model Predictor date: 2014-06-15 words: 4542 flesch: 68 summary: To my knowledge, the combination of networked control system and the predictive fuzzy control has not been reported except one paper written by us in 2007 Finally, the conclusions are drawn in Section 4. 2 Design of networked control systems 2.1 Structure of Networked Predictive Fuzzy Control Systems The networked predictive fuzzy control system as shown in Fig. 1 mainly consists of three key parts: the model predictor, the fuzzy controller and the delay compensator. keywords: control; controller; future; model; systems cache: ijccc-227.pdf plain text: ijccc-227.txt item: #322 of 981 id: ijccc-2270 author: Petcu, Dana; Bonchiș, Cosmin; Izbașa, Cornel title: Symbolic Computations based on Grid Services date: 2006-01-01 words: 3595 flesch: 49 summary: Grid services extends Web services (usually stateless services) by providing these extra functionalities. Being a source of Grid or Web services: the CAS or some of its facilities must be reachable as grid or web services and allowed to be activated by remote users under appropriate security and licensing conditions; furthermore, deployment of the services must be done in an easy way from the inside of the CAS. keywords: cas; client; computing; grid; instance; maple; problems; server; service; web cache: ijccc-2270.pdf plain text: ijccc-2270.txt item: #323 of 981 id: ijccc-2271 author: Stanojevic, Milan; Vujoševic, Mirko title: An Exact Algorithm for Steiner Tree Problem on Graphs date: 2006-01-01 words: 3422 flesch: 59 summary: The implemented program supports so called STP format [15] of Steiner tree problems, and it is compatible with the library of standard Steiner tree problems 41-46 An Exact Algorithm for Steiner Tree Problem on Graphs Milan Stanojević, Mirko Vujošević Abstract: The paper presents a new original algorithm for solving Steiner tree problem on graph. keywords: algorithm; constraints; number; problem; solution; steiner; tree cache: ijccc-2271.pdf plain text: ijccc-2271.txt item: #324 of 981 id: ijccc-2272 author: Rudas, Imre J.; Fodor, Jí¡nos title: Information Aggregation in Intelligent Systems Using Generalized Operators date: 2006-01-01 words: 5980 flesch: 67 summary: For a uninorm U with neutral element e ∈ ] 0, 1 ] , the binary operator TU defined by TU (x, y) = U (e x, e y) e is a t-norm; for a uninorm U with neutral element e In addition, T (x, y) = N(S(N(x), N(y))) keywords: element; fuzzy; operators; systems cache: ijccc-2272.pdf plain text: ijccc-2272.txt item: #325 of 981 id: ijccc-2273 author: Styliadis, Athanasios D.; Karamitsos, Ioannis D.; Zachariou, Dimitrios I. title: Personalized e-Learning Implementation - The GIS Case date: 2006-01-01 words: 4217 flesch: 37 summary: In order to evaluate the total efficiency of the proposed methodology both ïn calculating the suitability on the training set of GIS learning objects and on estimating the suitability of GIS learning objects external from the reference set, we have designed an evaluation criterion, defined by: Success(%) = 100· Correct Learning Objects Selected n , where n is the number of the desired GIS learning objects from the virtual pool that will act as input to the instructional planner. In paper’s experiments, GIS learning objects with aggregation level 2, which can be small or even bigger col- lections of GIS learning objects with aggregation level 1, appear to have less possibility of producing indifference relations, enabling to make secure decisions even for bigger desired number of learning objects (n = 1, 000). keywords: characteristics; gis; learner; learning; objects; rules; selection; set; suitability; web cache: ijccc-2273.pdf plain text: ijccc-2273.txt item: #326 of 981 id: ijccc-2274 author: Ciobanu, Gabriel title: Logic will never be the same again - Kurt Gí¶del Centenary date: 2006-01-01 words: 1558 flesch: 49 summary: Regarding their walks to and from the Institute for Advanced Studies, “Logic will never be the same again” - Kurt Gödel Centenary 71 Einstein said that “his own work no longer meant much; he came to the Institute merely to have the privilege of walking home with Gödel”. As a student, Gödel became interested in mathematical logic, the field to which he made his major contributions. keywords: gödel; kurt; logic; mathematics cache: ijccc-2274.pdf plain text: ijccc-2274.txt item: #327 of 981 id: ijccc-2275 author: Marcus, Solomon title: Grigore C. Moisil: A Life Becoming a Myth date: 2006-01-01 words: 6199 flesch: 51 summary: So, we can say that 1957 is the date of birth of Romanian Computer Science, under the guidance of Professor Moisil and by the collaboration between engineers and mathematicians. CCUB became a place where people from all cultural horizons came to learn from Professor Moisil how could they take profit in using in their own field the mathematical and computational thinking. keywords: century; computer; field; life; logic; mathematics; moisil; professor; romanian; science; university; way; work cache: ijccc-2275.pdf plain text: ijccc-2275.txt item: #328 of 981 id: ijccc-2276 author: Georgescu, George; Iorgulescu, Afrodita; Rudeanu, Sergiu title: Grigore C. Moisil (1906 - 1973) and his School in Algebraic Logic date: 2006-01-01 words: 9553 flesch: 72 summary: [0, 1]. 1 Łukasiewicz-Moisil algebras In 1940, Gr. C. Moisil has defined the 3-valued and the 4-valued Łukasiewicz algebras and in 1942, the n- valued Łukasiewicz algebras (n ≥ 2). Algebraically, this tight relationship is expressed by the fundamental adjunction between the categories of Boolean and Łukasiewicz algebras. keywords: algebras; algèbres; georgescu; lmn; logic; math; moisil; moisil algebras; n−1; łukasiewicz; łukasiewicz algebras cache: ijccc-2276.pdf plain text: ijccc-2276.txt item: #329 of 981 id: ijccc-2279 author: Herní¡ndez, Gastón Lefranc title: Preface date: 2006-04-10 words: 382 flesch: 49 summary: Gastón Lefranc Hernández Chairman of International Program Committee XVI Congress of ACCA Guest Editor of this Issue Copyright c© 2006 by CCC Publications In 1976, ACCA had its first Program Committee to select papers, and its first Proceedings. keywords: acca; congress cache: ijccc-2279.pdf plain text: ijccc-2279.txt item: #330 of 981 id: ijccc-228 author: Zhong, Haidong; Zhang, Shaozhong; Wang, Yanling; Shu, Yonggang title: Study on Directed Trust Graph Based Recommendation for E-commerce System date: 2014-06-15 words: 5255 flesch: 45 summary: Trust based recommendation systems are proved to make more accurate recommendation compared with traditional systems, because they utilize a new concept of trust propagation over a trust network. In Section 3 the approach of trust based recommendation is explained in detail. keywords: commerce; feedback; issn; items; node; recommendation; recommender; systems; trust; users; value cache: ijccc-228.pdf plain text: ijccc-228.txt item: #331 of 981 id: ijccc-2280 author: Acuña, Gonzalo; Pinto, Erika title: Development of a Matlab(R) Toolbox for the Design of Grey-Box Neural Models date: 2006-04-01 words: 2831 flesch: 54 summary: 3 Development of the Matlab Toolbox This Toolbox consists of two principal parts: a Neural Network and serial Grey Box Model, either with OSA or MPO estimates. “Comparison of Methods for Training Grey- Box Neural Network Models”, Computers & Chemicals Engineering Supplement, 23:561-564. keywords: box; grey; model; neural; output; system cache: ijccc-2280.pdf plain text: ijccc-2280.txt item: #332 of 981 id: ijccc-2281 author: Aguilera, Cristhian; Ramos, Mario; Roa, Gabriel title: An Automatic Grading System for Panels Surfaces Using Artificial Vision date: 2006-04-01 words: 2401 flesch: 49 summary: Panel surface stains are considered regions. 15-22 An Automatic Grading System for Panels Surfaces Using Artificial Vision Cristhian Aguilera, Mario Ramos, Gabriel Roa Abstract: This work describes an automatic grading system using artificial vision to improve the quality of wood panels surfaces. keywords: image; intensity; panels; quality; stains; surface cache: ijccc-2281.pdf plain text: ijccc-2281.txt item: #333 of 981 id: ijccc-2282 author: Bassi, Danilo; Olivares, Oscar title: Medium Term Electric Load Forecasting Using TLFN Neural Networks date: 2006-04-01 words: 4568 flesch: 51 summary: Medium Term Electric Load Forecasting Using TLFN Neural Networks 25 2.4 Methods of analysis of input variables Carrying out an analysis of input variables consists in studying the contribution of each variable to the result of the forecasting model. 3.2 Selection of input variables The first phase of the selection method was applied to the candidate variables of the four companies by means of a linear model. keywords: forecasting; linear; load; memory; model; network; neuronal; term; time; variables cache: ijccc-2282.pdf plain text: ijccc-2282.txt item: #334 of 981 id: ijccc-2283 author: Córdova, Felisa M.; Cañete, Lucio R. title: The Challenge of Designing Nervous and Endocrine Systems in Robots date: 2006-04-01 words: 2987 flesch: 48 summary: Considering the contribution of the Nervous System and Endocrine System to the successful performance of the animal facing its ecosystem, such systems conceptually may be copied in a robot to face its productive environment 3 However, in order to come close to achieving the behavior exhibited by animals as inspiratory beings, then by necessity (Ofek, 2001), it must be recognized the pertinence of Nervous System and Endocrine System. keywords: activity; endocrine; neuron; robot; sensors; system cache: ijccc-2283.pdf plain text: ijccc-2283.txt item: #335 of 981 id: ijccc-2284 author: Salinas, Renato; Gomez, Mauricio title: A New Technique For Texture Classification Using Markov Random Fields date: 2006-04-01 words: 4238 flesch: 53 summary: In such a way, starting from the knowledge already generated and using the approach of the human visual perception proposed by Julesz, is that we have raised our hypothesis applied to textures in digitized images, which establishes that to model textures, models of different statistical orders are required and for it we have chosen the Markov Random Fields as the basis of our model of texture due to its flexibility in defining the statistical dimension and the order. The process of texture classification will be based on the histograms of configurations proposed in the previous section. keywords: classification; figure; images; markov; model; neighborhood; order; set; texture cache: ijccc-2284.pdf plain text: ijccc-2284.txt item: #336 of 981 id: ijccc-2285 author: Kaschel C., Héctor; y Bernal, Luis Manuel Sí¡nchez title: Importance of Flexibility in Manufacturing Systems date: 2006-04-01 words: 2710 flesch: 44 summary: [5] Chandra, P. and Tombak, M., Models for the evaluation of routing and machine flexibility, Technical Report of Decision Craft Analytics, www.decisioncraft.com, 1993. [8] Gupta, A., Approach to Characterize Manufacturing Flexibility, Second World Conference on Production & Operations Management Society, Cancun - México, pp:100-120, 2004. keywords: constraints; flexibility; fms; group; machines; manufacturing; operations cache: ijccc-2285.pdf plain text: ijccc-2285.txt item: #337 of 981 id: ijccc-2286 author: López, E.; Campos, J.; Tardon, C.; Salgado, F.; Tardon, J.; López, R. title: Solution to the Reliability Problem of Radial Electric Distribution Systems Through Artificial Intelligence date: 2006-04-01 words: 4733 flesch: 60 summary: The primary route of each load point is stored in a matrix called matrix of primary route (MPR). When finding an element within the search sector, in the row of the matrix of primary routes, the number of the next node that corresponds is entered. keywords: feeding; load; node; point; reliability; route; system cache: ijccc-2286.pdf plain text: ijccc-2286.txt item: #338 of 981 id: ijccc-2288 author: Soria, Carlos M.; Carelli, Ricardo; Kelly, Rafael; Zannatha, Juan M. Ibarra title: Coordinated Control Of Mobile Robots Based On Artificial Vision date: 2006-04-01 words: 2674 flesch: 55 summary: I (2006), No. 2, pp. 85-94 Coordinated Control Of Mobile Robots Based On Artificial Vision Carlos M. Soria, Ricardo Carelli, Rafael Kelly, Juan M. Ibarra Zannatha Abstract: This work presents a control strategy for coordination of multiple robots based on artificial vision to measure the relative posture between them, in order to reach and maintain a specified formation. A precise localization is needed when multiple robots share a common environment. keywords: control; follower; leader; robot; system; vision cache: ijccc-2288.pdf plain text: ijccc-2288.txt item: #339 of 981 id: ijccc-2289 author: Vasconcelo, Flavio Véliz; Lefranc Herní¡ndez, Gastón title: Improvement and extension of Virtual Reality for flexible systems of manufacture date: 2006-04-01 words: 2983 flesch: 47 summary: 95-101 Improvement and extension of Virtual Reality for flexible systems of manufacture Flavio Véliz Vasconcelo, Gastón Lefranc Hernández Abstract: In this work it presents the improvement and extension of the virtual reality software created by the Robotics, Artificial Intelligence and Automatization Outpost Laboratory in the school of electrical engineering of the Pontificia Universi- dad Católica de Valparaíso. Improvement and extension of Virtual Reality for flexible systems of manufacture 97 keywords: design; java; manipulator; objects; reality; system cache: ijccc-2289.pdf plain text: ijccc-2289.txt item: #340 of 981 id: ijccc-2290 author: Bărbat, Boldur E.; Negulescu, Sorin C. title: From Algorithms to (Sub-)Symbolic Inferences in Multi-Agent Systems date: 2006-07-01 words: 4145 flesch: 49 summary: Through this sieve, Section 4 outlines the features asked for by the paradigm of computing as intelligent interaction, based on “nuances of nuanced-reasoning”, that should be reflected by agent logics. Until agent logics offer mechanisms to deal with uncertainty, at least, in simple expressions, the “ugly chasm” separating formal theory and practical system develop- ment [9] cannot be avoided. keywords: agent; bărbat; humans; logics; mas; processing; section; sub; synergy; systems cache: ijccc-2290.pdf plain text: ijccc-2290.txt item: #341 of 981 id: ijccc-2291 author: Ciobanu, Gabriel title: A Programming Perspective of the Membrane Systems date: 2006-07-01 words: 6140 flesch: 57 summary: I (2006), No. 3, pp. 13-24 A Programming Perspective of the Membrane Systems Gabriel Ciobanu Abstract: We present an operational semantics of the membrane systems, using an appropriate notion of configurations and sets of inference rules corresponding to the three stages of an evolution step in membrane systems: maximal parallel rewriting step, parallel communication of objects through membranes, and parallel membrane dissolving. Keywords: membrane systems, operational semantics, arithmetical operations over multisets. keywords: evolution; membrane; membrane systems; objects; parallel; programming; rules; semantics; step; systems cache: ijccc-2291.pdf plain text: ijccc-2291.txt item: #342 of 981 id: ijccc-2292 author: Cristea, Paul Dan title: Pathogen Variability. A Genomic Signal Approach date: 2006-07-01 words: 3134 flesch: 50 summary: Keywords: Genomic signals, Pathogen variability, HIV, Influenza, Orthomyxoviri- dae, Drug resistance 1 Introduction As shown in a series of previous papers Variability signals with respect to average, median and maximum flat references, and digital derivatives of genomic signals are applied to this purpose. keywords: genomic; phase; reference; resistance; signals; variability cache: ijccc-2292.pdf plain text: ijccc-2292.txt item: #343 of 981 id: ijccc-2293 author: Guțuleac, Emilian title: Descriptive Timed Membrane Petri Nets for Modelling of Parallel Computing date: 2006-07-01 words: 4731 flesch: 65 summary: Also, for e j event i f ((φ j = r j)∧(gr(r j, M) = true) then (the event e j occur to firing of rewriting rule r j and it occurrence change configuration and marking of current net:(RΓ, M) r j→ (RΓ′, M′), M[r j > M ′ ). The accessible state graph of a netRN =< Γ, M > is the labeled directed graph whose nodes are the states and whose arcs which is labeled with events of RN are of two kinds: a) firing of a enabled event e j ∈ E(M): arcs from state (RΓ, M) to state(RΓ, M ′ ) labeled with evente j then this event can fire in the net configuration RΓ at marking M and leads to new marking M ′ : (RΓ, M) e j→ (RΓ′, M′) ⇔ (RΓ = RΓ′ and M[e j > M ′ in RΓ); b) change configuration: arcs from state (RΓ, M) to state( RΓ ′ , M ′ ) labeled with rewriting rule r j :(RΓL, ML)¤ (RΓW , MW ) which represent the change configuration of current RN net: (RΓ, M) e j→ (RΓ′, M′) and M[r j > M ′ . keywords: membrane; nets; rewriting; rule cache: ijccc-2293.pdf plain text: ijccc-2293.txt item: #344 of 981 id: ijccc-2294 author: Nguyen, Dang Binh; Do, Khac Duc title: Formation Control of Mobile Robots date: 2006-07-01 words: 8983 flesch: 73 summary: Therefore the point qi j = 0 (the point O in Figure 6) must locate between the points qi j = li j and qi j = qi jc , see Figure 6. Our task is to design the control input ui for each robot i that forces the group of N robots to stabilize with respect to their group members in configurations that make a particular formation specified by a desired vector l(η) = keywords: control; formation; group; i=1; j∈ni; mobile; n ∑; robot cache: ijccc-2294.pdf plain text: ijccc-2294.txt item: #345 of 981 id: ijccc-2295 author: Peoples, Cathryn; Dini, Petre; McClean, Sally; Parr, Gerard; Black, Michaela title: Bringing IPTV to the Market through Differentiated Service Provisioning date: 2006-07-01 words: 4418 flesch: 45 summary: 4 Reconfigurable Protocol Stacks The concept of reconfigurable protocol stacks has long been under investigation An obvious concern which arises from the consideration of reconfigurable protocol stacks is the risk of increasing processing time when choosing the optimum stack configuration. keywords: application; control; data; iptv; multimedia; network; protocol; service; stack; time; transport cache: ijccc-2295.pdf plain text: ijccc-2295.txt item: #346 of 981 id: ijccc-2296 author: Tangour, Fatma; Saad, Ihsen title: Multiobjective Optimization Scheduling Problems by Pareto-optimality in Agro-alimentaryWorkshop date: 2006-07-01 words: 3833 flesch: 53 summary: When: C3 = max 1≤i≤n γi, ti ≥ ri and then Cb3 = min  ∑ i (ti + pi)   (5) Cb3 = ∑ i min (ri + pi) (6) 3 Genetic Algorithms application for the scheduling problems 3.1 principle Various approaches have been proposed to solve scheduling optimization problems, among them the Genetic Algorithms (GAs) approach can be distinguish. i ≤ nc (7) where S represents the space of realisable solutions and nc the number of objective functions. keywords: approach; objective; operations; optimization; pareto; problems; scheduling; solutions; table cache: ijccc-2296.pdf plain text: ijccc-2296.txt item: #347 of 981 id: ijccc-2297 author: Zarour, Nacer eddine; Bouzidi, Sabrina title: Coalition Formation for Cooperative Information Agent-Based Systems date: 2006-07-01 words: 3284 flesch: 52 summary: The aim of actual research in the cooperation and particularly the negotiation between agents is to reach a coherent global state of the multiagent system by favoring agents’ synergy. The coalition formation is a negotiation technique which is particularly preferred for solving the conflicts between agents whose behavior is economic and thus rational. keywords: agents; coalition; criteria; formation; manager; model; negotiation; number cache: ijccc-2297.pdf plain text: ijccc-2297.txt item: #348 of 981 id: ijccc-2298 author: Dzițac, Ioan; Andrei, Loriana title: 65 Years from Birth of Prof. Gheorghe S. Nadiu (1941-1998) date: 2006-07-01 words: 2280 flesch: 63 summary: 93-98 65 Years from Birth of Prof. Gheorghe S. Nadiu (1941-1998) Ioan Dziţac, Loriana Andrei Abstract: In 1967, Gheorghe S. Nadiu publishes in “Mathematical studies and researches”, the article “On a method for the construction of Three - valued Łukasiewicz algebras” (Romania), cited in the book “Cylindric Algebras” by P. Monk, L. Henkin, A. Tarski. 65 Years from Birth of Prof. Gheorghe S. Nadiu (1941-1998) 95 In the field of mathematical logic Nadiu introduces in [3] an algebraic method of construction of trivalent Łukasiewicz algebras, starting from the monadic boolean algebras, by means of quantified filters introduced by him. keywords: asupra; logic; mathematics; nadiu; oradea; s. nadiu; theory cache: ijccc-2298.pdf plain text: ijccc-2298.txt item: #349 of 981 id: ijccc-2301 author: Borne, Pierre title: Preface date: 2006-10-01 words: 267 flesch: 33 summary: This Confer- ence was co-chaired by Professor Pierre Borne (Ecole Centrale de Lille, France) and Professor Bo Zhang (Tsinghua University, China). In addition to the plenary lectures presented by Professor James M. Tien (Rensselaer Polytechnic Institute, USA), Professor Tianyou Chai (Northeastern University, China), Pro- fessor Florin G. Filip (Vice President of the Romanian Academy), Professor Jianwei Zhang (University of Hamburg, Germany) and Professor Toshio Fukuda (Nagoya University, Japan), 388 communications have been selected and accepted for presentation. keywords: professor; university cache: ijccc-2301.pdf plain text: ijccc-2301.txt item: #350 of 981 id: ijccc-2302 author: BENREJEB, Mohamed; SOUDANI, Dhaou; SAKLY, Anis; BORNE, Pierre title: New Discrete Tanaka Sugeno Kang Fuzzy Systems Characterization and Stability Domain date: 2006-10-01 words: 3813 flesch: 72 summary: By exploiting conditions or hypothesis obtained from stability analysis of discrete TSK fuzzy systems based on vector norms approach, the influence of the choice of t-norm is studied. Bandler’s t-norm (prod) Figure 4: Stability domains obtained for two different t-norms 7 Conclusion In this paper, we are interested in the stability study of discrete TSK fuzzy systems and the corre- spondent domain estimation relatively to the used conjunctive operator, materialized by a t-norm. keywords: fuzzy; norm; stability; systems cache: ijccc-2302.pdf plain text: ijccc-2302.txt item: #351 of 981 id: ijccc-2303 author: Bouzaouache, Hajer; Braiek, Naceur Benhadj title: On Guaranteed Global Exponential Stability Of Polynomial Singularly Perturbed Control Systems date: 2006-10-01 words: 4865 flesch: 71 summary: Structured and simultaneous Lyapunov for system stability problem, Joint. Subse- quently, in the context of control system design, our goal is to find an appropriate control law that insures the existence of an attractive integral manifold and furthermore insures stability of the studied systems (1) when the dynamics are restrictive to the integral manifold. keywords: control; manifold; matrix; stability; systems cache: ijccc-2303.pdf plain text: ijccc-2303.txt item: #352 of 981 id: ijccc-2304 author: Dieulot, Jean-Yves; Thimoumi, Issam; Colas, Frédéric; Béarée, Richard title: Numerical Aspects and Performances of Trajectory Planning Methods of Flexible Axes date: 2006-10-01 words: 2913 flesch: 62 summary: Among bang-bang profiles which are linked to optimal control, jerk assignment (acceleration derivative) and input shapers have been investigated. These techniques are known as input shapers, and have proven to be quite effective on linear systems e.g. keywords: bang; control; jerk; vibrations cache: ijccc-2304.pdf plain text: ijccc-2304.txt item: #353 of 981 id: ijccc-2305 author: Donnelly, Denis title: The Fast Fourier and Hilbert-Huang Transforms: A Comparison date: 2006-10-01 words: 2944 flesch: 69 summary: 0 2 4 6 8 2 0 2 Time F re q u e n c y Figure 1: HHT frequency representation (solid line) of the time domain signal (dashed). 2 4 6 8 10 0 5 10 Time F re q u e n c y / A m p li tu d e Figure 4: HHT frequency representation of a chirp signal. keywords: amplitude; fft; frequency; hht; imf; signal cache: ijccc-2305.pdf plain text: ijccc-2305.txt item: #354 of 981 id: ijccc-2307 author: Hamani, Nadia; Dangoumau, Nathalie; Craye, Etienne title: An Iterative Method for the Design Process of Mode Handling Model date: 2006-10-01 words: 3611 flesch: 44 summary: In addition to the main properties, other properties of mode handling model can be checked. These are generic models depending on the number of the child entities and the logical relationships that connect them. keywords: design; model; process; properties; specification; ssm; v&v cache: ijccc-2307.pdf plain text: ijccc-2307.txt item: #355 of 981 id: ijccc-2308 author: Jerbi, Nabil; Collart Dutilleul, Simon; Craye, Etienne; Benrejeb, Mohamed title: Time Disturbances and Filtering of Sensors Signals in Tolerant Multi-product Job-shops with Time Constraints date: 2006-10-01 words: 5103 flesch: 68 summary: Such systems have a robustness property to deal with time disturbances. Keywords: P-time Petri net, sensor signal, filtering, time disturbance, localization 1 Introduction This paper concerns critical time manufacturing job-shops. keywords: cri; disturbance; filtering; petri; robustness; time cache: ijccc-2308.pdf plain text: ijccc-2308.txt item: #356 of 981 id: ijccc-2309 author: Lescher, Fabien; Zhao, Jing-Yun; Borne, Pierre title: Switching LPV Controllers for a Variable Speed Pitch Regulated Wind Turbine date: 2006-10-01 words: 5087 flesch: 55 summary: The control system has Figure 3: Evolution of the main variables in function of wind speed. to operate over the full envelope of wind speeds. For high wind speed, i.e. v > v2, wind turbine operates in Full Load and electric produced power Pelec has to be regulated at nominal generator power. keywords: control; controller; lpv; pitch; speed; system; turbine; wind cache: ijccc-2309.pdf plain text: ijccc-2309.txt item: #357 of 981 id: ijccc-2310 author: Li, Peng; Lu, Yu; Li, Shen; Wei, Hongxing title: Realization of Embedded Multimedia System Based On Dual-Core Processor OMAP5910 date: 2006-10-01 words: 2989 flesch: 61 summary: Applications that run on the MPU can not access or make use of the DSP directly, so they must use the DSP driver to control or communicate with DSP core. In section 4, a detailed description of the system bootloader and DSP bootloader is given. keywords: bootloader; core; dsp; mpu; multimedia; omap5910; system; video cache: ijccc-2310.pdf plain text: ijccc-2310.txt item: #358 of 981 id: ijccc-2312 author: Zheng, Gang; Zeng, Wenli; Xu, Fanjiang title: Computation on the Optimal Control of Networked Control Systems with Multiple Switching Modes Over High Speed Local Area Networks date: 2006-10-01 words: 4052 flesch: 60 summary: Keywords: networked control systems, hybrid systems, optimal control, dynamic program, multiparametric program 1 Introduction Networked control systems (NCS) are feedback control systems wherein the control loops are closed through a real-time network[1]. [4]. Also, in practice, the initial state of networked control systems may be not determined, and for those with multiple switching modes, the unpredicted initial states may make the optimization process more complex. keywords: control; modes; problem; switching; systems cache: ijccc-2312.pdf plain text: ijccc-2312.txt item: #359 of 981 id: ijccc-2313 author: Zidi, Salah; Maouche, Salah; Hammadi, Slim title: Ant Colony with Dynamic Local Search for the Time Scheduling of Transport Networks date: 2006-10-01 words: 6500 flesch: 65 summary: We begin the investigation in a small zone of the research space and we look for decisions, which can be different from zero on this zone, but we apply only the zero 118 Salah Zidi, Salah Maouche, Slim Hammadi Figure 6: Rescheduling ant colony algorithm with dynamic local search Ant Colony with Dynamic Local Search for the Time Scheduling of Transport Networks 119 decision delay on the rest of the research space. The level of service can be represented by different regulation criteria such as, the regularity, punctuality, and connection criteria. keywords: algorithm; ant; colony; regulation; search; stop; time; transport; vehicles cache: ijccc-2313.pdf plain text: ijccc-2313.txt item: #360 of 981 id: ijccc-2314 author: Zina, Souheí¯l; Lombard, Muriel; Lossent, Luc; Henriot, Charles title: Generic Modeling and Configuration Management in Product Lifecycle Management date: 2006-10-01 words: 4602 flesch: 44 summary: Like configuration tools, the configuration management tools are also based on product models making it possible to formalize technical objects, links and constraints which express managed and traced needs. Figure 5 presents the graph of product study configuration. keywords: applications; configuration; configuration management; data; figure; management; model; modeling; needs; objects; plm; product; view cache: ijccc-2314.pdf plain text: ijccc-2314.txt item: #361 of 981 id: ijccc-2315 author: Yao, Haipeng; Liu, Yiqing; Fang, Chao title: An Abnormal Network Traffic Detection Algorithm Based on Big Data Analysis date: 2016-07-04 words: 5046 flesch: 60 summary: Abnormal traffic selection model and normal traffic selection model are independent, without order of priority in training stage or test stage. Normal traffic selection model uses k-means clustering algorithm, KNN, decision tree and random forest classification algorithms. keywords: data; decision; forest; model; selection; traffic; tree cache: ijccc-2315.pdf plain text: ijccc-2315.txt item: #362 of 981 id: ijccc-2317 author: Rojas, Jose David; Arrieta, Orlando; Meneses, Montse; Vilanova, Ramon title: Data-driven Control of the Activated Sludge Process: IMC plus Feedforward Approach date: 2016-07-03 words: 6376 flesch: 53 summary: Interested reader on IMC control, can find more information on [10, 25]. 2.1 Virtual Reference Feedback Tunning overview The Virtual Reference Feedback Tuning (VRFT) is a one-shot data-based method for the design of feedback controllers. keywords: approach; control; controller; data; imc; loop; model; process; reference; vrft cache: ijccc-2317.pdf plain text: ijccc-2317.txt item: #363 of 981 id: ijccc-2331 author: Andonie, Razvan; Russo, J. Edward; Dean, Rishi title: Crossing the Rubicon: A Generic Intelligent Advisor date: 2007-01-01 words: 6542 flesch: 52 summary: Local product knowledge focuses on the vendor’s offerings. Global product knowledge includes the product’s attributes, their functionalities, and anything else that is independent of the particular seller’s offerings. keywords: conference; customer; dialog; knowledge; needs; proceedings; product; recommendation; rubicon; system; user cache: ijccc-2331.pdf plain text: ijccc-2331.txt item: #364 of 981 id: ijccc-2332 author: Bentayeb, Abdelmadjid; Maamri, Nezha; Trigeassou, Jean-Claude title: The Moments in Control: a tool for Analysis, Reduction and Design date: 2007-01-01 words: 3237 flesch: 68 summary: Gr (s) (−.) −15 −10 −5 0 5 M a g n itu d e ( d B ) 10 −2 10 −1 10 0 10 1 10 2 −30 0 30 60 P h a se ( d e g ) Bode Diagram Frequency (rad/sec) NLP G (s) (−) Gr (s) (−.) −20 −15 −10 −5 0 5 M a g n itu d e ( d B ) 10 −2 10 −1 10 0 10 1 10 2 −30 0 30 60 P h a se ( d e g ) Bode Diagram Frequency (rad/sec) NLP with constraint G (s) (−) Gr (s) (−.) Figure 2: Frequency response of real system and reduced models Remark 5. 2rd/s Figure 1: Frequency response of real system and reduced models 22 Abdelmadjid Bentayeb, Nezha Maamri, Jean-Claude Trigeassou 3.3 Non Linear Optimization It is clear that the fact of imposing the denominator of the reduced model, limits the optimization’s performances, also if the reduction is needed in high frequencies, it is necessary to ensure at the same time the low frequencies behaviour. keywords: model; moments cache: ijccc-2332.pdf plain text: ijccc-2332.txt item: #365 of 981 id: ijccc-2333 author: Linguraru, Marius George; Ballester, Miguel íngel Gonzí¡lez; Ayache, Nicholas title: Deformable Atlases for the Segmentation of Internal Brain Nuclei in Magnetic Resonance Imaging date: 2007-01-01 words: 4150 flesch: 50 summary: values of the segmentation labels posterior to the application of the transformation, nearest-neighbour interpolation is performed, as opposed to the case of patient image registration, which employed spline interpolation. T1 images have often the highest resolution, hence we register them to the MNI template first using an affine transformation. keywords: brain; figure; image; internal; nuclei; patient; phantom; registration; segmentation; zubal cache: ijccc-2333.pdf plain text: ijccc-2333.txt item: #366 of 981 id: ijccc-2334 author: Albeanu, Grigore title: International Conference on Virtual Learning — ICVL 2006 date: 2007-01-01 words: 822 flesch: 31 summary: 37-38 International Conference on Virtual Learning – ICVL 2006 The current issue of the journal contains seven extended papers published in the Proceedings of the 1st International Conference on Virtual Learning, October 27 - 29, 2006, Bucharest, Romania, (ICVL 2006) keywords: conference; icvl; learning cache: ijccc-2334.pdf plain text: ijccc-2334.txt item: #367 of 981 id: ijccc-2335 author: Andreatos, Antonios title: Virtual Communities and their Importance for Informal Learning date: 2007-01-01 words: 4212 flesch: 49 summary: Virtual communities are next defined and then compared to real communities. Case studies are employed, focused on some specific kinds of virtual communities. keywords: communication; communities; education; information; internet; knowledge; learning; members; new; vcs cache: ijccc-2335.pdf plain text: ijccc-2335.txt item: #368 of 981 id: ijccc-2336 author: Anohina, Alla title: Advances in Intelligent Tutoring Systems: Problem-solving Modes and Model of Hints date: 2007-01-01 words: 4359 flesch: 48 summary: 48-55 Advances in Intelligent Tutoring Systems: Problem-solving Modes and Model of Hints Alla Anohina Abstract: The paper focuses on the issues of providing an adaptive support for learners in intelligent tutoring systems when learners solve practical problems. Keywords: intelligent tutoring system, problem-solving mode, hint 1 Introduction Emerging of a knowledge society and growing demands for highly skilled and educated labor force claim for changing traditional teaching and learning processes. keywords: feedback; hints; knowledge; learner; learning; problem; solving; system; tutoring cache: ijccc-2336.pdf plain text: ijccc-2336.txt item: #369 of 981 id: ijccc-2337 author: Doukas, Nikolaos; Andreatos, Antonios title: Advancing Electronic Assessment date: 2007-01-01 words: 4872 flesch: 55 summary: Innovative types of exam questions were used, that could not have been set without the existence of an e-assessment platform. After the initial 6-month deployment period, the e-Xaminer has been systematically catching human marking errors in up to 10% of student papers. keywords: assessment; computer; exams; learning; questions; students; system; tests; xaminer cache: ijccc-2337.pdf plain text: ijccc-2337.txt item: #370 of 981 id: ijccc-2338 author: Kitagaki, Ikuo; Hikita, Atsushi; Takeya, Makoto; Fujihara, Yasuhiro title: Development of An Algorithm for Groupware Modeling for A Collaborative Learning date: 2007-01-01 words: 3294 flesch: 53 summary: Groupware file The computer forms student groups appropriately based on results of answers by the students in 3. Making groups program Starting the duscuss Student (5)Making groups Sending personal information (1) Reg. student data (2)Reg.questio nnaires Download(FTP) Figure 1: System flow Development of An Algorithm for Groupware Modeling for A Collaborative Learning 69 3 Construction of students groups Suppose that there are four students A, B, C and D, and three questions a, b and c are given. keywords: answers; evaluation; file; group; grouping; information; students; system cache: ijccc-2338.pdf plain text: ijccc-2338.txt item: #371 of 981 id: ijccc-2339 author: Lambiris, Michael title: A Methodology for Providing Individualised Computer-generated Feedback to Students date: 2007-01-01 words: 4199 flesch: 54 summary: He is the managing director of Australian Law Course- ware (Pty) Ltd which publishes computer-based learning materi- als for law students. 74-83 A Methodology for Providing Individualised Computer-generated Feedback to Students Michael Lambiris keywords: answers; computer; feedback; knowledge; question; student cache: ijccc-2339.pdf plain text: ijccc-2339.txt item: #372 of 981 id: ijccc-234 author: Dong, Shi; Zhang, Xingang; Zhou, Dingding title: Auto Adaptive Identification Algorithm Based on Network Traffic Flow date: 2014-10-10 words: 5260 flesch: 44 summary: School of Computer Science & Technology, Huazhong University of Science and Technology Wuhan, 430074, China *Corresponding author: njbsok@gmail.com Xingang Zhang School of Computer and Information Technology, Nanyang Normal University Nanyang, 473061, China zxg@nynu.edu.cn Dingding Zhou Department of Laboratory and Equipment Management, Zhoukou Normal University Zhoukou, 466001, China zdd@zknu.edu.cn Abstract: Traffic identification is a key task for any Internet Service Provider (ISP) or network administrator. Machine learning method is an important research method on traffic identification, while impact of the asymmetry router on the traffic identification is considered, so this paper analyzes the impact of asymmetry routing on traffic identification, and proposes an effective method to decrease the impact, and experimental results show the auto adaptive algorithm can improve the traffic identification. keywords: accuracy; algorithm; data; flow; identification; internet; method; network; set; table; traffic; traffic identification; uniclassifier cache: ijccc-234.pdf plain text: ijccc-234.txt item: #373 of 981 id: ijccc-2340 author: Moise, Gabriela title: A Software System for Online Learning Applied in the Field of Computer Science date: 2007-01-01 words: 3176 flesch: 58 summary: Keywords: intelligent agent, conceptual map, learning style 1 Introduction A software system for online learning in the field of the computer science is proposed in this paper, a system called iLearning. The system is based on shaping the pedagogical resources through conceptual maps or semantic networks and on using intelligent agent technology.[6] keywords: agent; learning; resources; software; style; system cache: ijccc-2340.pdf plain text: ijccc-2340.txt item: #374 of 981 id: ijccc-2341 author: Oprea, Mihaela title: MAS_UP-UCT: A Multi-Agent System for University Course Timetable Scheduling date: 2007-01-01 words: 3427 flesch: 52 summary: In this paper it is presented a preliminary research work that involves the development of a multi-agent system for university course timetable scheduling, named MAS_UP-UCT. In order to solve this problem for the particular case of university course timetable scheduling we have adopted the agent-based approach. keywords: agent; course; negotiation; problem; scheduling; system; timetable; timetabling; university cache: ijccc-2341.pdf plain text: ijccc-2341.txt item: #375 of 981 id: ijccc-2342 author: Filip, Florin-Gheorghe title: MANAGEMENT INFORMATION SYSTEMS: Managing the Digital Firm - 9th edition, authors: Keneth C. Laudon and Jane P. Laudon (Book Review) date: 2007-01-01 words: 1376 flesch: 39 summary: He is the author of twelve books and over forty articles about social, organizational and management impacts of information systems, privacy, ethics, and multimedia technology. Besides, the authors adopt a broader view of information systems (IS) which encompasses an understanding of the management and organizational dimensions as well as technical dimensions of the systems as information systems liter- acy (p.20). keywords: business; chapters; information; management; systems cache: ijccc-2342.pdf plain text: ijccc-2342.txt item: #376 of 981 id: ijccc-2344 author: Ahola, Timo; Juuso, Esko; Leiviskí¤, Kauko title: Variable Selection and Grouping in a Paper Machine Application date: 2007-04-01 words: 4794 flesch: 50 summary: In this case, variable selection methods and technical information of the process has allowed the process variables most correlated with the final quality be revealed. : This paper describes the possibilities of variable selection in large-scale industrial systems. keywords: break; case; data; groups; model; paper; process; selection; systems; variables; vol cache: ijccc-2344.pdf plain text: ijccc-2344.txt item: #377 of 981 id: ijccc-2345 author: Borowa, Adam; Brdys, Mietek A.; Mazur, Krzysztof title: Modelling of Wastewater Treatment Plant for Monitoring and Control Purposes by State — Space Wavelet Networks date: 2007-04-01 words: 3545 flesch: 56 summary: (16) 4 Learning Algorithm During searching for the right structure of wavelet network, selecting the learning algorithm was also investigated. Mietek A. Brdys received the M.Sc. degree in Electronic Engi- neering and the Ph.D. and the D.Sc. degrees in Control Systems from the Institute of Automatic Control at the Warsaw University of Technology in 1970, 1974 and 1980, respectively. keywords: control; figure; learning; network; plant; state; treatment; wastewater; wavelet cache: ijccc-2345.pdf plain text: ijccc-2345.txt item: #378 of 981 id: ijccc-2346 author: Caraman, Sergiu; Sbarciog, Mihaela; Barbu, Marian title: Predictive Control of aWastewater Treatment Process date: 2007-04-01 words: 4445 flesch: 57 summary: [13] U. Jeppsson, Modelling Aspects of wastewater treatment processes, Ph.D. thesis, Dept. of Industrial Electrical Eng. and Automation, Lund University, Sweden, 1996. His research interest includes topics such as modelling and control of wastewater treatment processes, robust and intelligent control. keywords: control; model; oxygen; process; sludge; treatment; wastewater cache: ijccc-2346.pdf plain text: ijccc-2346.txt item: #379 of 981 id: ijccc-2347 author: Heikkinen, Mikko; Nurminen, Ville; Hiltunen, Yrjö title: Self-Organizing Maps for Analysis of Expandable Polystyrene Batch Process date: 2007-04-01 words: 2217 flesch: 56 summary: Process parameter data was not used for modelling in the first part of this study and the target is to add it later to the model. Archived process data is an important resource for the knowledge management of the process and it can be used for the optimization and improvement of productivity. keywords: agent; batch; data; process; som; stabilisation cache: ijccc-2347.pdf plain text: ijccc-2347.txt item: #380 of 981 id: ijccc-2348 author: Jena, Sanjay Kumar; Krishna, G.V.V. title: Blind Steganalysis: Estimation of Hidden Message Length date: 2007-04-01 words: 3887 flesch: 59 summary: To explain the details of difference image histogram method (DIH), we need to define some notions, Let I be the test image, which has M ×N pixels. If the stego-image created with embedded embedding ratio p is denoted as Sp, and the image created by flipping all bits in the LSB plane of Sp as Rp, the value of αi can be calculated for the images Sp and Rp(note that the value of αi for the images Rp is equal to the value of βi for the image Sp). keywords: difference; embedding; image; lsb; message; method cache: ijccc-2348.pdf plain text: ijccc-2348.txt item: #381 of 981 id: ijccc-2349 author: Bakar, Kamalrulnizam Abu; Doherty, Bernard S. title: An Enhancement of the Random Sequence 3-Level Obfuscated Algorithm for Protecting Agents Against Malicious Hosts date: 2007-04-01 words: 7635 flesch: 76 summary: i m e Figure 6: The Deobfuscation Time of the Random Sequence 3-level Obfuscated Algorithm for Small Number of Obfuscated Values From the results given in Table 1 and 2, and illustrated in Figure 6 and 7 respectively, it can be seen that the deobfuscation time of the RS3 obfuscated algorithm with noise code increases linearly with the number of obfuscated values in the test set. The main objective of using the RS3 obfuscated algorithm is to enable the comparing of confidential values within an unsecured remote host environment without exposing the actual confidential value to an unauthorised party, using comparison of obfuscated values rather than actual values. keywords: e n; e s; l e; t e; u e; u s cache: ijccc-2349.pdf plain text: ijccc-2349.txt item: #382 of 981 id: ijccc-235 author: Suganthi, N.; Vembu, Sumathy title: Energy Efficient Key Management Scheme for Wireless Sensor Networks date: 2014-01-03 words: 3628 flesch: 60 summary: Keywords: key management, sensor nodes, polynomial function 1 Introduction These tiny sensor nodes, which consist of sensing, data processing and communicating com- ponents, leverage the idea of sensor networks based on the collaborative effort of a large number of nodes. Sensor nodes are deployed in hostile environments or over large geographical area. keywords: group; key; keys; management; nodes; scheme; sensor cache: ijccc-235.pdf plain text: ijccc-235.txt item: #383 of 981 id: ijccc-2350 author: Liouane, Noureddine; Saad, Ihsen; Hammadi, Slim; Borne, Pierre title: Ant systems & Local Search Optimization for flexible Job Shop Scheduling Production date: 2007-04-01 words: 4588 flesch: 71 summary: [8,14] *** 180 Noureddine Liouane, Ihsen Saad, Slim Hammadi, Pierre Borne Table 8: Tabu search optimisation solution. Ant system algorithms and the tabu search techniques described are very effective and they alone can outperform all the alternative techniques. keywords: ant; fjsp; job; problem; scheduling; search; solution cache: ijccc-2350.pdf plain text: ijccc-2350.txt item: #384 of 981 id: ijccc-2351 author: Mina, Jesús; Verde, Cristina title: Fault Detection for Large Scale Systems Using Dynamic Principal Components Analysis with Adaptation date: 2007-04-01 words: 3843 flesch: 51 summary: In the following sections the recursive means estimation process is summarized; next, the proposed extension of DPCA based fault detection for changes in the operating point will be described. So, according to the proposed extension to DPCA based fault detection algorithm, the procedure to evaluate and classify an actual observation −→x a ∈ ℜ1×m is summarized as follows. keywords: data; detection; dpca; fault; inputs; means; output; system; variables cache: ijccc-2351.pdf plain text: ijccc-2351.txt item: #385 of 981 id: ijccc-2352 author: Rosinoví¡, Danica; Veselí½, Vojtech title: Robust PID Decentralized Controller Design Using LMI date: 2007-04-01 words: 4013 flesch: 66 summary: We consider affine models of uncertain system (1), (2) with symmetric uncertainty domain: ε j = −q, ε j = q (26) Example 1. Consider the uncertain system (1), (2) where: A =   −4.365 −0.6723 −0.3363 7.0880 −6.5570 −4.6010 −2.4100 7.5840 −14.3100  In this paper a state space approach to designing decentralized (multi-loop) PID robust controllers is proposed for linear uncertain system with guaranteed cost with a new quadratic cost function. keywords: control; controller; cost; design; function; matrix; pid; system cache: ijccc-2352.pdf plain text: ijccc-2352.txt item: #386 of 981 id: ijccc-2354 author: Dzițac, Ioan; Manolescu, Mișu-Jan; Oros, Horea; Văleanu, Emma title: 60 Years from Birth of Academician F.G. Filip date: 2007-09-01 words: 2599 flesch: 38 summary: 4 Awards, diplomas and distinctions F.G. Filip received the following award, diplomas and distinctions: 60 Years from Birth of Academician F.G. Filip 211 1. We will present in this paper a short digest of the biography and work of F.G. Filip 2 Opera omnia Prof. F. G. Filip is author/coauthor of 6 monographs published in Ed. keywords: academy; coordination; f.g; filip; informatics; international; member; romanian; systems; university cache: ijccc-2354.pdf plain text: ijccc-2354.txt item: #387 of 981 id: ijccc-2355 author: Ayari, Imen; Chatti, Abderrazak title: Reactive Control Using Behavior Modelling of a Mobile Robot date: 2007-09-01 words: 3619 flesch: 47 summary: Imen Ayari, Abderrazak Chatti 6 Obstacle avoidance task using neural robot behavior modelling For the task of avoiding obstacles, a neural model is utilized, reproducing the robot behavior in the used environment in order to avoid obstacles. Behavior robot learning in simple environment 7 Task activation The overall command, resulting from the fuzzy controller for reaching goal and the neural model for avoiding obstacles, is computed by a task activation module as shows the figure (14). keywords: behavior; control; environment; figure; goal; learning; mobile; obstacles; right; robot; task cache: ijccc-2355.pdf plain text: ijccc-2355.txt item: #388 of 981 id: ijccc-2356 author: Boukef, Hela; Benrejeb, Mohamed; Borne, Pierre title: A Proposed Genetic Algorithm Coding for Flow-Shop Scheduling Problems date: 2007-09-01 words: 4503 flesch: 53 summary: [26] J. Yuan, A. Soukhal, Y. Chen and L. Lu “ A note on the complexity of flow shop scheduling with transportation constraints ”. 1 Introduction In shop scheduling, there are three basic models classified according to the structure of a processing route: • the job-shop scheduling problem is an operation sequencing problem on multiple machines subject to some precedence constraints among the operations, • the flow-shop scheduling problem is a set of jobs that flow through multiple stages in the same order, • the open-shop scheduling problem is a problem where the workshop has several resources and the routing of all the operations is free. keywords: coding; cost; flow; food; individual; industries; operations; pharmaceutical; problems; scheduling; shop; time cache: ijccc-2356.pdf plain text: ijccc-2356.txt item: #389 of 981 id: ijccc-2357 author: Duviella, Eric; Chiron, Pascale; Charbonnaud, Philippe title: Hybrid Control Accommodation forWater-asset Management of Hydraulic Systems Subjected to Large Operating Conditions date: 2007-09-01 words: 3995 flesch: 60 summary: Hydraulic system dynamics are taken into account during the setpoint assignment step which consists in controlling gates for large operating conditions. They are equipped with dams, catchment areas, channels, etc., and are instrumented for water resource management and sat- isfaction of human activity needs. keywords: control; discharge; figure; hybrid; management; system; transfer; water cache: ijccc-2357.pdf plain text: ijccc-2357.txt item: #390 of 981 id: ijccc-2358 author: Medjoudj, Malika; Yim, Pascal title: Extraction of Critical Scenarios in a Railway Level Crossing Control System date: 2007-09-01 words: 7793 flesch: 59 summary: The train is equipped on board by a route map which contains the positions of danger points at level crossings and provides information for the train (lineside equipment or signal staff) when or where to send an activation order to the corresponding level crossing control system. We note three categories of scenarios according to the mode of activation of the red traffic light and each category contain deferent scenarios according to the way of train crossing. keywords: control system; crossing control; figure; level crossing; light; model; net; petri; place; scenarios; system; time; traffic; train cache: ijccc-2358.pdf plain text: ijccc-2358.txt item: #391 of 981 id: ijccc-2359 author: C.D., Jaidhar; Reddy, A.V title: Efficient Variable Length Block Switching Mechanism date: 2007-09-01 words: 4669 flesch: 67 summary: regardless of packet size and VOQi,1 achieves high transfer rate than VOQi,2. 4(b) shows the results of experiment #1 in which packet size is uniform. keywords: block; input; length; mechanism; output; packet; size; switch; transfer; variable cache: ijccc-2359.pdf plain text: ijccc-2359.txt item: #392 of 981 id: ijccc-2360 author: Precup, Radu-Emil; Tomescu, Marius L.; Preitl, Stefan title: Lorenz System Stabilization Using Fuzzy Controllers date: 2007-09-01 words: 4073 flesch: 71 summary: The accepted class of fuzzy logic control systems with Takagi- Sugeno (TS) fuzzy logic controllers (FLCs) is described in the next Section. Theorem 3 has general character guaranteeing suffi- cient stability conditions for fuzzy logic control systems with TS FLCs. keywords: control; system cache: ijccc-2360.pdf plain text: ijccc-2360.txt item: #393 of 981 id: ijccc-2361 author: Tudor, Nicoleta Liviana title: Optimization of Queries with Conjunction of Predicates date: 2007-09-01 words: 4500 flesch: 53 summary: This approach has serious drawbacks that limit its applicability [6]: it cannot guarantee an optimal plan because it uses a heuristic to estimate the rank of join predicates that influence the choice of the plan. The algorithm proceeds by building optimal execution plans for increasingly larger subsets of the set of all relations in the join. keywords: algorithm; heuristic; join; optimization; ordering; predicates; rank; system cache: ijccc-2361.pdf plain text: ijccc-2361.txt item: #394 of 981 id: ijccc-2362 author: Bărbat, Boldur E. title: DOMINO: Trivalent Logic Semantics in Bivalent Syntax Clothes date: 2007-04-01 words: 4842 flesch: 48 summary: Since DSS weaknesses are very similar, they are stated here adapted and abridged from [7]: they stem from inappropriate conceptualising, based on rigid, algorithmic (i.e., deterministic, almost sequential, computational, and atemporal processing), meant for decision making as step by step solving of arising sub-problems, not for decision making as continuous process of dealing with unexpected, potentially risky, fast changing situations requesting immediate - albeit not optimal - response. [12] Clegg, S., Kornberger, M., Rhodes, C. Organizational ethics, decision making, undecidability. keywords: agent; decision; domino; exception; logic; making; semantics; software; systems; time; uncertainty; value cache: ijccc-2362.pdf plain text: ijccc-2362.txt item: #395 of 981 id: ijccc-2363 author: H., Bení­tez-Pérez; F., Cí¡rdenas-Flores; F., Garcí­a-Nocetti title: An Implementation of Reconfigurable Network Control based upon Automata Proposal for Three Conveyor Belt Case Study date: 2007-12-01 words: 4754 flesch: 60 summary: Alternatively, dynamic system modeling provides a formal view of the effects of time delays and the loose of certain dynamic elements, however, reconfiguration is not a predetermined action only the effects of it. Firstly, dynamic system is modeled in order to determine where time delays play a key role. keywords: belt; case; control; conveyor; delays; fault; reconfiguration; speed; time cache: ijccc-2363.pdf plain text: ijccc-2363.txt item: #396 of 981 id: ijccc-2364 author: Debbache, Ghania; Bennia, Abdelhak; Goléa, Noureddine title: Neural Networks-based Adaptive State Feedback Control of Robot Manipulators date: 2007-12-01 words: 5023 flesch: 72 summary: [12] F. L. Lewis, A. Yesildirak , S. Jagannathan, Neural network control of robot manipulators and nonlinear systems, Taylor & Francis, Inc. [10] M. Saad, P. Bigras, L.-A. Dessaint, K. Al-Haddad, Adaptive robot control using neural networks, IEEE Transactions on Industrial Electronics, Vol. 41, No. 2, pp. 173-181, Apr 1994. keywords: adaptive; control; networks; neural; robot; uncertainties cache: ijccc-2364.pdf plain text: ijccc-2364.txt item: #397 of 981 id: ijccc-2365 author: Do, K.D. title: Bounded Controllers for Decentralized Formation Control of Mobile Robots with Limited Sensing date: 2007-12-01 words: 7630 flesch: 75 summary: ′i jc)qTi jcqi jc = ∑ (i, j)∈N∗ qTi jcqi j f (38) where i 6= j. j f is strictly negative since at the point where qi j = qi j f , ∀(i, j) ∈ N∗, i keywords: control; formation; function; robots cache: ijccc-2365.pdf plain text: ijccc-2365.txt item: #398 of 981 id: ijccc-2366 author: Douik, Ali; Ghabi, Jalel; Messaoud, Hassani title: Robust Predictive Control using a GOBF Model for MISO Systems date: 2007-12-01 words: 3934 flesch: 67 summary: 362 Ali Douik, Jalel Ghabi, Hassani Messaoud 0 100 200 300 −50 −40 0 40 50 GOBF model output Reference signal Figure 2: Reference signal and GOBF model output 0 100 200 300 −40 −30 −20 −10 0 10 20 30 40 Control signal u1 0 100 200 300 −15 −10 −5 0 5 10 Control signal u2 Figure 3: Control signals 0 100 200 300 −20 −15 −10 −5 0 5 10 15 20 25 Control increment signal 1 0 100 200 300 −25 −20 −15 −10 −5 0 5 10 15 20 25 Control increment signal 2 Figure 4: Control increment signals Robust Predictive Control using a GOBF Model for MISO Systems 363 On the other hand, the influence of the error bounds on the GOBF model output in the case of an ellipsoid domain is studied by considering 3 different SNR (signal to noise ratio). However, the main features of using GOBF model in RMPC methods is that the common FIR, Laguerre and Kautz model structures are special cases of this complete construction [10, 11, 12], it is not sensitive to sampling interval choice, it doesn’t requires a prior knowledge of the system delay and it op- erates on a small number of parameters. keywords: control; gobf; model; output cache: ijccc-2366.pdf plain text: ijccc-2366.txt item: #399 of 981 id: ijccc-2367 author: Murugesh, V.; Batri, K. title: An Efficient Numerical Integration Algorithm for Cellular Neural Network Based Hole-Filler Template Design date: 2007-12-01 words: 3332 flesch: 73 summary: Copyright © 2006-2007 by CCC Publications 368 V. Murugesh, Krishnan Batri uij xij · · · yij C R I Yij n I Uij n I Figure 1: CNN–Cell wherexi j, yi j and ui j are the state voltage, output voltage and input voltage respectively and they are functions of time t. Rx is a linear resistance, C is a linear capacitor, and A(i, j; k, l) and B(i, j; k, l) are the transconductances of the output and input voltages of C(k, l) with respect to C(i, j) called the cloning templates of CNN. The dynamic equation of cell C(i, j) in an M x N cellular neural network is given by Chua and Yang [1, 2]. C dxi j(t) keywords: algorithm; j(t cache: ijccc-2367.pdf plain text: ijccc-2367.txt item: #400 of 981 id: ijccc-2368 author: Vesselenyi, Tiberiu; Dzițac, Simona; Dzițac, Ioan; Manolescu, Mișu-Jan title: Fuzzy and Neural Controllers for a Pneumatic Actuator date: 2007-12-01 words: 3843 flesch: 52 summary: When using neural networks in controlling pro- cesses there have to be two steps: system identification (development of process neural model) and control design (development of neural control system). In the case of neural PFS there must be two steps to complete: system identification (development of process neural model) and control design (development of neural control system) keywords: control; figure; fuzzy; model; neural; position; system; u(k; y(k cache: ijccc-2368.pdf plain text: ijccc-2368.txt item: #401 of 981 id: ijccc-2369 author: Visioli, Antonio; Piazzi, Aurelio title: A Toolbox for Input-Output System Inversion date: 2007-12-01 words: 5322 flesch: 56 summary: [s] command input resulting output Figure 1: Command input and resulting system output with system (19) and desired output function (20) 0 2 4 6 8 10 12 14 0 0.2 0.4 0.6 0.8 1 time [s] command input resulting output Figure 2: Command input and resulting system output with system (19) and a polynomial desired output function (13) keywords: actuation; command; control; function; input; inversion; output; system; time cache: ijccc-2369.pdf plain text: ijccc-2369.txt item: #402 of 981 id: ijccc-237 author: Zhou, Kaile; Ding, Shuai; Fu, Chao; Yang, Shanlin title: Comparison and Weighted Summation Type of Fuzzy Cluster Validity Indices date: 2014-04-04 words: 3350 flesch: 71 summary: Table 1: Optimal cluster numbers preferred by each CVI c∗ PC NPC PE NPE XB VK PBMF FS VT SC WSCVI Butterfly 2 2 2 2 2 2 2 2 2 2 2 2 Example_01 3 3 3 3 2 3 3 2 3 3 3 3 Example_02 4 4 4 4 2 4 4 2 4 4 4 4 Data_2_3_60 3 3 3 3 3 3 3 2 7 3 3 3 Data_2_3_70 3 2 3 2 2 2 2 2 4 2 4 3 Data_2_4_110 4 2 4 2 2 2 2 2 4 2 10 4 Data_3_3_200 3 3 3 2 2 3 3 2 10 3 3 3 Data_3_3_300 3 2 2 2 2 2 2 2 15 2 3 2 Data_3_4_320 4 3 4 2 2 3 3 2 5 3 4 3 Bupa 2 2 2 2 2 2 2 3 4 2 2 2 Wdbc 2 2 2 2 2 2 2 5 4 2 2 2 Iris 3 2 2 2 2 2 2 3 5 2 2 2 Glass 6 2 2 2 2 2 2 6 6 2 5 2 (a) Data_3_3_300 (b) Data_3_4_320 Figure 3: Values of WSCVI 1 3 5 7 9 11 13 15 17 0 0.2 0.4 0.6 0.8 1 Number of clusters V a lu e s o f W S C V I with equal weights with adjusted weights 1 3 5 7 9 11 13 15 17 0 0.2 0.4 0.6 0.8 1 Number of clusters V a lu e s o f W S C V I with equal weights with adjusted weithts Figure 3: Values of WSCVI From Figure 4 (b), the minimum value of WSCVI with adjusted weights achieved at c=4, and its value is the second smallest when c=6. Experimental results demonstrate that most single fuzzy CVIs are effective in finding optimal cluster numbers for data sets which are low-dimensional and well-separated. keywords: cluster; clustering; cvis; data; index; number; sets; weights cache: ijccc-237.pdf plain text: ijccc-237.txt item: #403 of 981 id: ijccc-2370 author: Abid, Hafedh; Chtourou, Mohamed; Toumi, Ahmed title: Robust Fuzzy Sliding Mode Controller for Discrete Nonlinear Systems date: 2008-03-01 words: 4418 flesch: 71 summary: Then, we describe the sufficient and necessary reaching conditions of sliding mode control for discrete nonlinear systems in the first part of the third section ten, a fuzzy sliding mode controller for discrete time of nonlinear systems is developed in the second part and tracking robust fuzzy sliding mode control law is described in the third part. 3 Sliding mode control law and reaching conditions Sliding mode control, first appeared in the Soviet literature, it has been widely recognized as a po- tential approach to uncertain dynamical non-linear systems that are subject to external disturbances and parameter variations keywords: control; controller; evolution; law; mode; systems cache: ijccc-2370.pdf plain text: ijccc-2370.txt item: #404 of 981 id: ijccc-2371 author: Bouzid, Aicha; Elouze, Noureddine title: Electroglottographic Measures Based on GCI and GOI Detection Using Multiscale Product date: 2008-03-01 words: 4805 flesch: 62 summary: Wavelet transform of EGG signal is made with a quadratic spline function. Wavelet coefficients calculated on different dyadic scales, show modulus maxima at localized discontinuities of EGG signal. keywords: degg; detection; egg; gci; goi; product; signal; wavelet cache: ijccc-2371.pdf plain text: ijccc-2371.txt item: #405 of 981 id: ijccc-2372 author: Chen, Zhengxin title: Learning about Learners: System Learning in Virtual Learning Environment date: 2008-03-01 words: 4491 flesch: 40 summary: Abstract: Virtual learning is not just about a set of useful IT tools for learning. From an examination on where virtual learning stands in the overall learning spectrum, we point out the important impact of natural computing on virtual learning. keywords: computing; emergence; emotion; environment; intelligence; learners; learning; research; system cache: ijccc-2372.pdf plain text: ijccc-2372.txt item: #406 of 981 id: ijccc-2373 author: Dieulot, Jean-Yves; Benhammi, Tarik; Colas, Frédéric; Barre, Pierre-Jean title: Composite Predictive Functional Control Strategies, Application to Positioning Axes date: 2008-03-01 words: 2888 flesch: 54 summary: Figure 1: Principle of PFC control 2.2 Computation of control Cascaded predictive control could improve the tracking and was shown to be more robust to load mass variations. keywords: control; controller; jean; loop; model; pfc; speed cache: ijccc-2373.pdf plain text: ijccc-2373.txt item: #407 of 981 id: ijccc-2374 author: Donegan, Brendan J.; Doolan, Daniel C.; Tabirca, Sabin title: Mobile Message Passing using a Scatternet Framework date: 2008-03-01 words: 3317 flesch: 60 summary: Data: List of all MMPI capable devices initialize list of devices to send to bridge node; foreach device in the list do if bridge node then create slave connection; add bridge node to routing table; else if prior to bridge node then create slave connection; add slave node to routing table; send Slave message; else if after bridge node then add device to list of devices to send to bridge node; add node to routing table; add number of devices to Bridge message; add list of devices to the Bridge message; send Bridge message; Algorithm 1: Establishing initial connections at the root node The bridge node then chooses one of these to be the master of the other piconet and sends it the list minus the device chosen (Algorithm 2). The power of mobile devices is also growing quickly, in October 2005 ARM announced the ARM Cortex A8 keywords: devices; int; library; message; mobile; node; scatternet cache: ijccc-2374.pdf plain text: ijccc-2374.txt item: #408 of 981 id: ijccc-2375 author: Abu Bakar, Kamalrulnizam; Doherty, B. S. title: Evaluation of the Recorded State Mechanism for Protecting Agent Integrity Against Malicious Hosts date: 2008-03-01 words: 6965 flesch: 90 summary: Keywords: Agent security, Malicious host, Recorded State Mechanism. Summary of evaluation of Recorded State Mechanism The Recorded State Mechanism is able to detect most of the malicious host attacks that try to tamper with the agent’s data and state integrity. keywords: e c; e n; e t; h e; n t; s t; t h; t o; t t cache: ijccc-2375.pdf plain text: ijccc-2375.txt item: #409 of 981 id: ijccc-2376 author: Artal, Cayetano Guerra; Suarez, Maria Dolores Afonso; Perez, Idafen Santana; Lopez, Ruben Quesada title: OLC, On-Line Compiler to Teach Programming Languages date: 2008-03-01 words: 4986 flesch: 62 summary: He has finished the bachelor degree Computer Science Engineering and in a few weeks will defend his senior thesis (high level of programming language knowledge). He still has to study three subjects to finish the degree Computer Science Engineer- ing (high level of programming language knowledge). keywords: compiler; computer; language; learning; olc; programming; science; students; use; web cache: ijccc-2376.pdf plain text: ijccc-2376.txt item: #410 of 981 id: ijccc-2377 author: Mitsunaga, Kouichi; Matsuo, Takami title: Adaptive Compensation of Friction Forces with Differential Filter date: 2008-03-01 words: 3856 flesch: 66 summary: [13] L. R. Ray, A. Ramasubramanian, and J. Townsend, “ Adaptive Friction Compensation Using Ex- tended Kalman-Bucy filter Friction Estimation”. in: Adaptive Control of Nonsmooth Dynamic Systems G. Tao and F.L. Lewis (Eds.), Springer, pp.211– 248, 2001. keywords: adaptive; control; differential; filter; friction; velocity cache: ijccc-2377.pdf plain text: ijccc-2377.txt item: #411 of 981 id: ijccc-2378 author: Moise, Gabriela title: A Formal Description of the Systemic Theory based e-Learning date: 2008-03-01 words: 5665 flesch: 54 summary: The notion of instructional system was introduced by Robert Glaser in 1962. An intelligent instructional system (IIS) with a combined regulation is defined according to the schema presented in the figure no. 7. 94 Gabriela Moise Figure 7: Intelligent instructional system The input of the system represents the reference value, what the students have to realize after the learning (instructional) process has finished. keywords: boolean; learning; model; module; process; system; theory cache: ijccc-2378.pdf plain text: ijccc-2378.txt item: #412 of 981 id: ijccc-2379 author: Murugesh, V.; Batri, K. title: State Analysis of Time-Varying Singular Bilinear Systems by RK-Butcher Algorithms date: 2008-03-01 words: 2436 flesch: 67 summary: [5] applied the Haar wavelets for the solution of time -varying singular bilinear systems. 1 Introduction The development of singular bilinear systems has been studied by some researchers. keywords: bilinear; butcher; solutions; systems; time cache: ijccc-2379.pdf plain text: ijccc-2379.txt item: #413 of 981 id: ijccc-2380 author: Suarez, Maria Dolores Afonso; Artal, Cayetano Guerra; Tejera, Francisco Mario Hernandez title: E-learning multimedia applications: Towards an engineering of content creation date: 2008-06-01 words: 3734 flesch: 45 summary: This work intends to contribute with the methodological lines applied in the production of multimedia teaching content for lecturing. This paper presents the acquired experience in the development and use of multimedia contents for e-learning applications, created for some of the subjects of the degree in computer science engineering. keywords: content; development; engineering; learning; material; multimedia; students; teaching cache: ijccc-2380.pdf plain text: ijccc-2380.txt item: #414 of 981 id: ijccc-2381 author: Bentayeb, Abdelmadjid; Maamri, Nezha; Trigeassou, Jean-Claude title: Design of a MIMO PID Robust Controller using moments based approach date: 2008-01-01 words: 3575 flesch: 58 summary: Let:   Y1 (s) Y2 (s)   =   G11 (s) G12 (s) G21 (s) G22 (s)     U1 (s) U2 (s)   (2) where G (s) is the transfer matrix of the system. keywords: controller; model; moments; pid; reference; system cache: ijccc-2381.pdf plain text: ijccc-2381.txt item: #415 of 981 id: ijccc-2382 author: Bouhenna, Abderrahmane; Mansouri, Abdellah; Chenafa, Mohammed; Belaidi, Abdelkader title: Feedback Gain Design Method for the Full-Order Flux Observer in Sensorless Control of Induction Motor date: 2008-01-10 words: 4252 flesch: 70 summary: Speed adaptive full observers introduced by [8], [15] are promising flux estimators for inductions motors drives. eω ]T , the system describing the estimation error is as follows:    d dt δ eψ = −( 1 Tr + jωslo ) keywords: control; induction; motor; observer; speed cache: ijccc-2382.pdf plain text: ijccc-2382.txt item: #416 of 981 id: ijccc-2383 author: Elfelly, Nesrine; Dieulot, Jeans-Yves; Borne, Pierre title: A Neural Approach of Multimodel Representation of Complex Processes date: 2008-01-01 words: 5200 flesch: 54 summary: [12] D. J. Leith, W. E. Leithead, Analytic framework for blended multiple model systems using linear local models, International Journal of Control, Vol. 72, pp. In this paper, we propose a neural approach to derive different models describing the process in different operating conditions. keywords: approach; control; input; method; models; multimodel; output; system; validities cache: ijccc-2383.pdf plain text: ijccc-2383.txt item: #417 of 981 id: ijccc-2384 author: Hutu, Florin; Cauet, Sebastien; Coirault, Patrick title: Antenna Arrays Principle and Solutions: Robust Control Approach date: 2008-01-01 words: 4233 flesch: 60 summary: Robust Control Approach Florin Hutu, Sebastien Cauet, Patrick Coirault Abstract: This paper treats solutions on the ability of a chain of non identical oscilla- tors to drive antenna arrays. However, smart antenna arrays provide a much more effective solution by focusing the transmitted power toward user and only looking in the direction of the user for the up link signal. keywords: antenna; array; controller; master; matrix; oscillators; output; problem; signals; system cache: ijccc-2384.pdf plain text: ijccc-2384.txt item: #418 of 981 id: ijccc-2385 author: Nikolov, Angel Vassilev title: Analytical Model For a MultiprocessorWith Private Caches And Shared Memory date: 2008-01-01 words: 3481 flesch: 69 summary: In the case of non-blocking caches ANBC will be ANBC = N ∑ j=0 (N − j −1 + k)Pj,1 + N−1 ∑ j=0 (N − j)Pj,2. Hence the solutions of (9-11) are u j,i(s, x) = keywords: memory; n j cache: ijccc-2385.pdf plain text: ijccc-2385.txt item: #419 of 981 id: ijccc-2386 author: Pí¢rv, Bazil; Lazăr, Ioan; Motogna, Simona title: COMDEVALCO framework - the modeling language for procedural paradigm date: 2008-06-01 words: 5214 flesch: 38 summary: The UML metamodel has no correspondent for modeling constructs more fine-grained than Program and Procedure; • the models are executable and verifiable because each component can be executed; moreover, one can use tools for validation and evaluation of complexity; • the models are independent of any specific object-oriented language; • the modeling language is flexible and extensible in the following dimensions: the statement set, the component (program units) family, the component definition, the data type definition, and the set of components; • the modeling language allows the use of graphical tools in all the phases: building, validating, and using software component models; • the modeling language allows automatic code generation for components in a concrete program- ming language, according to Model Driven Architecture (MDA) specifications. Once defined, component models are passed to a V & V (verification and validation) process, which is intended to check their correctness and to evaluate their performances. keywords: component; development; language; modeling; new; object; process; program; software cache: ijccc-2386.pdf plain text: ijccc-2386.txt item: #420 of 981 id: ijccc-2387 author: Sahin, Mehmet; Yaldiz, Suleyman; Unsacar, Faruk; Yaldiz, Burak; Bilalis, Nikolaos; Maravelakis, Emmanuel; Antoniadis, Aristomenis title: Virtual Training Centre for Computer Numerical Control date: 2008-01-01 words: 2612 flesch: 41 summary: The major objective in the field of CNC training is to improve the qualifications and competences of the trainees, which is directly related to a well-designed and effective curriculum to be carried out on CNCs. The facilities for CNC training vary a lot and this has had direct impact on the experience that the trainee is acquiring during his/her apprentice. keywords: centre; cnc; control; education; ict; learning; systems; training cache: ijccc-2387.pdf plain text: ijccc-2387.txt item: #421 of 981 id: ijccc-2388 author: Styliadis, Athanasios D.; Konstantinidou, Debbie G.; Tyxola, Kyriaki A. title: eCAD System Design - Applications in Architecture date: 2008-01-01 words: 4291 flesch: 39 summary: Personalized eCAD learning is a new term in informatics, engineering and architecture, related to digital architecture documentation with e-learning functionality, and introduced to literature for the first time within this paper. The proposed term personalized eCAD learning is defined as a digital architecture documentation procedure with e-learning functionality based on metric and non-metric (qualitative) data, and spatial and 3-D modeling semantic information (please see next Section). keywords: architecture; caad; design; digital; ecad; functionality; learning; modeling; object; system; vol cache: ijccc-2388.pdf plain text: ijccc-2388.txt item: #422 of 981 id: ijccc-2389 author: Dzitac, Ioan title: A Letter From the Associate Editor in Chief date: 2008-09-01 words: 3734 flesch: 45 summary: This work intends to contribute with the methodological lines applied in the production of multimedia teaching content for lecturing. This paper presents the acquired experience in the development and use of multimedia contents for e-learning applications, created for some of the subjects of the degree in computer science engineering. keywords: content; development; engineering; learning; material; multimedia; students; teaching cache: ijccc-2389.pdf plain text: ijccc-2389.txt item: #423 of 981 id: ijccc-2390 author: Buciu, Ioan title: A Letter From the Associate Executive Editor date: 2008-09-01 words: 3575 flesch: 58 summary: Let:   Y1 (s) Y2 (s)   =   G11 (s) G12 (s) G21 (s) G22 (s)     U1 (s) U2 (s)   (2) where G (s) is the transfer matrix of the system. keywords: controller; model; moments; pid; reference; system cache: ijccc-2390.pdf plain text: ijccc-2390.txt item: #424 of 981 id: ijccc-2391 author: Alavandar, Srinivasan; Nigam, M. J. title: Neuro-Fuzzy based Approach for Inverse Kinematics Solution of Industrial Robot Manipulators date: 2008-09-01 words: 4252 flesch: 70 summary: Speed adaptive full observers introduced by [8], [15] are promising flux estimators for inductions motors drives. eω ]T , the system describing the estimation error is as follows:    d dt δ eψ = −( 1 Tr + jωslo ) keywords: control; induction; motor; observer; speed cache: ijccc-2391.pdf plain text: ijccc-2391.txt item: #425 of 981 id: ijccc-2392 author: Arrieta, Orlando; Vilanova, Ramon; Balaguer, Pedro title: Procedure for Cascade Control Systems Design: Choice of Suitable PID Tunings date: 2008-09-01 words: 5200 flesch: 54 summary: [12] D. J. Leith, W. E. Leithead, Analytic framework for blended multiple model systems using linear local models, International Journal of Control, Vol. 72, pp. In this paper, we propose a neural approach to derive different models describing the process in different operating conditions. keywords: approach; control; input; method; models; multimodel; output; system; validities cache: ijccc-2392.pdf plain text: ijccc-2392.txt item: #426 of 981 id: ijccc-2393 author: Bhanu, S. Mary Saira; Gopalan, N.P. title: A Hyper-Heuristic Approach for Efficient Resource Scheduling in Grid date: 2008-09-01 words: 4233 flesch: 60 summary: Robust Control Approach Florin Hutu, Sebastien Cauet, Patrick Coirault Abstract: This paper treats solutions on the ability of a chain of non identical oscilla- tors to drive antenna arrays. However, smart antenna arrays provide a much more effective solution by focusing the transmitted power toward user and only looking in the direction of the user for the up link signal. keywords: antenna; array; controller; master; matrix; oscillators; output; problem; signals; system cache: ijccc-2393.pdf plain text: ijccc-2393.txt item: #427 of 981 id: ijccc-2394 author: Cordova, Felisa M.; Canete, Lucio; Quezada, Luis E.; Yanine, Fernando title: An Intelligent Supervising System for the Operation of an Underground Mine date: 2008-09-01 words: 3481 flesch: 69 summary: In the case of non-blocking caches ANBC will be ANBC = N ∑ j=0 (N − j −1 + k)Pj,1 + N−1 ∑ j=0 (N − j)Pj,2. Hence the solutions of (9-11) are u j,i(s, x) = keywords: memory; n j cache: ijccc-2394.pdf plain text: ijccc-2394.txt item: #428 of 981 id: ijccc-2395 author: Duță, Luminița; Filip, Florin Gheorghe; Henrioud, Jean-Michel; Popescu, Ciprian title: Disassembly Line Scheduling with Genetic Algorithms date: 2008-09-01 words: 4472 flesch: 52 summary: First, the main concepts and research directions in modelling, optimization and control in disassembly processes are reviewed. There are several research directions in relation with disassembly processes such as: modeling, plan- ning, and control. keywords: algorithms; control; disassembly; filip; henrioud; line; population; problem; process cache: ijccc-2395.pdf plain text: ijccc-2395.txt item: #429 of 981 id: ijccc-2396 author: Ezzedine, Houcine; Bonte, Therese; Kolski, Christophe; Tahon, Christian title: Integration of Traffic Management and Traveller Information Systems: Basic Principles and Case Study in Intermodal Transport System Management date: 2008-09-01 words: 6256 flesch: 41 summary: Several authors (see for instance [12]) have contributed to the use of artificial intelligence in the field of transportation system regulation using fuzzy models. The comfort and the attractiveness of passenger transport systems depend largely upon the quality of the transfers at interchanges between public transport modes themselves and with the car. keywords: agent; decision; human; information; interface; intermodal; management; model; network; regulation; system; traffic; transport; transportation cache: ijccc-2396.pdf plain text: ijccc-2396.txt item: #430 of 981 id: ijccc-2397 author: Păun, Gheorghe; Perez-Jimenez, Mario J.; Riscos-Nunez, Agustí­n title: Tissue P Systems with Cell Division date: 2008-09-01 words: 5047 flesch: 65 summary: It remains as a research topic to consider the same extension for other types of systems, for in- stance, for cell P systems with symport/antiport rules, or for neural P systems (with states associated with cells and multiset rewriting rules for processing the objects. Keywords: Tissue-like P systems, cell division rule, SAT problem, NP-complete problem 1 Introduction In membrane computing, there are two main classes of P systems: with the membranes arranged hierarchically, inspired from the structure of the cell, and with the membranes placed in the nodes of a graph, all of them at the same level, inspired from the cell inter-communication in tissues. keywords: cell; rules; systems cache: ijccc-2397.pdf plain text: ijccc-2397.txt item: #431 of 981 id: ijccc-2398 author: Vesselenyi, Tiberiu; Dzitac, Ioan; Dzitac, Simona; Vaida, Victor title: Surface Roughness Image Analysis using Quasi-Fractal Characteristics and Fuzzy Clustering Methods date: 2008-09-01 words: 4044 flesch: 48 summary: The correlation between surface roughness and surface image had been studied in a large number of papers [4] show- ing a certain functional dependency between asperity height and image intensity. Fractal dimension computation of rough 306 Tiberiu Vesselenyi, Ioan Dzitac, Simona Dzitac, Victor Vaida Figure 1: Surface image with higher center intensity. keywords: analysis; clustering; dzitac; figure; fractal; image; method; parameters; roughness; samples; surface; university cache: ijccc-2398.pdf plain text: ijccc-2398.txt item: #432 of 981 id: ijccc-2399 author: Filip, Florin Gheorghe title: Book review date: 2008-09-01 words: 1038 flesch: 48 summary: Discrete event systems (DES) represent a class of dynamic, discrete - time systems whose states can take values only in a discrete-value space and can change only as a result of asynchronous occurrences of planned or spontaneous events. The authors are well aware of the existence of numerous books and papers addressing various sub- classes of DES such as: language and automata theory, Petri nets , queuing models, Markov chains, discrete time simulation, perturbation analysis and so on , all using specific representations of the ob- jects studied. keywords: book; control; systems cache: ijccc-2399.pdf plain text: ijccc-2399.txt item: #433 of 981 id: ijccc-2400 author: Atani, Reza Ebrahimi; Mirzakuchaki, Sattar; Atani, Shahabaddin Ebrahimi; Meier, Willi title: On DPA-Resistive Implementation of FSR-based Stream Ciphers using SABL Logic Styles date: 2008-12-01 words: 5942 flesch: 65 summary: Normally, a hamming distance power model is used to map the transitions that occur at the outputs of cells of a netlist to power consumption values. This contribution discusses the DPA-resistant implementation of two eS- TREAM finalists using SABL logic styles. keywords: ciphers; cmos; consumption; design; dpa; grain; logic; power; sabl; stream; styles; trivium cache: ijccc-2400.pdf plain text: ijccc-2400.txt item: #434 of 981 id: ijccc-2401 author: Georgescu, Irina title: Fuzzy Szpilrajn Theorem through Indicators date: 2008-12-01 words: 3321 flesch: 82 summary: Then to prove (4) is equivalent with establishing the following inequalities: (e) OrdΩ(R) ∧ R(x, y) ∧ R(y, z) ≤ R′(x, z); (f) OrdΩ(R) ∧ R(x, y) ∧ R(y, b) ∧ R(a, z) ≤ R′(x, z); (g) OrdΩ(R) ∧ R(y, z) ∧ R(x, b) ∧ R(a, y) ≤ R′(x, z); (h) OrdΩ(R) ∧ R(x, b) ∧ R(a, y) ∧ R(y, b) ∧ R(a, z) ≤ R′(x, z). (e) follows by applying Proposition 6 (2): OrdΩ(R) ∧ R(x, y) ∧ R(y, z) ≤ Trans(R) ∧ R(x, y) ∧ R(y, z) ≤ R(x, z) ≤ R′(x, z). keywords: r(x cache: ijccc-2401.pdf plain text: ijccc-2401.txt item: #435 of 981 id: ijccc-2402 author: Ji, Yuxuan; Ma, Hengtai; Zheng, Gang title: Analysis and Design on Key Updating Policies for Satellite Networks date: 2008-12-01 words: 4846 flesch: 60 summary: 343-352 Analysis and Design on Key Updating Policies for Satellite Networks Yuxuan Ji, Hengtai Ma, Gang Zheng Abstract: Satellite networks are becoming increasingly important because of the ex- citing global communication services they provide. Based on the structure and communication features of satellite networks, a dynamic key management model for satellite networks (DKM-SN) is presented, which includes certificates owned by each satellite, primary keys and session keys both of which are shared between two satellites. keywords: certificate; cost; key; keys; networks; satellite; session; time; updating cache: ijccc-2402.pdf plain text: ijccc-2402.txt item: #436 of 981 id: ijccc-2403 author: Marchand, Audrey; Chetto, Maryline title: Quality of Service Scheduling in Real-Time Systems date: 2008-12-01 words: 6469 flesch: 61 summary: We observe that five violations of deadline relative to blue task instances occur at time instants t = 24 (task T3), t = 30 (tasks T2 and T4) and t = 60 (tasks T3 and T4), thus reducing the QoS. 356 Audrey Marchand, Maryline Chetto - - - - -6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 0 30 60 0 20 40 60 0 15 30 45 60 0 12 24 36 48 60 0 10 20 30 40 50 60 T0 T1 T2 T3 T4 : processing red task : processing blue task 6 : release time Figure 2: BWP scheduling algorithm (si = 2) 3.2 The EDL algorithm In this example, we can see that, thanks to RLP scheduling, the number of 358 Audrey Marchand, Maryline Chetto - - - - -6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 0 30 60 0 20 40 60 0 15 30 45 60 0 12 24 36 48 60 0 10 20 30 40 50 60 T0 T1 T2 T3 T4 : processing red task : processing blue task 6 : release time Figure 4: RLP scheduling algorithm (si = 2) violations of deadline relative to blue task instances has been reduced to three. keywords: algorithm; blue; deadline; edl; instances; qos; rlp; scheduling; systems; task; time cache: ijccc-2403.pdf plain text: ijccc-2403.txt item: #437 of 981 id: ijccc-2404 author: Negulescu, Sorin C.; Kifor, Claudiu V.; Oprean, Constantin title: Ant Colony Solving Multiple Constraints Problem: Vehicle Route Allocation date: 2008-12-01 words: 2831 flesch: 63 summary: The α, β and γ parameters are controlling the relative weight of the history, pheromone intensity and the distance in the process of choosing the next node in the itinerary. Initialize pheromone trails for (every edge i, j) { τ = τ0 } // Choose the starting town for every ant for (k = 1; k ≤ m; k++) { Place ant k on a randomly chosen city } // Initialize the best tour and length T + = the shortest tour found from the beginning L+ = the length of the best tour // Main loop for (t = 1;t ≤ keywords: ant; j(t; pheromone; problem; tour cache: ijccc-2404.pdf plain text: ijccc-2404.txt item: #438 of 981 id: ijccc-2405 author: Stanojevic, Milan; Vujoševic, Mirko; Stanojevic, Bogdana title: Computation Results of Finding All Efficient Points in Multiobjective Combinatorial Optimization date: 2008-12-01 words: 4495 flesch: 56 summary: In order to demonstrate “independence” of efficient points number on graphs size for STP, some experimental results are given for maximin criteria types. [3] V.A. Emelichev, V.A. Perepelitsa, On Cardinality of the Set of Alternatives in Discrete Many- criterion Problems, Discrete Math. keywords: criteria; number; optimization; points; problem; set cache: ijccc-2405.pdf plain text: ijccc-2405.txt item: #439 of 981 id: ijccc-2406 author: Èší¢mbulea, Leon; Horvat-Petrescu, Manuela title: Redistributing Fragments into a Distributed Database date: 2008-12-01 words: 5232 flesch: 65 summary: The distributed database C contains a set of n fragments F j, 0 <= j n∑ j=1 Nj ÷ n and Xi is Xi−, then xij cycle e keywords: buildings; criteria; criterion; cycle; cycle e; degree; investment; method; project; table; utility; value; xij cache: ijccc-2679.pdf plain text: ijccc-2679.txt item: #559 of 981 id: ijccc-2680 author: Lang, Haoxiang; Khan, Muhammad Tahir; Tan, Kok-Kiong; de Silva, Clarence W. W. title: Application of Visual Servo Control in Autonomous Mobile Rescue Robots date: 2016-09-01 words: 4415 flesch: 47 summary: Therefore, it makes possible for so called direct visual servoing where it heavily relies on the speed of vision processing for computing joint inputs [4] in robot control. Furthermore, the eye-in-hand camera configuration has more advantages Application of Visual Servo Control in Autonomous Mobile Rescue Robots 691 (a) (b) (c) Figure 3: PBVS simulation in Matlab: (a) current and desired pose of the camera Cartesian space; (b) controller output; (c) trajectory of the camera pose in Cartesian space. 692 H. Lang, M.T. Khan, K.-K. Tan, C.W. de Silva (a) (b) Figure 4: (a) Robot search and rescue scenario; (b) Physical configuration of the test bed. than the eye-to-hand one in mobile robot applications. keywords: camera; control; figure; image; mobile; object; robot; servoing; system cache: ijccc-2680.pdf plain text: ijccc-2680.txt item: #560 of 981 id: ijccc-2681 author: Pinheiro, Billy; Cerqueira, Eduardo; Abelem, Antonio title: NVP: A Network Virtualization Proxy for Software Defined Networking date: 2016-09-01 words: 4488 flesch: 51 summary: The NVP (Network Virtualization Proxy) is a virtualization proxy that intercepts messages exchanged between controllers and switches SDN enabling network virtualization. An implementation of the proposal was developed as a proof of concept and load testing was performed showing that the solution can provide network virtualization in a scalable manner, using less than 2.5 MB of memory to manage 100 switches performing simultaneous requests, whereas FlowVisor requires more then 200 MB. keywords: controller; flowvisor; network; number; nvp; openflow; proxy; switches; virtualization cache: ijccc-2681.pdf plain text: ijccc-2681.txt item: #561 of 981 id: ijccc-2682 author: Qu, Zifang; Du, Zhenbin title: Fuzzy H2 Guaranteed Cost Sampled-Data Control of Nonlinear Time-Varying Delay Systems date: 2016-09-01 words: 4583 flesch: 79 summary: [2] K.Tanaka; M.Sugeno.(1992); Stability analysis and design of fuzzy control systems, Fuzzy Sets and Systems, ISSN 0165-0114, 45(2):135-156. R2ẋ(t) − (x(t) − x(t − τ(t))) keywords: control; data; delay; time cache: ijccc-2682.pdf plain text: ijccc-2682.txt item: #562 of 981 id: ijccc-2683 author: Stanojević,, Milan; Milenković, Ivan; Starčević, Dušan; Stanojević, Bogdana title: Continuous Distribution Approximation and Thresholds Optimization in Serial Multi-Modal Biometric Systems date: 2016-09-01 words: 6501 flesch: 50 summary: We performed some experiments with multi-modal biometric systems with more than two matchings, but the instances were not yet statistically relevant. [8] Marcialis, G.L.; Mastinu, P.; Roli, F. (2010), Serial fusion of multi-modal biometric systems. keywords: approximation; biometric; distribution; matching; modal; multi; score; systems; thresholds; users cache: ijccc-2683.pdf plain text: ijccc-2683.txt item: #563 of 981 id: ijccc-2692 author: Cheng, Shulin; Zhang, Bofeng; Zou, Guobing title: A Rating-Based Integrated Recommendation Framework with Improved Collaborative Filtering Approaches date: 2017-04-23 words: 7695 flesch: 53 summary: Although UBCF-I has some strong points, we don’t intend to deeply research the serious user Cold Start problem in which the number of user ratings is close or equal to 0. That means similar users making similar item ratings provides an extra and useful information source for prediction. keywords: approaches; information; item; matrix; method; model; rating; recommendation; similarity; sparsity; ubcf; user cache: ijccc-2692.pdf plain text: ijccc-2692.txt item: #564 of 981 id: ijccc-273 author: Chikamai, Keith; Viriri, Serestina; Tapamo, Jules Raymond title: Combining Feature Methods for Content-Based Classification of Mammogram Images date: 2013-07-26 words: 5144 flesch: 51 summary: This research work implements the Gabor filter and the Grey Level Co-occurrence Matrix (GLCM) in an attempt to enable efficient and accurate retrieval of mammogram images containing microcalcifications, as described by a pathologist. Grey Level Co-occurrence Matrix feature method is also used to model grey level dependencies of mammogram images. keywords: classification; features; gabor; haralick; image; mammogram; precision; query cache: ijccc-273.pdf plain text: ijccc-273.txt item: #565 of 981 id: ijccc-2744 author: Gí¢lmeanu, Honorius; Sasu, Lucian Mircea; Andonie, Razvan title: Incremental and Decremental SVM for Regression date: 2016-10-17 words: 8794 flesch: 68 summary: We discussed in [7] the conditions for vector migrations between the sets and how to determine the optimal increment. This pro- duces a robust incremental algorithm, that creates a sequence of vector migrations, as part of the learning process; c) keywords: incremental; migration; vector; ∆θc cache: ijccc-2744.pdf plain text: ijccc-2744.txt item: #566 of 981 id: ijccc-2745 author: Montoya, Germí¡n A.; Donoso, Yezid title: Delay-Sensitive Optimization Models and Distributed Routing Algorithms for Mobile Wireless Sensor Networks date: 2016-10-17 words: 5217 flesch: 60 summary: 2 General problem statement The Figure 1.a presents the problem we want to solve, where a rounded node is a sensor and a square node corresponds to a base station (destination node). d Destination node. keywords: destination; destination node; network; node; path; state cache: ijccc-2745.pdf plain text: ijccc-2745.txt item: #567 of 981 id: ijccc-2746 author: Pantelic, Ognjen; Pajic, Ana; Nikolic, Ana title: General Model for Adequate Cloud Service Selection using Decision Making Methods date: 2016-10-17 words: 6682 flesch: 48 summary: Cloud service models describe how cloud services are made available to clients. General Model for Adequate Cloud Service Selection using Decision Making Methods 835 3 General Model Elements There are many factors that determine which Cloud service model is right for the specific organizational needs. keywords: alternatives; business; cloud; computing; cost; decision; infrastructure; making; mean; methods; model; security; service cache: ijccc-2746.pdf plain text: ijccc-2746.txt item: #568 of 981 id: ijccc-2747 author: Schleyer, Gustavo; Lefranc, Gastón; Cubillos, Claudio; Millí¡n, Ginno; Osorio-Comparí¡n, Romí¡n title: A New Method for Colour Image Segmentation date: 2016-10-17 words: 7847 flesch: 53 summary: 3 Colour image segmentation method 3.1 Technical methods of image segmentation The Technical methods of image segmentation are classified in image segmentation techniques based colour image features, techniques based colour image, and image segmentation techniques based on physics [13]-[17]. Keywords: Computer vision, Image processing, Image segmentation. keywords: algorithm; colour; groups; image; image segmentation; method; pixels; regions; rgb; saturation; segmentation; tonality; values cache: ijccc-2747.pdf plain text: ijccc-2747.txt item: #569 of 981 id: ijccc-2751 author: Manoharan, Neelamegam; Sekhar Dash, Subhransu; Rajesh, Kurup Sathy; Panda, Sidhartha title: Automatic Generation Control by Hybrid Invasive Weed Optimization and Pattern Search Tuned 2-DOF PID Controller date: 2017-06-29 words: 6416 flesch: 52 summary: It is seen in literatures that the performance of power system depends on the tuning tech- nique, controller structure and choice of cost function. [13] , unit commitment problem solution [27] and economic load dispatch of power systems keywords: algorithm; area; controller; dof; hybrid; optimization; panda; pid; power; pso; search; system cache: ijccc-2751.pdf plain text: ijccc-2751.txt item: #570 of 981 id: ijccc-2759 author: Sirbu, Daniela; Dumitrache, Ioan title: A Conceptual Framework for Artificial Creativity in Visual Arts date: 2017-04-23 words: 4730 flesch: 36 summary: [38], [39], [44], and systemic [7], [8] ap- proaches in creativity research link creativity to external factors and lead to evolutionary views of creativity. A Conceptual Framework for Artificial Creativity in Visual Arts D. Sirbu, I. Dumitrache Daniela Sirbu Department of New Media University of Lethbridge Lethbridge, Canada daniela.sirbu@uleth.ca Ioan Dumitrache Department of Automatic Control and Systems Engineering University Politehnica Bucharest Bucharest, Romania ioan.dumitrache@acse.upb.ro Abstract: The present paper introduces the conceptual framework for an artificial system for visual creativity addressing the idea of niche creativity that is domain specific and non-anthropocentric in its conceptual approach. keywords: agents; approach; asvc; creativity; design; drawing; new; processes; stochastic; system cache: ijccc-2759.pdf plain text: ijccc-2759.txt item: #571 of 981 id: ijccc-2770 author: Bojan-Dragos, Claudia-Adina; Precup, Radu-Emil; Tomescu, Marius L.; Preitl, Stefan; Tanasoiu, Oana-Maria; Hergane, Stefania title: Proportional-Integral-Derivative Gain-Scheduling Control of a Magnetic Levitation System date: 2017-09-10 words: 5256 flesch: 52 summary: Proportional-Integral-Derivative Gain-Scheduling Control of a Magnetic Levitation System 605 Figure 2: Real-time experimental results of state feedback control system structure with the best state feedback gain matrix Figure 3: Control signal u1 = u (j) EM1, j ∈ {3, 5, 6}, versus time for control systems with PID controller for o.p.s. 1 Introduction During the last years several classical and adaptive control structures have been proposed for positioning control system and applications for magnetic levitation systems. keywords: control; controller; figure; gain; levitation; pid; scheduling; state; system; time cache: ijccc-2770.pdf plain text: ijccc-2770.txt item: #572 of 981 id: ijccc-2774 author: Widyotriatmo, Augie; Joelianto, Endra; Prasdianto, Agung; Bahtiar, Hafidz; Nazaruddin, Yul Yunazwin title: Implementation of Leader-Follower Formation Control of a Team of Nonholonomic Mobile Robots date: 2017-12-04 words: 5007 flesch: 48 summary: The global coordinator system also implements role assignment algorithm to allocate the role of mobile robots in the formation. The experimental results show the robustness of formation of mobile robots even if the leader is manually moved to the arbitrary location, and so that the role of a leader is taken by the nearest mobile robot to the virtual leader. keywords: control; follower; follower formation; formation; leader; mobile; robots cache: ijccc-2774.pdf plain text: ijccc-2774.txt item: #573 of 981 id: ijccc-2779 author: Porreca, Antonio E.; Leporati, Alberto; Mauri, Giancarlo; Zandron, Claudio title: Introducing a Space Complexity Measure for P Systems date: 2009-09-01 words: 5255 flesch: 53 summary: One of the most powerful features of P systems with active membranes is the possibility of creating an exponential workspace in polynomial time by means of elementary membrane division rules; we denote the class of such P systems by EAM. In particular, since the introduction of P systems with active membranes [5], var- ious results concerning time complexity classes defined in terms of P systems with active membranes were given, comparing different classes obtained using various ingredients (such as, e.g., polarizations, dissolution, uniformity, etc.). keywords: complexity; membrane; p systems; space; systems cache: ijccc-2779.pdf plain text: ijccc-2779.txt item: #574 of 981 id: ijccc-2780 author: Bucerzan, Dominic; Cayrel, Pierre-Louis; Dragoi, Vlad; Richmond, Tania title: Improved Timing Attacks against the Secret Permutation in the McEliece PKC date: 2016-12-02 words: 9059 flesch: 73 summary: The interest of timing attacks is both practical and theoretical: we avoid unsecured implementations and discover new attacks succeeding in a polynomial time. ← 5 + 6qi(x) end while The new security parameters: We recall the fact that normal security parameters do not take in consideration timing attacks. keywords: algorithm; attack; number; permutation; polynomial; positions; secret; step; timing; wt(e; σ(x cache: ijccc-2780.pdf plain text: ijccc-2780.txt item: #575 of 981 id: ijccc-2781 author: Chao, Xiangrui; Peng, Yi; Kou, Gang title: A Similarity Measure-based Optimization Model for Group Decision Making with Multiplicative and Fuzzy Preference Relations date: 2016-12-02 words: 7911 flesch: 56 summary: This study proposes a new consistency-based method to integrate multiplicative and fuzzy preference relations, which is based on a cosine sim- ilarity measure to derive a collective priority vector. When comparing alternatives in real word problem, experts may use any of the following preference structures: preference orderings, utility functions, multiplicative preference relations, and fuzzy preference relations (Herrera et al.[1], Herrera-Viedma et al.[2]). keywords: decision; fuzzy; making; model; preference; preference relations; priority; relations; vector cache: ijccc-2781.pdf plain text: ijccc-2781.txt item: #576 of 981 id: ijccc-2782 author: Derpich, Ivan; Sepulveda, Juan title: Lagrangian Formulation for Energy-efficient Warehouse Design date: 2016-12-02 words: 4652 flesch: 64 summary: In this paper it is addressed the problem of warehouse design considering the energy costs incurred by vehicles and equipment in a fully or partially automated facility. [5] J. Gu, M.Goetschalckx and L.F. McGinnis (2010), Research on warehouse design and per- formance evaluation: keywords: cost; design; energy; formulas; number; storage; warehouse cache: ijccc-2782.pdf plain text: ijccc-2782.txt item: #577 of 981 id: ijccc-2783 author: Jucevicius, Justinas; Treigys, Povilas; Bernataviciene, Jolita; Briediene, Ruta; Naruševiciute, Ieva; Dzemyda, Gintautas; Medvedev, Viktor title: Automated 2D Segmentation of Prostate in T2-weighted MRI Scans date: 2016-12-02 words: 3433 flesch: 48 summary: Researchers [10] have put a big effort to summarize prostate segmentation methods. With the aim to automating the biopsy localization, prostate segmentation has to be performed in magnetic resonance images. keywords: algorithms; cancer; image; methods; mri; prostate; prostate segmentation; segmentation; shape cache: ijccc-2783.pdf plain text: ijccc-2783.txt item: #578 of 981 id: ijccc-2784 author: Lagos, Carolina; Carrasco, Raúl; Fuertes, Guillermo; Gutiérrez, Sabastií¡n; Soto, Ismael; Vargas, Manuel title: Big Data on Decision Making in Energetic Management of Copper Mining date: 2016-12-02 words: 5860 flesch: 49 summary: 2 Description of the problem With the purposes of improving the decisión making, data mining can be considered a tool of quantitative analysis, that still needs more exploration for the energetic management. [21] Y. Y. Wen, W. M. Huang, J. Wu, Y. Chen, J. Q. Song (2013), Water consumption analysis system based on data mining, Applied Mechanics and Materials, 241:1093–1097. keywords: 16b; analysis; ball; copper; data; mills; mining; mobo; process; sag; table; variables cache: ijccc-2784.pdf plain text: ijccc-2784.txt item: #579 of 981 id: ijccc-2785 author: Matica, Liliana Marilena; Oros, Horea title: Speed Computation for Industrial Robot Motion by Accurate Positioning date: 2016-12-02 words: 5651 flesch: 51 summary: The computation starts from axle components values of initial position vector, named: p0,x; p0,y; p0,z. Because of this aspect, the last step of speed increase value must be adapted, in purpose to reach the programmed speed value (it is obvious that the last step of speed increase value will not be bigger then: aM). keywords: axle; kinematics; motion; speed; stage; time; value cache: ijccc-2785.pdf plain text: ijccc-2785.txt item: #580 of 981 id: ijccc-2786 author: Schiopu, Camelia; Ciurea, Eleonor title: Two Flow Problems in Dynamic Networks date: 2016-12-02 words: 6607 flesch: 76 summary: ,am}, ak = (i,j), i,j ∈ N, the lower bound function l : A → N, the upper Copyright © 2006-2017 by CCC Publications 104 C. Schiopu, E. Ciurea bound (capacity) function u : A → N, with N the natural number set, 1 the source node and n the sink node. − d(j,n; θ)}, (i,j ∈ A). keywords: bipartite; flow; maximum; network; node; problem cache: ijccc-2786.pdf plain text: ijccc-2786.txt item: #581 of 981 id: ijccc-2787 author: Suto, Jozsef; Oniga, Stefan; Pop Sitar, Petrica title: Feature Analysis to Human Activity Recognition date: 2016-12-02 words: 5954 flesch: 57 summary: So, both types of feature selection methods have advantages and disadvantages [22]. Conclusion In this article, we investigated the performance of feature selection methods on the HAR problem in combination with three well-known machine learning algorithms. keywords: activity; data; doi; feature; methods; n=5; n=6; recognition; selection; subject; table cache: ijccc-2787.pdf plain text: ijccc-2787.txt item: #582 of 981 id: ijccc-2788 author: Velí¡squez-Villada, Carlos; Donoso, Yezid title: Delay/Disruption Tolerant Networking-Based Routing for Rural Internet Connectivity (DRINC) date: 2016-12-02 words: 6727 flesch: 52 summary: 4 Results for Rural Internet Connectivity Scenarios This section presents the results for different Rural Internet connectivity scenarios. It reviews some connectivity technologies and initiatives that are currently being tested and developed around the world for rural internet connectivity. keywords: connectivity; delay; dtn; figure; internet; messages; networking; nodes; results; routing; scenarios; time cache: ijccc-2788.pdf plain text: ijccc-2788.txt item: #583 of 981 id: ijccc-2792 author: Liu, Weihua; Liu, HaiBo; Li, LingLing title: A Multiple Attribute Group Decision Making Method Based on 2-D Uncertain Linguistic Weighted Heronian Mean Aggregation Operator date: 2017-03-01 words: 4813 flesch: 53 summary: Intuitionistic uncertain linguistic aggregation operators and their application to group decision making, Systems Engineering-Theory & Practice, 32(12): 2704- 2711. [s̈ck ij , s̈dk ij ]) where ṡa, ṡb ∈ sF and s̈c, s̈d ∈ sT is uncertain linguistic information. keywords: aggregation; attribute; decision; dimension; linguistic; liu; making; ṡ4; s̈1 cache: ijccc-2792.pdf plain text: ijccc-2792.txt item: #584 of 981 id: ijccc-2796 author: Yi, Junyan; Zhao, Peixin; Zhang, Lei; Yang, Gang title: A New Adaptive Elastic Net Method for Cluster Analysis date: 2017-04-23 words: 5348 flesch: 62 summary: The data set contains 3 classes of iris plant with A New Adaptive Elastic Net Method for Cluster Analysis 439 Table 2: The average values of SED over 20 trials produced by K-means and K-medoids and the value of SED produced by ACEN on sets of 50, 100, 300, 500 and 1000 synthetic data in 7D, 10D and 13D. Data Number Dimension 7 Dimension 10 Dimension 13 of Kmeans Kmedoids ACEN Kmeans Kmedoids ACEN Kmeans Kmedoids ACEN Size Clusters SED SED SED SED SED SED SED SED SED 438 J. Yi, P. Zhao, L. Zhang, G. Yang Table 1: The average values of SED over 20 trials produced by K-means and K-medoids and the value of SED produced by ACEN on sets of 50, 100, 300, 500 and 1000 synthetic data in 2D, 3D and 4D. Data Number Dimension 2 Dimension 3 Dimension 4 of Kmeans Kmedoids ACEN Kmeans Kmedoids ACEN Kmeans Kmedoids ACEN Size Clusters SED SED SED SED SED SED SED SED SED 50 3 32.33 29.8 20.85 46.82 42.19 29.66 44.28 44.27 36.83 5 31.87 29.37 15.59 26.17 25.72 19.47 37.48 38.04 29 10 19.35 16.85 7.29 23.16 21.4 11.39 24.54 24.7 17.4 100 3 76.85 73.98 45.21 75.41 74.14 67.7 109.27 109.38 109.27 5 68.76 64.38 39.71 104.37 96.42 83.05 69.8 68.77 54.09 10 37.72 31.45 20.88 67.02 55.91 35.95 62.36 59.54 44.91 keywords: acen; clustering; clusters; data; method; net; phase; sed cache: ijccc-2796.pdf plain text: ijccc-2796.txt item: #585 of 981 id: ijccc-2800 author: Jin, Liuqian; Fang, Xin title: Interval Certitude Rule Base Inference Method using the Evidential Reasoning date: 2017-12-04 words: 6735 flesch: 60 summary: Keywords: interval certitude rule, knowledge representation, uncertainty inference, evidential reasoning. First, due to the use of interval certitude rule, the ICRIMER method gives a description frame- work of relationships between inputs and outputs which may be complete or incomplete, linear or nonlinear, discrete or continuous, or their mixture, which are based on both numerical data and human judgments. keywords: attribute; base; certitude; degree; inference; interval; method; rule cache: ijccc-2800.pdf plain text: ijccc-2800.txt item: #586 of 981 id: ijccc-2813 author: Ramanauskas, Mikalojus; Šešok, Dmitrij; Belevičius, Rimantas; Kurilovas, Eugenijus; Valentinavičius, Saulius title: Genetic Algorithm with Modified Crossover for Grillage Optimization date: 2017-04-23 words: 4005 flesch: 49 summary: As a benchmark the problem of pile placement optimization under grillage-type foundations is chosen. Keywords: genetic algorithm; crossover operator; grillage optimization. keywords: algorithm; crossover; function; grillage; individuals; optimization; piles; problem; results; supports cache: ijccc-2813.pdf plain text: ijccc-2813.txt item: #587 of 981 id: ijccc-284 author: Teodorescu, Horia-Nicolai L. title: On the Characteristic Functions of Fuzzy Systems date: 2013-06-02 words: 4070 flesch: 62 summary: 2 Definitions and hypotheses Consider two spaces, S ⊆ X named input space and S′ ⊆ Y named output space, and applications µ : S → [0, 1] ⊂ R named input membership functions and respectively η ...S′ → [0, 1] ⊂ R named output membership functions. On the other hand,if for any point x on the frontier of the support of the fuzzy system with continuous input membership functions on X, there is a membership function µh such that for all the other membership functions µi ̸=h there is a finite limit lim u→x µi(u) µh(u) keywords: functions; fuzzy; input; membership; systems cache: ijccc-284.pdf plain text: ijccc-284.txt item: #588 of 981 id: ijccc-2842 author: Mendez Monroy, Paul Erick title: Walking Motion Generation and Neuro-Fuzzy Control with Push Recovery for Humanoid Robot date: 2017-04-23 words: 7296 flesch: 62 summary: In this environment, the robot is susceptible to external disturbance that in some cases is inevitable, requiring push recovery strategies to avoid possible falls, damage in humans and the environment. However, few researchers have presented push recovery strategies in the walking phase, in order to continue the walking before a push. keywords: ankle; controller; fuzzy; humanoid; learning; neuro; push; push recovery; recovery; reinforcement; robot; step; strategy; system; walking cache: ijccc-2842.pdf plain text: ijccc-2842.txt item: #589 of 981 id: ijccc-2844 author: Krylovas, Aleksandras; Kosareva, Natalja; Zavadskas, Edmundas Kazimieras title: WEBIRA - Comparative Analysis of Weight Balancing Method date: 2017-03-01 words: 7377 flesch: 62 summary: Max method MinMax method Sum method Vctr method m (E) (A) (W) (E) (A) (W) (E) (A) (W) (E) (A) (W) 3 0.7224 0.7268 0.8837 0.4736 0.6086 0.8398 0.6944 0.7344 0.8820 0.7018 0.7286 0.8820 4 0.5762 0.5896 0.8122 0.3298 0.4868 0.7781 0.5358 0.5934 0.8006 0.5468 0.5890 0.8039 5 0.4760 0.4860 0.7721 0.2746 0.4082 0.7479 0.4288 0.4842 0.7591 0.4438 0.4770 0.7599 6 0.3870 0.4010 0.7354 0.2220 0.3358 0.7059 0.3426 0.3958 0.7075 0.3552 0.3918 0.7055 7 0.2968 0.3308 0.6694 0.1580 0.2758 0.6539 0.2556 0.3180 0.6449 0.2682 0.3200 0.6472 8 0.2060 0.2236 0.6318 0.0824 0.1744 0.6074 0.1606 0.2166 0.6003 0.1782 0.2110 0.6016 9 0.1520 0.1816 0.5999 0.0626 0.1470 0.5797 0.1134 0.1732 0.5637 0.1272 0.1724 0.5662 10 0.0998 0.1200 0.5644 0.0300 0.0884 0.5430 0.0574 0.1064 0.5314 0.0718 0.1082 0.5300 11 0.0404 0.0628 0.5275 -0.0412 0.0414 0.5149 0.0108 0.0494 0.4906 0.0168 0.0500 0.4905 13 -0.0646 -0.0374 Max method MinMax method Sum method Vector normalization Nr. keywords: alternatives; criteria; mcdm; method; normalization; webira; weights cache: ijccc-2844.pdf plain text: ijccc-2844.txt item: #590 of 981 id: ijccc-285 author: Demir, llginç; Sayar, Ahmet title: Hadoop Optimization for Massive Image Processing: Case Study Face Detection date: 2014-10-10 words: 3867 flesch: 60 summary: This enables extreme parallel pro- cessing power of Hadoop to be applied to contents of massive number of image files. First, image files need to be modeled in an appropriate format as a complete entity, and second, they need to be adapted to the mappers in order to utilize parallelization of Hadoop framework. keywords: data; face; files; hadoop; hdfs; image; input; number; processing; size cache: ijccc-285.pdf plain text: ijccc-285.txt item: #591 of 981 id: ijccc-2876 author: Bojicic, Ivan; Marjanovic, Zoran; Turajlic, Nina; Petrovic, Marko; Vuckovic, Milica; Jovanovic, Vladan title: Domain/Mapping Model: A Novel Data Warehouse Data Mode date: 2017-02-28 words: 8038 flesch: 49 summary: Keywords: data warehouse, data models, relational/normalized model, data vault model, anchor model, dimensional model, domain/mapping model aReprinted (partial) and extended, with permission based on License Number 4057540167908 Although this issue was not explicitly described in the previous analysis of data models (because the identifier is in fact part of the structure of an object), it is relevant because the analyzed models differ in the way that they handle object identifiers. keywords: business; changes; data; data model; data vault; data warehouse; mapping; model; object; structure; system; time cache: ijccc-2876.pdf plain text: ijccc-2876.txt item: #592 of 981 id: ijccc-2877 author: Davila, Ignacio; Lopez-Juarez, Ismael; Mendez, Gerardo Maximiliano; Osorio-Comparan, Roman; Lefranc, Gaston; Cubillos, Claudio title: A Singleton Type-1 Fuzzy Logic Controller for On-Line Error Compensation During Robotic Welding date: 2017-02-28 words: 5368 flesch: 55 summary: Av. Eloy Cavazos 2001 Col. Tolteca, C.P. 67175 Guadalupe, Nuevo Leon, Mexico gerardo.maximiliano.mendez@gmail.com Roman Osorio-Comparan Instituto de Investigaciones en Matematicas Aplicadas y Sistemas Universidad Nacional Autonoma de Mexico (UNAM) Circuito Escolar S/N, Ciudad Universitaria, Coyoacán, C.P. 04510, Mexico City roman@unam.mx Gaston Lefranc Escuela de Ingenieria Electrica Pontificia Universidad Catolica de Valparaiso Avda Brasil 2950, Valparaíso, Chile 2430000 gaston.lefranc@pucv.cl Claudio Cubillos Escuela Ingenieria Informatica Pontificia Universidad Catolica de Valparaiso Avda Brasil 2950, Valparaíso, Chile 2430000 claudio.cubillos@pucv.cl Abstract: During robot welding operations in the manufacturing industry there is a need to modify on-line the welding path due to a mismatch in the position of the components to be welded. Fuzzy logic controllers (FLC’s) are useful control schemes for plants having difficulties in de- riving mathematical models or having performance limitations with conventional control schemes. keywords: axis; controller; error; figure; image; line; logic; misalignment; robot; welding cache: ijccc-2877.pdf plain text: ijccc-2877.txt item: #593 of 981 id: ijccc-2878 author: Gí®fu, Daniela; Cioca, Lucian-Ionel title: Detecting Bridge Anaphora date: 2017-02-28 words: 3221 flesch: 44 summary: BAT is created for the automated recognition of bridge type semantic relations, more precisely of the 10 types of referential relations for which annotation conventions have been determined. Initially, a similar study carried out by the same team consisted in the supervised extraction of Bridge Anaphora type relations, using WEKA statistics [8]. keywords: anaphora; bat; bridge; bridge anaphora; person; relations; type cache: ijccc-2878.pdf plain text: ijccc-2878.txt item: #594 of 981 id: ijccc-2879 author: Negulescu, Alina Eugenia; Negulescu, Sorin Constantin; Dzitac, Ioan title: Balancing Between Exploration and Exploitation in ACO date: 2017-02-28 words: 4751 flesch: 46 summary: Other common traits between ACO algorithm variants are the initialization steps that in- clude: • loading the problem’s associated graph; • setting up the initial parameter’s values; • initialization of the pheromone trails on the graph’s arches (using a minimum quantity of pheromone) as to kick-start the algorithm as otherwise, it would take a couple of iterations until the artificial ants would do this instead and this would result in additional computational costs. Rx (3) To visually grasp the behavior of this function for different parameter values, below are presented several histograms. keywords: algorithm; ant; eas; node; pheromone; probability cache: ijccc-2879.pdf plain text: ijccc-2879.txt item: #595 of 981 id: ijccc-2880 author: Palominos, Fredi; Dí­az, Hernan; Córdova, Felisa; Cañete, Lucio; Durí¡n, Claudia title: A Solution for Problems in the Organization, Storage and Processing of Large Data Banks of Physiological Variables date: 2017-02-28 words: 6649 flesch: 43 summary: 2 Stages in the treatment of EGG records The processing and analysis of EEG data go through different stages or states. 3.1 Scientific/clinical studies, research and dependences In any context of treatment and analysis of EEG data, there will be planned investigative processes (projects) conducted by researchers or clinical staff specialized, which will be assigned to a set of physical units (clinics or laboratories), where all the experimental activities will be 282 F. Palominos, H. Díaz, F. Córdova, L. Cañete, C. Durán conducted. keywords: analysis; data; eeg; eeg records; information; methods; model; organization; problems; processing; records; research; storage; treatment cache: ijccc-2880.pdf plain text: ijccc-2880.txt item: #596 of 981 id: ijccc-2886 author: Zhang, Ning; Zhong, Shan; Tian, Li title: Using Blockchain to Protect Personal Privacy in the Scenario of Online Taxi-hailing date: 2017-12-04 words: 7173 flesch: 53 summary: The third-party certification, reputation, and return policy are interacted to produce a different overall effect on the level of trust [2]. Third-party database means that the user can choose his own trusted database to achieve personal privacy data hosting. 5○ U.broadcast(permission,UAddress,SAddress) 4.3 Upload the privacy information To carry out an Online taxi-hailing order, U1 should first provide personal privacy information such as his own departure and destination, and upload the above itinerary route information to E1 and audit them in the blockchain. keywords: blockchain; data; database; hailing; information; passenger; platform; privacy; software; taxi; token cache: ijccc-2886.pdf plain text: ijccc-2886.txt item: #597 of 981 id: ijccc-2889 author: Vintan, Lucian Nicolae; Morariu, Daniel Ionel; Cretulescu, Radu George; Vintan, Maria title: An Extension of the VSM Documents Representation date: 2017-04-23 words: 5215 flesch: 55 summary: More precisely, at average the SVM with Gaussian kernel obtained, using the new representation, an improvement of 0.78% using only 1309 features, compared to the simple frequency of words vector representation. Keywords: documents representation, vector space model, hyper-vectors, documents similarity, classification, clustering. keywords: documents; hyper; representation; vector; vsm; words cache: ijccc-2889.pdf plain text: ijccc-2889.txt item: #598 of 981 id: ijccc-289 author: da Mata, Saulo Henrique; Magalhaes, Johann M. H.; Cardoso, Alexandre; Guardieiro, Paulo R.; Carvalho, Helio A. title: Performance Evaluation of ENUM Name Servers date: 2014-06-15 words: 6229 flesch: 65 summary: 4.1 Overall performance Figure 2 shows ENUM servers performance for query throughput considering the record sets and record types previously defined. Since we have used extended scenarios and size of database that were not evaluated before, these results bring to light an interesting insight about ENUM servers. keywords: bind; clients; enum; evaluation; nsd; number; performance; records; servers; throughput cache: ijccc-289.pdf plain text: ijccc-289.txt item: #599 of 981 id: ijccc-2894 author: Lee, Sang-Hun; Jin, Hyun-Wook; Kim, Kanghee; Lee, Sangil title: Phasing of Periodic Tasks Distributed over Real-time Fieldbus date: 2017-09-10 words: 7440 flesch: 60 summary: This is due to coarse-grained clock synchronization on legacy networks; moreover, the performance analysis of distributed tasks by considering jitters in task execution time is not straightforward. With the assumption that task phases can be managed by using a global clock provided by emerging real-time fieldbuses, such as EtherCAT, we can try to calculate the optimal task phasing that yields the minimal worst-case end-to-end delay. keywords: case end; delays; end; end delay; execution; max; message; node; phase; phasing; slave; tasks; time cache: ijccc-2894.pdf plain text: ijccc-2894.txt item: #600 of 981 id: ijccc-2895 author: El-Sayed, Hesham; Sankar, Sharmi; Yu, Heng; Thandavarayan, Gokulnath title: Benchmarking of Recommendation Trust Computation for Trust/Trustworthiness Estimation in HDNs date: 2017-09-10 words: 6988 flesch: 44 summary: The trustor acquires direct trust values and recommendation trust values for the trustee node. In hybrid computation, both directed path trust value and third party recommended trust values are considered and the trust computation models are shown in Figure 3. 4.1 Direct trust computation (DTC) Direct-trust computations are estimated with trust values ranging between +1 and -1. keywords: complexity; computation; hdns; management; metric; networks; node; recommendation; table; techniques; trust; trust computations; trustee; trustworthiness; values cache: ijccc-2895.pdf plain text: ijccc-2895.txt item: #601 of 981 id: ijccc-2896 author: Song, Xiaoli; Gong, Yunzhan; Jin, Dahai; Li, Qiangyi; Jing, Hengchang title: Coverage Hole Recovery Algorithm Based on Molecule Model in Heterogeneous WSNs date: 2017-06-29 words: 6259 flesch: 47 summary: The cooperative sensing monitoring method between lots of wireless sensor nodes is used in this research and the collaborate perceived probability of pixel pi being perceived by any of underwater wireless sensor nodes is shown as: P(pi) The position of wireless sensor nodes after being randomly deployed is uncertain in the coverage problem of wireless sensor network, regarding mobile wireless sensor nodes which can’t satisfy the requirements in many cases. keywords: algorithm; area; coverage; deployment; force; heterogeneous; model; monitoring; network; nodes; perception; sensor; sensor nodes cache: ijccc-2896.pdf plain text: ijccc-2896.txt item: #602 of 981 id: ijccc-2898 author: Chen, Guomin; Jin, Yingwei; Wang, Huili; Cao, Shuo title: Intelligent Decision Support Algorithm Based on Self-Adaption Reasoning date: 2017-12-04 words: 4590 flesch: 41 summary: The planning system of the previous three competitions mainly deals with the system performance, with the handling time of planning problems being the only criterion to measure the pros and cons of the system. By convergence transformation planning method, planning problems are converted into a number of classic problems (such as Propositional sat- isfiability problem, model checking problem, constraint satisfying problem, linear programming problem, theorem proving problem of non-classical logic, etc.), and solving the original program- ming problem indirectly through solving the transformed objective problem efficiently. keywords: algorithm; decision; description; logic; planning; planning problem; problem; programming; reasoning; state; support cache: ijccc-2898.pdf plain text: ijccc-2898.txt item: #603 of 981 id: ijccc-290 author: Valles-Barajas, Fernando title: A metamodel for an Adaptive Control System date: 2014-02-28 words: 3989 flesch: 55 summary: In [17] a requirements process for control system software is presented. In [18] and in [22] the authors explain best practices in using programming languages at the moment code for control system software is made. keywords: class; constraints; control; fig; language; model; process; software; system; uml cache: ijccc-290.pdf plain text: ijccc-290.txt item: #604 of 981 id: ijccc-2907 author: Oprea, Mihaela; Mihalache, Sanda Florentina; Popescu, Marian title: Computational Intelligence-based PM2.5 Air Pollution Forecasting date: 2017-04-23 words: 6838 flesch: 46 summary: In the last years, the research work was focused on combining PM2.5 forecasting ANN models with other techniques, such as statistical techniques, data mining, genetic algorithms, wavelet transformation, deep learning, that can improve the forecasting accuracy. In the first years of the current century, the PM2.5 forecasting ANN models (usually, of MLP type) were compared mostly with statistical models such as linear regression, ARMA, ARIMA, revealing a very good performance of the neural models. keywords: air; anfis; ann; computational; data; forecasting; intelligence; layer; model; neural; pm2.5; pollution cache: ijccc-2907.pdf plain text: ijccc-2907.txt item: #605 of 981 id: ijccc-2909 author: Muthusenthil, Balaubramanian; Kim, Hyunsung title: SHRP - Secure Hybrid Routing Protocol over Hierarchical Wireless Sensor Networks date: 2017-12-04 words: 6455 flesch: 54 summary: The second role is to generate a time division multiple access (TDMA) schedule in which sensor nodes receive a time slot for data transmission. Since this approach only considers the energy level of sensor nodes while selecting the cluster head, there may be a greater probability of elected cluster head is far away from base station which consumes more energy for the communication between base station and cluster head. keywords: cluster; clustering; cmd; energy; figure; head; key; message; network; nodes; number; protocol; routing; secure; sensor; shrp; weight cache: ijccc-2909.pdf plain text: ijccc-2909.txt item: #606 of 981 id: ijccc-2910 author: Pérez, Francisco José; Zambrano, Marcelo; Esteve, Manuel; Palau, Carlos title: A Solution for Interoperability in Crisis Management date: 2017-06-29 words: 9316 flesch: 48 summary: 8 18 5 SECTOR boosts interoperability and information exchange among different organizations. ����������� ������� �� � �� � �� ����������� ����������� �������� �� � �� � �� � �� � ���� �� ���� ���� ��� �� ��� �� � �� � ���� ���������� ������ �� � �� � ��� ��� ����������� �� � �� � ���� � � �� � �������� � �� ����� � ��� ��� ��������� � ��� �!������ ���������� � ���� ��� �� ������ ��������� ������#�� ����������� ������ �� �� � ��������� �� � ������ ��������� � ���������������� �������� ���� �$ ���� �� ������ %������� ���&#�!���� ��'���� �� �� �������� ������� ��� ��������� �� � �� � (��� ����������� (��� �����'� �����'� ��� ������������� ��� ������ �� � �� � ��� ����������� ��� ������� ��� �� �� ����������� ������ �� �������������� ��� ������ Figure 7: Platform deployment schema The distributed architecture of SECTOR platform, divides the data processing load among all the CDI nodes and decreases the hardware and software requirements in the communication nodes. keywords: agencies; cis; crisis; data; exchange; information; interoperability; iss; management; platform; sector cache: ijccc-2910.pdf plain text: ijccc-2910.txt item: #607 of 981 id: ijccc-2914 author: Zhang, Dalin title: High-speed Train Control System Big Data Analysis Based on the Fuzzy RDF model and Uncertain Reasoning date: 2017-06-29 words: 7275 flesch: 52 summary: When we combine linked data with big data mining, which provides a powerful tool for big data analysis, which implements semantic-based integration in the data. A variety of complex data analysis beyond our current ability range to use DMS. keywords: analysis; context; control; data; evidence; information; instance; method; model; paper; rdf; reasoning; speed; system; time; train cache: ijccc-2914.pdf plain text: ijccc-2914.txt item: #608 of 981 id: ijccc-2918 author: Cheng, Qifeng; Wang, Tiantian; Guo, Sicong; Zhang, Dayi; Jing, Kai; Feng, Liang; Zhao, Zhifeng; Wang, Peizhuang title: The Logistic Regression from the Viewpoint of the Factor Space Theory date: 2017-06-29 words: 5504 flesch: 67 summary: Keywords: logistic regression, factor space theory, fuzzy sets, logistic membership function 1 Introduction In 1965, Zadeh put forward the concept of fuzzy subset which made ordinary subset generalize that the range of grade of membership has been relaxed from binary variables {0,1} to continuous variables [0,1] In this article, we will expand the discussion about logistic regression based on factor space theory and fuzzy sets which can present a relatively different state from before. keywords: factor; function; membership; regression; space; theory; wang cache: ijccc-2918.pdf plain text: ijccc-2918.txt item: #609 of 981 id: ijccc-2923 author: Lin, Shangjing; Yu, Jianguo; Ni, Wei; Liu, RenPing title: Decoupling 5G Network Control: Centralised Coordination and Distributed Adaptation date: 2018-04-13 words: 6074 flesch: 54 summary: 2 Evolutionary view of 5G network control As discussed in Section 1, centralised network control faces critical challenges of severely delayed control and limited scalability in a heterogeneous 5G network depicted in Fig. This substantially alleviates the requirement of network control on delay and complexity, hence simplifying 5G control plane design, reducing signalling overhead, and enhancing network scalability. keywords: base; clusters; control; interference; layer; network; network control; power; stations cache: ijccc-2923.pdf plain text: ijccc-2923.txt item: #610 of 981 id: ijccc-2926 author: Peng, Liwen; Liu, Yongguo title: Gravitation Theory Based Model for Multi-Label Classification date: 2017-09-10 words: 4995 flesch: 56 summary: The limitation of the traditional single-label classification has contributed to the growing popularity in multi-label classification algorithms. Tables 2∼3 show the results of multi-label classification algorithms on test datasets for F1Ex and micro F1-measure. keywords: algorithm; classification; data; gravitation; label; learning; neighbors; number cache: ijccc-2926.pdf plain text: ijccc-2926.txt item: #611 of 981 id: ijccc-2928 author: Cațaron, Angel; Andonie, Razvan; Chueh, Yvonne title: Asymptotically Unbiased Estimation of A Nonsymmetric Dependence Measure Applied to Sensor Data Analytics and Financial Time Series date: 2017-06-29 words: 6718 flesch: 67 summary: ∫ ∞ 0 −uk−2e−udu = kf(x)2 (k − 1)! lim n→∞ E [( T (n) 1 )2] = lim n→∞ E [ E [( T (n) 1 )2 |X1 = x ]] = lim n→∞ E [ k k − 1 f(x)2 ] = k k − 1 E [ f(x)2 ] = k k − 1 [ V ar [f(x)] keywords: data; f(x; measure; o(x cache: ijccc-2928.pdf plain text: ijccc-2928.txt item: #612 of 981 id: ijccc-2930 author: Zhang, Shuai; Yang, Wenting; Xu, Song; Zhang, Wenyu title: A Hybrid Social Network-based Collaborative Filtering Method for Personalized Manufacturing Service Recommendation date: 2017-09-10 words: 5608 flesch: 40 summary: [15] was leveraged to compute the global reputation values of enterprises in selecting top K1 trustworthy enterprises by considering reputation prop- agation in enterprise social network. Fig. 1 demonstrates the overview of the proposed method, and it is divided into four parts: (a) selection of top K1 trustworthy enterprises-considering global reputation propagation in enterprise social network; (b) selection of three types of top K similar enterprises-with different features, including rating similarity, development stage similarity, and category similarity; (c) optimization of four corresponding weights-by means of PSO algorithm; and (d) manufacturing service recommendation-by calcu- lating rating value of required service through extended user-based CF method. keywords: enterprises; manufacturing; method; network; rating; recommendation; reputation; salsa; service; similarity; trust cache: ijccc-2930.pdf plain text: ijccc-2930.txt item: #613 of 981 id: ijccc-2931 author: Choi, Sang-Il; Choi, Sang Tae; Yoo, Haanju title: Selective Feature Generation Method for Classification of Low-Dimensional Data date: 2018-02-12 words: 6852 flesch: 50 summary: *Corresponding author: beconst@cau.ac.kr Abstract: We propose a method that generates input features to effectively classify low-dimensional data. When there are input features in a data sample, feature extraction methods find projection vec- tors to get new features containing the maximal information for problem solving [4,14,15,27,31]. keywords: choi; classification; data; database; discriminant; features; images; input; input features; method; recognition; samples; yale cache: ijccc-2931.pdf plain text: ijccc-2931.txt item: #614 of 981 id: ijccc-2942 author: Schoeneich, Radosław Olgierd; Sadło, Piotr title: Delay Tolerant Networks over Near Field Communications: The Automatic Multi-packet Communication date: 2017-09-10 words: 3435 flesch: 59 summary: Results was presented in Figure 9. 5 Conclusions In this paper we have presented the idea of NFC multi packet communication for DTN networks. Automatic data send is mandatory for multi packet data transfer, therefore we propose the method to handle this problem. keywords: communication; data; dtn; message; networks; nfc; number; packet; time; transfer cache: ijccc-2942.pdf plain text: ijccc-2942.txt item: #615 of 981 id: ijccc-2950 author: Jiang, Wen; Wang, Shiyu title: An Uncertainty Measure for Interval-valued Evidences date: 2017-09-10 words: 5459 flesch: 64 summary: [10] Deng X., Xiao F., Deng Y., Lei L., Quan W.(2017); An improved distance-based total uncertainty measure in belief function theory, Applied Intelligence 46(4), 898–915, 2017. [19] Frikha A., Moalla H.(2014); Analytic hierarchy process for multi-sensor data fusion based on belief function theory, European Journal of Operational Research, 241(1), 133–147, 2014. keywords: 0,0; belief; deng; evidence; information; interval; measure; structure; theory; uiv; uncertainty cache: ijccc-2950.pdf plain text: ijccc-2950.txt item: #616 of 981 id: ijccc-2960 author: Dzitac, Ioan; Manolescu, Misu-Jan title: Contributions of Florin Gheorghe Filip in Information Science and Technology date: 2017-06-29 words: 4322 flesch: 45 summary: F.G. Filip is an engineer and Ph.D. in control engineering and computer science. for Applied Industrial Control, Purdue University, wrote about F.G. Filip in August 1994. keywords: academy; computer; control; decision; f.g; filip; information; international; journal; romanian; science; systems; technology; university cache: ijccc-2960.pdf plain text: ijccc-2960.txt item: #617 of 981 id: ijccc-2961 author: Barrí­a, Cristian; Cordero, David; Cubillos, Claudio; Palma, Miguel; Cabrera, Daniel title: Obfuscation-based Malware Update: A comparison of Manual and Automated Methods date: 2017-06-29 words: 4656 flesch: 44 summary: Obfuscation-based Malware Update: A comparison of Manual and Automated Methods C. Barría, D. Cordero, C. Cubillos, M. Palma, D. Cabrera Cristian Barría, Claudio Cubillos* Pontificia Universidad Católica de Valparaíso Valparaíso, Chile cristian.barria@udp.cl *Corresponding author:claudio.cubillos@pucv.cl David Cordero Universidad Andrés Bello Santiago, Chile d.cordero.v@gmail.com Miguel Palma Universidad Tecnológica de Chile Santiago, Chile rmiguel.palma06@inacapmail.cl Daniel Cabrera Universidad de Valparaíso Valparaíso, Chile daniel.cabrera@uv.cl Abstract: This research presents a proposal of malware classification and its update based on capacity and obfuscation. In section 2, this paper presents a summary of malware classification, while in section 3 the use of obfuscation through a crypter for updating the detected malware is explained. keywords: antivirus; code; figure; malware; manual; obfuscation; process; time; updating cache: ijccc-2961.pdf plain text: ijccc-2961.txt item: #618 of 981 id: ijccc-2962 author: Kuantama, Endrowednes; Vesselenyi, Tiberiu; Dzitac, Simona; Tarca, Radu title: PID and Fuzzy-PID Control Model for Quadcopter Attitude with Disturbance Parameter date: 2017-06-29 words: 5687 flesch: 51 summary: As it is known through PID control parameter, in this design, the PD gain values are enough to control the quadcopter movement on a horizontal path. Control of a Quadrotor Using a Smart Self-Tuning Fuzzy PID Controller, International Journal of Advanced Robotic Systems, 10:1-9, 2013. keywords: attitude; axis; control; controller; movement; pid; pid control; pitch; position; quadcopter; system; trajectory cache: ijccc-2962.pdf plain text: ijccc-2962.txt item: #619 of 981 id: ijccc-2970 author: Ben Alaia, Essia; Harbaoui, Imen; Borne, Pierre; Bouchriha, Hanen title: A Comparative Study of the PSO and GA for the m-MDPDPTW date: 2018-02-12 words: 6961 flesch: 58 summary: Another PSO algorithm is proposed for solving the practical case of multi-depot vehicle routing problem with simultaneous pickup and delivery and time window A Comparative Study of the PSO and GA for the m-MDPDPTW 21 Table 4: Comparison of the results of our AG approaches using the Li and Lim instances of single depot problem Case Best known solutions of Li and Lim Best known solutions of our GA approach LC101 828.94 861.24 LC102 828.94 926.941 LC103 1035.35 959.303 LC104 860.01 940.05 LC105 828.94 867.609 LC106 828.94 955.339 LC107 828.94 922.66 LC108 826.44 914.211 LC109 1000.60 869.537 problem. keywords: algorithm; delivery; depot; mdpdptw; optimization; particle; population; problem; pso; time; vehicle cache: ijccc-2970.pdf plain text: ijccc-2970.txt item: #620 of 981 id: ijccc-2972 author: Mohammadi, Shahriar; Namadchian, Amin title: A New Deep Learning Approach for Anomaly Base IDS using Memetic Classifier date: 2017-09-10 words: 3625 flesch: 49 summary: Section 4 deals with deep learning algorithm and its characteristics for obtain linear classification function for each class. One of the problems in intrusion detection systems is large scale of features. keywords: algorithm; attack; data; detection; features; function; learning; memetic; model cache: ijccc-2972.pdf plain text: ijccc-2972.txt item: #621 of 981 id: ijccc-2975 author: Nageswaran, Ushabhanu; Marikkannan, Sangeetha title: Fast Motion Estimation Algorithm using Hybrid Search Patterns for Video Streaming Application date: 2017-09-10 words: 3706 flesch: 60 summary: The results show that the average number of search points in NCDHS algorithm is 9.068. For the mobile sequence, the ME Time obtained for proposed NCDHS algorithm requires 10.161 seconds and the ME Time obtained for the existing DS algorithm proposed by Zhu & Ma keywords: algorithm; block; estimation; motion; ncdhs; search; time; video cache: ijccc-2975.pdf plain text: ijccc-2975.txt item: #622 of 981 id: ijccc-2981 author: Gao, Yang; Wu, Xueyi; Liu, Yu; Li, Jian Ming; Liu, Jia Hao title: A Rapid Recognition of Impassable Terrain for Mobile Robots with Low Cost Range Finder Based on Hypotheses Testing Theory date: 2017-12-04 words: 4554 flesch: 49 summary: Over the previous few decades, techniques and theories for terrain recognition of intelligent automatic vehicles or robots have achieved many successes. [21] proposed a method for terrain recognition using a 3-D reconstruction technique that requires 3-D sensors and shows poor efficiency. keywords: estimation; figure; mobile; range; recognition; robot; sensor; slope; terrain cache: ijccc-2981.pdf plain text: ijccc-2981.txt item: #623 of 981 id: ijccc-2990 author: Liu, Baoyu; Hu, Yong; Deng, Yong title: New Failure Mode and Effects Analysis based on D Numbers Downscaling Method date: 2018-04-13 words: 6741 flesch: 57 summary: Use of failure mode effect analysis (fmea) to improve medication manage- ment process, International Journal of Health Care Quality Assurance, 30 (2), 175, 2017. That is RPN = OSD, where O stands for the probability of occurrence of failure mode, S refers to the severity of failure mode and D refers to the probability of failure being detected. keywords: analysis; deng; downscaling; failure; failure mode; fmea; method; mode; numbers; risk cache: ijccc-2990.pdf plain text: ijccc-2990.txt item: #624 of 981 id: ijccc-300 author: Brandabur, Raluca Ecaterina title: IT Outsourcing - A Management-Marketing Decision date: 2013-02-18 words: 5152 flesch: 41 summary: IT Outsourcing - A Management-Marketing Decision 193 6 Future work The author proposes to study the degree of acceptance of cloud computing solution in Ro- mania into B2B (business/organizational) market and furthermore the degree of developing of IT outsourcing strategies. The present paper describes how the decision of outsourcing IT using cloud solutions is bounded from benefits in terms of reduced costs for the infrastructure, removes the burden of the infrastructure and networking management for the companies, offers the chance to use multi-tenant applications that are easy to be updated by the application developers and so on. keywords: business; cloud; community; companies; company; computing; costs; hybrid; management; outsourcing; public; solution cache: ijccc-300.pdf plain text: ijccc-300.txt item: #625 of 981 id: ijccc-3000 author: Jecan, Sergiu; Benta, Dan; Rusu, Lucia Maria; Arba, Raluca title: Elder Monitoring Workflow System for Independent Living date: 2018-02-12 words: 3724 flesch: 42 summary: It can be accessed by doctors or elderly patients for monitoring and disease surveillance. For elderly person who accepts Kinect, PAT implementation offers several exergames as video serious game, designed in a customized manner, depending on the restrictions imposed by the chronic elderly. keywords: elderly; exercise; exergame; living; medication; monitoring; step; system; workflow cache: ijccc-3000.pdf plain text: ijccc-3000.txt item: #626 of 981 id: ijccc-3002 author: Chang, Dan; Ma, Yunfang; Ding, Xueli title: Time Series Clustering Based on Singularity date: 2017-12-04 words: 5577 flesch: 49 summary: X.L. Ding 2.2 Time series clustering algorithm Data in real life have features such as huge amount, high-dimension and high noise etc., especially for time series data. Clustering of time series data: a survey, Pattern Recognition, 38, 1857– 1874, 2005. keywords: algorithm; class; clustering; data; means; port; series; similarity; singularity; throughput; time; time series cache: ijccc-3002.pdf plain text: ijccc-3002.txt item: #627 of 981 id: ijccc-301 author: Costin, Hariton title: A Fuzzy Rules-Based Segmentation Method for Medical Images Analysis date: 2013-02-18 words: 3851 flesch: 49 summary: A Fuzzy Rules-Based Segmentation Method for Medical Images Analysis 199 Figure 2: The block diagram of the used fuzzy system Figure 3: The block diagram of the used fuzzy system 3.1 Obtaining fuzzy image According to our approach, when utilizing polar co-ordinates and representation from Figure 2, the angle values are fuzzified in classes αj by the fuzzy variable POSITION. At the exit, the system yields the position of contour points. keywords: contour; figure; image; medical; method; points; position; rules; segmentation cache: ijccc-301.pdf plain text: ijccc-301.txt item: #628 of 981 id: ijccc-302 author: Hasanagas, Nikolaos D. title: Digital Perception Functionality for Institutional Design: The Forest Policy Issue of "Loch Lomond & the Trossachs National Park" of Scotland as a Case Study date: 2013-02-18 words: 5599 flesch: 50 summary: Actors 3, 7 and 5 are public actors. For the reputation of the actor A, it is not merely important how many actors trust A, but also how much reputation these actors gain from other actors, etc [4]. keywords: actor; case; control; forest; information; lomond; national; network; policy; trust cache: ijccc-302.pdf plain text: ijccc-302.txt item: #629 of 981 id: ijccc-3022 author: Mocanu, Irina; Scarlat, Georgiana; Rusu, Lucia; Pandelica, Ionut; Cramariuc, Bogdan title: Indoor Localisation through Probabilistic Ontologies date: 2018-11-29 words: 8187 flesch: 46 summary: Thus, object recognition plays an essential part in understanding the environment and adding meaning to it. Keywords: object recognition, detection rate, probabilistic ontology, context iden- tification. keywords: detection; image; inference; information; module; object; object recognition; ontology; positive; recognition; relations; scene; set; system cache: ijccc-3022.pdf plain text: ijccc-3022.txt item: #630 of 981 id: ijccc-303 author: Karic, Miran; Martinovic, Goran title: Improving Offline Handwritten Digit Recognition Using Concavity-Based Features date: 2013-02-18 words: 6059 flesch: 54 summary: Feature vector e-grc3 and SVM-rbf classifier give the best recognition accuracy on this dataset as well (error rate 1.33%). The use of complementary features greatly improves the recognition accuracy, with feature vector e-grc3 performing best (error rate 1.66% using SVM-rbf). keywords: accuracy; concavity; dataset; digit; error; feature; handwritten; recognition; results; training; vector cache: ijccc-303.pdf plain text: ijccc-303.txt item: #631 of 981 id: ijccc-3033 author: Liu, Haitao; Dzitac, Ioan; Guo, Sicong title: Factors Space and its Relationship with Formal Conceptual Analysis: A General View date: 2018-02-12 words: 8286 flesch: 71 summary: [14] (Pawlak, 1982) and Factors space [29] (Wang, 1982). Factors space can deepen the researches of fuzzy sets. keywords: concept; factors; factors space; set; space; theory; wang cache: ijccc-3033.pdf plain text: ijccc-3033.txt item: #632 of 981 id: ijccc-304 author: Kifor, Vasile Claudiu; Tudor, Nicolae title: Quality System for Production Software as Tool for Monitoring and Improving Organization KPIs date: 2013-02-18 words: 3946 flesch: 26 summary: These differences of production software applications are shown in Figure 1: Figure 1: Major differences among production software application The quality of production software should address two related but distinct notions [14] Petrash, R., The definition of software quality; a practical approach, ISSRE, 1999. keywords: iso; kifor; management; process; production; production software; qsma; qsps; quality; requirements; software; system cache: ijccc-304.pdf plain text: ijccc-304.txt item: #633 of 981 id: ijccc-3044 author: Vo Ngoc, Phu title: Latent Semantic Analysis using a Dennis Coefficient for English Sentiment Classification in a Parallel System date: 2018-05-27 words: 9598 flesch: 52 summary: [12] Phu, V.N.; Tran, V.T.N.; Chau, V.T.N. et al. (2017); A Decision Tree using ID3 Algorithm for English Semantic Analysis, International Journal of Speech Technology, 20(3), 593-613, 2017. Our proposed model has the crucial contributions to many areas of research as well as com- mercial applications as follows: (1) Many surveys and commercial applications can use the results of this work in a significant way; (2) The algorithms are built in the proposed model; (3) This survey can certainly be applied to other languages easily; (4) The algorithm of data mining is applicable to semantic analysis of natural language processing; (5) Millions of English documents are successfully processed for emotional analysis; (6) Our proposed model can be applied to many different parallel network environments such as a Cloudera system; (7) This study can be applied to many different distributed functions such as Hadoop Map (M) and Hadoop Reduce (R); (8) The LSA − related algorithms are proposed in this survey; (9) The DNC − related algorithms are built in this work. keywords: algorithm; data; data set; documents; english; lsav; sentiment; set; testing data cache: ijccc-3044.pdf plain text: ijccc-3044.txt item: #634 of 981 id: ijccc-305 author: Montoya, Germí¡n A.; Velí¡squez-Villada, Carlos; Donoso, Yezid title: Energy Optimization in Mobile Wireless Sensor Networks with Mobile Targets Achieving Efficient Coverage for Critical Applications date: 2013-02-18 words: 3711 flesch: 54 summary: This paper presents a difficult problem of Mobile Wireless Sensor Networks with Mobile Targets (MWSN-MT), which consists of an area of interest with mobile targets, mobile sensors and one or more base stations available inside, which can’t move and its position is known. [9] explore the problem of deployment and distribution of mobile sensor networks through swarm intelligence. keywords: base; energy; mobile; networks; path; sensors; targets cache: ijccc-305.pdf plain text: ijccc-305.txt item: #635 of 981 id: ijccc-306 author: Pitic, Alina Elena; Moisil, Ioana; Dzitac, Simona title: Raising Energy Saving Awareness Through Educational Software date: 2013-02-18 words: 3026 flesch: 59 summary: Indeed those who have worked with children and teen on a day to day basis have seen how much they love computer games. Thus the technology used in computer games could be used to create educational software, raising the motivation and engagement of children and making the learning process a fun activity. keywords: application; children; computer; energy; figure; study cache: ijccc-306.pdf plain text: ijccc-306.txt item: #636 of 981 id: ijccc-3064 author: Jemilda, G.; Baulkani, S. title: Moving Object Detection and Tracking using Genetic Algorithm Enabled Extreme Learning Machine date: 2018-04-13 words: 4420 flesch: 54 summary: [11] Philip, F.M.; Mukesh R.(2016); Hybrid tracking model for multiple object videos using second derivative based visibility model and tangential weighted spatial tracking model, International Journal of Computational Intelligence Systems, 9(5): 888-899, 2016. Numerous applications of object tracking in computer vision are video compression, video surveillance, visual interface, man-and-computer management, medicine, augmented reality and robotics. keywords: algorithm; detection; feature; frame; image; learning; method; object; tracking; value; video cache: ijccc-3064.pdf plain text: ijccc-3064.txt item: #637 of 981 id: ijccc-307 author: Popescu, Daniela Elena; Lonea, Alina Madalina title: An Hybrid Text-Image Based Authentication for Cloud Services date: 2013-02-18 words: 5091 flesch: 44 summary: An Hybrid Text-Image Based Authentication for Cloud Services 267 3 Background and Related Work There are three main techniques for user authentication: knowledge based techniques, token- based techniques and techniques based on biometrics. Knowledge-based systems are the most frequently used for user authentication in our days. keywords: access; authentication; cloud; computing; figure; image; security; services; solution; text; user cache: ijccc-307.pdf plain text: ijccc-307.txt item: #638 of 981 id: ijccc-3074 author: Dagiene, Valentina; Gudoniene, Daina; Bartkute, Reda title: The Integrated Environment for Learning Objects Design and Storing in Semantic Web date: 2018-02-12 words: 4220 flesch: 39 summary: LO search is performed from the user development environment and directly channeled into educational learning object repositories. The Integrated Environment for Learning Objects Design and Storing in Semantic Web V. Dagiene, D. Gudoniene, R. Bartkute Valentina Dagiene, Daina Gudoniene* Institute of Mathematics and Informatics Vilnius University Akademijos 4, LT-08663 Vilnius, Lithuania *Corresponding author: daina.gudoniene@mii.stud.vu.lt Reda Bartkute Informatics Faculty Kaunas University of Technology Studentu 50, LT-51367 Kaunas, Lithuania Abstract: There is a variety of tools and environments for Learning Objects (LOs) design and delivery as well as learning object repositories (LOR) but the researchers could not find a repository that includes both functions: creation and storing of LOs. keywords: content; design; environment; learning; model; objects; semantic; web cache: ijccc-3074.pdf plain text: ijccc-3074.txt item: #639 of 981 id: ijccc-308 author: Prabhu, Puniethaa; Duraiswamy, K. title: Enhanced Dark Block Extraction Method Performed Automatically to Determine the Number of Clusters in Unlabeled Data Sets date: 2013-02-18 words: 6956 flesch: 57 summary: E-DBE has no such constraint and is performed just once 3 Review of Enhanced Visual Assessment Tendency Of the many achievable ways to obtain an RDI, apply E-VAT to generate RDIs of unlabeled data, i.e., to secure inputs to E-DBE algorithm. Figure 3: Sample results of E-DBE algorithm. keywords: algorithm; cluster; data; dataset; dbe; dissimilarity; figure; image; number; projection; signal; step; vat cache: ijccc-308.pdf plain text: ijccc-308.txt item: #640 of 981 id: ijccc-3088 author: Misbahuddin, Misbahuddin; Putri Ratna, Anak Agung; Sari, Riri Fitri title: Dynamic Multi-hop Routing Protocol Based on Fuzzy-Firefly Algorithm for Data Similarity Aware Node Clustering in WSNs date: 2018-02-12 words: 8058 flesch: 60 summary: Minimum distance to a cluster head is defined as the minimum weight wMin, whilst the maximum weight wMax is the Dynamic Multi-hop Routing Protocol Based on Fuzzy-Firefly Algorithm for Data Similarity Aware Node Clustering in WSNs 105 Algorithm 2 Receiving data for node clustering Receiving(add,cdR,nsN) 1: spatNeighbor 2: simNeighbor 3: simNeighbor ← CreateSimNeighbor(add, cdR, nsN) 4: sigma ← 1.74 5: n ← cdR 6: m ← DataReading() 7: s ← exp( - || n-m || 2/(2 102 M. Misbahuddin, A.A. Putri Ratna, R.F. Sari 3 The proposed model of routing protocol 3.1 Network model Data similarity aware node clustering in WSNs is an unequal sized clustering-based WSNs. keywords: algorithm; clustering; data; energy; firefly; hop; khopca; network; node; protocol; routing; similarity cache: ijccc-3088.pdf plain text: ijccc-3088.txt item: #641 of 981 id: ijccc-309 author: Sekkat, Souhail; Kouiss, Khalid; Saadi, Janah; Deshayes, Laurent title: Developing Integrated Performance Measurement System using Component Based Approach date: 2013-02-18 words: 4183 flesch: 42 summary: The MES software allows efficient integration of computer control systems and achieves the coordination of all production resources. Also, the component approach can be used to achieve the interoperability of computer control systems and to allow components reuse [8]. keywords: approach; component; control; data; information; integration; manufacturing; mes; performance; production; software; system cache: ijccc-309.pdf plain text: ijccc-309.txt item: #642 of 981 id: ijccc-3090 author: Rueda, Diego F.; Calle, Eusebi; Wang, Xiangrong; Kooij, Robert E. title: Enhanced Interconnection Model in Geographically Interdependent Networks date: 2018-07-25 words: 6321 flesch: 47 summary: This paper proposes a new region-based interconnection model in which a node i in network G1 and a node j in network G2 can be interconnected if 1) the distance dij between them is less than or equal to a given radius r and 2) the number of interlinks for nodes i and j do not exceed a given percentage for limiting the number of interlinks (φ1 and φ2, respectively). We assume the node i in network G1 is functional if a) at least one of its interconnected nodes in network G2 is operative, and b) the node i belongs to the giant component of the Enhanced Interconnection Model in Geographically Interdependent Networks 543 Algorithm 1 Interconnection model for limiting the number of interlinks in geographically interdependent networks. keywords: failures; interconnection; interlinks; model; networks; nodes; number; robustness cache: ijccc-3090.pdf plain text: ijccc-3090.txt item: #643 of 981 id: ijccc-31 author: Arotaritei, Dragos title: A Method to Construct Approximate Fuzzy Voronoi Diagram for Fuzzy Numbers of Dimension Two date: 2014-06-15 words: 3800 flesch: 66 summary: Keywords: approximated fuzzy Voronoi diagram, fuzzy numbers of dimension two, computational geometry, fuzzy arithmetic, bisector median, path planning. Only very few papers deal with fuzzy Voronoi diagram. keywords: algorithm; bisector; diagram; numbers; points; voronoi cache: ijccc-31.pdf plain text: ijccc-31.txt item: #644 of 981 id: ijccc-310 author: Serbu, Razvan; Borza, Sorin; Marza, Bogdan title: Bio-Eco-Analysis for Risk Factors using GIS Software date: 2013-02-18 words: 3157 flesch: 35 summary: [17] 2 The analize of Environmental Risk in Agriculture with GIS aplications The analyze of Environmental Risk in Agriculture with GIS applications needs a multi- disciplinary approach, with input and expertise required from many fields - civil and chemical engineering, physics, life sciences, ecology, geology, hydrology and statistics being some of them. The analyze of environmental risk in agriculture process involves preparation and use of the processed information derived and presented in various ways - for example, comparative (or relative) risk analysis, cost-benefit analysis, scenario analysis, probabilistic analysis, decision matrix, sensitivity analysis etc. keywords: analysis; areas; factors; gis; information; map; risk; spatial cache: ijccc-310.pdf plain text: ijccc-310.txt item: #645 of 981 id: ijccc-3104 author: Lin, Xixun; Liang, Yanchun; Wang, Limin; Wang, Xu; Yang, Mary Qu; Guan, Renchu title: A Knowledge Base Completion Model Based on Path Feature Learning date: 2018-02-12 words: 5377 flesch: 54 summary: With the stage of path feature learning, plenty of classification algorithms (in our case, we use ELM and KELM) can be easily incorporated into our framework. We first introduce the A Knowledge Base Completion Model Based on Path Feature Learning 75 Knowledge base Match subjects and objects Large parsed corpus Collect verbs to produce knowledge matrix Exploit PCA to generate latent embeddings Use the stratified sampling and down sampling techniques PathFinders search DRPs PathFinders search SRPs PathFollowers compute path feature values X1 X2 Xn Xn-1 H1 Hn-1 Hn Y H2 ...... β1 β2 βn βn-1 ...... Path Feature Learning Figure 1: Flowchart of the path feature learning model. concept of path feature learning, which includes DRPs and SRPs. keywords: classification; feature; kernel; knowledge; learning; model; path; path feature; pflm; pra; proceedings; relations; wang cache: ijccc-3104.pdf plain text: ijccc-3104.txt item: #646 of 981 id: ijccc-3107 author: Zheng, Lei; Zhang, Zhiguo; Deng, Yong title: Evidential Identification of New Target based on Residual date: 2018-05-27 words: 6114 flesch: 57 summary: + anHn) (15) 446 L. Zheng, Z. Zhang, Y. Deng 3.4 Residual vector processing Let R represent residual vector of collected data of target requested to identify, and the ith element of R , R(i), represents the residual between the ith collected sample data and linear regression of fusion result calculated in (9). Based least square method, parameters in linear regression are calculated and the relational expression is shown below. keywords: data; deng; discernment; evidence; frame; residual; target; theory; vector cache: ijccc-3107.pdf plain text: ijccc-3107.txt item: #647 of 981 id: ijccc-311 author: Tabirca, Tatiana; Yang, Laurence T.; Tabirca, Sabin title: Smallest Number of Sensors for k-Covering date: 2013-02-18 words: 3801 flesch: 71 summary: For k-coverage problem, the numbers Nk(a, b) satisfy the following inequality k ·a · b π ≤ The main result of the article proves that the minimal density of sensors to achieve k-coverage is λ(k) ≤ k/2 improving a previous result of Ammari and Das keywords: sensors cache: ijccc-311.pdf plain text: ijccc-311.txt item: #648 of 981 id: ijccc-3112 author: Hayajneh, Mohammad title: Minimizing Uplink Cellular Outage Probability in Interference Limited Rayleigh and Nakagami Wireless Fading Channels date: 2017-12-04 words: 5937 flesch: 59 summary: Hence, the power received from user k at receiver i is modeled as Exponential (Gamma) random variable with expected value expressed as: E{Hi,kχi,kpk} = Hi,kpk (2) 826 M. Hayajneh Inan interference limited fadingchannels, thebackgroundadditivewhiteGaussiannoise (AWGN) effect is considered minor compared to the power interference from the other active users. For simplicity define xi,k = Hi,k pk−min, then (43) can be expressed as: δi N ∑ k 6=i xi,k > N ∑ k 6=i δk xi,k,∀i ∈ N (44) keywords: game; outage; power; probability; sirth; sirth hi cache: ijccc-3112.pdf plain text: ijccc-3112.txt item: #649 of 981 id: ijccc-3125 author: Tariq, Usman; Aldaej, Abdulaziz title: Outlook of Coordinated Transmission Control in 5G Networks for IoTs date: 2018-04-13 words: 5647 flesch: 34 summary: Consequently a precise supporting module is the non- methodological operational support, which resides on current wireless systems and innovative standards, such as grid programming. By decreasing the volume of grid communication, the devices lessen the battery usage events (e.g. Communication, response, congestion impact, and eavesdropping). keywords: communication; control; data; devices; frequency; grid; ieee; information; iot; millimeter; networks; nodes; payload; route; systems; transmission; wireless cache: ijccc-3125.pdf plain text: ijccc-3125.txt item: #650 of 981 id: ijccc-313 author: Ví¡squez, í“scar C.; Sepulveda, Juan M.; Alfaro, Miguel D.; Osorio-Valenzuela, Luis title: Disaster Response Project Scheduling Problem: A Resolution Method based on a Game-Theoretical Model date: 2013-02-18 words: 5227 flesch: 64 summary: The case Γij, i ̸= j means that the strategy of row player i is to buy to column player j, the strategy of player j is placed on sale, and the strategies of all player k ̸= i ̸= j is not to buy to player j. Note that by definition, both the payoff of player i and the player j are equal. The resolution method generates new players, that is, a new set of activities from the PNE. keywords: activities; activity; game; method; player; problem; project; resolution; resource; scheduling; time cache: ijccc-313.pdf plain text: ijccc-313.txt item: #651 of 981 id: ijccc-3142 author: Du, Changshun; Huang, Lei title: Text Classification Research with Attention-based Recurrent Neural Networks date: 2018-02-12 words: 6219 flesch: 52 summary: Keywords: machine learning, text classification, attention mechanism, bidirectional RNN, word vector. In this paper, we use E to represent the matrix of word vectors, each of which represents a vector of words, and the dimension of the column vector is d . keywords: attention; classification; data; model; network; neural; rnn; set; text; use; vector; word cache: ijccc-3142.pdf plain text: ijccc-3142.txt item: #652 of 981 id: ijccc-3143 author: Gao, Ren; Wu, Juebo; Hu, Wen; Zhang, Yun title: An Improved ABC Algorithm for Energy Management of Microgrid date: 2018-07-25 words: 6374 flesch: 53 summary: It is able to meet the electricity and heat demand through the output of distributed generation units and energy storage units, as well as improve the energy efficiency and reduce power generation cost and discharge system. b) Determine whether to use MT for generating power according to actual load. keywords: abc; algorithm; cost; dispatch; energy; food; generation; microgrid; optimal; power; source; system cache: ijccc-3143.pdf plain text: ijccc-3143.txt item: #653 of 981 id: ijccc-3148 author: Truong, Phuc Huu; Nguyen, Nhan Duc; Ho, Ngoc-Huynh; Jeong, Gu-Min title: Nonparametric Regression-based Step-length Estimation for Arm-swing Walking using a Smartphone date: 2018-07-25 words: 3086 flesch: 57 summary: [14] proposed a peak detection algorithm using five data points to find the number of walking steps. D = N∑ i=1 Lstep(i), (13) where, N is the number of walking steps in each trial. keywords: arm; distance; estimation; method; speed; step; swing; walking cache: ijccc-3148.pdf plain text: ijccc-3148.txt item: #654 of 981 id: ijccc-3149 author: Mohammed Saeed, Ali Amer; Danciulescu, Dana title: Modern Interfaces for Knowledge Representation and Processing Systems Based on Markup Technologies date: 2018-02-12 words: 5190 flesch: 63 summary: Figure 1: A Knowledge database - inheritance and its graph representation To optimize the development of voice based user interfaces, the following facts should be understood: 1. Also, JAXB lets you transfer XML data from sources other than the files and XML documents such as the nodes DOM, paintings rows of characters, SAX sources and so on and so forth); the generation of the shaft into which describes the contents of an XML document; validation (Unmarshal process involves the validation of the source before generating shaft into which describes the contents. keywords: document; interfaces; knowledge; krp; language; markup; processing; rdf; representation; systems; xml cache: ijccc-3149.pdf plain text: ijccc-3149.txt item: #655 of 981 id: ijccc-3153 author: Song, Xiaoru; Gao, Song; Chen, C.B.; Cao, Kai; Huang, Jiaoru title: A New Hybrid Method in Global Dynamic Path Planning of Mobile Robot date: 2018-11-29 words: 5043 flesch: 58 summary: Fig.8 shows a block diagram of the data processing for robot path planning. It is A New Hybrid Method in Global Dynamic Path Planning of Mobile Robot 1041 Figure 7: Laboratory to build mobile robot navigation and obstacle avoidance experimental Figure 8: The block diagram of data processing for robot path planning established by the Kinect visual sensor of the robot. keywords: algorithm; fig; global; method; mobile; obstacle; path; path planning; planning; point; robot cache: ijccc-3153.pdf plain text: ijccc-3153.txt item: #656 of 981 id: ijccc-3173 author: Tan, Liang title: Service Innovation Decision Analysis Based on Influence Diagrams date: 2018-09-29 words: 4917 flesch: 45 summary: Service innovation is not restricted to service industry innovation alone; all service-related in- novations can be classi�ed under the concept of service innovation [17]. In this study, the dynamic in�uence diagram and the interactive dynamic in�uence diagram are used to model the three parties to service innovation: customers, suppliers, and service enterprises. keywords: action; agent; decision; enterprise; innovation; l−1; model; probability; service cache: ijccc-3173.pdf plain text: ijccc-3173.txt item: #657 of 981 id: ijccc-3176 author: Wei-dong, Huang; Qian, Wang; Jie, Cao title: Tracing Public Opinion Propagation and Emotional Evolution Based on Public Emergencies in Social Networks date: 2018-02-12 words: 6229 flesch: 44 summary: Therefore, based on the public opinion event of Shandong illegal vac- cine,combined with the life cycle theory, we analyzed the characteristics of key nodes in different stages, so as to study the characteristics evolution of network public opinion. Timely release of authoritative and transparent objective information was conducive to dredge network public opinion, and it can reduce the negative influence brought by internet public opinion. keywords: analysis; emotion; evolution; information; micro; network; nodes; opinion; opinion propagation; propagation; public; sentence; words cache: ijccc-3176.pdf plain text: ijccc-3176.txt item: #658 of 981 id: ijccc-3180 author: Olgierd Schoeneich, RadosÅ‚aw; Prus, Piotr title: Improving DTNs Performance by Reduction of Bundles Redundancy using Clustering Algorithm date: 2018-07-25 words: 6326 flesch: 64 summary: The only information about the neighborhood we acquire is by listening to other nodes messages. This means that cluster based network forwards messages efficiently without additional, unnecessary transmissions. keywords: buffer; cluster; clustering; dtn; head; inv; level; message; networks; nodes; number; routing cache: ijccc-3180.pdf plain text: ijccc-3180.txt item: #659 of 981 id: ijccc-3184 author: Senthilkumar, R.; TamilSelvan, G.M.; Kanithan, S.; Arun Vignesh, N. title: Routing in WSNs Powered by a Hybrid Energy Storage System through a CEAR Protocol Based on Cost Welfare and Route Score Metric date: 2019-04-14 words: 8261 flesch: 54 summary: Review of energy storage system for wind power integration support, Applied Energy, 137, 545-553, 2015. Energy sharing control scheme for state-of-charge bal- ancing of distributed battery energy storage system, IEEE Transactions on Industrial Elec- tronics, 62(5), 2764-2776, 2015. keywords: battery; cear; cost; energy; energy storage; figure; hybrid; network; node; packet; power; protocol; route; routing; routing protocol; storage; system cache: ijccc-3184.pdf plain text: ijccc-3184.txt item: #660 of 981 id: ijccc-3187 author: Tang, Li; Pan, Ping He; Yao, Yong Yi title: EPAK: A Computational Intelligence Model for 2-level Prediction of Stock Indices date: 2018-04-13 words: 5122 flesch: 58 summary: As a foremost key process for financial time series prediction, feature extraction should con- centrate essential information from the historical data set and input to the prediction model. However, for financial time series prediction, the feature extraction needs to keep the more infor- mation of original data the better robustness and prediction accuracy of the model. keywords: data; emd; epak; index; knn; model; prediction; series; stock; time cache: ijccc-3187.pdf plain text: ijccc-3187.txt item: #661 of 981 id: ijccc-3188 author: Ma, Xiaofei; Feng, Yi; Qu, Yi; Yu, Yang title: Attribute Selection Method based on Objective Data and Subjective Preferences in MCDM date: 2018-05-27 words: 6690 flesch: 50 summary: Attribute Selection Method based on Objective Data and Subjective Preferences in MCDM X. Ma, Y. Feng, Y. Qu, Y. Yu Xiaofei Ma, Yi Feng Technology Planning Dalian Commodity Exchange Dalian City, China, 116023 maxf@dce.com.cn, fengyi@dce.com.cn Yi Qu*, Yang Yu Agricultural Bank of China Data Center 88 Aoni Road, Pudong New Area Shanghai City, China, 200131 *Corresponding author: 57638907@qq.com yuyinyang@126.com Abstract: Decision attributes are important parameters when choosing an alter- native in a multiple criteria decision-making (MCDM) problem. In order to select the optimal set of decision attributes, an analysis framework is proposed to illustrate the attribute selection problem. keywords: attribute; criteria; data; decision; decision attributes; fire; mcdm; method; objective; selection; set; step cache: ijccc-3188.pdf plain text: ijccc-3188.txt item: #662 of 981 id: ijccc-3211 author: Hammood, Omar A.; Nizam, Mohd; Nafaa, Muamer; Hammood, Waleed A. title: RESP: Relay Suitability-based Routing Protocol for Video Streaming in Vehicular Ad Hoc Networks date: 2019-02-14 words: 7830 flesch: 53 summary: The delay and ETX are essential parameters for video streaming over VANETs and to deliver video files to their destination on time, it is essential to select efficient routing nodes. Thus, the proposed work designs an efficient weighted division algorithm and efficiently delivers the video stream over selected scalable routing vehicles. keywords: forwarding; link; network; node; packet; performance; protocol; relay; resp; routing; streaming; suitability; video; video streaming cache: ijccc-3211.pdf plain text: ijccc-3211.txt item: #663 of 981 id: ijccc-3217 author: Adorna, Henry N.; Pan, Linqiang; Song, Bosheng title: On Distributed Solution to SAT by Membrane Computing date: 2018-05-27 words: 10839 flesch: 70 summary: 306 H.N. Adorna, L. Pan, B. Song Cooperation between component P systems of a dP scheme is defined in the set R∆ of inter- component communications. To solve the problem, component P systems must communicate with respect to a particular protocol. keywords: cell; communication; component; number; p systems; rules; sat; systems cache: ijccc-3217.pdf plain text: ijccc-3217.txt item: #664 of 981 id: ijccc-3220 author: Rong, Haina; Ge, Mianjun; Zhang, Gexiang; Zhu, Ming title: An Approach for Detecting Fault Lines in a Small Current Grounding System using Fuzzy Reasoning Spiking Neural P Systems date: 2018-07-25 words: 8161 flesch: 63 summary: An Approach for Detecting Fault Lines in a Small Current Grounding System using Fuzzy Reasoning Spiking Neural P Systems H. Rong, M. Ge, G. Zhang, M. Zhu Haina Rong, Mianjun Ge, Gexiang Zhang* School of Electrical Engineering Southwest Jiaotong University Chengdu, 610031, China ronghaina@126.com, 641294684@qq.com, zhgxdylan@126.com *Corresponding author: zhgxdylan@126.com Ming Zhu Chengdu University of Information Technology Chengdu 610225, China zhuming@126.com Abstract: This paper presents a novel approach for detecting fault lines in a small current grounding system using fuzzy reasoning spiking neural P systems. Thus, a novel approach for detecting fault lines in a small current grounding system using FRSN P systems is proposed to enhance the accuracy. keywords: current; detection; fault line; grounding; line detection; lines; neural; phase; power; reasoning; sequence; system cache: ijccc-3220.pdf plain text: ijccc-3220.txt item: #665 of 981 id: ijccc-3223 author: Niu, Yunyun; Zhang, Yongpeng; Zhang, Jieqiong; Xiao, Jianhua title: Running Cells with Decision-Making Mechanism: Intelligence Decision P System for Evacuation Simulation date: 2018-09-29 words: 8096 flesch: 61 summary: Information can be exchanged between di�erent cells. On the other hand, di�erent evacuation scenarios usually need di�erent strategies, and disasters often change the spatial accessibility of a scene. keywords: cells; decision; evacuation; evacuees; exit; guide; information; knowledge; simulation; system cache: ijccc-3223.pdf plain text: ijccc-3223.txt item: #666 of 981 id: ijccc-3236 author: Zhao, Dongming; Yang, Tiantian; Ou, Wen; Zhou, Hao title: Autopilot Design for Unmanned Surface Vehicle based on CNN and ACO date: 2018-05-27 words: 3883 flesch: 57 summary: Keywords: USV, autopilot, predictive control, Convolution Neural Network (CNN), Ant Colony Optimization (ACO), rolling optimization. The proposed autopilot design is shown in Figure 2. 3.1 CNN model The architecture of CNN based model is shown in Figure 3. keywords: angle; autopilot; cnn; control; controller; model; predictive; time; usv cache: ijccc-3236.pdf plain text: ijccc-3236.txt item: #667 of 981 id: ijccc-3238 author: Chen, Guangchun; Hu, Juan; Peng, Hong; Wang, Jun; Huang, Xiangnian title: A Spectral Clustering Algorithm Improved by P Systems date: 2018-09-29 words: 5102 flesch: 60 summary: Membrane computing is a class of distributed parallel computing models, known as P systems or membrane systems. In the past years, many variants of P systems have been proposed [7, 8, 11, 15, 16, 18, 19, 32, 41, 46], and they have been applied to di�erent real-world problems [47], for example, combinatorial optimization keywords: algorithm; clustering; clustering algorithm; computing; membrane; systems; wang cache: ijccc-3238.pdf plain text: ijccc-3238.txt item: #668 of 981 id: ijccc-3243 author: Mendez-Monroy, Paul Erick; Sanchez Dominguez, Israel; Bassam, Ali; Tzuc, Oscar May title: Control-Scheduling Codesign for NCS based Fuzzy Systems date: 2018-04-13 words: 7025 flesch: 63 summary: This paper is an extension of [20].a Keywords: codesign, dynamic scheduling, fuzzy control, networked control system. [12] Ji, K.; Kim, W.J. (2007); Robust control for networked control systems with admissible parameter uncertainties, International Journal of Control, Automation and Systems, 5(4), 372-378, 2007. keywords: actuation; codesign; control; controller; delay; fuzzy; model; network; packets; period; sampling; scheduling; system; time; traffic cache: ijccc-3243.pdf plain text: ijccc-3243.txt item: #669 of 981 id: ijccc-3244 author: Li, Yangxue; Deng, Yong title: Generalized Ordered Propositions Fusion Based on Belief Entropy date: 2018-09-29 words: 6869 flesch: 64 summary: The processes of method for fusion of basic support functions of generalized ordered propositions is shown in Fig. Input: The initial fusion result ω′ and basic support function ω after positive regulation Output: The �nal fusion result ω 1: δ ← 1 2: while |E(ω) −E(ω′)| ≤ � do 3: I ← index of maximum truth-value of ω 4: k ← 1 5: for k = I to n− 1 do 6: if ω(pk) > ω(pk+1) then 7: ω(pk) keywords: deng; entropy; function; fusion; propositions; support; uncertainty cache: ijccc-3244.pdf plain text: ijccc-3244.txt item: #670 of 981 id: ijccc-3252 author: Liu, Haitao; Dzitac, Ioan; Guo, Sicong title: Reduction of Conditional Factors in Causal Analysis date: 2018-05-27 words: 4169 flesch: 68 summary: idzitac@univagora.ro Abstract: Faced with a great number of conditional factors in big data causal analysis, the reduction algorithm put forward in this paper can reasonably reduce the number of conditional factors. Compared with the previous reduction methods, we take into consideration the influence of conditional factors on resulted factors, as well as the relationship among conditional factors themselves. keywords: causal; factors cache: ijccc-3252.pdf plain text: ijccc-3252.txt item: #671 of 981 id: ijccc-3265 author: Wang, Huifang; Zhou, Kang; Zhang, Gexiang title: Arithmetic Operations with Spiking Neural P Systems with Rules and Weights on Synapses date: 2018-07-25 words: 7283 flesch: 70 summary: Keywords: SN P systems, rules and weights on synapses, addition, multiplication, the greatest common divisor. In recent years, SN P systems have been widely investigated in theory and applications. keywords: neuron; rules; spikes; synapses; systems; weights cache: ijccc-3265.pdf plain text: ijccc-3265.txt item: #672 of 981 id: ijccc-3267 author: Dai, Yu; Zhu, Xiang; Zhou, Haibo; Mao, Zuoli; Wu, Wei title: Trajectory Tracking Control for Seafloor Tracked Vehicle By Adaptive Neural-Fuzzy Inference System Algorithm date: 2018-07-25 words: 7602 flesch: 43 summary: 0 5 10 15 -1.0 -0.5 0.0 0.5 1.0 1.5 (Left: 3.0 kPa; right: 5 kPa) (Left: 4.0 kPa; right: 5 kPa) L at er al P o si ti o n ( m ) Longitudinal Position (m) Figure 9: Straight-line motion trajectory deviation simulations of the STV The above used fuzzy logic control, neural control and ANFIS control were carried out respectively for the trajectory control as shown in Fig.11. 0 4 8 12 16 0.605 0.610 0.615 0.620 0.625 Fuzzy Logic Control Longitudinal Position (m) ANFIS Control L at er al P o si ti o n ( m ) Nueral Network Control Figure 10: Straight-line motion trajectory control simulations comparisons between different controls An ANFIS model has been built for a predetermined path control for the STV and collaborated Figure 9: Straight-line motion trajectory deviation simulations of the STV Straight-line motion trajectory control simulations comparisons between different controls The above used fuzzy logic control, neural control and ANFIS control were carried out re- spectively for the trajectory control as shown in Fig. keywords: algorithm; anfis; control; control model; model; neural; seafloor; simulation; stv; tracking; trajectory; vehicle; velocity cache: ijccc-3267.pdf plain text: ijccc-3267.txt item: #673 of 981 id: ijccc-3268 author: Xu, Guojing; Wang, Shiyu; Yang, Tian; Jiang, Wen title: A Neutrosophic Approach Based on TOPSIS Method to Image Segmentation date: 2018-11-29 words: 5372 flesch: 62 summary: Neutrosophic image segmentation approach integrated LPG & PCA, Journal of Image & Graphics, 19(5), 693–700, 2014. NS can not only describe the incomplete information in the decision-making system but also depict the uncertainty and inconsistency, so it has applied successfully in several fields such as risk assessment, fuzzy decision and image segmentation. keywords: fcm; image; information; method; neutrosophic; segmentation; set; topsis; wang cache: ijccc-3268.pdf plain text: ijccc-3268.txt item: #674 of 981 id: ijccc-3269 author: Lim, Kahyun; Lee, Byung Mun; Kang, Ungu; Lee, Youngho title: An Optimized DBN-based Coronary Heart Disease Risk Prediction date: 2018-07-25 words: 4612 flesch: 54 summary: We developed a predictive algorithm for CHD risk through CHD risk factor data and verified it using a confusion matrix and ROC curve. When the error rate gradually decreases over the generations and converges toward its lowest value, the RBM performs learning for CHD risk prediction. keywords: algorithm; chd; chd risk; data; dbn; performance; prediction; risk; study; value cache: ijccc-3269.pdf plain text: ijccc-3269.txt item: #675 of 981 id: ijccc-3275 author: You, Xuemei; Ma, Yinghong; Liu, Zhiyuan; Xie, Mingzhao title: An ABC Algorithm with Recombination date: 2018-07-25 words: 4714 flesch: 68 summary: [10] Karaboga, D.; Akay, B. (2009); A comparative study of artificial bee colony algorithm, Applied Mathematics and Computation, 214, 108-132, 2009. An ABC Algorithm with Recombination X. You, Y. Ma, Z. Liu, M. Xie Xuemei You*, Yinghong Ma, Zhiyuan Liu, Mingzhao Xie Business School, Shandong Normal University, Shandong, 250014, P. R. China *Corresponding author: sdxmyou@126.com yinghongma71@163.com liuzhiyuan@sdnu.edu.cn Abstract: Artificial bee colony (ABC) is an efficient swarm intelligence algorithm, which has shown good exploration ability. keywords: abc; algorithm; bee; colony; model; rabc; search cache: ijccc-3275.pdf plain text: ijccc-3275.txt item: #676 of 981 id: ijccc-3281 author: Gritli, Wafa; Gharsallaoui, Hajer; Benrejeb, Mohamed; Borne, Pierre title: Electronic Throttle Valve Takagi-Sugeno Fuzzy Control Based on Nonlinear Unknown Input Observers date: 2018-09-29 words: 6126 flesch: 61 summary: [18] He, S.P.; Liu, F. (2012); Finite-time H∞ fuzzy control of nonlinear jump systems with time delays via dynamic observer-based state feedback, IEEE Transactions on Fuzzy Systems, 20(4), 605-614, 2012. [29] Nakano, K.; Sawut, U.; Higuchi, K.; Okajima, Y. (2006); Modelling and observer-based sliding-mode control of electronic throttle systems, ECTI Transactions on Electrical Engi- neering, Electronics, and Communications, 4(1), 22-28, 2006. keywords: control; design; etv; fuzzy; input; model; nonlinear; observer; sugeno; system; throttle; time; valve cache: ijccc-3281.pdf plain text: ijccc-3281.txt item: #677 of 981 id: ijccc-3282 author: Elkhani, Naeimeh; Muniyandi, Ravie Chandren; Zhang, Gexiang title: Multi-Objective Binary PSO with Kernel P System on GPU date: 2018-05-27 words: 5674 flesch: 55 summary: The first part defines modelling and implementing previous MObPSO based on KP system rules with some improvements which leads to the result consists of different set of marker genes, so called KP-MObPSO feature selection. Keywords: parallel membrane computing, GPU based membrane computing, ker- nel P system, parallel multi-objective binary PSO, parallel kernel P system-multi objective binary PSO. keywords: genes; gpu; membrane; mobpso; parallel; rules; system; time cache: ijccc-3282.pdf plain text: ijccc-3282.txt item: #678 of 981 id: ijccc-3283 author: Jiang, Wen; Huang, Chan title: A Multi-criteria Decision-making Model for Evaluating Suppliers in Green SCM date: 2018-05-27 words: 7725 flesch: 52 summary: The A Multi-criteria Decision-making Model for Evaluating Suppliers in Green SCM 341 Step 1:Make up decision making team Step 2: Determine the relevant evaluation criteria and green suppliers Determine the weights of criteria Step 3:Set linguistic sacle and assess all suppliers for each criterion using linguistic variables Step 4:Calculate weighted fuzzy decision -making matrix Step 5:Compute regret decision-making matrix Step 6:Calculate OWA weight and aggregate regrets for each supplier under all criteria Step 7:Rank all suppliers according to the effective regrets Figure 1: The proposed model for ranking green suppliers in GSCM practice 342 W. Jiang, C. Huang proposed method extends Yager’s generalized regret decision making method to the fuzzy envi- ronment and this can be used to effectively handle fuzzy decision making problem. In this paper, a novel fuzzy multi-criteria decision making method for GSCM is proposed. keywords: criteria; decision; decision making; green; journal; making; matrix; method; model; regret; regret decision; supplier cache: ijccc-3283.pdf plain text: ijccc-3283.txt item: #679 of 981 id: ijccc-3284 author: Jiang, Yun; Kong, Yuan; Zhu, Chaoping title: Implementation of Arithmetic Operations by SN P Systems with Communication on Request date: 2018-05-27 words: 5737 flesch: 62 summary: School of Computer Science and Information Engineering Chongqing Technology and Business University Chongqing 400067, China *Corresponding author: jiangyun@email.ctbu.edu.cn jsjzcp@163.com Yuan Kong College of Mathematics and System Science Shandong University of Science and Technology Qingdao 266590, China kongyuan1122@126.com Abstract: Spiking neural P systems (SN P systems, for short) are a class of dis- tributed and parallel computing devices inspired from the way neurons communicate by means of spikes. Keywords: membrane computing, spiking neural P system, communication on re- quest, arithmetic operation. keywords: communication; neural; neuron; p systems; sn p; spikes cache: ijccc-3284.pdf plain text: ijccc-3284.txt item: #680 of 981 id: ijccc-3285 author: Lei, Xiujuan; Wang, Siguo; Pan, Linqiang title: Identifying Essential Proteins in Dynamic PPI Network with Improved FOA date: 2018-05-27 words: 7253 flesch: 51 summary: The comparison results between EPFOA and the other predicted essential proteins methods by six statistical measures performed on DIP are shown in Table 2. Finally,we analysis the modularity of identified essential proteins. keywords: algorithm; centrality; epfoa; fruit; gene; methods; network; pan; ppi; proteins; wang cache: ijccc-3285.pdf plain text: ijccc-3285.txt item: #681 of 981 id: ijccc-3286 author: Sun, Yanfeng; Zhang, Minglei; Chen, Si; Shi, Xiaohu title: A Financial Embedded Vector Model and Its Applications to Time Series Forecasting date: 2018-09-29 words: 6378 flesch: 63 summary: 4.3 Weekly closing price forecasting based on �nancial embedded vector To further examine the e�ect of �nancial embedded vectors, longer periods of data are adopted. That is the dictionary size of �nancial embedding models. keywords: daily; data; model; network; neural; price; series; set; time; vector; vector model; word cache: ijccc-3286.pdf plain text: ijccc-3286.txt item: #682 of 981 id: ijccc-3308 author: Mironescu, Ion Dan; Vinţan, Lucian title: A Simulation Based Analysis of an Multi Objective Diffusive Load Balancing Algorithm date: 2018-07-25 words: 8404 flesch: 58 summary: In the first iteration, one of the chares receives the domain and starts, as initiator, a negotiation process with other nodes; the negotiations are following the Contract Net Protocol Figure 3: Initial distribution of load on available nodes After all nodes start calculation, blocks are also exchanged in the communication step to balance the load. keywords: algorithm; blocks; computation; computing; energy; gpu; load; node; number; reference; set; time cache: ijccc-3308.pdf plain text: ijccc-3308.txt item: #683 of 981 id: ijccc-3310 author: Korvel, Grazina; Kostek, Bozena; Kurasova, Olga title: Comparative Analysis of Various Transformation Techniques for Voiceless Consonants Modeling date: 2018-09-29 words: 5169 flesch: 59 summary: [21] Pruthi T.; Espy-Wilson C. (2003); Automatic Classi�cation of Nasals and Semivowels, ICPhS 2003-15th International Congress of Phonetic Sciences, 3061�3064, 2003 [22] Pyz, G.; Simonyte, V.; Slivinskas, V. (2014); [31] Thasleema T. M.; Narayanan N. K.: Consonant Classi�cation using Decision Directed Acyclic Graph Support Vector Machine Algorithm, International Journal of Signal Pro- cessing, Image Processing and Pattern Recognition, 6(1), 59�74, 2013. keywords: analysis; cation; classi; consonant; dct; dft; dwht; phoneme; signal; speech; transform cache: ijccc-3310.pdf plain text: ijccc-3310.txt item: #684 of 981 id: ijccc-3315 author: Marwan, Abdul Aziz; Perdana, Doan; Sanjoyo, Danu Dwi title: Performance Analysis of RAW Impact on IEEE 802.11ah Standard affected by Doppler Effect date: 2019-04-14 words: 3255 flesch: 60 summary: The design of the simulation system is done by changing RAW slot and RAW slot duration. Figure 3 shows the influence of Doppler Effect in increasing the number of RAW slot and RAW slot duration to the delay that obtained from simulations with MCS 3 (2 MHz bandwidth and 2600 Kbps data rate) using v = 10 km/h user speed. keywords: number; performance; raw; slot; slot duration cache: ijccc-3315.pdf plain text: ijccc-3315.txt item: #685 of 981 id: ijccc-3316 author: KEUPONDJO SATCHOU, Gilles Armel; ANOH, Nogbou Georges; N'Takpé, Tchimou; Oumtanaga, Souleymane title: Optimization of the latency in networks SDN date: 2018-09-29 words: 4390 flesch: 61 summary: Despite the incremental deployment of new routing solutions adapted to modern uses of the Internet [5] facilitated by SDN networks. And also one of the problems in data with SDN network is control of the size of the table of rules of transfers. keywords: approach; controller; latency; network; node; rules; time; transfer cache: ijccc-3316.pdf plain text: ijccc-3316.txt item: #686 of 981 id: ijccc-3349 author: Kirsal, Yonal; Paranthaman, Vishnu Vardhan; Mapp, Glenford title: Exploring Analytical Models for Proactive Resource Management in Highly Mobile Environments date: 2018-09-29 words: 8139 flesch: 54 summary: Based on these results an operational space has been explored and are shown to be useful for emerging future networks such as 5G by allowing base stations to calculate the probability of contention based on the de- mand for network resources. However, in this paper the work in [9] has been extended and analysed the request not being a�ected and staying in queue considering all possible contention probabilities in highly mobile environments based on the time the mobile user needs to acquire network resources before the handover. keywords: channel; contention; environments; handover; mobile; network; queue; request; resource; system; time cache: ijccc-3349.pdf plain text: ijccc-3349.txt item: #687 of 981 id: ijccc-3354 author: Dragoi, Vlad; Cowell, Simon Robin; Beiu, Valeriu; Hoara, Sorin; Gaspar, Pastorel title: How Reliable are Compositions of Series and Parallel Networks Compared with Hammocks? date: 2018-09-29 words: 7864 flesch: 75 summary: − 55098726855452p45 − 30641343744796p46 +111186328020944p47 − 111483252211446p48 − 197506250928p35 − 337635320852p36 +1438498163768p37 − 67797908976p38 keywords: compositions; hammocks; networks; number; p p; parallel; reliability; series; t p; wires cache: ijccc-3354.pdf plain text: ijccc-3354.txt item: #688 of 981 id: ijccc-3356 author: Ahanger, Tariq Ahamad title: Defense Scheme to Protect IoT from Cyber Attacks using AI Principles date: 2018-11-29 words: 4476 flesch: 57 summary: To assimilate the structure and sequence developed in the system, neural network systems go through the training phase. Intrusion detection systems in wireless sensor networks: a review, International Journal of Distributed Sensor Networks, 1-7, 2013. keywords: attacks; data; detection; information; internet; intrusion; iot; network; security; system; things; traffic cache: ijccc-3356.pdf plain text: ijccc-3356.txt item: #689 of 981 id: ijccc-3360 author: Huertas, Jorge A.; Donoso, Yezid title: Multi-Objective Tabu Search to Balance Multihoming Loads in Heterogeneous Wireless Networks date: 2018-11-29 words: 6314 flesch: 58 summary: Multi-Objective Tabu Search to Balance Multihoming Loads in Heterogeneous Wireless Networks J. A. Huertas, Y. Donoso Jorge A. Huertas Center for Optimization and Applied Probability (COPA) Industrial Engineering Department Universidad de los Andes, Bogotá, Colombia huertas.ja@uniandes.edu.co Yezid Donoso* Computing and Systems Engineering Department Universidad de los Andes, Bogotá, Colombia *Corresponding author: Standards such as IEEE 802.21 MH provide only the framework for performing VHO, yet the decision-making algorithms to do so are an open Copyright ©2018 CC BY-NC Multi-Objective Tabu Search to Balance Multihoming Loads in Heterogeneous Wireless Networks 957 discussion topic among the research world [15]. keywords: instance; mobile; mots; multi; networks; objective; search; set; solutions; tabu cache: ijccc-3360.pdf plain text: ijccc-3360.txt item: #690 of 981 id: ijccc-3364 author: Turskis, Zenonas; Dzitac, Simona; Stankiuviene, Aušra; Šukys, Ritoldas title: A Fuzzy Group Decision-making Model for Determining the Most Influential Persons in the Sustainable Prevention of Accidents in the Construction SMEs date: 2019-02-14 words: 7526 flesch: 48 summary: A reduction of accidents at work, as a priority, must be included in the action plans of construction projects [41]. It should be emphasized that all stakeholders involved in construction project need to be aware of the risks they are facing and how they apply risk management in order to create better working conditions. keywords: accidents; construction; criteria; decision; group; journal; making; management; method; model; osh; prevention; project; safety; stakeholders; turskis; work cache: ijccc-3364.pdf plain text: ijccc-3364.txt item: #691 of 981 id: ijccc-3366 author: Zhang, Qianqian; Liu, Shifeng; Gong, Daqing; Tu, Qun title: A Latent-Dirichlet-Allocation Based Extension for Domain Ontology of Enterprise’s Technological Innovation date: 2019-02-14 words: 6441 flesch: 35 summary: Table 2: Related terms extraction and relations recognition Existing Concepts Topic P (cm|z = j) Related terms Weights Appli- cable rules Semantic relations Profit Management 79 0.438621 Innovation Resources 0.00413586 (2) Subclass Total Amount 0.00624005 (2) Subclass Technical Information 139 0.388462 Material 0.00651796 (2) Subclass Painting 0.00331878 (3) Related Alloy 0.00243573 (3) Related Visible Asset 27 0.236543 Fixed asset 0.01342533 (1) Equivalent Equipment 0.00523433 (2) Subclass Instrument 0.00243234 (2) Subclass Visible Asset 27 0.236543 Fixed asset 0.01342533 (1) Equivalent Equipment 0.00523433 (2) Subclass Instrument 0.00243234 (2) Subclass Technical- Quality 5 0.388462 Precision 0.00257653 (3) Related New Technology 0.00323643 (3) Related A Latent-Dirichlet-Allocation Based Extension for Domain Ontology of Enterprise’s Technological Innovation 119 Existing Concepts Topic P (cm|z = j) Related terms Weights Appli- cable rules Semantic relations High-tech Product 136 0.446243 Strategy Innovation 0.00276406 (3) Related High-tech Product 136 0.446243 Technological Innovation 0.00143524 (3) Related Product Innovation 23 0.237643 Patent 0.00332763 (3) Related Brand 0.00236232 (3) Related Copyright 0.00323422 (3) Related New Product 0.00332542 (3) Related Staff Management 13 0.376432 Expert 0.00335476 (3) Related Doctor 0.003276543 (3) Related Degree 0.002387432 (3) Related Senior engineer 0.003723423 (3) Related Wage management 63 0.3412663 Wage 0.01472652 (1) Equivalent Subsidy 0.00234653 (3) Related Bonus 0.00334523 (3) Related Insurence 0.00343263 (3) Related Innovation Activities Organizational Innovation Strategic Innovation Marketing Innovation Innovation Resources Personnel Management Staff Management Technological Innovation Technology Quality Technology Information Technological Strategy Product Technology Product Innovation Product Strategy Product Information Product Development Product Quality High-tech product Product Quality Certification Profit Management Cost Management Economic Activities Analysis Assets Management Invisible Asset Visible Asset Total Amount Material Painting Precision Patent Brand Copyright New Product Equipment Instrument Experts Doctor Wage Management Wage Subsidy Bonus Insurance Alloy Market Occupancy Sale Quota Competitiveness Period Degree Senior Engineer WaWaWaWaWaWaWaWa Fixed Asset Figure 9: Parts of produced enterprise technological innovation domain ontology The Fig.5 shows that the relationship between domain ontology concepts which takes the Strategic innovation as the center and reflects the complex relationship between concepts. keywords: concepts; domain; domain ontology; enterprise; innovation; lda; learning; method; model; ontology; relationship; semantic; terms; topic; words cache: ijccc-3366.pdf plain text: ijccc-3366.txt item: #692 of 981 id: ijccc-3370 author: Perez-Hurtado, Ignacio; Perez-Jimenez, Mario J.; Zhang, Gexiang; Orellana-Martin, David title: Simulation of Rapidly-Exploring Random Trees in Membrane Computing with P-Lingua and Automatic Programming date: 2018-11-29 words: 9341 flesch: 60 summary: 2 Robot path planning In general terms, robot path planning can be solved by applying a solution based on three modules: • Global planner: It receives the desired ending configuration of the robot, its safety radius and current localization, as well as the precomputed position of the static obstacles in 1010 I. Pérez-Hurtado, M.J. Pérez-Jiménez, G. Zhang, D. Orellana-Martín the environment and current information of sensors and odometry. Robot path planning using rapidly-exporing random trees: A membrane computing approach, 2018 keywords: algorithm; computing; function; lingua; membrane; path; production; protein; pérez; repartition; robot; rrt cache: ijccc-3370.pdf plain text: ijccc-3370.txt item: #693 of 981 id: ijccc-3374 author: Du, Changshun; Huang, Lei title: Sentiment Analysis Method based on Piecewise Convolutional Neural Network and Generative Adversarial Network date: 2019-02-14 words: 6884 flesch: 43 summary: Many current studies have shown that executing word embedding pre-training on a large-scale corpus, and then ap- plying the obtained word embedding to subsequent training, can speed up the convergence of neural network models and achieve a better local optimal solution. 2.2 Piecewise pooling based convolutional neural network sentiment classifi- cation model There is a deficiency in the process of extracting text features using the sentiment analysis model based on a traditional convolutional neural network. keywords: analysis; convolution; data; emotional; features; method; model; network; neural; pooling; sentiment; sentiment analysis; text cache: ijccc-3374.pdf plain text: ijccc-3374.txt item: #694 of 981 id: ijccc-3375 author: Yang, Fushen; Du, Changshun; Huang, Lei title: Ensemble Sentiment Analysis Method based on R-CNN and C-RNN with Fusion Gate date: 2019-04-14 words: 6653 flesch: 49 summary: Figure 3: Text sentiment feature extraction model based on convolution-recurrent neural network 2.3 Sentiment analysis model based on R-CNN and C-RNN of with fusion gate Feature fusion based on gating unit After R-CNN and C-RNN respectively extract the emotional features of the review text, the features extracted by the two networks need to be integrated and input into the sentiment orientation analyzer to obtain the final sentiment analysis result. At the same time, text analysis methods based on CNN can obtain the important features of text through pooling, but it is difficult to obtain the context information. keywords: analysis; cnn; feature; method; model; network; neural; rnn; sentiment; sentiment analysis; text; word cache: ijccc-3375.pdf plain text: ijccc-3375.txt item: #695 of 981 id: ijccc-3379 author: C, Jothi kumar; Venkataraman, Revathi title: EODC: An Energy Optimized Dynamic Clustering Protocol for Wireless Sensor Network using PSO approach date: 2019-04-14 words: 5766 flesch: 63 summary: The energy consumed by the non-CH for data transmission is given as, Enon−CH = mEc + m�fsd 2 (8) EODC: An Energy Optimized Dynamic Clustering Protocol for Wireless Sensor Networks using PSO Approach 189 The total consumption of energy for the single cluster includes the consumption of energy for the non-CH, of the cluster in intra cluster communication in addition to the energy consumption of the CH in the given cluster. An Energy Optimized Dynamic Clustering Protocol for Wireless Sensor Networks using PSO Approach C. Jothikumar, R. Venkataraman C. Jothikumar* Department of Computer Science SRM Institute of Science and Technology Chennai, India *Corresponding author: jothikumar.c@ktr.srmuniv.ac.in Revathi Venkataraman Department of Computer Science SRM Institute of Science and Technology Chennai, India revathi.n@ktr.srmuniv.ac.in Abstract: A Wireless Sensor Network comprises many small wireless nodes that helps to sense, gather, process and communicate. keywords: approach; cluster; clustering; data; energy; eodc; network; nodes; protocol; sensor cache: ijccc-3379.pdf plain text: ijccc-3379.txt item: #696 of 981 id: ijccc-3383 author: Caruntu, Constantin F.; Velandia-Cardenas, Cristian C.; Liu, Xinghua; Vargas, Alessandro title: Model Predictive Control of Stochastic Linear Systems with Probability Constraints date: 2018-11-29 words: 4116 flesch: 60 summary: [9]—this setup is referred to as model predictive control (MPC) with probability constraints, as detailed next. 4 Application of model predictive control to a direct current mo- tor subject to probability constraints The goal of this section is to illustrate the proposed model predictive control scheme with probability constraints. keywords: constraints; control; linear; model; motor; probability; problem; systems cache: ijccc-3383.pdf plain text: ijccc-3383.txt item: #697 of 981 id: ijccc-3385 author: Chis, Violeta Eugenia; Barbulescu, Constantin; Kilyeni, Stefan; Dzitac, Simona title: ANN based Short-Term Load Curve Forecasting date: 2018-11-29 words: 6029 flesch: 63 summary: Load forecasting has a great impact on future decisions, predicting the energy demand for the operation and planning of power systems plays an important role in the control, power security, market operation, and scheduling of reasonable dispatching plans for smart grids. Load forecasting is an important component of power system to establish economical and reliable operations for power stations and their generating units. keywords: ann; based; data; forecasting; load; load forecasting; table; term; term load cache: ijccc-3385.pdf plain text: ijccc-3385.txt item: #698 of 981 id: ijccc-3398 author: Krylovas, Aleksandras; Kosareva, Natalja; Zavadskas, Edmundas Kazimieras title: Scheme for Statistical Analysis of Some Parametric Normalization Classes date: 2018-11-29 words: 6044 flesch: 58 summary: Table 3: Numbers of cases with the best first alternative (ID) for normalization methods (1)–(7), The question arises: are the detected differences between normalization methods with different α values statistically significant? keywords: decision; ewid; methods; normalization; parameter; values; xij; x̃ij cache: ijccc-3398.pdf plain text: ijccc-3398.txt item: #699 of 981 id: ijccc-3419 author: Huang, Yue title: Heterogeneous Data Clustering Considering Multiple User-provided Constraints date: 2019-04-14 words: 5952 flesch: 42 summary: Since different values of λ lead to different numbers of central object clusters, the relation- ship between different values of λ and the number of central object clusters was tested on the UserHeteClus (wauthor = 0.3,wvenue = 0.2,wterm = 0.5) using the CNKI experimental dataset (Fig. 1). It can be observed that a monotonically increasing relationship was present between λ and the number of central object clusters (paper cluster); specifically, when λ = 0, the number of paper clusters was 1; as the value of λ gradually increased, the number of paper clusters also gradually increased; when λ = 1.0, the number of paper clusters reached 168, i.e., the number of paper objects. keywords: attribute; attribute objects; central; clustering; constraints; data; information; link; objects; similarity; user cache: ijccc-3419.pdf plain text: ijccc-3419.txt item: #700 of 981 id: ijccc-3420 author: Zhang, Shuai; Chen, Yong; Huang, Xiaoling; Cai, Yishuai title: Text Classification of Public Feedbacks using Convolutional Neural Network Based on Differential Evolution Algorithm date: 2019-02-14 words: 4448 flesch: 44 summary: Text Classification of Public Feedbacks using Convolutional Neural Network Based on Differential Evolution Algorithm 127 Table 1: Names and feedback numbers of 22 categories Category Name Number of Feedbacks Population and Family Planning Commission 42 Disabled Persons’ Federation 29 Security Supervision Bureau 39 National Tax Bureau 43 City Management Enforcement Bureau 503 Electric Power Bureau 119 Housing Administration 382 Industrial and Commercial Bureau 152 Public Security Bureau 688 Sports Bureau 57 Bureau of Land and Resources 174 Environmental Protection Bureau 131 Commission for Discipline Inspection 98 Traffic Bureau 190 Education Bureau 401 Brigade Committee 66 Weather Bureau 56 Health Bureau 256 Pricing Bureau 507 Tobacco Bureau 112 Post Office 120 Court 92 3.2 Text representation and text classification model Then, by linking the results of the pooling with the neurons in the fully connected layer and using the rectified linear unit incentive function [24], 128 S. Zhang, Y. Chen, X.L. Huang, Y.S. Cai Figure 2: The structure of CNN classification model the output vector is obtained. keywords: algorithm; bureau; classification; cnn; feedbacks; learning; model; network; public; text; text classification; tfidf cache: ijccc-3420.pdf plain text: ijccc-3420.txt item: #701 of 981 id: ijccc-3428 author: Ren, Haiping; Liu, Manfeng; Zhou, Hui title: Extended TODIM Method for MADM Problem under Trapezoidal Intuitionistic Fuzzy Environment date: 2019-04-14 words: 5595 flesch: 66 summary: 228 H.P. Ren, M.F. Liu, H. Zhou Table 3: Linguistic evaluation values given by expert 2 Alternatives o1 o2 o3 x1 FL M L x2 FH H M x3 M FH FL x4 H FH FL Table 4: Linguistic evaluation values given by expert 3 Alternatives o1 o2 o3 x1 M FH FL x2 M FH M x3 FH FH M x4 H H M Table 5: Trapezoidal intuitionistic fuzzy decision matrix given by expert 1 Alternatives o1 o2 o3 x1 <(0.3,0.4,0.5,0.6), (0.2,0.4,0.5,0.7)> <(0.3,0.4,0.5,0.6), (0.2,0.4,0.5,0.7)> <(0.1,0.2,0.3,0.4), (0.0,0.2,0.3,0.5)> x2 <(0.5,0.6,0.7,0.8), (0.4,0.6,0.7,0.9)> <(0.5,0.6,0.7,0.8), (0.4,0.6,0.7,0.9)> <(0.3,0.4,0.5,0.6), (0.2,0.4,0.5,0.7)> x3 <(0.3,0.4,0.5,0.6), (0.2,0.4,0.5,0.7)> <(0.5,0.6,0.7,0.8), (0.4,0.6,0.7,0.9)> <(0.3,0.4,0.5,0.6), (0.2,0.4,0.5,0.7)> x4 <(0.7,0.8,0.9,1.0), (0.7,0.8,0.9,1.0)> <(0.3,0.4,0.5,0.6), (0.2,0.4,0.5,0.7)> <(0.1,0.2,0.3,0.4), (0.0,0.2,0.3,0.5)> Table 6: Trapezoidal intuitionistic fuzzy decision matrix given by expert 2 Alternatives o1 o2 o3 x1 <(0.1,0.2,0.3,0.4), (0.0,0.2,0.3,0.5)> <(0.3,0.4,0.5,0.6), (0.2,0.4,0.5,0.7)> <(0.0,0.1,0.2,0.3), (0.0,0.1,0.2,0.3)> keywords: decision; fuzzy; making; method; numbers; todim cache: ijccc-3428.pdf plain text: ijccc-3428.txt item: #702 of 981 id: ijccc-3430 author: Ren, Haiping; Xiao, Shixiao; Zhou, Hui title: A Chi-square Distance-based Similarity Measure of Single-valued Neutrosophic Set and Applications date: 2019-02-14 words: 5522 flesch: 61 summary: The calculated numerical values of these 9 existing similarity measures and proposed similarity measure are shown in Table 1. Keywords: Chi-square distance measure, similarity measure, multi-attribute deci- sion making, single-valued neutrosophic set. keywords: measure; neutrosophic; set; similarity; similarity measure cache: ijccc-3430.pdf plain text: ijccc-3430.txt item: #703 of 981 id: ijccc-3433 author: Cao, Benchun; Liang, Yanchun; Yoshida, Shinichi; Guan, Renchu title: Facial Expression Decoding based on fMRI Brain Signal date: 2019-08-05 words: 5365 flesch: 56 summary: According to these results, it can be found that facial expressions can be analyzed by analyzing fMRI brain images. During the collection of brain images, because we cannot scan the entire brain image at a time, we scan brain in slice. keywords: accuracy; analysis; brain; data; elm; fmri; function; images; layer; machine; subjects cache: ijccc-3433.pdf plain text: ijccc-3433.txt item: #704 of 981 id: ijccc-3477 author: Alic, Kemal; Mohorcic, Mihael; Svigelj, Ales title: Network and Traffic Design Aspects in Network-Coding-Enabled Wireless Networks date: 2019-05-31 words: 8859 flesch: 56 summary: Keywords: opportunistic network coding, network coding algorithm, wireless mul- tihop networks, simulations; traffic design. Since the coding happens between the flows that cross their paths in opposite directions, the benefits of network coding increase with an in- creasing traffic-symmetry ratio. keywords: bon; coding; cope; flows; length; network; network coding; nodes; number; packets; traffic; traffic flows cache: ijccc-3477.pdf plain text: ijccc-3477.txt item: #705 of 981 id: ijccc-3489 author: Racz, Sever Gabriel; Breaz, Radu Eugen; Bologa, Octavian; Tera, Melania; Oleksik, Valentin Stefan title: Using an Adaptive Network-based Fuzzy Inference System to Estimate the Vertical Force in Single Point Incremental Forming date: 2019-02-14 words: 5747 flesch: 42 summary: The user can either drag the vertical bars through any values of the two input variables, or manually introduce input data for them and the model will automatically calculate the value of the output (technological vertical force). [10] Gatea, S.; Ou, H.; Mccartney, G. (2016); Review on the influence of process parameters in incremental sheet forming, International Journal of Advanced Manufacturing Technology, 87, 479–499, 2016. keywords: adaptive; data; feed; force; forming; fuzzy; incremental; inference; network; parameters; process; system cache: ijccc-3489.pdf plain text: ijccc-3489.txt item: #706 of 981 id: ijccc-3490 author: Noje, Dan; Tarca, Radu; Dzitac, Ioan; Pop, Nicolae title: IoT Devices Signals Processing based on Multi-dimensional Shepard Local Approximation Operators in Riesz MV-algebras date: 2019-02-14 words: 2501 flesch: 64 summary: [8] Noje, D.; Dzitac I.; Pop N.; Tarca, R. (2019), IoT devices signals processing based on Shep- ard local approximation operators defined in Riesz MV-algebras, Informatica, submitted for publication 2018. 3,λ = 20 13.1902 13.2233 r = 5,λ = 2 21.7479 152.12 r = 5,λ = 10 13.1902 33.5822 r = 5,λ = 20 13.1902 16.5552 r = 10,λ = 2 24.8594 455.862 r = 10,λ = 10 13.1902 146.969 r = 10,λ = 20 13.1902 74.6371 4 Conclusion Nowadays, industrial information systems are depending on signals received form IoT devices. keywords: approximation; riesz; shepard cache: ijccc-3490.pdf plain text: ijccc-3490.txt item: #707 of 981 id: ijccc-3491 author: Balakrishna, Gubba; Moparthi, Nageswara Rao title: ESBL: Design and Implement A Cloud Integrated Framework for IoT Load Balancing date: 2019-08-05 words: 5602 flesch: 48 summary: Hence, it is a prime importance to realize the cloud computing service types and identify the benefits, which can be utilized for balancing IoT network loads. This invites the demands for research on load balancing for IoT networks. keywords: algorithm; applications; balancing; cloud; data; framework; iot; load; network; research; routing; time cache: ijccc-3491.pdf plain text: ijccc-3491.txt item: #708 of 981 id: ijccc-3498 author: Singh, Ajeet; Jain, Anurag title: An Empirical Study of AML Approach for Credit Card Fraud Detection—Financial Transactions date: 2020-02-02 words: 8738 flesch: 55 summary: A systematic review of the 672 A. Singh, A. Jain existing machine learning techniques (MLTs) for credit card fraud detection are also discussed, and their advantages and limitations are reported in this paper. The research process of this paper is explained in figure 1 based on adaptive existing machine learning techniques to credit card fraud detection. keywords: accuracy; attributes; card fraud; classification; credit card; data; dataset; financial; fraud; fraud detection; fraudulent; learning; machine; model; network; study; system; techniques; transaction cache: ijccc-3498.pdf plain text: ijccc-3498.txt item: #709 of 981 id: ijccc-3513 author: Jeong, Gu-Min; Lee, Kyoungwoo; Choi, Sang-Il; Ji, Sang-Hoon; Dutt, Nikil title: Effect of Soft Errors in Iterative Learning Control and Compensation using Cross-layer Approach date: 2019-05-31 words: 6408 flesch: 61 summary: 2 Effect of Soft Errors in Iterative Learning Control and Compensation using Cross-layer Approach 363 3 Effect of soft error in iterative learning control In this section, we analyze the effect of soft errors on the ILC. By considering above mentioned aspects, let us discuss the effects of the soft error on the Effect of Soft Errors in Iterative Learning Control and Compensation using Cross-layer Approach 365 Table 2: Effect of soft error on the 4-byte floating point variable with a value of 0.2 Part Error bit Approximate vaule (≈) keywords: compensation; control; error; ilc; iteration; learning; method; output; system cache: ijccc-3513.pdf plain text: ijccc-3513.txt item: #710 of 981 id: ijccc-3514 author: Florea, Adrian-Catalin; Andonie, Razvan title: Weighted Random Search for Hyperparameter Optimization date: 2019-04-14 words: 6303 flesch: 60 summary: Weighted Random Search for Hyperparameter Optimization A.C. Florea, R. Andonie Adrian-Cătălin Florea* Department of Electronics and Computers Transilvania University of Braşov, Romania *Corresponding author: acflorea@unitbv.ro Răzvan Andonie Department of Computer Science Central Washington University, USA andonie@cwu.edu Abstract: We introduce an improved version of Random Search (RS), used here for hyperparameter optimization of machine learning algorithms. Keywords:Hyperparameter optimization, random search, deep learning, convolu- tional neural network. keywords: algorithm; function; hyperparameter; number; optimization; probability; results; trials; values; wrs cache: ijccc-3514.pdf plain text: ijccc-3514.txt item: #711 of 981 id: ijccc-3516 author: Miranda, Michael Gabriel; Salinas, Renato Alberto; Raff, Ulrich; Magna, Oscar title: Wavelet Design for Automatic Real-Time Eye Blink Detection and Recognition in EEG Signals date: 2019-05-31 words: 4652 flesch: 55 summary: The design of a mother wavelet used in the context of wavelet analysis incorporates features of shape, amplitude, and phase shift for de- tecting patterns using one-dimensional wavelet transform thus ensuring a robust detection and recognition technique of eye blinking phenomena in EEG signals. Among the advantages of using wavelet signal processing is the multi-resolution analysis, which involves looking at multiple versions of the blinking patterns. keywords: analysis; blinking; detection; eeg; eye; mother; pattern; signal; time; wavelet cache: ijccc-3516.pdf plain text: ijccc-3516.txt item: #712 of 981 id: ijccc-3526 author: Li, Leixiao; Gao, Jing; Mu, Ren title: Optimal Data File Allocation for All-to-All Comparison in Distributed System: A Case Study on Genetic Sequence Comparison date: 2019-04-14 words: 5288 flesch: 61 summary: Performing initiative data prefetch- ing in distributed file systems for cloud computing, IEEE Transactions on Cloud Computing, 5(3), 550–562, 2017. 568387304@qq.com Abstract: In order to solve the problem of unbalanced load of data files in large-scale data all-to-all comparison under distributed system environment, the differences of files themselves are fully considered. keywords: allocation; comparison; computing; data; file; load; node cache: ijccc-3526.pdf plain text: ijccc-3526.txt item: #713 of 981 id: ijccc-3534 author: Chen, Mo title: Research on Key Technology of Web Hierarchical Topic Detection and Evolution Based on Behaviour Tracking Analysis date: 2019-05-31 words: 8001 flesch: 40 summary: From research angle of mining Web news instance set supporting topics concerned by users, the issue should be solved to mine events that are happening under these topics, analyse the instance set supporting these events, so as to reflect the evolution process of Web news topics continuously. The accuracy rate of analysing the topic evolution with the variation trend for the parameter adjustment As shown in the figure 6, the accuracy rate indicates the quality of analysing the topic evolution for Web news topics according to the parameter adjustment of the sequence event construction process. keywords: accuracy; analysis; data; evolution; instances; news instances; process; rate; research; threshold; topic; topic detection; topic evolution; web; web news cache: ijccc-3534.pdf plain text: ijccc-3534.txt item: #714 of 981 id: ijccc-3536 author: Tugui, Alexandru; Danciulescu, Daniela; Subtirelu, Mihaela-Simona title: The Biological as a Double Limit for Artificial Intelligence: Review and Futuristic Debate date: 2019-04-14 words: 9861 flesch: 41 summary: To achieve our goal, we utilized a qualitative research methodology framework, providing an in-depth analysis of AI limitations formulated by prominent scholars within this field of specialization. As highlighted by Gartner [8,12], AI has become the core of new technologies, motivating the need to identify AI limitations in order to avoid and even overcome them. keywords: analysis; biological; brain; computer; design; human; intelligence; limitations; limits; perspective; research; system; technology; university; years cache: ijccc-3536.pdf plain text: ijccc-3536.txt item: #715 of 981 id: ijccc-3537 author: Zhao, Jie; Deng, Yong title: Performer selection in Human Reliability analysis: D numbers approach date: 2019-05-31 words: 6470 flesch: 61 summary: Assuming there are several D numbers of one individual, the translation from D numbers into BPA is defined as: D1i = {(b1,v1), (b2,v2)} Performer Selection in Human Reliability Analysis: D numbers Approach 443 Anchor points Linguistic judgement Dep. level TSC vs control shift room NO similarity of performers is present between tasks ZD Different team A low level of performer similarity exist LD Different individuals with same qualification The level of performer similarity is medium MD Same team High level of performer similarity is present between tasks HD Same person The tasks are accomplished by the same individual CD Table 4: Judgement on factors given by experts after transformation Step 4. keywords: analysis; deng; dependence; factors; journal; method; numbers; performers; time cache: ijccc-3537.pdf plain text: ijccc-3537.txt item: #716 of 981 id: ijccc-3539 author: Feng, Xiaolong; Gao, Jing title: Gene Sequences Parallel Alignment Model Based on Multiple Inputs and Outputs date: 2019-04-14 words: 6140 flesch: 60 summary: The principle of gene sequence alignment based on Hadoop is to distribute short reads sequence data to multiple nodes of distributed cluster, then map to reference sequence independently on each node and form their own result files. However, there are few methods using Hadoop independently to complete gene sequences alignment. keywords: algorithm; alignment; bwa; computing; data; end; gene; hadoop; input; model; parallel; sequence cache: ijccc-3539.pdf plain text: ijccc-3539.txt item: #717 of 981 id: ijccc-3548 author: Wang, Yuhe; Qiao, Peili; Luo, Zhiyong; Sun, Guanglu; Wang, Guangze title: Reliability Assessment Model for Industrial Control System Based on Belief Rule Base date: 2019-05-31 words: 6328 flesch: 55 summary: The framework for ICS reliability assessment The accuracy of ICS reliability assessment hinges on the clear identification of various influ- encing factors. On this basis, the framework of ICS reliability assessment was constructed. keywords: assessment; attributes; belief; brb; control; data; fault; ics; model; reliability; reliability assessment; rule; security; system; wang cache: ijccc-3548.pdf plain text: ijccc-3548.txt item: #718 of 981 id: ijccc-355 author: Yao, Jianguo; An, Jie; Hu, Fei title: Scalable Architecture for CPS: A Case Study of Small Autonomous Helicopter date: 2013-09-17 words: 4167 flesch: 58 summary: The standard must be fulfilled both before and after the installation of flight control system, so as not to destroy the balance of the helicopter. One ARM board is used as the flight data collection module, it collect data of each sensor and then send them to PC104 flight control system via Ethernet. keywords: angle; control; data; flight; flight control; height; helicopter; position; signal; system; uav; velocity cache: ijccc-355.pdf plain text: ijccc-355.txt item: #719 of 981 id: ijccc-3558 author: Liu, Baoyu; Deng, Yong title: Risk Evaluation in Failure Mode and Effects Analysis Based on D Numbers Theory date: 2019-11-17 words: 8009 flesch: 67 summary: For another, the com- bination usage of risk priority number (RPN) and the risk coefficient newly defined not only achieve less computation complexity compared with other methods, but also overcome the shortcomings of classical RPN. Risk priority number (RPN) is a traditional and typical method to model and evaluate risk in FMEA. keywords: analysis; assessment; failure; failure mode; method; mode; numbers; risk; theory cache: ijccc-3558.pdf plain text: ijccc-3558.txt item: #720 of 981 id: ijccc-3570 author: Perdana, Doan; Sanyoto, Aji Nur; Bisono, Yoseph Gustommy title: Performance Evaluation and Comparison of Scheduling Algorithms on 5G Networks using Network Simulator date: 2019-08-05 words: 3938 flesch: 58 summary: Performance Evaluation and Comparison of Scheduling Algorithms on 5G Networks using Network Simulator 537 Figure 6: Delay on change number of users for video traffic Figure 7: Throughput on change number of users for video traffic Figure 8: Fairness index on change number of users for video traffic Figure 8 shows the effect when changing the number of users to fairness index in each scheduling algorithm for video traffic simulation. Performance Evaluation and Comparison of Scheduling Algorithms on 5G Networks using Network Simulator D. Perdana, A. N. Sanyoto, Y. G. Bisono Doan Perdana* School of Electrical Engineering Telkom University, Bandung, Indonesia *Corresponding author: doanperdana@telkomuniversity.ac.id Aji Nur Sanyoto School of Electrical Engineering Telkom University, Bandung, Indonesia ajinsanyoto@gmail.com keywords: delay; fairness; number; proportional; robin; round; scheduling; throughput; traffic; users cache: ijccc-3570.pdf plain text: ijccc-3570.txt item: #721 of 981 id: ijccc-3572 author: Hu, Wei; Li, Huanhao; Yao, Wenhui; Hu, Yawei title: Energy Optimization for WSN in Ubiquitous Power Internet of Things date: 2019-08-05 words: 7010 flesch: 49 summary: The protocol ensure the balance of network energy by creating clusters of different scales based on the distance to sink node, residual energy and distribution density of network nodes, such that no low-energy node will be selected as cluster head. Finally, Matlab-based simulation shows that the proposed routing protocols can effectively optimize network energy, reduce energy consumption of network nodes and enhance the network reliability. keywords: algorithm; candidate; cycle; data; energy; mode; network; node; optimization; power; routing; sensor; set; transmission; wsn cache: ijccc-3572.pdf plain text: ijccc-3572.txt item: #722 of 981 id: ijccc-3573 author: Hu, Wei; Yao, Wenhui; Hu, Yawei; Li, Huanhao title: Selection of Cluster Heads for Wireless Sensor Network in Ubiquitous Power Internet of Things date: 2019-05-31 words: 6490 flesch: 58 summary: Next, the selectivity function-based CH selection (SF-CHs) algorithm was proposed based on sensor energy, the number of neighbors, sensor motion velocity, and transmission environment. In the UPIoT, the energy of a sensor far away from the virtual power plant may be atten- uated to zero after multiple communication, owing to the limited amount of sensor energy. keywords: chs; cluster; cluster head; data; energy; network; power; selection; sensor; sensor network cache: ijccc-3573.pdf plain text: ijccc-3573.txt item: #723 of 981 id: ijccc-3577 author: Zhang, Xuefeng; Chen, Xiuli; Seng, Dewen; Fang, Xujian title: A Factored Similarity Model with Trust and Social Influence for Top-N Recommendation date: 2019-08-05 words: 8228 flesch: 55 summary: Nevertheless, in the field of recommendation system, trust plays an important role, and social influence is neglected by most researchers, although it is also a key factor affecting the behavior of social network users. (3) Considering the influence of user trust and social influence on recommendation, an innovative top-N recommendation model with the incorporation of user and item similarity, trust and social influence is proposed. keywords: data; influence; information; item; model; network; node; recommendation; set; similarity; social; trust; user; value cache: ijccc-3577.pdf plain text: ijccc-3577.txt item: #724 of 981 id: ijccc-3578 author: Seng, Dewen; Liu, Jiaxin; Zhang, Xuefeng; Chen, Jing; Fang, Xujian title: Top-N Recommendation Based on Mutual Trust and Influence date: 2019-08-05 words: 7342 flesch: 57 summary: After the calculation, the list of trust users was updated, and the implicit information in the user rating matrix was obtained to obtain the directed trust between users. In the right half of the model, user k trusts and is influenced by user u, and has rated item j as r(k,j); the rating may affect user u’s rating r(u,j) for the same item j. Following this model, the social network relationship and a user’s item ratings are analyzed to predict the item ratings of the other user. keywords: fsti; influence; item; model; network; recommendation; set; similarity; social; trust; users cache: ijccc-3578.pdf plain text: ijccc-3578.txt item: #725 of 981 id: ijccc-3585 author: Zhou, Lian; Xiao, Fuyuan title: DCM: D Number Extended Cognitive Map. Application on Location Selection in SCM date: 2019-11-17 words: 8166 flesch: 52 summary: Few studies have employed SC resilience as an indicator when selecting offshore outsourcing locations. 0.5276 -0.3825 -1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 Capability L1 L2 L3 L4 Figure 2: Comparison of the 4 locations 5 Sensitivity analysis To investigate the impact of the SCRE’s weights (developed by WCapi for capability Capi, where i = 1, 2, · · · , 9) on the selection of offshore outsourcing locations with the best benefits, we conduct a sensitivity analysis. keywords: capabilities; chain; criteria; decision; factors; fcm; location; method; outsourcing; resilience; scre; step; supply; weights cache: ijccc-3585.pdf plain text: ijccc-3585.txt item: #726 of 981 id: ijccc-3589 author: Dong, Yukun; Zhang, Jiantao; Li, Zhen; Hu, Yong; Deng, Yong title: Combination of Evidential Sensor Reports with Distance Function and Belief Entropy in Fault Diagnosis date: 2019-05-31 words: 5559 flesch: 62 summary: One Copyright ©2019 CC BY-NC 330 Y. Dong, J. Zhang, Z. Li, Y. Hu, Y. Deng of the most used math tools in sensor data fusion is evidence theory [4, 49]. Combination of Evidential Sensor Reports with Distance Function and Belief Entropy in Fault Diagnosis Y. Dong, J. Zhang, Z. Li, Y. Hu, Y. Deng Yukun Dong Institute of Fundamental and Frontier Science University of Electronic Science and Technology of China, Chengdu, 610054, China Jiantao Zhang College of Information Science and Technology Jinan University, Tianhe, Guangzhou, 510632, China Zhen Li College of Information Science and Technology Jinan University, Tianhe, Guangzhou, 510632, China Yong Hu Big Data Decision Institute Jinan University, Tianhe, Guangzhou, 510632, China Yong Deng* 1. keywords: belief; combination; deng; diagnosis; distance; entropy; evidence; fault; information; method; sensor cache: ijccc-3589.pdf plain text: ijccc-3589.txt item: #727 of 981 id: ijccc-3593 author: Sun, Yunlei; Gong, Huiquan; Li, Yucong; Zhang, Dalin title: Hyperparameter Importance Analysis based on N-RReliefF Algorithm date: 2019-08-05 words: 6462 flesch: 43 summary: Keywords: Hyperparameter optimization, Bayesian optimization, RReliefF Algo- rithm. Automated machine learning, represented by Bayesian optimization algorithm, has recently achieved great success in hyperparameter optimization, which exceeds the performance of human experts in some cases. keywords: algorithm; bayesian; data; hyperparameter; importance; learning; optimization; optimization algorithm; performance; random; rrelieff; rrelieff algorithm cache: ijccc-3593.pdf plain text: ijccc-3593.txt item: #728 of 981 id: ijccc-3594 author: Chang, Dan; Gui, Hao Yu; Fan, Rui; Fan, Ze Zhou; Tian, Ji title: Application of Improved Collaborative Filtering in the Recommendation of E-commerce Commodities date: 2019-08-05 words: 5756 flesch: 43 summary: In [8] Hu et al. integrated time information into collaborative filtering similarity measure in collaborative filtering algorithm, and designed a hybrid personalized random walk algorithm; Yong-ping Du et al. In [18] Zhongya Wang et al. calculated PB-level data by parallel computing and proposed effective collaborative filtering based on multi-GPU. keywords: algorithm; collaborative; commodities; commodity; data; et al; filtering; item; recommendation; set; svm; users cache: ijccc-3594.pdf plain text: ijccc-3594.txt item: #729 of 981 id: ijccc-3607 author: Xue, Linyan; Zhang, Xiaoke; Xie, Fei; Liu, Shuang; Lin, Peng title: Frequent Patterns Algorithm of Biological Sequences based on Pattern Prefix-tree date: 2019-08-05 words: 7343 flesch: 58 summary: Because classic Apriori algorithm, BioPM algorithm, and multiple sequence frequent pattern 586 L.Y. Xue, X.K. Zhang, F. Xie, S. Liu, P. Lin Figure 5: The relationship between the number of sequences and the time detection algorithm are deterministic algorithm of multiple sequence frequent patterns, the set of frequent patterns mined for the same biological sequence collection and support threshold is exactly the same. (Addition of Set Vectors and Numbers) With the set vector T = (T1,T2, · · · ,Tn) and the number l, there is T + l = T1 + l,T2 + l, · · · ,Tn + l. (3) + represents the addition of sets and numbers as defined in Definition 3. 4.1 Multiple sequence basic pattern table For the mining of multiple sequence frequent patterns, firstly we would intercept all the basic patterns in each sequence, and then sort the basic pattern tables of each sequence to obtain the basic pattern table of multiple sequences in the sequence set. keywords: algorithm; mining; pattern; pattern mining; pattern prefix; prefix; sequence; sequence pattern; set; table; tree cache: ijccc-3607.pdf plain text: ijccc-3607.txt item: #730 of 981 id: ijccc-3622 author: Xie, Hualong; Xie, Yao; Li, Fei title: Design, Modeling and Control of Bionic Knee in Artificial Leg date: 2019-11-17 words: 6294 flesch: 56 summary: Design, Modeling and Control of Bionic Knee in Artificial Leg H.L. Xie, Y. Xie, F. Li Hualong Xie* Department of Mechanical Engineering and Automation, Northeastern University, Shenyang 110819, China hlxie@mail.neu.edu.cn Yao Xie Department of Mechanical Engineering and Automation, Northeastern University, Shenyang 110819, China 1870220@stu.neu.edu.cn Fei Li Department of Information Science and Engineering, Shenyang University of Technology, Shenyang 110870, China lifeisut@163.com Abstract: The biped robot with heterogeneous legs (BRHL) greatly facilitates the development of intelligent lower-limb prosthesis (ILLP). Keywords: Bionic knee, biped robot with heterogeneous legs (BRHL), pneumatic artificial muscle (PAM), high-speed on-off valve, sliding mode control 1 Introduction Millions around the world have lost their lower extremities due to varied reasons, ranging from wars, earthquakes, diseases, work-related injuries, traffic accidents to accidental injuries. keywords: artificial; control; design; figure; knee; leg; mode; pam; pams; pressure; signal; system; xie cache: ijccc-3622.pdf plain text: ijccc-3622.txt item: #731 of 981 id: ijccc-3629 author: Lin, Tao; Wu, Peng; Gao, Fengmei; Wu, Tianshu title: Intrusion Detection for Mobile Ad Hoc Networks Based on Node Reputation date: 2019-11-17 words: 3897 flesch: 53 summary: The internal attacks may Intrusion Detection for Mobile Ad Hoc Networks Based on Node Reputation 663 occur when malicious network nodes attack the routing information or selfish nodes refuse to participate in routing. To suppress the selfish behavior of MANET nodes, this paper mainly calculates the repu- tation value, constructs a reputation mechanism, and applies the model to detect selfish nodes. keywords: data; manet; mechanism; module; network; nodes; packets; reputation cache: ijccc-3629.pdf plain text: ijccc-3629.txt item: #732 of 981 id: ijccc-3630 author: Prashanth, Jangiti Siva; Nandury, Satyanarayana V. title: A Cluster—based Approach for Minimizing Energy Consumption by Reducing Travel Time of Mobile Element in WSN date: 2020-02-02 words: 8065 flesch: 62 summary: Even for higher node densities energy consumption is low with HLI, the reason for this is THold for HLI is low when compared to CSS. 6 Conclusion ENI diminishes the TL of ME by limiting the ENs to be covered by ME. Energy efficient wireless sensor networks utilizing adaptive dictionary in compressed sensing, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), 383–388, 2018. keywords: cluster; consumption; data; energy; eni; ens; envoy; halting; hli; nodes; number; path; sen; time cache: ijccc-3630.pdf plain text: ijccc-3630.txt item: #733 of 981 id: ijccc-3651 author: Hua, Jin; He, Lile; Kang, Zhiqiang; Yan, Keding title: A Force/Position Hybrid Controller for Rehabilitation Robot date: 2019-11-17 words: 5011 flesch: 50 summary: Being the hybrid of force control and position control, the compliance control can be achieved either actively or passively. [4] conducts orthogonal separation of force control and position control in the time domain, and realizes grinding and polishing of the aspherical surface through mixed control of both force and position. keywords: compliance; control; controller; end; environment; force; hybrid; manipulator; position; rehabilitation; robot; segment; velocity cache: ijccc-3651.pdf plain text: ijccc-3651.txt item: #734 of 981 id: ijccc-3659 author: Yao, Lu; Du, Xiujuan title: Sensor Coverage Strategy in Underwater Wireless Sensor Networks date: 2020-03-28 words: 7312 flesch: 53 summary: 2.1 Creation of static deployment algorithm Static deployment is widely used in underwater sensor networks. At present, the research on underwater network coverage mostly adopts an ideal coverage environment model keywords: algorithm; area; coverage; deployment; dimension; direction; environment; gradient; hydrophone; network; node; sensor; set; terrain; underwater cache: ijccc-3659.pdf plain text: ijccc-3659.txt item: #735 of 981 id: ijccc-3668 author: Vitkus, Donatas; Steckevičius, Žilvinas; Goranin, Nikolaj; Kalibatienė, Diana; Čenys, Antanas title: Automated Expert System Knowledge Base Development Method for Information Security Risk Analysis date: 2020-02-02 words: 6377 flesch: 52 summary: On the other hand, there exist a number of information security ontologies that can be used in knowledge base formation of risk-analysis ES. Summarasing it can be said that there are a lot of information security ontologies and our work allows transforming the selected ontology into expert system rules set in an automated and novel way. keywords: analysis; base; expert; information; knowledge; knowledge base; method; ontologies; ontology; rdf; rif; risk; rules; security; system; triplets cache: ijccc-3668.pdf plain text: ijccc-3668.txt item: #736 of 981 id: ijccc-3674 author: Kaklauskas, Arturas; Dzitac, Domnica; Sliogeriene, Jurate; Lepkova, Natalija; Vetloviene, Ingrida title: VINERS Method for the Multiple Criteria Analysis and Neuromarketing of Best Places to Live date: 2019-11-17 words: 9344 flesch: 58 summary: 20 6 1 7 2 9 Utility degree of housing unit video alternatives under comparison (%) 74,17 75,88 . . . It would require considerable room to demonstrate Table 1: The neuro decision matrix of alternative video ads and the results of its multiple criteria analysis Criteria describing alternatives Sub-criteria describing alternatives Measu- ring units Weight * Apartments video alternatives under comparison A1 . . . . . . keywords: alternatives; analysis; buyers; criteria; data; decision; environmental; happiness; housing; method; places; points; potential; research; segmentation; video; viners cache: ijccc-3674.pdf plain text: ijccc-3674.txt item: #737 of 981 id: ijccc-3676 author: Kirsal, Yonal title: Exploring Analytical Models for Performability Evaluation of Virtualized Servers using Dynamic Resource date: 2019-11-17 words: 6597 flesch: 56 summary: Similarly, the system will not able to serve the tasks due to virtual machine failures hence the mean response time of the proposed system also increases as shown in Fig. Similarly Exploring Analytical Models for Performability Evaluation of Virtualized Servers using Dynamic Resource 657 (a) mean arrival rate, λ (tasks/sec) 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 20 40 60 80 100 120 140 150 VM=50, K=150, µ=0.016 (tasks/sec), η v =η p =0.5/h, ξ v =0.001/h ξ p =0.001-Analytical ξ p =0.001-Simulation ξ p =0.01-Analytical ξ p =0.01-Simulation ξ p =0.1-Analytical ξ p =0.1-Simulation (b) mean arrival rate, λ (tasks/sec) 0.2 0.3 0.4 0.5 0.6 0.7 0.8 b lo c k in g p ro b a b il it y 0 0.1 0.2 0.3 0.4 0.5 0.6 VM=50, K=150, µ=0.016 (tasks/sec), η v =η p =0.5/h, ξ v =0.001/h ξ p =0.001-Analytical ξ p =0.001-Simulation ξ p =0.01-Analytical ξ p =0.01-Simulation ξ p =0.1-Analytical ξ p =0.1-Simulation (c) mean arrival rate, λ (tasks/sec) 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 m e a n r e s p o n s e t im e ( s e c o n d s ) 60 80 100 120 140 160 180 VM=50, K=150, µ=0.016 (tasks/sec), η v =η p =0.5/h, ξ v =0.001/h ξ p =0.001-Analytical ξ p =0.001-Simulation ξ p =0.01-Analytical ξ p =0.01-Simulation ξ p =0.1-Analytical ξ p =0.1-Simulation Figure 6: QoS results of the proposed model with physical machine failure rates: (a) Mean queue length; (b) Blocking probability; (c) Mean response time to the Fig. 5, the mean queue length, the blocking probability and the mean response time results are presented in Fig. keywords: machine; mean; model; performance; resource; system; tasks cache: ijccc-3676.pdf plain text: ijccc-3676.txt item: #738 of 981 id: ijccc-3690 author: Bolos, Marcel Ioan; Bogdan, Victoria; Bradea, Ioana Alexandra; Sabau Popa, Claudia Diana; Popa, Dorina Nicoleta title: Stochastic Fuzzy Algorithms for Impairment of Assets Management date: 2020-02-03 words: 9972 flesch: 61 summary: The positive value of impairment indicates that the company is sheltered from asset impairment risk and its financial performance will not be affected in short and medium term by asset impairment. They demonstrated that firms which do not record asset impairment when evidence suggests the probable need to do so, will show an important reduction in conditional conservatism. keywords: accounting; asset; ã∆cfa; cash; cash flows; company; flows; impairment; numbers; stochastic; value cache: ijccc-3690.pdf plain text: ijccc-3690.txt item: #739 of 981 id: ijccc-3704 author: Zhong, Minjuan; Tan, Liang; Qu, Xilong title: Identification of Opinion Spammers using Reviewer Reputation and Clustering Analysis date: 2020-02-02 words: 6701 flesch: 48 summary: 1 Introduction The rapid development of online shopping has led to a large number of user reviews for various products or services. In spamming activities of product reviews, each member of spammer group will publish multiple fake reviews in a short period of time once they received the designed task by the manufactures or the store owners. keywords: detection; features; model; opinion; product; reputation; review; reviewer; similarity; spammers; target; user cache: ijccc-3704.pdf plain text: ijccc-3704.txt item: #740 of 981 id: ijccc-3705 author: Jiang, Jianwu; Chen, Zhi; Wang, Yihuai; Peng, Tao; Zhu, Shilang; Shi, Lianmin title: Parameter Estimation for PMSM based on a Back Propagation Neural Network Optimized by Chaotic Artificial Fish Swarm Algorithm date: 2020-02-02 words: 8024 flesch: 49 summary: 4 Process analysis of PMSM motor parameter identification net- work algorithm based on CAFSPNNA 4.1 Network optimization algorithm for PMSM motor parameter identifica- tion based on CAFSBPNNA CAFSBPNNA includes two parts for PMSM motor parameter identification. Table 4: PMSM motor parameter identification error Working condition Algorithm Rs/Ω Ld/mH Lq/mH ψf/Wb Error T = 2N ·m ω = 2000r/min PSO RSL CAFBPNNA 0.554/19.3% 0.741/25.8% 0.132/4.6% 1.185/13.9% 1.343/15.8% 0.365/4.3% 1.113/13.1% 1.181/13.9% 0.467/5.5% 0.009/5.2% 0.078/44.8% 0.007/4.5% 12.8% 25.1% 4.7% T = 2N ·m ω = 2500r/min PSO RSL CAFBPNNA 0.477/16.6% keywords: algorithm; bpnn; convergence; error; fish; identification; layer; model; motor; network; neurons; number; optimization; parameter; pmsm; speed; swarm; system cache: ijccc-3705.pdf plain text: ijccc-3705.txt item: #741 of 981 id: ijccc-3712 author: Sun, Shuai; Hu, Bin; Yu, Zhou; Song, Xiaona title: A Stochastic Max Pooling Strategy for Convolutional Neural Network Trained by Noisy Samples date: 2020-02-03 words: 3887 flesch: 56 summary: There are three commonly used pooling methods, including average pooling, max pooling and stochastic pooling [15]. This strategy is different from average https://doi.org/10.15837/ijccc.2020.1.3712 4 Figure 1: A pooling example pooling, max pooling and stochastic pooling. keywords: deep; field; max; max pooling; network; pooling; stochastic; value cache: ijccc-3712.pdf plain text: ijccc-3712.txt item: #742 of 981 id: ijccc-3735 author: Gao, Xiaozhuan; Deng, Yong title: The Pseudo-Pascal Triangle of Maximum Deng Entropy date: 2020-02-03 words: 4271 flesch: 59 summary: The Pseudo-Pascal Triangle of Maximum Deng Entropy 3.1 The Example of Maximum Deng Entropy The specific BPA of having maximum Deng entropy was showed as follows. = 1 5 ,m(A,B) = 3 5 HM−D = 2.3219 From the above, the BPA of having maximum Deng entropy has the phenomenon that m(A) and m(B) has the same distribution. keywords: bpa; deng; deng entropy; entropy; maximum; pascal; theory; triangle cache: ijccc-3735.pdf plain text: ijccc-3735.txt item: #743 of 981 id: ijccc-3739 author: Zhao, Fang title: A Neural Network Classification Model Based on Covering and Immune Clustering Algorithm date: 2020-02-03 words: 4414 flesch: 55 summary: Thus, neural network classification model can be defined by the following elements: (1) Feature vector of sample point A(a1,a2, · · · ,an). 4.1 Model architecture The architecture of classification neural network model is shown in Fig.4. keywords: algorithm; classification; covering; layer; model; network; neural; neurons; number cache: ijccc-3739.pdf plain text: ijccc-3739.txt item: #744 of 981 id: ijccc-3743 author: Pan, Lipeng; Deng, Yong title: Probability Transform Based on the Ordered Weighted Averaging and Entropy Difference date: 2020-06-08 words: 5257 flesch: 63 summary: Jiang proposed a probability transformation method of mass functions based on inter- val information, which used intermediate information of belief function and plausibility function to transform[22]. Keywords: Dempster-Shafer evidence theory, probability transform, mass function, ordered weighted averaging, entropy difference. keywords: deng; entropy; evidence; function; method; probability; systems cache: ijccc-3743.pdf plain text: ijccc-3743.txt item: #745 of 981 id: ijccc-3744 author: Luo, Cong; Fan, Xiangbo; Yan, Ying; Jin, Han; Wang, Xuan title: Optimization of Three-dimensional Face Recognition Algorithms in Financial Identity Authentication date: 2022-03-21 words: 6043 flesch: 41 summary: Internet finance, e-commerce and other asset-related areas have begun to try to use face recognition technology as a means of authentication, so people’s security needs for face recognition systems are also increasing. Because of these unalterable defects in the two-dimensional face recognition system, researchers have begun https://doi.org/10.15837/ijccc.2022.3.3744 4 to develop methods to improve the performance of face recognition system or turn directly to other face recognition methods. keywords: algorithm; authentication; data; face; face recognition; feature; identity; image; information; method; network; neural; recognition; security; system cache: ijccc-3744.pdf plain text: ijccc-3744.txt item: #746 of 981 id: ijccc-3753 author: Li, Yang; Xu, Zeshui; Wang, Xinxin; Filip, Florin Gheorghe title: Studies in Informatics and Control: A Bibliometric Analysis from 2008 to 2019 date: 2020-02-02 words: 8664 flesch: 56 summary: In the following, three types of co-citation analysis: references co-citation analysis, journals co-citation analysis, and authors co-citation analysis, are made, and all the network maps are established using VoS viewer. SIC has the strongest co-citation relationship with other journals as the only one reference with the strongest citation bursts was published in SIC in 2012 by Cabrera, G.G. (3) International cooperation relationship is not strong enough in this journal. keywords: analysis; authors; citation; control; countries; documents; journal; publications; research; sic cache: ijccc-3753.pdf plain text: ijccc-3753.txt item: #747 of 981 id: ijccc-3762 author: Cao, Guo title: A Multi-criteria Picture Fuzzy Decision-making Model for Green Supplier Selection based on Fractional Programming date: 2020-02-03 words: 6690 flesch: 71 summary: Consequently, it is beneficial to combine the advantages of picture fuzzy sets in representing information and the superiority of fractional programming. Later, other extensions of the above distance measures were developed for picture fuzzy sets, such as the normalized picture Hamming distance, the normalized picture Euclidean distance and the generalized picture distance measure. keywords: criteria; decision; distance; green; making; picture; sets; supplier; νa(xj cache: ijccc-3762.pdf plain text: ijccc-3762.txt item: #748 of 981 id: ijccc-3764 author: Chen, Songmin; Lv, Xiyan; Gou, Juanqiong title: Personalized Recommendation Model: An Online Comment Sentiment Based Analysis date: 2020-02-03 words: 6522 flesch: 41 summary: Get the user ID, user review, item ID, and item score from the user’s online reviews. In order to verify the actual effect of sentiment analysis on personalized recommendations, this paper adopts the Scrapy method based on the Python programming language to analyze data on the Chinese movie social networking site Douban, which mainly includes user ID, Douban ID, user review and user score. keywords: analysis; degree; emotion; feature; film; method; paper; polarity; recommendation; reviews; score; sentiment; sentiment words; similarity; user; words cache: ijccc-3764.pdf plain text: ijccc-3764.txt item: #749 of 981 id: ijccc-377 author: Brodic, Darko; Maluckov, Čedomir A.; Peng, Liangrui title: Estimation of the Text Skew in the Old Printed Documents date: 2013-09-17 words: 2998 flesch: 58 summary: Estimation of the Text Skew in the Old Printed Documents 675 (a) (b) Figure 1: Document text image: (a) Before binarization, (b) After binarization 2.3 Joining text objects with oriented binary morphology Currently, some of filled convex hulls are joined. (a) (b) (c) (d) Figure 2: Document text image: (a) CC extraction (b) CCISR extraction, (c) Extended CC extraction (b) The longest CC extraction In order to correctly estimate the text skew, connected components should be extended. keywords: algorithm; document; image; method; skew; text cache: ijccc-377.pdf plain text: ijccc-377.txt item: #750 of 981 id: ijccc-3779 author: Wu, Sen; Li, Huifei; Liu, Lu title: A Venture Capital Recommendation Algorithm based on Heterogeneous Information Network date: 2020-02-03 words: 4646 flesch: 50 summary: Venture capital nodes are VC firms, startups and the attributes of startups in heterogeneous venture capital network. Figure 1: An example of heterogeneous venture capital network Fig.1 is an example of heterogeneous venture capital network. keywords: algorithm; capital; information; investment; network; recommendation; venture; venture capital cache: ijccc-3779.pdf plain text: ijccc-3779.txt item: #751 of 981 id: ijccc-3780 author: Zou, Ping; Hou, Baocun; Lei, Jiang; Zhang, Zhenji title: Bearing Fault Diagnosis Method Based on EEMD and LSTM date: 2020-02-03 words: 5889 flesch: 52 summary: In this paper, a new EEMD-LSTM bearing fault diagnosis method is proposed, which combines the signal preprocessing technology with the EEMD method that can get clear fault feature signals, and LSTM technology to extract fault features automatically that improves the efficiency of fault feature extraction. The paper introduces EEMD and LSTM methods in detail in the second and third chapter respectively, and puts forward the fault diagnosis process based on EEMD-LSTM in the fourth chapter, and in the fifth chapter Experimental verification was carried out. keywords: bearing; data; diagnosis; eemd; fault; fault diagnosis; imf; information; learning; lstm; method; network; neural; signal; time cache: ijccc-3780.pdf plain text: ijccc-3780.txt item: #752 of 981 id: ijccc-3783 author: Zhang, Hao; Feng, Huixia; Cui, Yan; Wang, Yuting title: A Fuzzy Bayesian Network Model for Quality Control in O2O e-Commerce date: 2020-02-03 words: 7584 flesch: 47 summary: However, in order to carry out effective quality control of fresh foods, it is necessary to analyse the influence of each factor reasonably, find out the key factors and provide the entry point of quality control so as to reduce the risk of deterioration of fresh food. The storage condition and cold chain structure are important factors influencing fresh food quality The smart freezing technology enables real-time monitoring of quality during the freezing process and helps improve the product quality and freezing efficiency keywords: bayesian; chain; control; delivery; factors; food; food quality; fresh; model; network; node; o2o; probability; process; quality; safety; supply cache: ijccc-3783.pdf plain text: ijccc-3783.txt item: #753 of 981 id: ijccc-380 author: Hayajneh, Mohammad Suleiman; Abdallah, Chaouki title: Game Theoretic Distributed Power Control Algorithms for Uplink Wireless Data in Flat Fading Channels date: 2015-06-23 words: 9273 flesch: 66 summary: As for the effect of slow fading channels on the outcomes of NPGP, equilibrium utilities and equilibrium powers, our simulations showed that Pareto improvement (dominance) over NPG 534 M. Hayajneh, C. Abdallah was not possible under the three small scale models. 10 2 10 3 10 −6 10 −5 10 −4 10 −3 10 −2 10 −1 10 0 d (meters) E q u ili b ri u m P o w e rs ( W a tt s) 10 2 10 3 10 3 10 4 10 5 10 6 10 7 10 8 10 9 10 10 d (meters) E q u ili b ri u m U til iti e s (b its /J o u l) Deterministic Rayleigh Rician Nakagami Figure 1: Equilibrium powers and equilibrium utilities of NPG for Rician fast flat fading channel gain (+), Rayleigh fast flat fading channel gain (o), Nakagami fast flat fading (△) and determin- istic channel gain (*) versus the distance of a user from the BS in meters with W/R = 103. keywords: channel; equilibrium; fading; function; point; power cache: ijccc-380.pdf plain text: ijccc-380.txt item: #754 of 981 id: ijccc-3811 author: Luo, Jia; Yu, Dongwen; Dai, Zong title: A Latent Dirichlet Allocation and Fuzzy Clustering Based Machine Learning Model for Text Thesaurus date: 2020-03-28 words: 6265 flesch: 53 summary: The impact of these words on the analysis work can be ignored, but if these words are not used as text feature words, Bringing large errors to text classification results, these words are often referred to as stop words in this article. New words can cause segmentation errors. keywords: algorithm; clustering; data; dictionary; discovery; information; keywords; lda; learning; machine; method; model; opinion; segmentation; text; topic; word cache: ijccc-3811.pdf plain text: ijccc-3811.txt item: #755 of 981 id: ijccc-3812 author: Stanojevic, Bogdana; Dzitac, Simona; Dzitac, Ioan title: Crisp-linear-and Models in Fuzzy Multiple Objective Linear Fractional Programming date: 2020-02-03 words: 4991 flesch: 58 summary: Whenever some parameters are fuzzy quantities, inequalities are fuzzy or there are fuzzy goals formulated on the objective functions of a programming problem the problem is called fuzzy programming problem and usually ”m̃ax“ is used instead of ”max“ to denote the optimization in a fuzzy sense. This model loses its linearity when fractional objective functions are involved. keywords: fractional; linear; membership; objective cache: ijccc-3812.pdf plain text: ijccc-3812.txt item: #756 of 981 id: ijccc-3821 author: TAŞKIN, Deniz; YAZAR, Selçuk title: A Long-range Context-aware Platform Design For Rural Monitoring With IoT In Precision Agriculture date: 2020-03-28 words: 4806 flesch: 56 summary: In this study, especially we want to usage area of LoRa applications using in precision agriculture and agricultural engineering practices. In the study we compared, there are communication values obtained by burying LoRa devices in the soil. keywords: applications; communication; data; devices; field; gateway; iot; lora; network; sacu; sensor; soil; study; temperature cache: ijccc-3821.pdf plain text: ijccc-3821.txt item: #757 of 981 id: ijccc-3825 author: Ahmad, Ashraf; Hababeh, Mohammed; Abu-Hantash, Alaa; AbuHour, Yousef; Musleh, Husam title: Reduce Effect of Dependent Malicious Sensor Nodes in WSNs using Pairs Counting and Fake Packets date: 2020-08-30 words: 7887 flesch: 62 summary: For instance, attacks aimed to affect the calculations of the fusion center, in which malicious sensor nodes send misleading packets to sabotage the WSN global decision. Thus, malicious sensor nodes can easily attack WSNs. keywords: algorithm; center; decision; detection; fsp; fusion; fusion center; nodes; number; sensor; sensor nodes cache: ijccc-3825.pdf plain text: ijccc-3825.txt item: #758 of 981 id: ijccc-3836 author: Chang, Dan; Fan, Rui; Sun, Zitong title: A Deep Belief Network and Case Reasoning Based Decision Model for Emergency Rescue date: 2020-04-21 words: 7038 flesch: 44 summary: 3 Decision model of earthquake emergency rescue based on DBN- CBR 3.1 Analysis of earthquake emergency rescue decision 3.1.1 Analysis of the constituent elements of earthquake emergency rescue decision By analyzing the history of earthquakes, the main causes of human fatalities due to earthquakes can be classified into three categories: building collapse, secondary disasters, and social environment effects. The basic type of earthquake emergency rescue case data information is shown in Table 4. Table 4: Types of earthquake case data information Type Specific Unit symbol Numerical data numerical data are generally divided into discrete and continuous data discrete data: The number of values is limited, intermittent, and discon- tinuous continuous data: Data that takes values within a full numeric inter- val, or may be indeterminate values indeterminate values intensity: magni- tude 8 Descriptive data non-numerical data is generally de- scriptive and is usually described when non-numerical data records are recorded collapse: loose, completely collapsed The essence of discrete non-discrete data is to divide the attribute value intervals of non-discrete data into several regions, so that they are in the same region, or to convert the data within the description range into discrete amounts of the same property values, thus updating the original data to discrete values. keywords: case; data; dbn; decision; earthquake; earthquake emergency; emergency; emergency rescue; information; learning; making; model; process; reasoning; rescue; rescue decision cache: ijccc-3836.pdf plain text: ijccc-3836.txt item: #759 of 981 id: ijccc-3842 author: Kontogiannis, Sotirios; Kokkonis, George title: Proposed Fuzzy Real-Time HaPticS Protocol Carrying Haptic Data and Multisensory Streams date: 2020-06-08 words: 9767 flesch: 53 summary: This value is send back to the sender using appropriate ACK FRTPS frame field (see Figure 1, D′i receiver inter-packet variance field of FRTPS protocol ACK header). FRTPS protocol does not include a native re-transmission mechanism nor does it uses RTO intervals for timeout or frame RTR purposes. keywords: congestion; control; controller; data; figure; flow; frame; frtps; level; low; metric; network; packet; pad; protocol; quantization; rate; receiver; sender; srl; tcp; time; values cache: ijccc-3842.pdf plain text: ijccc-3842.txt item: #760 of 981 id: ijccc-3844 author: Precup, Radu-Emil; Voisan, Emil-Ioan; Petriu, Emil M.; Tomescu, Marius L.; David, Radu-Codrut; Szedlak-Stinean, Alexandra-Iulia; Roman, Raul-Cristian title: Grey Wolf Optimizer-Based Approaches to Path Planning and Fuzzy Logic-based Tracking Control for Mobile Robots date: 2020-04-21 words: 8083 flesch: 56 summary: Grey wolf optimizer algorithm-based tuning of fuzzy control systems with reduced parametric sensitivity, IEEE Transactions on Industrial Electronics, 64 (1), 527–534, 2017. An improved ant colony algorithm for robot path planning, Soft Computing, 21(9), 5829–5839, 2017. keywords: agent; algorithm; approach; control; controller; figure; gwo; mobile; optimization; papl; path; planning; prk; robot; systems; tracking cache: ijccc-3844.pdf plain text: ijccc-3844.txt item: #761 of 981 id: ijccc-3851 author: Morente-Molinera, Juan Antonio; Cabrerizo, Francisco Javier; Alonso, Sergio; Martí­nez, Marí­a íngeles; Herrera-Viedma, Enrique title: Using Multi-granular Fuzzy Linguistic Modelling Methods to Represent Social Networks Related Information in an Organized Way date: 2020-03-28 words: 3479 flesch: 55 summary: Keywords: Multi-granular fuzzy linguistic modelling methods, fuzzy ontologies, sentiment analysis. α = β (3) 3 Representing information in fuzzy ontologies using sentiment anal- ysis and multi-granular fuzzy linguistic modelling methods In this section, the designed method is described in detail. keywords: information; label; set; value cache: ijccc-3851.pdf plain text: ijccc-3851.txt item: #762 of 981 id: ijccc-3854 author: Yang, Zhihui; Song, Yang title: Matrix Game with Payoffs Represented by Triangular Dual Hesitant Fuzzy Numbers date: 2020-04-21 words: 5819 flesch: 67 summary: Fuzzy mathematical programming and fuzzy matrix games, Germany, Berlin, Springer-Verlag. Fuzzy matrix games via a fuzzy relation approach, Fuzzy Optimization and DecisionMaking, 6(4), 299-314, 2007. https://doi.org/10.15837/ijccc.2020.3.3854 11 [28] Wang, J. F.; Fei, Z. C.; Chang, Q.; Fu, Y.; Li, S. Q. (2019). keywords: game; i=1; matrix cache: ijccc-3854.pdf plain text: ijccc-3854.txt item: #763 of 981 id: ijccc-3856 author: Severin, Ionut Cristian; Dobrea, Dan Marius; Dobrea, Monica Claudia title: Head Gesture Recognition using a 6DOF Inertial IMU date: 2020-04-21 words: 7400 flesch: 52 summary: Also, the main focus is to obtain a new approach of head movement classification with help from a cheaper IMU sensor with the possibility to integrate into a more complex system such as a robotic wheelchair system or other HCI complex systems. As a first conclusion, our idea can be very competitive if we take into consideration the fact that for the moment, only a few similar solutions exist which make head movement classification using a web camera keywords: classification; data; database; filter; head; imu; movement; paper; position; sensor; solution; system cache: ijccc-3856.pdf plain text: ijccc-3856.txt item: #764 of 981 id: ijccc-3858 author: Porcel, Carlos; Herce-Zelaya, Julio; Bernabé-Moreno, Juan; Tejeda-Lorente, ílvaro; Herrera-Viedma, Enrique title: Trust Based Fuzzy Linguistic Recommender Systems as Reinforcement for Personalized Education in the Field of Oral Surgery and Implantology date: 2020-04-21 words: 4489 flesch: 50 summary: https://doi.org/10.15837/ijccc.2020.3.3858 8 5 Concluding remarks In this paper, we present a trust based fuzzy linguistic recommender system, to provide personalized activities to students in order to reinforce their individualized education. But trust networks are usually very large and therefore a lot of users don’t even know the vast majority of other users. keywords: information; linguistic; recommender; results; students; system; trust; users cache: ijccc-3858.pdf plain text: ijccc-3858.txt item: #765 of 981 id: ijccc-3859 author: Popescu, Liviu; Militaru, Nicolae Daniel; Mituca, Ovidiu Mircea title: Optimal Control Applications in the Study of Production Management date: 2020-03-28 words: 4539 flesch: 67 summary: Considering x0 and x1 two points of M (two states of the system), then the optimal control problem consists of finding the optimal trajectories of control system that connect x0 and x1 and minimizing the cost min ∫ T 0 L(x(t),u(t))dt, x(0) = x0, x(T) In the second section we present the known results about Lie geometric methods in optimal control theory for control affine systems, including the controlla- bility problems in the case of holonomic distributions. keywords: control; distribution; lie; production; space; system cache: ijccc-3859.pdf plain text: ijccc-3859.txt item: #766 of 981 id: ijccc-3862 author: Ardelean, Andrei-Timotei; Sasu, Lucian Mircea title: Pose Manipulation with Identity Preservation date: 2020-03-28 words: 4015 flesch: 55 summary: To this end, we introduce Character Adaptive Identity Normalization GAN (CainGAN) which uses spatial characteristic features extracted by an embedder and combined across source images. New approaches for face image generation have been brought by recent advances in generative adversarial networks (GANs) keywords: caingan; conference; face; identity; images; model; pose; source; training cache: ijccc-3862.pdf plain text: ijccc-3862.txt item: #767 of 981 id: ijccc-3864 author: Daranda, Andrius; Dzemyda, Gintautas title: Navigation Decision Support: Discover of Vessel Traffic Anomaly According to the Historic Marine Data date: 2020-04-21 words: 3456 flesch: 54 summary: The enormous amount of marine traffic data creates significant challenges to detect anomalies for situation awareness. In this paper, we present marine traffic anomaly detection by the combination of the DBSCAN clustering algorithm (Density- Based Spatial Clustering of Applications with Noise) with k-nearest neighbors analysis among the clusters and particular vessels. keywords: anomaly; data; dbscan; detection; flow; marine; points; traffic; vessel cache: ijccc-3864.pdf plain text: ijccc-3864.txt item: #768 of 981 id: ijccc-3867 author: Visan, Maria M; Ciurea, Cristian title: Smart City: Concepts and two Relevant Components date: 2020-03-28 words: 4491 flesch: 35 summary: Keywords: Big Data, cloud, collaborative work, cultural heritage, mobile, Smart City, virtual exhibitions 1 Introduction According to the United Nations, 55% of people worldwide live today in cities, and the increase is estimated to 68 % until 2050. The following chapters develop the SC concept by two particular components: a) spatial urban territorial planning and b) enhancing the access to cultural heritage via virtual exhibitions. keywords: cities; city; community; cultural; data; development; heritage; information; planning; public cache: ijccc-3867.pdf plain text: ijccc-3867.txt item: #769 of 981 id: ijccc-3868 author: Andonie, Razvan; Florea, Adrian-Catalin title: Weighted Random Search for CNN Hyperparameter Optimization date: 2020-03-28 words: 5968 flesch: 50 summary: 3 Software for Hyperparameter Optimization Currently, there are many software packages which include hyperparameter optimization methods. Keywords: Hyperparameter optimization, supervised learning, random search, convolutional neural networks. keywords: algorithm; cnn; hyperparameter; hyperparameter optimization; learning; methods; model; number; optimization; values; wrs cache: ijccc-3868.pdf plain text: ijccc-3868.txt item: #770 of 981 id: ijccc-3874 author: Nasrollahi, Mahdi; Ramezani, Javaneh title: A Model to Evaluate the Organizational Readiness for Big Data Adoption date: 2020-04-21 words: 4281 flesch: 54 summary: In the present paper, we propose a model to evaluate the organizational readi- ness for Big Data adoption. The finding enables decision-makers to appropriately choose the more important criteria and drop unimportant crite- ria in strengthening organizational readiness for Big Data adoption. keywords: adoption; analysis; criteria; criterion; data; https://doi.org/10.15837/ijccc.2020.3.3874; model; readiness; table cache: ijccc-3874.pdf plain text: ijccc-3874.txt item: #771 of 981 id: ijccc-3878 author: Oddershede, Astrid M.; Macuada, Claudio J.; Quezada, Luis E.; Montt, Cecilia A. title: Automation Factors Influencing the Operation of IoT in Health Institutions: A Decision Support Methodology date: 2020-06-08 words: 4193 flesch: 44 summary: Taking into account that health service users wishes to have different ICT and IoT applications to support operations and the health activities services and due to limited resources the health institution’s ICT system applications do not always meet the user’s requirements (quality level, performance, cost and others)there will be the omission of some with preference over others. The aim of this paper focus on the development of a decision support model to define key areas where the inclusion of IoT would sustain the efficiency in health care service. keywords: data; decision; health; ieee; information; international; iot; quality; results; service; support; system cache: ijccc-3878.pdf plain text: ijccc-3878.txt item: #772 of 981 id: ijccc-3879 author: Montt, Cecilia; Castro, Juan Carlos; Valencia, Alejandra; Oddershede, Astrid; Quezada, Luis title: Artificial Neural Network and a Nonlinear Regression Model for Predicting Electrical Pole Crash date: 2020-08-30 words: 4490 flesch: 47 summary: Analyzing road design risk fac- tors for run-off-road crashes in the Netherlands with crash prediction models, Journal of Safety Research, 49, 121-127, 2014. https://doi.org/10.15837/ijccc.2020.5.3879 9 [16] Rojas, M. (2015). Traffic accident prediction in the metropolitan region of Chile based on neural networks, Proceedings of the XVII Chilean Congress of Trans- portation Enginee, Concepción, Chile, 2015. keywords: ann; artificial; crashes; model; network; neural; number; prediction; streets; variables cache: ijccc-3879.pdf plain text: ijccc-3879.txt item: #773 of 981 id: ijccc-3885 author: Özbilge, Emre; Kırsal, Yönal; Çaglar, Ersin title: Modelling and Analysis of IoT Technology Using Neural Networks In Agriculture Environment date: 2020-04-21 words: 5243 flesch: 53 summary: INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL Online ISSN 1841-9844, ISSN-L 1841-9836, Volume: 15, Issue: 3, Month: June, Year: 2020 Article Number: 3885, https://doi.org/10.15837/ijccc.2020.3.3885 CCC Publications Modelling and Analysis of IoT Technology Using Neural Networks In Agriculture Environment Emre Özbilge, Yönal Kırsal, Ersin Çağlar Emre Özbilge* Department of Computer Engineering European University of Lefke, North Cyprus TR-10 Mersin, Turkey *Corresponding author: eozbilge@eul.edu.tr Yönal Kırsal Department of Electronics and Communication European University of Lefke, North Cyprus TR-10 Mersin, Turkey ykirsal@eul.edu.tr Ersin Çağlar Department of Management Information Systems European University of Lefke, North Cyprus TR-10 Mersin, Turkey ecaglar@eul.edu.tr Abstract The rapid development of internet, cloud computing and sensor networks lead to develop and deploy the Internet of Things (IoT) which is a hot topic for the researchers. However, none of the models above have not considered neural network models to predict desired output considering the different weather conditions. keywords: agriculture; data; farm; figure; future; iot; model; network; neural; sensor; tdrbf; time; weather cache: ijccc-3885.pdf plain text: ijccc-3885.txt item: #774 of 981 id: ijccc-3888 author: Su, Zhan; Xu, Zeshui; Zhao, Hua; Liu, Shousheng title: Hesitant Fuzzy DeGroot Opinion Dynamics Model and Its Application in Multi-attribute Decision Making date: 2020-06-08 words: 10491 flesch: 64 summary: 4 Decision making method based on the HF-DeGroot opinion dy- namics model In this section we will discuss the following questions in combination with the characteristics of the hesitant fuzzy opinions: – How to explore the relationships between the hesitant fuzzy opinions? – When will a group of hesitant fuzzy opinions reach consensus? 4.1 The structure of the transition matrix In the research of DeGroot opinion dynamics model, the stochastic matrix P which represents the transition weights between opinions plays an important role. In order to simulate the transformation of hesitant fuzzy opinions, we introduced the multiplications for real matrix and hesitant fuzzy matrix. keywords: algorithm; decision; degree; degroot; dynamics; making; matrix; model; opinion; similarity; step; transition cache: ijccc-3888.pdf plain text: ijccc-3888.txt item: #775 of 981 id: ijccc-3891 author: Simo, Attila; Dzitac, Simona; Frigura-Iliasa, Flaviu Mihai; Musuroi, Sorin; Andea, Petru; Meianu, Dragoș title: Technical Solution for a Real-Time Air Quality Monitoring System date: 2020-06-08 words: 2733 flesch: 51 summary: The deployment of a thick, reliable wide area network of air quality monitoring system would im- prove the ability to identify sources of pollution, understand person-al exposure, complement existing monitoring networks and raise air quality awareness among the population. Keywords: wireless sensors network, air quality monitoring, LoRaWAN. keywords: air; data; devices; figure; monitoring; quality; sensors; system cache: ijccc-3891.pdf plain text: ijccc-3891.txt item: #776 of 981 id: ijccc-3894 author: Wang, Hongxin; Jia, Lijing; Zhuang, Heng; Li, Xueyan; Zhao, Yuzhuo; Pan, Shuxiao; Wu, Kainan; Li, Jing; Li, Tanshi title: A Rough Set and Cellular Genetic Fusion Algorithm for Acute Critical Disease Prediction date: 2020-11-20 words: 8162 flesch: 47 summary: In this paper, we propose an intelligent screening algorithm that combines a genetic algorithm, cellular automata, and rough set theory. The major advantages of rough set theory are that it can efficiently discover implied knowledge by analysing imperfect https://doi.org/10.15837/ijccc.2020.6.3894 3 (uncertain and vague) keywords: algorithm; attribute; cellular; cga; condition; data; decision; disease; fitness; indicators; knowledge; medical; patients; prediction; set; theory cache: ijccc-3894.pdf plain text: ijccc-3894.txt item: #777 of 981 id: ijccc-3897 author: Stanca, Liana; Lacurezeanu, Ramona -; Tiron-Tudor, Adriana; Bresfelean, Vasile Paul; Pandelica, Ionut title: Determining IT Student Profile Using Data Mining and Social Network Analysis date: 2020-07-06 words: 8888 flesch: 47 summary: A key to the successful development of such a strategy rests to synchronize jobs descriptions with profiles and behavior of IT students. For the latter, it will provide the IT companies with information that would enable them to understand the profile of IT students and will create a realistic description of the job advertised in the digital labor market, in order to facilitate the superposition of the offer and the request on the supposed market. keywords: analysis; data; education; environment; information; job; journal; labor; learning; market; network; personality; profile; research; results; skills; students; study; teaching; university cache: ijccc-3897.pdf plain text: ijccc-3897.txt item: #778 of 981 id: ijccc-3898 author: JERBI, Houssem Mahmoud; HAMIDI, Faiçal; BEN AOUN, Sondess; OLTEANU, Severus Constantin; POPESCU, Dumitru title: Lyapunov-based Methods for Maximizing the Domain of Attraction date: 2020-08-30 words: 4809 flesch: 58 summary: Keywords: Lyapunov function, nonlinear model, asymptotic stability, equilibrium point, ge- netic algorithm, threshold accepted algorithm, LMI. In general, there is no generic techniques for determining Lyapunov functions as a group of non- linear models [6, 8] are established. keywords: attraction; control; function; lyapunov; nonlinear; stability; systems cache: ijccc-3898.pdf plain text: ijccc-3898.txt item: #779 of 981 id: ijccc-39 author: Farokhi Moghadam, Hassan; Vasegh, Nastaran title: Robust PID Stabilization of Linear Neutral Time-Delay Systems date: 2014-02-28 words: 2570 flesch: 67 summary: A graphical approach which will obtain the set of robust stabilizing PID controllers is presented. Step response of the closed loop system for the entire unknown time-delay range is also plotted in the left side of Figure 4 to show the stability and good performance of robust system. keywords: pid; stability; system cache: ijccc-39.pdf plain text: ijccc-39.txt item: #780 of 981 id: ijccc-3900 author: Palominos, Fredi Edgardo; Córdova, Felisa; Durí¡n, Claudia; Nuñez, Bryan title: A Simpler and Semantic Multidimensional Database Query Language to Facilitate Access to Information in Decision-making date: 2020-06-08 words: 4545 flesch: 39 summary: Multidimensional data model for the anal- ysis of information of productive, scientific or service processes, In 7th International Conference on Computers Communications and Control, IEEE, 17–22, 2018. Those who have ventured into the definition of algebras that allow multidimensional data to be operated more independently of languages, have proposed sophis- ticated conceptual frameworks [12] keywords: data; dimensions; language; model; olap; queries; query; variable cache: ijccc-3900.pdf plain text: ijccc-3900.txt item: #781 of 981 id: ijccc-3901 author: Wang, Yongsheng; Gao, Jing; Xu, Zhiwei; Luo, Jidong; Li, Leixiao title: A Prediction Model for Ultra-Short-Term Output Power of Wind Farms Based on Deep Learning date: 2020-06-08 words: 9177 flesch: 59 summary: Analysis and improvement of ultra- short-term prediction results of wind farm output power, Power System Automation, 35(15), 30–33, 2011. Wind power prediction based on projection pursuit principal component analysis and coupling model, Acta Energiae Solaris Sinica, 39(2), 315–323, 2018. keywords: data; dataset; farm; features; input; lstm; model; output power; power data; power prediction; prediction; time; tsw; values; wind; wind power cache: ijccc-3901.pdf plain text: ijccc-3901.txt item: #782 of 981 id: ijccc-3906 author: Tian, Yonghong; Wu, Qi; Zhang, Yue title: A Convolutional Long Short-Term Memory Neural Network Based Prediction Model date: 2020-08-30 words: 5512 flesch: 55 summary: The eigenvalues of the supply and demand prediction of online car hailing can be expressed as: Gn = [ G1,G2, · · · ,GTn ] ,n = 1, 2, · · · ,N (1) where, Gt = [ Gt1,G t 2, · · · ,G t m ]T ∈ Rm×1 is the eigenvalue at time t; N is the number of eigenvalues. [18] predicted online car-hailing supply and demand based on long short term memory (LSTM) with sliding window, but wasted too much time in LSTM training. keywords: car; data; demand; feature; gate; hailing; layer; lstm; model; prediction; supply; time cache: ijccc-3906.pdf plain text: ijccc-3906.txt item: #783 of 981 id: ijccc-3910 author: Petrescu, Marius; Cuc, Mădălina; Oncioiu, Ionica; Petrescu, Anca-Gabriela; Bí®lcan, Florentina-Raluca; Ivan, Lucian title: Analytical Modelling of Share Price Value Using Computational Intelligence Methods date: 2020-06-08 words: 4482 flesch: 45 summary: Keywords: neural networks, intelligent systems, share price, financial daily vector, exchange risks. First, we focus on assessment the model of price prediction for share based on neural networks and the model of volatility prediction, encapsulated in an agent-based system make up a subsystem of a decision support system. keywords: data; figure; function; input; model; network; price; training; value; weights cache: ijccc-3910.pdf plain text: ijccc-3910.txt item: #784 of 981 id: ijccc-3914 author: Lozano-Garzon, Carlos; Montoya, Germí¡n Adolfo; Donoso, Yezid title: A Green Routing Mathematical Model for IoT Networks in Critical Energy Environments date: 2020-06-08 words: 7173 flesch: 57 summary: The number of network nodes is 7, where two nodes (1 and 2) are source nodes, and the desti- nation nodes are nodes 6 and 7. doi.org/10.15837/ijccc.2020.4.3914 4 Table 1: Notations of the proposed model Sets Description N Set of network nodes. keywords: approach; consumption; destination; energy; iot; network; nodes; number; objective; source cache: ijccc-3914.pdf plain text: ijccc-3914.txt item: #785 of 981 id: ijccc-3920 author: Dragoi, Vlad-Florin; Cayrel, Pierre-Louis; Colombier, Brice; Bucerzan, Dominic; Hoara, Sorin title: Solving a Modified Syndrome Decoding Problem using Integer Programming date: 2020-08-30 words: 4405 flesch: 69 summary: A polynomial time attack against algebraic geometry code based public key cryptosystems. https://doi.org/10.15837/ijccc.2020.5.3920 2 1 Introduction In 1978, the Coset Weight Problem (CWP) and the Subspace Weight Problem (SWP), usually known by the name of Syndrome Decoding Problem (SDP), have been proven to be NP-complete for random binary codes by Berlekamp, McEliece and van Tilborg keywords: codes; integer; linear; mceliece; problem; solution; springer; syndrome; vector cache: ijccc-3920.pdf plain text: ijccc-3920.txt item: #786 of 981 id: ijccc-3928 author: Yang, Xiaoying; Zhang, Wanli; Lu, Hongmei; Zhao, Liang title: V2V Routing in VANET Based on Heuristic Q-Learning date: 2020-07-06 words: 7571 flesch: 60 summary: As can be seen from Figure 11, with the increase of vehicle node speed, the delay time of the three algorithms shows an upward trend. Different from the mobile ad-hoc network (MANET), VANET has the characteristics of fast mobile speed of vehicle nodes, short link maintenance time between nodes, frequent disconnection of links leading to extremely unreliable links and complex communication scenarios, which make it difficult for the traditional routing algorithms based on MANET to be applied in the VANET network [17][14][2]. keywords: algorithm; destination node; information; learning; link; node; packet; routing; speed; time; value; vehicle cache: ijccc-3928.pdf plain text: ijccc-3928.txt item: #787 of 981 id: ijccc-3933 author: Katib, Iyad title: Exhaustive Search for Optimal Offline Spectrum Assignment in Elastic Optical Networks date: 2020-08-30 words: 3616 flesch: 64 summary: To avoid saturating the 1color coded and numbered for b/w printout https://doi.org/10.15837/ijccc.2020.5.3933 4 Table 1: Example of 4 Traffic demands after being allocated to the required Frequency Slots (FSs) Links FS1 FS2 FS3 FS4 FS5 FS6 FS7 FS8 FS9 FS10 1 1 1 0 0 0 0 0 0 0 0 2 1 1 3 3 3 3 0 0 0 0 3 2 2 2 2 0 0 0 0 0 0 4 0 0 0 0 0 0 4 4 0 0 5 2 2 2 2 0 0 4 4 0 0 6 0 0 3 3 3 3 4 4 0 0 7 0 0 3 3 3 3 4 4 0 0 Table 2: Example traffic demands permutation 1 Traffic Demand Links to pass through Number of FS required 1 1,2 2 2 3,5 4 3 2,6,7 4 4 4,5,6,7 2 Table 3: Example traffic demands permutation 2 Traffic Demand Links to pass through Number of FS required 3 The SA problem is defined as a set of traffic demands T where each traffic demand ti,j is a binary vector of the links of the traffic path pi,j and each link in the path has the same number of frequency slots F Si,j. keywords: algorithm; assignment; demands; frequency; networks; problem; spectrum; traffic cache: ijccc-3933.pdf plain text: ijccc-3933.txt item: #788 of 981 id: ijccc-3935 author: Elshrkawey, Mohamed; Al-Mahdi, Hassan title: SDA-SM: An Efficient Secure Data Aggregation Scheme using Separate MAC across Wireless Sensor Networks date: 2021-03-03 words: 8458 flesch: 61 summary: According to the proposed SDA-SM scheme, both of https://doi.org/10.15837/ijccc.2021.2.3935 9 Algorithm 3 Verification process 1: : data packet and MACs packet. Keywords: WSN, LEACH, secure data aggregation, homomorphic encryption, Message Au- thentication Code. keywords: aggregated; aggregation; cluster; data; energy; mac; nodes; packet; process; scheme; sda; sensor cache: ijccc-3935.pdf plain text: ijccc-3935.txt item: #789 of 981 id: ijccc-3975 author: MacAllister, Francisco José; Maya, Laura; Huertas, Jorge A; Lozano-Garzón, Carlos; Donoso, Yezid title: Addressing Cooperation between Mobile Operators in Telecommunication Networks via Optimization: A Lexicographic Approach and Case Study in Colombia: A lexicographic approach and case study in Colombia date: 2020-11-20 words: 7589 flesch: 42 summary: When assuming a local operation of 1 for all operators (as the designed model does), Operator 1 undergoes an 86.8% decrease in its operating costs for roaming users (i.e., (1-0.132)/1); Operator 2 experiences an absolute decrease in connection cost because it receives income for every roaming user; and operator 3 experience an increase of 395.4% in the cost of every roaming user (i.e., (1-4.954)/1). By ensuring all the above, it is possible to find the best possible service under a cooperative scenario, guaranteeing minimum-cost operation for Telcos operators. keywords: antenna; case; connections; cooperation; cost; infrastructure; lexicographic; model; operator; phase; scenario; service; table cache: ijccc-3975.pdf plain text: ijccc-3975.txt item: #790 of 981 id: ijccc-3977 author: Narayanan, Lakshmi Kanthan; Sankaranarayanan, Suresh; J P C Rodrigues, Joel; Kozlov, Sergei title: Water Demand Forecasting using Deep Learning in IoT Enabled Water Distribution Network: DL-Water Demand Forecasting for Water Distribution Design date: 2020-11-20 words: 6029 flesch: 52 summary: In addition, none of these water demand predictions been integrated into IoT based water distribution system towards water distribution design. In water distribution systems, the supervisory control and automation is not in practice throughout the network. keywords: analysis; consumption; data; demand; distribution; error; figure; forecast; iot; lstm; network; prediction; system; water; water distribution cache: ijccc-3977.pdf plain text: ijccc-3977.txt item: #791 of 981 id: ijccc-3978 author: Chandrawati, T. Brenda; Ratna, Anak Agung Putri; Sari, Riri Fitri title: Path Selection using Fuzzy Weight Aggregated Sum Product Assessment date: 2020-08-30 words: 7340 flesch: 60 summary: Fuzzy AHP is a multi-criteria decision-making method that combines fuzzy methods and AHP methods. Multi-criteria assessment of cellular mobile telephone service providers using intuitionistic fuzzy WASPAS method with similarity measures, Granular Computing, 4(3), 511-529, 2019. keywords: ahp; alternative; assessment; criteria; decision; flood; fuzzy; making; method; multi; route; selection; victims; waspas; weight cache: ijccc-3978.pdf plain text: ijccc-3978.txt item: #792 of 981 id: ijccc-3983 author: Deng, Yong title: Information Volume of Mass Function date: 2020-10-26 words: 5002 flesch: 62 summary: Keywords: information volume, mass function, Shannon entropy, Deng entropy. Based on Deng entropy, the information volume of mass function is presented in this paper. keywords: deng; deng entropy; entropy; function; hi(m; information; mass; mass function; uncertainty; volume cache: ijccc-3983.pdf plain text: ijccc-3983.txt item: #793 of 981 id: ijccc-3988 author: Liu, Hongtao; Liang, Yanchun; Wang, Liupu; Feng, Xiaoyue; Guan, Renchu title: BioNMT: A Biomedical Neural Machine Translation System date: 2020-11-20 words: 5822 flesch: 45 summary: 4 Experiments This section mainly introduces translation model training and analysis of the results. Graham first making“sequence-to-sequence” to machine translation marked a formal departure of neural networks from statistical machine translation and the independent training of machine translation models are widely used [23]. keywords: attention; biomedical; bionmt; machine; machine translation; model; neural; results; semantic; sentence; system; training; translation; unk cache: ijccc-3988.pdf plain text: ijccc-3988.txt item: #794 of 981 id: ijccc-401 author: Zidi, Kamel; Mguis, Fethi; Borne, Pierre; Ghedira, Khaled title: Distributed genetic algorithm for disaster relief planning date: 2013-09-17 words: 5975 flesch: 53 summary: [25] Mguis, F. et al.; Distributed approach for vehicle routing problem in disaster case, 13th IFAC Symposium on Control in Transportation Systems, Sofia-Bulgaria, 2012. Keywords: Vehicle Routing Problem, multi-agent system, genetic algorithm, emer- gency, disaster relief. keywords: agent; algorithm; approach; disaster; emergency; management; new; planning; problem; relief; routing; supervisor; time; vehicle cache: ijccc-401.pdf plain text: ijccc-401.txt item: #795 of 981 id: ijccc-4024 author: Zhang, Yaqiong; Lin, Jiyan; Zhang, Hui title: A Data Collecting Strategy for Farmland WSNs using a Mobile Sink date: 2020-09-25 words: 6913 flesch: 61 summary: Tp < Tlimit (10) On the other hand, the mobile sink can be considered as moving at a constant speed, and the time consumption of data transmission can be ignored; if the moving speed of the sink is V. as shown in formula (11), the maximum delay limit of mobile sink data collection can be transformed into the path length limit of mobile sink. The movement modes of mobile sink nodes include fixed path, random movement, controlled mo- tion and mobile path algorithms based on swarm intelligence algorithm or mathematical programming (linear programming path strategy) keywords: cluster; data; energy; head; mobile; network; nodes; number; point; rendezvous; sensor; sink; wireless cache: ijccc-4024.pdf plain text: ijccc-4024.txt item: #796 of 981 id: ijccc-4029 author: Tariq, Usman; Ahamed Ahanger, Tariq; Nusir, Muneer; Ibrahim, Atef title: A Pervasive Computational Intelligence based Cognitive Security Co-design Framework for Hype-connected Embedded Industrial IoT date: 2021-03-03 words: 11362 flesch: 40 summary: IP level integration standardizes the tool assistance and ensures instantaneous connection appropriate for improvement of design process and enhance the effective design for IoT design system [56]. Configuration of IoT system will determine the security and safety of data central to the firms [25]. keywords: authentication; cluster; communication; context; data; design; devices; end; https://doi.org/10.15837/ijccc.2021.2.4029; iiot; information; intelligence; international; internet; iot; issue; learning; level; network; node; packet; process; security; system; things; time; vol cache: ijccc-4029.pdf plain text: ijccc-4029.txt item: #797 of 981 id: ijccc-4037 author: Bai, Junwei; Chi, Cheng title: A Social Network Image Classification Algorithm Based on Multimodal Deep Learning date: 2020-11-20 words: 4545 flesch: 53 summary: As a result, the clustering, classification, and frequent pattern mining of social network images have become research hotspots [12, 15, 18, 22, 24]. Radcliffe-Brown was the first to study social network and its structure, kicking off the social network analysis. The current research on social network images mainly focuses on image indexing, image classifica- tion, and image annotation. keywords: algorithm; association; classification; image; multimodal; network; network image; similarity; social; user cache: ijccc-4037.pdf plain text: ijccc-4037.txt item: #798 of 981 id: ijccc-4052 author: Castillo, Oriol; Bení­tez-Pérez, Héctor title: AN Improving NCS Stabilization Using a Predictive Pulsed Control Law date: 2020-11-01 words: 5153 flesch: 69 summary: Otherwise, in the same line of control strategies, there is a little known strategy called the pulsed control law which has shown to improve the performance and even recover the stability of control systems exposed to large time-delays. Previous results can be so useful in NCS where control systems are exposed to large time-delays. keywords: control; control law; law; model; sampling; system; zoh cache: ijccc-4052.pdf plain text: ijccc-4052.txt item: #799 of 981 id: ijccc-4057 author: Stanojevic, Bogdana; Stanojević, Milan title: Approximate Membership Function Shapes of Solutions to Intuitionistic Fuzzy Transportation Problems date: 2020-10-08 words: 6713 flesch: 61 summary: 3 Existing approaches to fuzzy transportation problems In a classic linear transportation problem the total cost of transferring commodities from m sources with certain supply capacities (ai)i=1,m to n destinations with certain demands (bj)j=1,n has to be minimized. i = 1,m, j = 1,n. (2-b) In fuzzy transportation problems the parameters (ai)i=1,...,m, (bj)j=1,...,n and (cij) j=1,n i=1,m become fuzzy numbers denoted by (ãi)i=1,m, ( b̃j ) keywords: = 1,m; approach; membership; problem; solution; transportation; values cache: ijccc-4057.pdf plain text: ijccc-4057.txt item: #800 of 981 id: ijccc-4087 author: Uddin, Mohammed Yousuf; Abdeljaber, Hikmat Awad; Ahanger, Tariq Ahamed title: Development of a Hybrid Algorithm for efficient Task Scheduling in Cloud Computing environment using Artificial Intelligence date: 2021-10-04 words: 5397 flesch: 50 summary: Task scheduling is the method of orga- nizing incoming tasks in some way so that the feasible resources are used properly[7]. Task scheduling is one of the major problems in cloud computing. keywords: algorithm; ant; bat; bat algorithm; cloud; colony; colony optimization; computing; optimization; scheduling; task; task scheduling cache: ijccc-4087.pdf plain text: ijccc-4087.txt item: #801 of 981 id: ijccc-4088 author: Ciobanu, Gabriel title: What does P mean in Natural Computing? date: 2020-11-17 words: 1190 flesch: 51 summary: INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL Biographical material dedicated to the 70th birthday of Gheorghe Păun Online ISSN 1841-9844, ISSN-L 1841-9836, Volume: 15, Issue: 6, Month: December, Year: 2020 Article Number: 4088, https://doi.org/10.15837/ijccc.2020.6.4088 CCC Publications 1 What does P Mean in Natural Computing? G. Ciobanu Abstract Celebrating the 70th birthday of Gheorghe Păun. Gheorghe Păun (b. 1950, December 6) Natural computing investigates computational techniques and models inspired by nature. keywords: gheorghe; journal; păun cache: ijccc-4088.pdf plain text: ijccc-4088.txt item: #802 of 981 id: ijccc-409 author: Ramamurthy, B.; Chandran, K.R. title: CBMIR: Content Based Medical Image Retrieval Using Multilevel Hybrid Approach date: 2015-04-28 words: 3572 flesch: 49 summary: Content Based Medical Image Retrieval with Texture Content Using Gray Level Co-occurrence Matrix and K-Means Clustering Algorithms: This system has used a texture based image retrieval system for medical image retrieval. Improving the ranking quality of medical image retrieval using a genetic feature selection method: In this paper, the authors proposed a method for improving the ranking quality for medical image retrieval using genetic feature selection method. keywords: feature; image; level; method; retrieval; shape; texture cache: ijccc-409.pdf plain text: ijccc-409.txt item: #803 of 981 id: ijccc-4090 author: Shi, Yong title: My Early Researches on Fuzzy Set and Fuzzy Logic date: 2020-11-30 words: 4803 flesch: 81 summary: Fuzzy normal subgroup. The first part of the paper is about an isomorphic theorem on fuzzy subgroups and fuzzy series of invariant subgroups, which could be a theoretical basis when the multiple-valued computer system will be reconsidered or redeveloped in the future. keywords: fuzzy cache: ijccc-4090.pdf plain text: ijccc-4090.txt item: #804 of 981 id: ijccc-4106 author: Deng, Jixiang; Deng, Yong title: Information Volume of Fuzzy Membership Function date: 2021-01-17 words: 5237 flesch: 57 summary: It can be derived from Definition 3.2 and Algorithm 1 that, when i = 1, the higher-order in- formation volume of fuzzy membership function H∞(µ,v) degenerates into the first-order information volume of fuzzy membership function H1(µ,v), which can be written as follows: However, how to measure the information volume of fuzzy membership function is still an open issue. keywords: entropy; information volume; log; membership function; order; order information; sets cache: ijccc-4106.pdf plain text: ijccc-4106.txt item: #805 of 981 id: ijccc-4108 author: Qin, Qiuli; Zhou, Xuehan; Jiang, Yong title: Prognosis Prediction of Stroke based on Machine Learning and Explanation Model date: 2021-03-03 words: 6363 flesch: 48 summary: This paper considers different types of machine learning models in algorithm selection. Then, we use different machine learning algorithms to build prediction models. keywords: data; dataset; feature; interpretability; learning; machine; method; model; paper; performance; prediction; results; risk; stroke; value cache: ijccc-4108.pdf plain text: ijccc-4108.txt item: #806 of 981 id: ijccc-4112 author: Chen, Wenbai; He, Chao; W.Z., Chen; Q.L., Chen; P.L., Wu title: A New Semantic-Based Tool Detection Method for Robots date: 2021-03-06 words: 4425 flesch: 54 summary: With the emergence of red, green, blue depth (RGB-D) sensors, such as Optrima and Kinect, fast and low-cost 3D data acquisition has become possible, leading to novel research results in tool function detection. The features extracted in this stage are suitable for tool detection and location. keywords: cnn; components; detection; feature; loss; mask; method; model; network; semantic; tools cache: ijccc-4112.pdf plain text: ijccc-4112.txt item: #807 of 981 id: ijccc-4115 author: Zhao, Fengda; Yang, Zhikai; Li, Xianshan; Guo, Dingding; Li, Haitao title: Extract Executable Action Sequences from Natural Language Instructions Based on DQN for Medical Service Robots date: 2021-03-03 words: 5604 flesch: 57 summary: The input dimension for action names extraction model is set to be (100 × 4) and for action arguments extraction model is set to be (400 × 3), the batch size to be 32. where s is the https://doi.org/10.15837/ijccc.2021.2.4115 7 state representation for action names extraction model F1 and ŝ is the state representation for action arguments extraction model F2. keywords: action; action names; agent; arguments; attention; extraction; language; learning; lstm; model; names; robots; tag cache: ijccc-4115.pdf plain text: ijccc-4115.txt item: #808 of 981 id: ijccc-4125 author: Nadaban, Sorin title: From Classical Logic to Fuzzy Logic and Quantum Logic: A General View date: 2021-01-14 words: 7299 flesch: 71 summary: = 1−µ as orthocomplementation, the orthogonality of the elements coinciding with their weak disjointness, and an ordering set of probability measures generated by points of the universe U according to the formula Sx(A) = µA(x), (∀)x ∈ U. L(U) will be called fuzzy quantum logic. Fuzzy quantum logics and infinite-valued Lukasiewicz logic, International Journal of Theoretical Physics, 33, 1403–1416, 1994. keywords: definition; fuzzy; lattice; logic; quantum; sets cache: ijccc-4125.pdf plain text: ijccc-4125.txt item: #809 of 981 id: ijccc-4166 author: Sreeram, Maitreya; Nof, Shimon Y. title: Human-in-the-loop: Role in Cyber Physical Agricultural Systems date: 2021-03-03 words: 7174 flesch: 44 summary: Task control is now shared, leading to lower task performance, since both agents now contribute to contentious tasks. • Limited availability: HAs are assumed to be available for task assignment only for fixed time periods (HITL Level) Task control is defined as the agent currently controlling the system: for e.g., if the robot performs and validates a scan on a certain plant, task control is said to be with the RA; if the HA provides the validation, task control is maintained by the HA. keywords: agents; collaboration; control; cost; figure; hitl; hub; human; integration; level; performance; physical; sampling; systems; task cache: ijccc-4166.pdf plain text: ijccc-4166.txt item: #810 of 981 id: ijccc-4170 author: Zhou, Tingting; Gao, Xuedong; Wei, Guiying title: Construction Method of Tender Document Based on Case-based Reasoning date: 2021-03-31 words: 9674 flesch: 54 summary: The main innovations are as follows: First of all, this paper summarized the key and difficult problems in the compilation process, and then introduced case- based reasoning as the theoretical framework to build an intelligent recommendation algorithm of tender document content from similar case retrieval, to case reference template reuse, to case reference template revision, and to new case learning, so as to ensure the rationality of the recommendation system; Secondly, we consumed clustering method to retrieve similar tender case sets, which realized the first step of content recommendation of tender documents based on case-based reasoning, which greatly reduced the recommended scope of tender cases; Thirdly, the non-interference sequence index was consumed to measure the similarity of tender case content, to realize the construction and recommendation of similar case reference templates and content modules, so as to ensure that the recommended content is more scientific and accurate; https://doi.org/10.15837/ijccc.2021.3.4170 3 Finally, through the construction of tender case learning algorithm, the tender knowledge of new problems was updated into the database, which made the recommendation system more perfect. The difference degree of case characteristics between tender case Ck and Cl is as follows: Simcase (Ck,Cl) = √ ∑N i=1 |ckAi − clAi| 2 N (3) N is the total number of tender case characteristics, N=5, ckAi is the value of tender case Ck under tender case characteristic Ai, The smaller the value of Simcase(Ck,Cl), the higher the similarity of tender cases, otherwise, the lower the similarity. keywords: content; content module; dcp; method; module; recommendation; reference; sequence; template; tender; tender case; tender documents cache: ijccc-4170.pdf plain text: ijccc-4170.txt item: #811 of 981 id: ijccc-4180 author: Wang, Jiaming; Zhu, Bing; Liu, Pei; Jia, Ruiqi; Jia, Lijing; Chen, Wei; Feng, Cong; Li, Jing title: Screening Key Indicators for Acute Kidney Injury Prediction Using Machine Learning date: 2021-04-12 words: 5903 flesch: 53 summary: This study used machine learning methods to filter key indicators and use key indicator data to achieve advance prediction of AKI so that a small number of indicators could be measured to reliably predict AKI and provide auxiliary decision support for clinical staff. In a recent study of key indicators and subsequent state prediction in emergency patients, Coster et al. keywords: aki; database; decision; eicu; iii; indicators; machine; mimic; model; patients; prediction; results; study; vol cache: ijccc-4180.pdf plain text: ijccc-4180.txt item: #812 of 981 id: ijccc-4186 author: Wahsheh, Heider A. M.; Al-Zahrani, Mohammed S. title: Secure Real-Time Computational Intelligence System Against Malicious QR Code Links date: 2021-05-09 words: 4198 flesch: 53 summary: Table 4 compares BarCI and various barcode scanners that validates QR code URLs. Optical Delusions: A Study of Malicious QR Codes in the Wild. keywords: ann; barcode; code; logic; mlp; online; results; security; urls cache: ijccc-4186.pdf plain text: ijccc-4186.txt item: #813 of 981 id: ijccc-4189 author: Zhang, Huashuai; Wang, Tingmei; Shen, Haiwei title: A Resource Allocation Algorithm for Ultra-Dense Networks Based on Deep Reinforcement Learning date: 2021-03-18 words: 5061 flesch: 56 summary: [34] studied the power allocation of sub-channels in small cell networks, and solved the game model by the Lagrangian dual decomposition method. To solve the problem, artificial intelligence (AI) techniques like DRL provides a possible tool to intelligently and effectively enhance user satisfaction with QoS and the utilization rate of network resources [25]. keywords: algorithm; allocation; base; cell; efficiency; learning; network; power; resource; stations; wireless cache: ijccc-4189.pdf plain text: ijccc-4189.txt item: #814 of 981 id: ijccc-4207 author: Jia, Bokang; Dzitac, Domnica; Shrestha, Samridha; Turdaliev, Komiljon; Seidaliev, Nurgazy title: An Ensemble Machine Learning Approach to Understanding the Effect of a Global Pandemic on Twitter Users’ Attitudes date: 2021-03-17 words: 4320 flesch: 53 summary: We aggregated the hater timeline tweets together, which produced the recent-heavy graph of hate tweets near May See Fig 9. Figure 8: Classified hate speech tweets related to COVID-19 https://doi.org/10.15837/ijccc.2021.2.4207 7 Figure 9: Classification of hate speech on racist users timelines When we normalize this by the total number of timeline tweets, we obtain the ratio of real hate tweets of these users See Fig 9. In the figure, we observe that a increase in the number of COVID-19 cases can be seen directly preceding a large increase in the number of hate tweets. keywords: covid-19; dataset; hate; pandemic; people; racism; speech; tweets; twitter; users cache: ijccc-4207.pdf plain text: ijccc-4207.txt item: #815 of 981 id: ijccc-4211 author: Tayeb, Ahmed Abdulwahab; Aldhaheri, Rabah Wasel; Hanif, Muhammad Shehzad title: Vehicle Speed Estimation Using Gaussian Mixture Model and Kalman Filter date: 2021-07-30 words: 4450 flesch: 55 summary: Vehicle speed is calculated using the distance travelled by the detected vehicles in a certain number of frames and frame rate. Finally, vehicle speed is estimated by using the relationship between pixel distance and actual distance. keywords: background; detection; estimation; gaussian; image; mixture; model; speed; tracking; vehicle; vehicle speed cache: ijccc-4211.pdf plain text: ijccc-4211.txt item: #816 of 981 id: ijccc-4214 author: Zhao, Hongmei; Zhang, Runtong; Zhang, Ao; Zhu, Xiaomin title: Multi-attribute Group Decision Making Method with Unknown Attribute Weights Based on the Q-rung Orthopair Uncertain Linguistic Power Muirhead Mean Operators date: 2021-04-16 words: 9234 flesch: 69 summary: Keywords: q-rung orthopair uncertain linguistic set, cross -entropy, attribute weights, q-rung orthopair uncertain linguistic power Muirhead mean, multi-attribute group decision making. In practical MAGDM problem, one of the most important difficulties is the representation of attribute values in uncertain decision environments. keywords: attribute; decision; j=1; j=1 kj; linguistic; making; mean; n∏ j=1; operator; orthopair; ϑ∈sn; − n∏; −  cache: ijccc-4214.pdf plain text: ijccc-4214.txt item: #817 of 981 id: ijccc-4215 author: Pang, Yajing; Dong, Shengmei title: Finite time Synchronization of Inertial Memristive Neural Networks with Time Varying Delay date: 2021-04-16 words: 3560 flesch: 62 summary: With the in-depth study of neural network and the development of syn- chronization theory, network system synchronization has attracted extensive attention from scholars in recent years. [14] https://doi.org/10.15837/ijccc.2021.4.4215 3 with extremely superior effect for chaotic system synchronization and differential synchronization, and chaotic system synchronization has extremely high value in some practical applications [16]. keywords: control; i=1; synchronization; system; time cache: ijccc-4215.pdf plain text: ijccc-4215.txt item: #818 of 981 id: ijccc-4216 author: Dzitac, Simona; Dzitac, Domnica; Manolescu, Misu-Jan; Filip, Florin Gheorghe title: Obituary date: 2021-03-27 words: 606 flesch: 51 summary: He was an Adjunct Professor at the University of the Chinese Academy of Sciences (2013-2016) and a member of the advisory board at Hoseo University in Asan, Republic of Korea. In 2019, he obtained the habilitation in the field of Economic Informatics at “Alexandru Ioan Cuza” University of Ias, i, then the title of Doctoral Supervisor at University of Craiova. keywords: prof; professor; university cache: ijccc-4216.pdf plain text: ijccc-4216.txt item: #819 of 981 id: ijccc-4217 author: Li, Dongxing; Luo, Zuying title: Regression Loss in Transformer-based Supervised Neural Machine Translation date: 2021-04-16 words: 8486 flesch: 58 summary: Subword regularization: Improving neural network translation models with multiple subword candidates, arXiv preprint arXiv:1804.10959, 2018. = arg max y p(y|x), where x and y are the source and target sequences, respectively. keywords: attention; decoder; distance; encoder; evaluation; loss; machine; model; neural; rouge; semantic; sequence; target; token; training; transformer; translation; wmt17 cache: ijccc-4217.pdf plain text: ijccc-4217.txt item: #820 of 981 id: ijccc-4221 author: Benitez-Perez, Hector; Hermosillo-Gomez, Jose A. title: Job-shop Scheduling Over a Heterogeneous Platform date: 2021-05-18 words: 5472 flesch: 57 summary: i , k Figure 3: Correspondence between a job-shop (down) and its pseudo-periodic associated task (up) Lemma 4 (Task validation time). As the speeds in the heterogeneous platform are faster than in the identical (homogeneous) platform (see lemma 1), the execution requirement of every job τi,j, ci,j, will meet ci,j ≤ Ci, where Ci is the execution requirement of the associated pseudo-periodic task τ keywords: execution; job; non; platform; scheduling; tasks; time; τactive cache: ijccc-4221.pdf plain text: ijccc-4221.txt item: #821 of 981 id: ijccc-4226 author: Perdana, Doan; Naufal, Julian; Alinursafa, Ibnu title: Performance Evaluation of River Water Quality Monitoring Using Lora Connectivity with Fuzzy Algorithm date: 2021-07-06 words: 4631 flesch: 68 summary: The value of 50 was included in the Medium deffuzzyfication, therefore it was concluded that Citarum River Sector 6 is in the Medium category. The value of 50 was included in the Medium deffuzzification, therefore it was concluded that Citarum River Sector 21 is in the Medium category. keywords: citarum; citarum river; data; fuzzy; lora; quality; river; river sector; sector; system; value; water cache: ijccc-4226.pdf plain text: ijccc-4226.txt item: #822 of 981 id: ijccc-4233 author: Dusadeerungsikul, Puwadol Oak; Nof, Shimon Y. title: A Cyber Collaborative Protocol for Real-Time Communication and Control in Human-Robot-Sensor Work date: 2021-05-24 words: 5214 flesch: 45 summary: The developed protocol aims to minimize information delay and maximize JIN (Just In Need) information sharing, to enable collaborative decisions among system agents. Hence, the system has relatively smaller information delays, as well as better timely information shared with system agents that need it. keywords: ars; ccp; collaborative; communication; control; cyber; information; rtc2; system; time cache: ijccc-4233.pdf plain text: ijccc-4233.txt item: #823 of 981 id: ijccc-4235 author: TANG, RUI XUE title: A Boundary Determined Neural Model for Relation Extraction date: 2021-06-07 words: 6509 flesch: 53 summary: School of Information, Guizhou University of Finance and Econnomics Guiyang 550025, China gs.rxtang19@gzu.edu.cn Yongbin Qin* College of Computer Science and Technology, Guizhou University Guiyang 550025, China *Corresponding author: ybqin@foxmail.com Ruizhang Huang College of Computer Science and Technology, Guizhou University Guiyang 550025, China rzhuang@gzu.edu.cn Hao Li College of Computer Science and Technology, Guizhou University Guiyang 550025, China haolilhhh@foxmail.com Yanping Chen College of Computer Science and Technology, Guizhou University Guiyang 550025, China ypench@gmail.com Abstract Existing models extract entity relations only after two entity spans have been precisely extracted that influenced the performance of relation extraction. For relation extraction, this paper combines boundary detection model with relation extraction model into a boundary determined neural (BDN) model. keywords: boundaries; boundary; corpus; entities; entity; extraction; features; information; layer; model; relation; relation extraction; sequence cache: ijccc-4235.pdf plain text: ijccc-4235.txt item: #824 of 981 id: ijccc-4239 author: Barnabas, S.Godwin; Geethan, K.Arun vasantha; Ganesh, S.Valai; Rajakarunakaran, S.; Kumar, P.Sabarish title: Role of Modern Technologies and Internet of things in the field of Solid Waste Management date: 2021-09-03 words: 6878 flesch: 50 summary: Use of optimization techniques and algorithms 4. Part of Radio Frequency Identification (RFID) in solid waste management 2.1 Part of IoT in in solid waste management Reduction of waste by adopting modern industrial automation techniques in waste management was carried out. Part of IoT in in solid waste management 2. keywords: collection; data; garbage; generation; information; iot; journal; management; method; network; neural; rfid; sensors; smart; system; technologies; technology; waste; waste management cache: ijccc-4239.pdf plain text: ijccc-4239.txt item: #825 of 981 id: ijccc-4240 author: Jerbi, Nabil; Collart-Dutilleul, Simon title: Decision Tools Regarding Time Constraints Violation in Manufacturing Workshops date: 2021-06-08 words: 5532 flesch: 71 summary: Keywords: manufacturing, maximum time constraints, time disturbance, constraints violation, robustness. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL Online ISSN 1841-9844, ISSN-L 1841-9836, Volume: 16, Issue: 3, Month: June, Year: 2021 Article Number: 4240, https://doi.org/10.15837/ijccc.2021.3.4240 CCC Publications Decision Tools Regarding Time Constraints Violation in Manufacturing Workshops N. JERBI, S. Collart-Dutilleul Nabil JERBI* Université de Sousse, Ecole Supérieure des Sciences et de la Technologie de Hammam Sousse, 4011, H. Sousse, Tunisie ; *Corresponding author: nabil.jerbi@essths.u-sousse.tn Simon Collart-Dutilleul COSYS/ESTAS, University Gustave Eiffel, 59666 Villeneuve d’Ascq, France ; simon.collart-dutilleul@univ-eiffel.fr Abstract This paper is dedicated to the study of constraints violation in manufacturing workshops with time constraints. keywords: constraints; qie; qje; respj; time; token; transition; −aj cache: ijccc-4240.pdf plain text: ijccc-4240.txt item: #826 of 981 id: ijccc-4258 author: Castañeda Herrera, Luis Miguel; Campo-Muñoz, Wilmar Yesid; Torres, Alejandra Duque title: Video Streaming Service Identification on Software-Defined Networking date: 2021-09-03 words: 5592 flesch: 57 summary: Most approaches to video traffic classification are based on port number, Deep Packet Inspection (DPI), and flow characteristics Network traffic classification using machine learning techniques over software definednetworks, International Journal of Advanced Computer Science and Applications, 8, 2017. keywords: classification; data; datavideo1; flows; model; network; non; packet; performance; sdn; streaming; traffic; video cache: ijccc-4258.pdf plain text: ijccc-4258.txt item: #827 of 981 id: ijccc-4266 author: Shakan, Yassynzhan; Kumalakov, Bolatzhan; Mutanov, Galimkair; Mamykova, Zhanl; Kistaubayev, Yerlan title: Verification of University Student and Graduate Data using Blockchain Technology date: 2021-09-03 words: 6823 flesch: 42 summary: The UniverCert platform was developed on a consortium blockchain architec- ture to address the problems universities face in storing and securing student data. The proposed platform is based on a globally distributed peer-to-peer network that allows educational institutions to partner with the blockchain network, track student data, verify academic performance, and share documents with other stakeholders. keywords: access; blockchain; data; documents; education; information; network; platform; process; smart; student; system; technology; university; verification cache: ijccc-4266.pdf plain text: ijccc-4266.txt item: #828 of 981 id: ijccc-4268 author: Hirald Dwaraka, Praveena; C., Subhas; K., Rama Naidu title: iEEG based Epileptic Seizure Detection using Reconstruction Independent Component Analysis and Long Short Term Memory Network date: 2021-09-22 words: 4061 flesch: 44 summary: In RICA model, the extracted feature vectors sp are sparse like other learning models. In the SWEC ETHZ iEEG database, 116 seizure records are used for experimental analysis with 80% https://doi.org/10.15837/ijccc.2021.5.4268 7 Table 2: Performance analysis of dissimilar classifiers without RICA model Without RICA Classifiers Arcucacy (%) Sensitivity (%) Specificity (%) BA (%) F-score (%) keywords: classification; detection; epileptic; lstm; model; performance; rica; seizure; signals cache: ijccc-4268.pdf plain text: ijccc-4268.txt item: #829 of 981 id: ijccc-4274 author: Marufuzzaman, Mohammad; Timu, Muneed Anjum; Sarkar, Jubayer; Islam, Aminul; Rahman, Labonnah Farzana; Sidek, Lariyah Mohd title: Multi Objective PSO with Passive Congregation for Load Balancing Problem date: 2021-09-14 words: 3312 flesch: 50 summary: The load can be split up into two loads: computation load, which is a measurement of system load. Multi-Objective Particle Swarm Optimization (MOPSO) based on crowding distance (CD) is a popular MOEA method used to balance HLA load. keywords: balancing; hla; load; method; mopso; performance; research cache: ijccc-4274.pdf plain text: ijccc-4274.txt item: #830 of 981 id: ijccc-4291 author: Kamaladevi, M.; Venkatraman, V. title: Tversky Similarity based UnderSampling with Gaussian Kernelized Decision Stump Adaboost Algorithm for Imbalanced Medical Data Classification date: 2021-11-16 words: 5227 flesch: 39 summary: INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL Online ISSN 1841-9844, ISSN-L 1841-9836, Volume: 16, Issue: 6, Month: December, Year: 2021 Article Number: 4291, https://doi.org/10.15837/ijccc.2021.6.4291 CCC Publications Tversky Similarity based Under Sampling with Gaussian Kernelized Decision Stump Adaboost Algorithm for Imbalanced Medical Data Classification M. Kamaladevi, V. Venkatraman M. Kamaladevi Department of Computer Science, SASTRA Deemed University-SRC campus Kumbakonam, India kamaladeviresearch@gmail.com Corresponding author V. Venkatraman Department of Mathematics SASTRA Deemed University, Thanjavur , India mathvvr@maths.sastra.edu Abstract In recent years, imbalanced data classification are utilized in several domains including, detecting fraudulent activities in banking sector, disease prediction in healthcare sector and so on. Mutual class potential was utilized in [4] via radial bias that in turn reduced the time complexity involved in imbalanced data classification. keywords: classification; data; dataset; decision; diabetes; indian; instances; pima; positive; regression; similarity; undersampling cache: ijccc-4291.pdf plain text: ijccc-4291.txt item: #831 of 981 id: ijccc-4296 author: Jambulingam, Umamageswaran; Balasubadra, K. title: A Unique Multi-Agent-Based Approach for Enhanced QoS Resource Allocation in Multi Cloud Environment while Maintaining Minimized Energy and Maximize Revenue date: 2022-03-07 words: 3935 flesch: 45 summary: The obtained results from proposed method when compared with the existing state of art methods observed to be novel and better. The key challenge we address in this paper is to maximise revenue while maintaining a minimum consumption of energy with an enhanced QoS for resource allocation. keywords: allocation; analysis; approach; cloud; computing; cost; energy; figure; https://doi.org/10.15837/ijccc.2022.2.4296; method; resources; sentiment cache: ijccc-4296.pdf plain text: ijccc-4296.txt item: #832 of 981 id: ijccc-4305 author: Imavathy, S; Chinnadurai, M. title: Threshold based Support Vector Machine Learning Algorithm for Sequential Patterns date: 2021-11-16 words: 6398 flesch: 50 summary: Genome sequence having high volume of gene data, which is analyzed by monitoring number of data sequences. The alarm will triggers the next relay and it returns to next end state of sequence pattern. keywords: algorithm; classification; data; dataset; gene; learning; method; mining; model; pattern; pattern mining; sequence; sequential; support; technique; threshold; value cache: ijccc-4305.pdf plain text: ijccc-4305.txt item: #833 of 981 id: ijccc-4308 author: Alazzawi, Ammar Kareem; Rais, Helmi Md; Basri, Shuib; Alsariera, Yazan A.; Capretz, Luiz Fernando; Imam, Abdullahi Abubakar; Balogun, Abdullateef Oluwagbemiga title: HABCSm: A Hamming Based t-way Strategy based on Hybrid Artificial Bee Colony for Variable Strength Test Sets Generation date: 2021-10-04 words: 11234 flesch: 63 summary: t v Pure computation strategies AI-based strategiesJenny Best TConfig Best PICT Best IPOG-D Best IPOG Best DPSO Best PSTG Best CS Best GS Best HSS Best ABCS Best HABC Best HABCSm Best HABCSm Avg.Size 2 2 8 7 7 8 8 7 6 6 6 7 7 7 7 7.40000 3 16 15 16 15 17 14 15 15 14 14 15 15 14 15.0000 4 28 28 27 32 28 24 26 25 24 25 25 25 24 26.1000 5 37 40 40 45 42 34 37 37 36 35 38 37 34 37.6500 3 2 14 16 15 14 19 15 13 12 12 12 14 14 13 15.4500 3 54 55 51 50 57 48 50 49 49 50 49 47 46 51.2000 4 124 112 124 114 208 112 116 117 116 121 119 114 110 117.850 5 236 239 241 252 275 216 225 223 221 223 231 226 221 225.475 4 2 31 36 32 40 48 34 29 27 27 29 27 29 27 31.8000 3 169 166 168 226 185 150 155 155 153 155 157 155 149 158.250 4 517 568 529 704 509 472 487 487 486 500 498 488 484 494.500 5 1248 1320 1279 1858 1349 1148 1176 1171 1173 1174 1215 1187 1179 1196.55 5 2 57 56 57 80 128 59 53 53 51 53 54 54 55 57.6500 3 458 477 452 678 608 438 441 439 432 437 439 441 439 445.350 4 1938 1792 1933 2816 2560 1814 1826 1845 1821 1831 1878 1856 1855 1868.20 5 5895 N/A 5814 9198 8091 5400 5474 5479 5463 5468 5630 5601 5588 5608.95 6 2 87 64 72 96 64 64 64 66 65 64 65 64 64 64.0000 3 1087 921 1015 1201 1281 729 977 973 963 916 893 810 792 744.400 4 6127 N/A 5847 5120 4096 5223 5599 5610 5608 4096 5541 5502 5470 5557.20 5 23492 N/A 22502 24808 28513 20525 21595 21597 21532 21748 21645 21592 21565 21610.2 Table 3: Test set size for CA (N; 4,5P ) with 5 ≤ p ≤ 10. P Pure computation strategies AI-based strategiesJenny Best TConfig Best PICT Best IPOG-D Best IPOG Best DPSO Best PSTG Best CS Best GS Best HSS Best ABCS Best HABC Best HABCSm Best HABCSm Avg.Size 5 837 773 810 1250 908 NA 779 776 769 751 758 759 750 771.150 6 1074 1092 1072 1250 1239 NA 1001 991 984 990 1010 1000 996 1007.30 7 1248 1320 1279 1858 1349 NA 1209 1200 1176 1186 1198 1189 1179 1196.55 8 1424 1532 1468 1858 1792 NA 1417 1415 1371 1358 1413 1386 1354 1360.00 9 1578 1724 1643 2110 1793 NA 1570 1562 1548 1530 1621 1591 1526 1531.40 10 1719 1878 1812 2110 1965 NA 1716 1731 1638 1624 1831 1798 1718 1721.50 Table 4: Test size for VSCA (N, 2, 315, C). Table 1: Test set size for CA (N; t, 3P ) with 2 ≤ t ≤ 11 and 3 ≤ P ≤ 12. keywords: algorithm; bee; colony; food; generation; habcsm; interaction; mca; set; software; strategies; strategy; test; testing; way cache: ijccc-4308.pdf plain text: ijccc-4308.txt item: #834 of 981 id: ijccc-4345 author: Daranda, Andrius; Dzemyda, Gintautas title: Novel Machine learning approach for Self-Aware prediction based on the Contextual reasoning date: 2021-07-26 words: 6222 flesch: 56 summary: The cluster helps to recreate the generalized route from port A to port B. DBSCAN algorithm has two control parameters: a radius of the neighborhood for some point (�), and the minimum number of neighbors (data points) within radius � (MinPts). Due to the com- plexity of context, marine traffic data was chosen to demonstrate the proposed approach capability. keywords: approach; assessment; context; data; learning; machine; marine; point; threat; traffic; vessel cache: ijccc-4345.pdf plain text: ijccc-4345.txt item: #835 of 981 id: ijccc-4351 author: Kalaiarasu, M.; Kumar, C. Ranjeeth title: Sentiment Analysis using Improved Novel Convolutional Neural Network (SNCNN) date: 2022-03-18 words: 7033 flesch: 47 summary: “On the feature selection and classification based on information gain for document sentiment analysis”, Applied Computational Intelligence and Soft Computing, Pp.1- 5, [22] S.V. Georgakopoulos, S.K. Tasoulis, A.G. Vrahatis and V.P. Plagianakos.2018., “Convolutional neural networks for toxic comment classification”, Proceedings of the 10th Hellenic Conference on Artificial Intelligence, Pp.1-6, [23] https://www.kaggle.com/mchirico/cheltenham-s-facebook-group [24] Ragab et al., (2020). Text feature extraction belongs to a task function which lists out text data words and transforms it to feature set classifiers. keywords: analysis; classification; comments; data; dataset; document; facebook; feature; frequency; incnn; information; posts; sentiment; sentiment analysis; svm; text; words cache: ijccc-4351.pdf plain text: ijccc-4351.txt item: #836 of 981 id: ijccc-4356 author: Anitha, J.; Saranya, N. title: Cassava Leaf Disease Identification and Detection Using Deep Learning Approach date: 2022-02-18 words: 2009 flesch: 42 summary: Figure 6: Accuracy curve over augmented dataset 5 Conclusion Deep learning-based architecture was designed with minimum number of parameters to classify Cassava plant diseases. [5] has proposed machine learning models for detection and classifica- tion of Cassava leaf diseases as blight or mosaic disease. keywords: cassava; dataset; detection; disease; learning; model; plant cache: ijccc-4356.pdf plain text: ijccc-4356.txt item: #837 of 981 id: ijccc-4363 author: P., Arul Sindhia; Bharathi.R title: Bi-Level Minimal Resource Protected Key Generation Framework For Fog Computing Applications date: 2022-12-14 words: 5945 flesch: 56 summary: https://doi.org/10.15837/ijccc.2022.6.4363 11 Figure 7: Throughput comparison of proposed Fog based system with other existing techniques Figure 8: Security Level Analysis Figure 7 depicts the throughput curve of the proposed Fog-based system using the MRV-BSKG key management approach. During the data transmission from source to fog nodes, LKG is done using a source encoder, and in every fog node, LBK is done using a channel encoder. keywords: bskg; cloud; computing; data; figure; fog; generation; information; key; lbk; level; node; path; security; source; system; time cache: ijccc-4363.pdf plain text: ijccc-4363.txt item: #838 of 981 id: ijccc-4394 author: Ahmad Sa'ahiry, Ahmad Hakimi bin; Ismail, Abdul Halim; Kamaruddin, Latifah Munirah; Hashim, Mohd Sani Mohamad; Azmi, Muhamad Safwan Muhamad; Satar, Muhammad Juhairi Aziz; Toyoura, Masahiro title: Effect of Sample Sizes in Fingerprinting Database for Wi-Fi System date: 2021-12-05 words: 6990 flesch: 59 summary: The result shows that sample sizes are an important metrics in developing the indoor positioning system as it effects the result of the location estimation. Keywords: indoor positioning system, sample size, positioning accuracy, big data, fingerprint- ing, deep learning. keywords: accuracy; database; distance; dnn; error; figure; fingerprinting; point; reference; sample; sample sizes; signal cache: ijccc-4394.pdf plain text: ijccc-4394.txt item: #839 of 981 id: ijccc-4396 author: Murugesan, Rajesh Khanna ; Madhu, Karthikeyan ; Sambandam, Jayalakshmi ; Malliga, Lakshmanan title: Covid-19 Forecasting Using CNN Approach With A Halbinomial Distribution And A Linear Decreasing Inertia Weight-Based Cat Swarm Optimization date: 2023-02-09 words: 5531 flesch: 53 summary: Range of lies between 0 and SMP; Candidates selection probability is given by Pi; Overall fitness values maximum value is represented as FSmax and minimum value is represented as FSmin; Candidates fitness value is given by FSi. When compared with available techniques, high accuracy value is produced by proposed method as shown in experimental results. keywords: accuracy; cat; cnn; covid-19; data; feature; figure; forecasting; https://doi.org/10.15837/ijccc.2023.1.4396; layer; lstm; method; optimization; value cache: ijccc-4396.pdf plain text: ijccc-4396.txt item: #840 of 981 id: ijccc-4398 author: Xiao, Quan; Li, Xia title: Exploring the Antecedents of Online Learning Satisfaction: Role of Flow and Comparison Between use Contexts date: 2021-12-03 words: 9483 flesch: 47 summary: Many factors that affect online learning satisfaction have been addressed by previous studies. How- ever, the mechanisms by which these factors are associated with online learning satisfaction are not sufficiently clear. keywords: context; education; efficacy; expertise; flow; interaction; learners; learning; learning platform; learning satisfaction; mobile; model; online; platform; quality; research; self; students; teacher; use cache: ijccc-4398.pdf plain text: ijccc-4398.txt item: #841 of 981 id: ijccc-4413 author: Song, Yutong; Deng, Yong title: Entropic Explanation of Power Set date: 2021-08-13 words: 3771 flesch: 61 summary: Given a finite set S with |S|= n hypothesis, one property of power set is that the amount of subsets of S is |P(S)|= 2n. To address this issue, a possible explanation of power set is proposed in this paper. keywords: entropy; event; number; power; probability; set; theory cache: ijccc-4413.pdf plain text: ijccc-4413.txt item: #842 of 981 id: ijccc-4444 author: Martinez, Sebastien; Collart-Dutilleul, Simon; Bon, Philippe title: Identifying Alterability States of a Single Track Railway Line Control System date: 2022-09-29 words: 6704 flesch: 62 summary: Indeed, station graphs have no memory of the direction of the trains. In case of malfunction in control systems, in railway lines or when the traffic is simply reorganized, human operators handle traffic control until control systems are repaired or updated. keywords: deviation; graph; state; station; system; track; transitions; − > cache: ijccc-4444.pdf plain text: ijccc-4444.txt item: #843 of 981 id: ijccc-4468 author: Xiong, Leihui; Su, Xiaoyan; Qian, Hong title: Supplier Selection Model Based on D Numbers and Transformation Function date: 2022-09-29 words: 9010 flesch: 60 summary: Second, the D matrix is converted into a crisp matrix form based on the integration representation of D numbers according to different situations whether or not the information in D matrix is complete. [39] After D numbers extended fuzzy preference relation (D matrix) is constructed, we can gain the crisp matrix by the integration representation of D numbers. keywords: a1 a2; d matrix; decision; deng; equation; information; matrix; method; numbers; selection; supplier cache: ijccc-4468.pdf plain text: ijccc-4468.txt item: #844 of 981 id: ijccc-4476 author: Chanchí Golondrino, Gabriel Elías; Sierra Martí­nez, Luz Marina; Campo Muñoz, Wilmar Yesid title: Fuzzy Logic-Based System for the Estimation of the Usability Level in User Tests date: 2022-02-18 words: 5674 flesch: 44 summary: In the same way, the functionality of the fuzzy system developed to estimate the level of output usability in user tests is described, and a case study is presented where the functionality of the proposed system is verified with the results obtained from a test of usability developed with 5 users over the electronic accessories store website Sigma Electrónica Starting from the membership functions and the inference rules, the development of the fuzzy system for determining the level of usability in user tests takes place in stage 4, making use of the Java language and the jFuzzyLogic library. keywords: effectiveness; efficiency; level; membership; output; satisfaction; system; task; test; usability; user cache: ijccc-4476.pdf plain text: ijccc-4476.txt item: #845 of 981 id: ijccc-4478 author: Rahmath Nisha, S. ; Muthurajkumar, S. title: Semantic Graph Based Convolutional Neural Network for Spam e-mail Classification in Cybercrime Applications date: 2023-02-09 words: 4741 flesch: 56 summary: Various tactics for classifying E-mail spam have been suggested by certain academics. [11] programme, which is based on the Spambase and Spam datasets, to evaluate the Nave Bayes algorithm for classifying E-mail spam. keywords: approach; classification; cnn; data; graph; learning; machine; mail; model; network; neural; spam; word cache: ijccc-4478.pdf plain text: ijccc-4478.txt item: #846 of 981 id: ijccc-4482 author: Tashtoush, Yahya; Al-refai, Mohammed; Al-refai, Ghaith; Darweesh, Dirar Abdul-Kareem; Zaghal, Noor; Darwish, Omar title: Dynamic Traffic Light System to Reduce The Waiting Time of Emergency Vehicles at Intersections within IoT Environment date: 2022-03-21 words: 5287 flesch: 56 summary: Since few of researches projects in the literature interested in solving traffic jam problem for emergency vehicles, the contribution of this paper is to introduces a novel approach to operate traffic light system. Based on the emergency vehicle’s location and the current state of the traffic light, our dynamic model for traffic light system will adapt to reduce the waiting time for the emergency vehicles. keywords: detection; emergency; intersections; light; system; time; traffic; traffic light; vehicles; waiting cache: ijccc-4482.pdf plain text: ijccc-4482.txt item: #847 of 981 id: ijccc-4485 author: Poonkuntran, S. ; Abinaya, V.; Manthira Moorthi, S. ; Oza, M P title: Efficient Classification of Satellite Image with Hybrid Approach Using CNN-CA date: 2022-09-29 words: 5212 flesch: 48 summary: Using the gray level Satellite image as the target and CNN image classification by the CA’s self- iteration mechanism and eventually explores the efficacy and viability of the proposed method in long-term satellite remote sensing image water body classification. Four types of image classification may be distinguished depending on how they approach the problem, including clustering, edge-based, region-based, and model-driven approaches. keywords: classification; cnn; data; feature; figure; https://doi.org/10.15837/ijccc.2022.5.4485; image; indian; network; pixel; remote; satellite; sensing; training cache: ijccc-4485.pdf plain text: ijccc-4485.txt item: #848 of 981 id: ijccc-4502 author: An, Yu; Lu, Yinan; Wu, Tieru title: Segmentation Method of Magnetic Tile Surface Defects Based on Deep Learning date: 2022-01-25 words: 5078 flesch: 56 summary: Nowadays, there are many improved Mask R-CNN models to study defect segmentation. Figure 6 is the comparison result of defect segmentation. keywords: accuracy; defects; detection; feature; mask; method; model; network; segmentation; surface; tile; yolact cache: ijccc-4502.pdf plain text: ijccc-4502.txt item: #849 of 981 id: ijccc-4521 author: Uma Maheswari, K. ; Rajesh, S. title: Fused LISS IV Image Classification using Deep Convolution Neural Networks date: 2022-09-29 words: 5585 flesch: 47 summary: Image fusion is another recent booming task to improve efficiency of image classification. The last part act as image classifier such as fully connected layer to map is a fully completely associated layer for image classification. 1) Feature Extraction CNN-based feature extraction comprises of three perspectives: convolutional layers, ReLU function layers, and Max pooling layers. keywords: accuracy; classification; cnn; data; fusion; image; land; learning; liss; method; model; neural; pan; remote; sensing; use cache: ijccc-4521.pdf plain text: ijccc-4521.txt item: #850 of 981 id: ijccc-4539 author: Chandan, Radha Raman; Kshirsagar, Pravin R.; Manoharan, Hariprasath; El-Hady, Khalid Mohamed; Islam, Saiful; Khan, Mohammad Shahiq; Chaturvedi, Abhay title: Substantial Phase Exploration for Intuiting Covid using form Expedient with Variance Sensor date: 2022-03-31 words: 6303 flesch: 52 summary: When considering the cost of sensor units distance, angle of inclination and width of sensors will also be included. + φi (6) Where, wi represents the width of installed sensors 2.5 Objective function By considering Equations (1) to (6) the objective function on implementing sensors for distance monitoring and hand sanitizing can be modeled as follows, O(i) = max n∑ (i=1) Di,Ei,min n∑ (i=1) Ci (7) keywords: angle; cost; covid; detection; distance; energy; equation; figure; ieee; inclination; method; monitoring; sensors; values cache: ijccc-4539.pdf plain text: ijccc-4539.txt item: #851 of 981 id: ijccc-4541 author: Zhang, Caicai; Mei, Mei; Mei, Zhuolin; Zhang, Junkang; Deng, Anyuan; Lu, Chenglang title: PLDANet: Reasonable Combination of PCA and LDA Convolutional Networks date: 2022-02-08 words: 5443 flesch: 57 summary: Data Sets Description Train-Valid-Test basic Smaller subset of MNIST 10,000-2000-10,000 rot MNIST with rotation 10,000-2000-50,000 bg-rand MNIST with noise background 10,000-2000-50,000 bg-img MNIST with image background 10,000-2000-50,000 bg-img-rot MNIST with rotation and image background 10000-2000-50000 (a) rot (b) bg-rand (c) bg-img (d) bg-img-rot Figure 2: The number eight in the MNIST variations To evaluate the performance of PCA convolutional layer and LDA convolutional layer in different convolutional layers, we compare PCANet-i, PLDANet-i and PLDANet2-i, where PCANet-i means there are number of i PCA convolutional layers, PLDANet-i means there are PCA convolutional layers in the first (i-1) layers and LDA convolutional layer in the last layer, and PLDANet2-i means there are PCA convolutional layers in the first 6 layers and LDA convolutional layer in the rest layers. Given an image with size 28×28, if the kernel size in each convolutional layer is 7×7, then G =[ (28 − 7)/3] = 7. 4 The PLDANet model The convolutional coverage theory calculates the necessary number of the convolutional layers, which is important for designing reasonable combination of PCA and LDA convolutional networks. Section 4.1 gives the definitions of PCA convolutional layer and LDA convolutional layer. keywords: convolutional; image; information; layer; lda; mnist; pca; pcanet; pldanet cache: ijccc-4541.pdf plain text: ijccc-4541.txt item: #852 of 981 id: ijccc-4542 author: Deng, Yong title: Random Permutation Set date: 2022-01-10 words: 7276 flesch: 69 summary: In this sense, according to the seriousness of the aircraft, all the possible threat ranking of threat event can be represented as PES: PES ({A, B, C}) = { ∅, (A) , (B) , (C) , (37) (A, B) , (A, C) , (B, C) , (B, A) , (C, A) , (C, B) , (A, B, C) , (A, C, B) , (B, A, C) , (B, C, A) , (C, B, A) , (C, A, B) } To better understand, let’s consider the following example. (A, C, B) indicate that the threat rank- ing of threat event {A, B, C} is A � C � B, which means that aircraft A is very threatening, while the threat of B is the lowest (but can not be ignored) compared with A and C. keywords: permutation; rps; set; theory; threat cache: ijccc-4542.pdf plain text: ijccc-4542.txt item: #853 of 981 id: ijccc-4558 author: Zholdas, Nurassyl; Mansurova, Madina; Postolache, Octavian; Kalimoldayev, Maksat; Sarsembayeva, Talshyn title: A Personalized mHealth Monitoring System for Children and Adolescents with T1 Diabetes by Utilizing IoT Sensors and Assessing Physical Activities date: 2022-04-15 words: 5913 flesch: 44 summary: In addition to monitoring blood glucose levels, the effect of physical activity on the condition of patients is also taken into account. At the same time, in addition to monitoring blood glucose levels, the effect of physical activity on the condition of patients is also taken into account. keywords: activity; application; blood; children; data; diabetes; glucose; health; levels; mobile; monitoring; patient; system; type cache: ijccc-4558.pdf plain text: ijccc-4558.txt item: #854 of 981 id: ijccc-4568 author: M., Sangeetha ; Thiagarajan, Meera Devi title: An Enhanced Neural Graph based Collaborative Filtering with Item Knowledge Graph date: 2022-07-20 words: 4220 flesch: 47 summary: Then, it described the deep learning role in recommendation process in terms of graph or data mining approach. Then, it surveyed around 61 articles from 2011 to 2015 for recommendation process. keywords: filtering; graph; information; items; layer; neural; process; recommendation; system; user cache: ijccc-4568.pdf plain text: ijccc-4568.txt item: #855 of 981 id: ijccc-457 author: Alic, Kemal; Pertovt, Erik; Å vigelj, Aleš title: Bearing-Opportunistic Network Coding date: 2015-02-15 words: 4977 flesch: 55 summary: Keywords: Algorithms, network layer network coding, network throughput, perfor- mance evaluation. COPE update packets as described in [13] are sent out at least every 0.5 s. When possible, update packets are attached to regular outgoing packets, or cumulative ACKs thus introducing less overhead to the network. keywords: algorithm; bon; coding; cope; figure; layer; load; network; nodes; packet; traffic cache: ijccc-457.pdf plain text: ijccc-457.txt item: #856 of 981 id: ijccc-4573 author: Wang, Yiying; Xu, Zeshui; Filip, Florin Gheorghe title: Multi-Objective Model to Improve Network Reliability Level under Limited Budget by Considering Selection of Facilities and Total Service Distance in Rescue Operations date: 2022-01-05 words: 12167 flesch: 65 summary: Based on the definition of network reliability level, this paper balances the reliability level of selected paths with variance weight, and studies how variance weight affects the goal with a case study. In order to study the goal of road construction, we form the concepts of the reliability level of edge, reliability level of the minimum edge cut, reliability level of path, reliability level between two points and network reliability level, and discuss how to calculate the network reliability level. keywords: cut; edge; edge cut; facilities; model; network reliability; path; points; reinforcement; reliability level; set cache: ijccc-4573.pdf plain text: ijccc-4573.txt item: #857 of 981 id: ijccc-4577 author: Ashok Babu, P.; Subba Rao, B.V.; Vijay Bhaskar Reddy, Y.; Rajendra Kumar, G .; Nageswara Rao, J.; Kumar Reddy Koduru, Surendra; Sunil Kumar, G. title: Optimized CNN-based Brain Tumor Segmentation and Classification using Artificial Bee Colony and Thresholding date: 2023-02-09 words: 8242 flesch: 55 summary: Brain tumor segmentation using 2D MRI slices are classified into major following types: threshold and region-based [11-15], pixel-based scheme [16-18]. [21] have identified a multi-features selection for brain tumor segmentation using enhanced binomial thresholding. keywords: abc; accuracy; algorithm; boa; brain; brain tumor; brats; classification; cnn; image; method; mri; net; performance; segmentation; technique; thresholding; tumor; tumor segmentation cache: ijccc-4577.pdf plain text: ijccc-4577.txt item: #858 of 981 id: ijccc-4587 author: Dzitac, Simona; Oros, Horea; Deac, Dan; Nădăban, Sorin title: Fixed Point Theory in Fuzzy Normed Linear Spaces: A General View date: 2021-11-19 words: 5644 flesch: 78 summary: Approximate fixed point in fuzzy normed spaces for nonlinear maps, Iranian Journal of Fuzzy Systems, 10(1), 135–142. Regarding the notion of Cauchy sequence, the great majority of the articles use a definition inspired by the work of M. Grabiec in fuzzy metric spaces (see [22]). keywords: fuzzy; linear; point; spaces cache: ijccc-4587.pdf plain text: ijccc-4587.txt item: #859 of 981 id: ijccc-4588 author: Liu, Song; Zhang, Runlan ; Shi, Yongheng title: Design of Moving Coverage Algorithm of Ecological Monitoring Network for Curved Surface date: 2022-12-14 words: 4458 flesch: 46 summary: Optimal algorithm for directed sensor network coverage under ran- dom obstacles [J]. Three-dimensional spatial cov- erage algorithms are based on full-space mobile coverage, which is effective for sensor networks deployed in air or water, and not fully applicable for curved surface full coverage. keywords: algorithm; coverage; coverage algorithm; monitoring; monitoring network; network; nodes; sensor; surface cache: ijccc-4588.pdf plain text: ijccc-4588.txt item: #860 of 981 id: ijccc-4606 author: Ngo, Thanh-Quyen; Hoang, Dinh-Khoi; Tran, Trong-Toan; Nguyen, Thanh-Thuan ; Nguyen, Van-Tho; Le, Long-Ho title: A Novel Self-organizing Fuzzy Cerebellar Model Articulation Controller Based Overlapping Gaussian Membership Function for Controlling Robotic System date: 2022-07-20 words: 7353 flesch: 65 summary: Figure 1: Block diagram of NSOFC control system It can be seen from Eq. In general, it is difficult to calculate accurately the mathematical model of the robotic system due to the reasons mentioned above and therefore designing the controller based on dynamic system model is not a trivial task. keywords: adaptive; cmac; controller; function; https://doi.org/10.15837/ijccc.2022.4.4606; layer; learning; model; nsofc; parameters; present; prior; robot; system; vol cache: ijccc-4606.pdf plain text: ijccc-4606.txt item: #861 of 981 id: ijccc-461 author: Dhavarudha, Ekularn; Charoenlarpnopparut, Chalie; Runggeratigul, Suwan title: Traffic Control Based on Contention Resolution in Optical Burst date: 2014-11-17 words: 5481 flesch: 54 summary: Firstly, traffic class 0 is IP remote terminal unit (IP RTU) traffic based on IEC 60870-5- 101/104 protocol Secondly, traffic class 1 is assumed to carry both IP television (IP TV) and voice over IP (VoIP) applications which are real-time services in IP networks. keywords: blocking; burst; class; contention; delay; network; probability; resolution; time; traffic cache: ijccc-461.pdf plain text: ijccc-461.txt item: #862 of 981 id: ijccc-4623 author: Precup, Radu-Emil; Roman, Raul-Cristian; Hedrea, Elena-Lorena; Bojan-Dragos, Claudia-Adina; Damian, Miruna-Maria; Nedelcea, Monica-Lavinia title: Performance Improvement of Low-Cost Iterative Learning-Based Fuzzy Control Systems for Tower Crane Systems date: 2022-01-05 words: 8953 flesch: 55 summary: As highlighted in the recent and popular surveys [3], [4], [5], [6] and [7], the systematic design and tuning of fuzzy control systems is supported by analyses that include stability, controllability, observability, sensitivity and robustness. Several low-cost controllers specific to this first approach were proposed in the subsequent papers [9], [41], [42], [43], [44] and [45] focusing on the Proportional-Integral (PI) fuzzy controllers, which replace the linear PI controllers and the performance of fuzzy control systems is improved in terms of ILC. keywords: control; control systems; controller; crane; ieee; ilc; international; iterative; journal; learning; learning control; model; optimization; position; position control; precup; r.-e; systems cache: ijccc-4623.pdf plain text: ijccc-4623.txt item: #863 of 981 id: ijccc-463 author: Cosma, Smaranda; Văleanu, Mădălina; Cosma, Dan; Vasilescu, Dana; Moldovan, Grigor title: Efficient Data Organisation in Distributed Computer Systems using Data Warehouse date: 2013-06-02 words: 4630 flesch: 58 summary: Definition [8]: Data warehouses are non-volatile data collections, oriented to the subject, integrated, variable in time and supporting the managerial decision making process. In order to select some options (actions) defining the conceptual schemes of data warehouses (DWs) and able to provide short time answers to queries made by users, some efficiency indicators can be used. keywords: computer; cosma; data; data warehouse; databases; nodes; set; systems; warehouse cache: ijccc-463.pdf plain text: ijccc-463.txt item: #864 of 981 id: ijccc-464 author: Crăciun, Mihaela; Bucerzan, Dominic; Raţiu, Crina; Manolescu, Adriana title: Actuality of Bankruptcy Prediction Models used in Decision Support System date: 2013-06-02 words: 4108 flesch: 58 summary: Anghel’s model report a success rate greater than 97% and in the Altman‘s model the success rates were: 93.9% for N-B companies and 97% for B companies. Here we refer to type I errors (B companies classified as N-B) and type II errors (N-B companies classified as B). keywords: altman; analysis; bankruptcy; companies; model; prediction; total cache: ijccc-464.pdf plain text: ijccc-464.txt item: #865 of 981 id: ijccc-4644 author: Mazher Iqbal, J.L .; Senthil Kumar, M.; Mishra, Geetishree; Asha G R; Saritha A N; Karthik, A; BonthuKotaiah N title: Facial emotion recognition using geometrical features based deep learning techniques date: 2023-06-20 words: 9199 flesch: 49 summary: The NFC will shave down hair so that facial features may be extracted more easily for use in emotional analysis. Yet, the NFC would be capable of removing facial features, such as age and gender, while the hair remains intact. keywords: accuracy; cnn; computer; dataset; distance; emotion; expression; face; features; gemep; https://doi.org/10.15837/ijccc.2023.4.4644; layer; manet; model; mug; network; performance; points; recognition; results; routing; state; system cache: ijccc-4644.pdf plain text: ijccc-4644.txt item: #866 of 981 id: ijccc-4646 author: Turskis, Zenonas; Bausys, Romualdas; Smarandache, Florentin; Kazakeviciute-Januskeviciene, Giruta; Zavadskas, Edmundas Kazimieras title: M-generalised q-neutrosophic extension of CoCoSo method date: 2022-01-09 words: 5397 flesch: 50 summary: Pythagorean fuzzy MCDM method based on CoCoSo and CRITIC with score function for 5G industry evaluation, Artificial Intelligence Review, 53, 3813– 3847, 2020. Fuzzy decision making method based on CoCoSo with critic for financial risk evaluation, Technological and Economic Development of Economy, 26(4), 695–724, 2020. keywords: cocoso; compromise; construction; criteria; decision; making; mcdm; method; neutrosophic; selection; set; sets; solution cache: ijccc-4646.pdf plain text: ijccc-4646.txt item: #867 of 981 id: ijccc-465 author: Cubillos, Claudio; Dí­az, René; Urra, Enrique; Cabrera-Paniagua, Daniel; Cabrera, Guillermo; Lefranc, Gastón title: An Agent-Based Solution for the Berth Allocation Problem date: 2013-06-02 words: 4742 flesch: 55 summary: (b) Input file example with distribution of ships arrival. Hence, it was decided to remove the restriction of the original heuristic as to allow slack times between ship arrivals, providing a more realistic scenario. keywords: agent; allocation; architecture; bap; berth; dock; port; problem; ships; system; time cache: ijccc-465.pdf plain text: ijccc-465.txt item: #868 of 981 id: ijccc-4650 author: Musat, Bogdan; Andonie, Razvan title: Information Bottleneck in Deep Learning - A Semiotic Approach date: 2022-01-09 words: 7909 flesch: 49 summary: In practical terms, we study the evolution of spatial entropy of CNN saliency maps to validate/invalidate the IB principle. In our experiments, we noticed a pattern similar to the fitting and compression phases appearing in the evolution of spatial entropy. keywords: bottleneck; compression; entropy; evolution; fitting; information; layers; learning; maps; network; phase; principle; process; saliency; saliency maps; superization; theory; training cache: ijccc-4650.pdf plain text: ijccc-4650.txt item: #869 of 981 id: ijccc-4665 author: Simo, Attila; Dzitac, Simona; Dzitac, Domnica title: First Responders' Localization and Health Monitoring During Rescue Operations date: 2022-01-10 words: 5283 flesch: 45 summary: However, with appearance of low-cost depth and 3D- sensors, research community reported on advanced navigation/camera tracking algorithms based on captured 3D data [5] and stereo/depth data [6]. All together, the 3D geo-map, carrier’ positions, important labels, alerts and decision support data are visualized onto multiple layers on coordinator’ displays. keywords: actors; algorithms; data; figure; fire; human; localization; location; object; operation; project; sensors; slam; system; time cache: ijccc-4665.pdf plain text: ijccc-4665.txt item: #870 of 981 id: ijccc-4666 author: Jenila, L.; Aroul Canessane, R. title: Cross Layer based Energy Aware and Packet Scheduling Algorithm for Wireless Multimedia Sensor Network date: 2023-04-03 words: 6362 flesch: 56 summary: The scheduling of packets is a crucial issue in wireless multimedia sensor networks because the network’s limited resources, such as bandwidth and power, must be carefully controlled to guarantee that data may be transferred effectively and without interference. Wireless multimedia sensor networks have several key characteristics that distinguish them from other types of wireless networks: Heterogeneity: WMSNs typically consist of a large number of diverse sensors with different capabilities and requirements. keywords: cross; data; energy; layer; multimedia; network; node; packets; path; rate; scheduling; sensor; transmission; wireless cache: ijccc-4666.pdf plain text: ijccc-4666.txt item: #871 of 981 id: ijccc-467 author: Găianu, Mihail; Cristescu, Gabriela; M. OnchiÅŸ, Darian title: Erosion based Method for Quantification of Facial Palsy date: 2013-06-02 words: 4074 flesch: 58 summary: We plan to employ generative face models (i.e., models that can produce synthetic face images) which can be used for visualization of prognosis appearance of the patient’s mimic and facial movements. Keywords: distance, deletable point, interest point of mimic, Univalue Segment Assimilating Nucleus. keywords: 1)h; face; image; interest; mimic; operation; patient; points cache: ijccc-467.pdf plain text: ijccc-467.txt item: #872 of 981 id: ijccc-468 author: Lozano-Garzon, Carlos; Ortiz-Gonzalez, Nicolas; Donoso, Yezid title: A Proactive VHD Algorithm in Heterogeneous Wireless Networks for Critical Services date: 2013-06-02 words: 3641 flesch: 51 summary: [10] W. Zhang, Handover decision using fuzzy MADM in heterogeneous networks, IEEE Wireless Commun and Networking Conference, WCNC., Atlanta, USA, 2:653- 658, 2010. [13] A. Ismail, B. Roh, Adaptive Handovers in heterogeneous networks using fuzzy MAD, Int Conf on Mobile IT Convergence, Gumi, Korea, 99-104, 2011. keywords: algorithm; decision; handover; interface; networks; parameters; services; time; user; wireless cache: ijccc-468.pdf plain text: ijccc-468.txt item: #873 of 981 id: ijccc-4683 author: Teodorescu, Horia-Nicolai title: Improve the design and testing of fuzzy systems with a set of (almost) simple rules date: 2022-01-19 words: 4542 flesch: 53 summary: Throughout the article, we use the following typical abbreviations: FLS fuzzy logic system mf(s) membership function(s) c.o.g. center of gravity (defuzzification method) Beyond the above discussion, there is at least one sense of understanding the robustness of FLSs, namely that given in the FLSs’ property: Property of low sensitivity of FLSs to the change in input m.f.s. keywords: control; fls; flss; function; fuzzy; input; m.f.s; output; systems cache: ijccc-4683.pdf plain text: ijccc-4683.txt item: #874 of 981 id: ijccc-469 author: Mazurczyk, Wojciech; KaraÅ›, Maciej; Szczypiorski, Krzysztof title: SkyDe: a Skype-based Steganographic Method date: 2013-06-02 words: 5342 flesch: 56 summary: SkyDe utilizes encrypted Skype voice packets as a hidden data carrier. An experimental test-bed was set up (Fig. 2) that included two Skype clients (Skype for Linux v. 2.2.0.35 and for Windows v. 6.0.60.126) and a Linux-based application designed and developed by authors that could intercept Skype packets before they reached (for the transmitting side) and after they entered the (for the receiving side) network interface. keywords: bandwidth; data; method; network; packets; quality; secret; silence; skype; traffic; voice cache: ijccc-469.pdf plain text: ijccc-469.txt item: #875 of 981 id: ijccc-4694 author: Filip, Florin Gheorghe title: In Memoriam: Prof. Ioan Dzitac - Editorial date: 2022-01-24 words: 1283 flesch: 40 summary: Prof. Ioan Dzitac will forever live in the hearts of those who knew him. In Memoriam: Prof. Ioan Dzitac Editorial In 2021, the International Journal for Computers, Communications and Control (IJCCC) en- tered its 16th year of existence. keywords: dzitac; ijccc; ioan; issue; journal; university cache: ijccc-4694.pdf plain text: ijccc-4694.txt item: #876 of 981 id: ijccc-4696 author: Wang, Yong title: Online Healthcare Privacy Disclosure User Group Profile Modeling Based on Multimodal Fusion date: 2022-09-29 words: 9055 flesch: 38 summary: Through many research results on user information disclosure, researchers found that users compare their expected benefits and possible risks in the process of whether to disclose their privacy. In the future, we will further explore the privacy disclosure intention of online healthcare users by combining privacy protection, domestic and international service platform differences, and demographic factors to further assist the development of online healthcare privacy platforms 6 Conclusion To address the challenges of user privacy disclosure in current online healthcare platforms, this paper proposes a multimodal fusion user profile modeling method. keywords: behavior; data; disclosure; disclosure behavior; fusion; healthcare; healthcare privacy; information; intention; online; online healthcare; paper; platform; privacy disclosure; profile; term; term disclosure; user; willingness cache: ijccc-4696.pdf plain text: ijccc-4696.txt item: #877 of 981 id: ijccc-4697 author: Bouhamed, Heni; Hamdi, Monia; Gargouri, Rahma title: Covid-19 Patients' Hospital Occupancy Prediction During the Recent Omicron Wave via some Recurrent Deep Learning Architectures date: 2022-03-14 words: 4138 flesch: 49 summary: To train the model, we referred to Covid-19 hospital occupancy data from 15 countries whose curves started their regressions during January 2022. To predict Covid-19 hospital occupancy, we tested some recurrent deep learning architectures. keywords: covid-19; data; hospital; learning; model; occupancy; omicron; prediction; rate; vaccination; variant cache: ijccc-4697.pdf plain text: ijccc-4697.txt item: #878 of 981 id: ijccc-470 author: Mendoza, Jorge E.; López, Miguel; Fingerhuth, Sebastií¡n; Carvajal, Felipe; Zuñga, Gonzalo title: Comparative Study of Methods for Estimating Technical Losses in Distribution Systems with Distributed Generation date: 2013-06-02 words: 5926 flesch: 59 summary: EPSG are annual energy losses without the generator, in MWh and PPSGi are power losses in the system obtained with the power flow for each demand scenario, without the DG. This way, power losses are obtained for the 9 cases. keywords: curve; demand; distribution; energy; generation; losses; method; power; table; year cache: ijccc-470.pdf plain text: ijccc-470.txt item: #879 of 981 id: ijccc-471 author: Suryanto, Yohan; Nasser, Rizki Reynaldo; Sari, Riri Fitri title: Performance Comparison of TCP Spoofing and End to End Approach to Enable Partial QoS on IP Based Network date: 2015-04-28 words: 5498 flesch: 56 summary: Even in cases where the Internet network delay product characteristics are relatively high, partial QoS spoofing technique has a much better performance than end-to-end QoS. Keywords: TCP Spoofing, partial QoS, End to End Approach, Performance Com- parison, Wireless Network, Internet, IP based network. 3 Proposed solution In this paper we propose the use of TCP spoofing techniques to enable the partial QoS. TCP Spoofing is a method to intercept TCP. keywords: end; end approach; network; partial; priority; qos; spoofing; tcp; throughput; time; user cache: ijccc-471.pdf plain text: ijccc-471.txt item: #880 of 981 id: ijccc-4714 author: Shi, Yong; Xue, Xiaodong; Xue, Jiayu; Qu, Yi title: Fault Detection in Nuclear Power Plants using Deep Leaning based Image Classification with Imaged Time-series Data date: 2022-02-03 words: 8944 flesch: 47 summary: In addition, we will focus on the processes of exact methods for encoding time-series numeric data into images and deep learning based image classification models, which will be elaborated while the specifics of experiments like dimension reduction of data and image concatenation will be fully illustrated in Section 4. 0 50 100 150 200 250 300 350 1 51 101 151 201 Time Series Dimension Reduction Encoding Time Series to Images Un-Thresholded Recurrence Plot (UTRP) Markov Transition Field (MTF) Gramian Angular Summary Field (GASF) Gramian Angular Difference Field (GADF) Deep Learning Architectures CNN-based Models Transformer-based Models MLP-based Models Output: Fault Class Image Concatenation Figure 1: The precise process of the two-stage fault detection methodology in NPPs 3.1 Data processing & transformation Obviously the transformed images as experimental data certainly will affect the results and perfor- mance of fault detection. Due to the lack of real images from NPPs, we also consider to transform the numeric time- series data into images with four major methods to make deep learning based image classifying models https://doi.org/10.15837/ijccc.2022.1.4714 3 applicable. keywords: classification; cnn; data; deep; detection; diagnosis; fault; image; learning; methods; mlp; models; npps; nuclear; power; series; time; transformer cache: ijccc-4714.pdf plain text: ijccc-4714.txt item: #881 of 981 id: ijccc-4732 author: Filip, Florin Gheorghe title: Collaborative Decision-Making: Concepts and Supporting Information and Communication Technology Tools and Systems date: 2022-02-20 words: 4671 flesch: 39 summary: Next section contains a review of basic aspects of collaborative decision-making concept, such as decision problems, activities involved, collaborative group definition, and the process of adopting and releasing collaborative decisions. Having presented the classification of decision problems and decision-making units, the main phases of a specific multi-participant form of Herbert Simon’s decision process model are described followed by the presentation of two main forms of close and soft collaboration, namely consensus building and crowdsourcing, respectively. keywords: collaboration; consensus; crowdsourcing; decision; group; information; making; participant; process; support; systems; tools cache: ijccc-4732.pdf plain text: ijccc-4732.txt item: #882 of 981 id: ijccc-4741 author: Ban, Olimpia I.; Droj, Laurențiu; Tușe, Delia; Droj, Gabriela; Bugnar, Nicoleta title: Data Processing by Fuzzy Methods in Social Sciences Researches. Example in Hospitality Industry date: 2022-03-05 words: 9139 flesch: 65 summary: Li (2013, p. 1613) calls on previous studies that have claimed that fuzzy scales are more accurate than traditional scales due to the continuous nature of fuzzy sets. Li ([34], p. 1613) calls on previous studies that have claimed that fuzzy scales are more accurate than traditional scales due to the continuous nature of fuzzy sets. keywords: analysis; attributes; choice; data; gap; hotel; importance; ipca; likert; numbers; performance; scale; table cache: ijccc-4741.pdf plain text: ijccc-4741.txt item: #883 of 981 id: ijccc-4749 author: Wang, Yiying; Xu, Zeshui title: A Multi-objective Location Decision Making Model for Emergency Shelters Giving Priority to Subjective Evaluation of Residents date: 2022-07-20 words: 12443 flesch: 66 summary: Emergency planning includes evacuation of disaster victims, site selection and construction of emergency shelters, etc. However, the location of emergency shelters and evacuation of disaster victims are complex issues, involving many factors, while the single-objective model ignores some im- portant objectives [10]. keywords: demand; demand point; distance; emergency; emergency shelters; hjloqstvwx; model; point; residents; score; site; table cache: ijccc-4749.pdf plain text: ijccc-4749.txt item: #884 of 981 id: ijccc-475 author: Zhang, Ning; Zhang, Xuemei; Liu, Haitao; Zhang, Dengfeng title: Optimization Scheme of Forming Linear WSN for Safety Monitoring in Railway Transportation date: 2014-10-11 words: 4495 flesch: 65 summary: Ng as sink node number in each group, hence the group number: N = Ns/Ng, where Ng can be decided using the following method: Optimization Scheme of Forming Linear WSN for Safety Monitoring in Railway Transportation 803 We assume the channel error as ec, average data length as DL(bit), sending data from arbi- trary node to sink node has a successful rate no smaller than rd, we can easily derive that the maximum hop count hMAX: hMAX The switching algorithm of group head nodes is put forward, so that the energy consumption of each node in the group is even. keywords: data; energy; group; monitoring; network; node; number; sensor; sink cache: ijccc-475.pdf plain text: ijccc-475.txt item: #885 of 981 id: ijccc-4756 author: S, Arul Jothi; Venkatesan R title: A Deep Learning Approach for Efficient Anomaly Detection in WSNs date: 2023-02-09 words: 8235 flesch: 50 summary: From the comparison, it is identified that the proposed deep learning model consumes reduced energy than existing deep learning models and energy models for AD. Reconstruction error comparison of proposed model the AUC score obtained for the FANN model using HL 0.98 is compared to AMSE 0.96. keywords: accuracy; activation; analysis; anomaly; data; detection; energy; error; fann; figure; function; instances; learning; loss; model; network; neural; proposed; sensor cache: ijccc-4756.pdf plain text: ijccc-4756.txt item: #886 of 981 id: ijccc-4781 author: Shakila, R. ; Paramasivan (Balasubramanian), B. title: Opportunity Based Energy Efficient Routing Algorithm for Underwater Wireless Sensor Network for Submarine Detection date: 2022-09-29 words: 6024 flesch: 54 summary: The distance vectors, which have lowest hop counts in the direction of sink for underwater sensor nodes are determined by ODVR through a query method. Light-weight signaling with opportunistic routing: The ODVR requires no complicated signaling from the query method to determine the distance vector of underwater nodes. keywords: data; distance; energy; forwarding; hop; networks; nodes; odvr; packet; routing; sensor; sink; underwater cache: ijccc-4781.pdf plain text: ijccc-4781.txt item: #887 of 981 id: ijccc-48 author: Ilic, Sinisa Stevan; Zoric, Aleksandar Cedomir; Spalevic, Petar; Lazic, Ljubomir title: Multithreaded Aapplication for Real-Time Visualization of ECG Signal Waveforms and Their Spectrums date: 2013-08-01 words: 5876 flesch: 55 summary: Some of the tools for processing of ECG signal that can be implemented in this device are: segmentation (recognition and separation of ECG signal parts) 6 Conclusion The PC based ECG device is a solution for real time complex signal processing in analysis of ECG signal. keywords: coefficients; data; ecg; ecg signal; frequency; function; samples; signal; state; thread; time; window cache: ijccc-48.pdf plain text: ijccc-48.txt item: #888 of 981 id: ijccc-4800 author: Qin, Bo; Fan, Yongqing; Yang, Shuo title: Distributed Adaptive Control for Nonlinear Heterogeneous Multi-agent Systems with Different Dimensions and Time Delay date: 2022-07-20 words: 5570 flesch: 80 summary: Because neural networks are a broad approximation strategy for existing unknown nonlinear functions or uncertain models in many challenging areas, and a large number of control algorithms for nonlinear multi-agent systems have been proposed in the last few years in [18, 19, 20]. Up till now, the uniformly bounded stability problem of nonlinear multi-agent systems with various nodes and dimensions is solved in [21, 22, 23], and a novel distributed adaptive control with similar parameters is proposed. keywords: agent; control; multi; neural; nonlinear; systems; τ(t; −0.1; −0.2; −0.3 cache: ijccc-4800.pdf plain text: ijccc-4800.txt item: #889 of 981 id: ijccc-4815 author: Obeidat, Alaa; Al-shalabi, Mohammed title: An Efficient Approach towards Network Routing using Genetic Algorithm date: 2022-09-29 words: 5817 flesch: 56 summary: Many fields including navigation systems and transportation employ GA for solving optimal path problems. • Compare the proposed algorithm with other routing protocols, such as RIP. • Use genetic algorithms to build a new routing approach: always finding the optimum route in any network. keywords: algorithm; chromosomes; cost; crossover; fitness; network; node; path; routing; solution cache: ijccc-4815.pdf plain text: ijccc-4815.txt item: #890 of 981 id: ijccc-4854 author: Breaz, Teodora Odett; Fulop, Melinda Timea; Cioca, Lucian Ionel title: The role of E-Learning generated by the COVID-19 epidemic in higher education date: 2022-09-29 words: 6832 flesch: 43 summary: The first systematic debates around e-learning occurred in the late 1990s; at the equivalent period, they encouraged the primary methodical efforts at providing a characterization. The acceptance investigation of e-learning was conducted in the context of this research using two systems. keywords: acceptance; development; digitalization; education; journal; learning; model; new; research; students; teaching; technology; universities; university; use cache: ijccc-4854.pdf plain text: ijccc-4854.txt item: #891 of 981 id: ijccc-4861 author: Montoya, Germán A. ; Lozano-Garzón, Carlos ; Donoso, Yezid title: A Stochastic Mobility Prediction Algorithm for finding Delay and Energy Efficient Routing Paths considering Movement Patterns in Mobile IoT Networks date: 2022-07-20 words: 4517 flesch: 54 summary: In this sense, our mobility prediction algorithm obtained the best solutions in terms of delay and energy consumption compared against not using prediction techniques (the Distance and Random algorithms) independently of the number of network nodes and the level of movement randomness. Due to IoT nodes are attached to humans, animals or objects, they present a specific movement pattern that can be analyzed to improve the path-building with the aim of reducing the end-to-end delay. keywords: algorithm; consumption; energy; iot; mobility; movement; network; node; prediction cache: ijccc-4861.pdf plain text: ijccc-4861.txt item: #892 of 981 id: ijccc-4862 author: Li, Yangxue; Cabrerizo, Francisco Javier; Herrera-Viedma, Enrique; Morente-Molinera, Juan Antonio title: A Modified Uncertainty Measure of Z-numbers date: 2022-07-20 words: 4328 flesch: 64 summary: Total utility of z-number. A method of converting z-number to classical fuzzy number. keywords: information; number; probability; uncertainty; value cache: ijccc-4862.pdf plain text: ijccc-4862.txt item: #893 of 981 id: ijccc-4863 author: Macuada, Claudio Javier; Oddershede, Astrid María; Quezada, Luis Ernesto; Palominos, Pedro Iván title: Decision Support Model for Raw Water Availability for Purification in a Region in Chile date: 2022-07-20 words: 3580 flesch: 39 summary: INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL Online ISSN 1841-9844, ISSN-L 1841-9836, Volume: 17, Issue: 4, Month: August, Year: 2022 Article Number: 4863, https://doi.org/10.15837/ijccc.2022.4.4863 CCC Publications Decision Support Model for Raw Water Availability for Purification in a Region in Chile C. J. Macuada, A. M. Oddershede, L. E. Quezada, P. I. Palominos Claudio J. Macuada, Astrid M. Oddershede, Luis E. Quezada, Pedro I. Palominos Industrial Engineering Department University of Santiago of Chile, Santiago, Chile claudio.macuada@usach.cl astrid.oddershede@usach.cl luis.quezada@usach.cl pedro.palominos@usach.cl Abstract This article proposes a decision model to identify the most sustainable solution(s) to ensure the availability of raw water to be subsequently treated to be converted into drinking water as a consequence of the climate change scenario, particularly the drought currently experienced by the Metropolitan Region in Chile, derived from the technical and regulatory requirements associated with the availability of water resources from its capture to its drink ability to meet the future demand of the region. “Decision-support framework for the envi- ronmental assessment of water treatment systems”, Journal of Cleaner Production 225. keywords: availability; chile; criteria; decision; drinking; hierarchy; model; system; wastewater; water cache: ijccc-4863.pdf plain text: ijccc-4863.txt item: #894 of 981 id: ijccc-4865 author: Jianu, Marilena; Daus, Leonard; Nagy, Mariana; Beiu, Roxana-Mariana title: Approximating the Level Curves on Pascal’s Surface date: 2022-07-20 words: 5541 flesch: 68 summary: Promenade around Pascal triangle—Number motives, Bull. Math. Keywords: Pascal’s triangle, Pascal’s surface, binomial coefficients, reliability polynomials. keywords: binomial; coefficients; june; pascal; reliability; stirling; surface; triangle cache: ijccc-4865.pdf plain text: ijccc-4865.txt item: #895 of 981 id: ijccc-4886 author: Ivanescu, Renato Constantin; Belciug, Smaranda; Nascu, Andrei ; Serbanescu, Mircea Sebastian; Iliescu, Dominic Gabriel title: Evolutionary Computation Paradigm to Determine Deep Neural Networks Architectures date: 2022-09-29 words: 5027 flesch: 52 summary: A score-based method for quality control of fetal images at routine second trimester ultrasound examination. Learning deep neural networks’ architectures using differential evolution. keywords: architecture; chromosomes; craiova; dataset; images; layer; learning; results; romania cache: ijccc-4886.pdf plain text: ijccc-4886.txt item: #896 of 981 id: ijccc-49 author: Yoo, Donghee; No, Sungchun; Ra, Minyoung title: A Practical Military Ontology Construction for the Intelligent Army Tactical Command Information System date: 2014-01-03 words: 3174 flesch: 43 summary: Keywords: military ontology, ontology building methodology, ATCIS. 3 Practical military ontology construction 3.1 Building scope of military ontology keywords: atcis; concepts; information; knowledge; military; ontology; service cache: ijccc-49.pdf plain text: ijccc-49.txt item: #897 of 981 id: ijccc-4901 author: Chanchí Golondrino, Gabriel Elías; Ospina Alarcón, Manuel Alejandro; Sierra Martínez, Luz Marina title: Determination of the satisfaction attribute in usability tests using sentiment analysis and fuzzy logic date: 2023-05-09 words: 6459 flesch: 39 summary: Similarly, the fuzzy system made use of the javacsv library for processing the system input files, which contain the post-test ques- tionnaire data associated with user satisfaction and opinions regarding the interaction. Keywords: fuzzy logic, satisfaction level, sentiment analysis, usability. keywords: analysis; attribute; input; level; questionnaire; satisfaction; satisfaction level; sentiment; system; test; usability; user cache: ijccc-4901.pdf plain text: ijccc-4901.txt item: #898 of 981 id: ijccc-4929 author: Saida, D.; Premchand, P. title: Brain Tumor Identification using Dilated U-Net based CNN date: 2022-12-14 words: 4886 flesch: 48 summary: A hy- brid fuzzy brain-storm optimization algorithm for the classification of brain tumor MRI images, Journal of ambient intelligence and humanized computing, 1-9. Figure 7: The architecture of proposed dilated based U-Net model 4 Results and Discussion The results obtained by the proposed method are evaluated in terms of accuracy, F-score, precision, and recall of the model. keywords: accuracy; brain; brain tumor; cnn; data; image; model; net; segmentation; tumor cache: ijccc-4929.pdf plain text: ijccc-4929.txt item: #899 of 981 id: ijccc-4952 author: Yang, Haining; Gao, Xuedong ; Han, Lei ; Cui, Wei title: A financial time series data mining method with different time granularity based on trend Division date: 2022-12-14 words: 7501 flesch: 53 summary: However, in the actual analysis of time series data, it is often necessary to analyze the local characteristics of time series, such as finding the frequent patterns, comparing different sequences or whether the same sequence has similarity in different time periods, etc. Time series records the state values of observation targets at each time point to form complex high- dimensional data. By using the method of time series value recursion, the extreme points of time series are extracted, and the extreme points are taken as deci- sion variables, and the time series decision table is constructed by combining the relevant technical indicators of stock time series and other data. keywords: data; decision; granularity; index; interval; method; model; points; prediction; price; research; stock; support; table; time series; trend cache: ijccc-4952.pdf plain text: ijccc-4952.txt item: #900 of 981 id: ijccc-4957 author: Jerbi, Houssem; Kchaou, Mourad ; Alshammari, Obaid ; Abassi, Rabeh ; Popescu, Dumitru title: Observer-based feedback control of interval-valued fuzzy singular system with time-varying delay and stochastic faults date: 2022-12-14 words: 9670 flesch: 72 summary: Iπ ⊗ ψ̄16ij ∗ ψ̄22 0 0 0 0 ∗ ∗ ψ̄33 0 0 0 ∗ ∗ ∗ ψ̄44 0 0 ∗ ∗ ∗ ∗ −ψ̄55 0 ∗ ∗ ∗ ∗ ∗ −ψ̄66   Υ1ij = col { B̄Γij 0 0 0 0 0 √ d1 2 B̄Γij √ d12 2 B̄Γij √ d12B̄Γij 0 B̄>Σij } Υ3l Ξ̂26i ∗ ∗ Ξ̂33i −Q̄12 Ξ̂35i 0 ∗ ∗ ∗ Ξ̂44i 0 0 ∗ ∗ ∗ ∗ Ξ̂55i −S̄12 ∗ ∗ ∗ ∗ ∗ Ξ̂66i   Ξ̄11ijl = Q̄11 + S̄11 + Q̄1 + sym(M̄1Ē>) + sym(Āijl) Ξ̄12i = Ādi Ξ̄13i = Q̄12 −M̄1Ē> keywords: actuator; control; controller; delay; design; faults; functions; fuzzy; interval; ivf; matrix; membership; non; observer; singular; stochastic; systems; time; ∗ ∗ cache: ijccc-4957.pdf plain text: ijccc-4957.txt item: #901 of 981 id: ijccc-4973 author: S.R. Janani; R. Subramanian; S. Karthik; C. Vimalarani title: Healthcare Monitoring using Machine Learning Based Data Analytics date: 2023-02-09 words: 4885 flesch: 50 summary: [9] reviewed the various types of intelligent health monitoring systems and zeroed in on the benefits and drawbacks of the technologies now in use in health care systems. Utilizing deep learning technology can assist reduce the number of errors that arise in IoMT smart health systems. keywords: data; disease; health; healthcare; iomt; iot; learning; machine; model; monitoring; patient; system cache: ijccc-4973.pdf plain text: ijccc-4973.txt item: #902 of 981 id: ijccc-498 author: Costin, Hariton; Geman, Oana title: Parkinson’s Disease Prediction Based on Multistate Markov Models date: 2013-07-12 words: 5437 flesch: 64 summary: [22] Key, R. (1986); A Markov model for analyzing cancer markers and disease states in survival studies, Biometrics, 42: 855-865. Xmin 382 385 396 398 399 Xmed 785 792 784 796 795 Xmax 837 857 912 944 946 Ymin 518 537 544 586 585 Ymed 457 459 467 489 488 Ymax 354 359 373 382 380 Zmin 257 282 278 310 308 Zmed 528 549 558 568 566 Zmax 1300 1329 1348 1399 1398 4 Conclusions In this paper we describe a general purpose model of PD prognosis based on Markov process and show how this simple mathematical tool may be used to generate detailed and accurate assessments of Parkinson’s disease stage and therefore may be applicable in medical screening for PD. keywords: disease; markov; matrix; parkinson; state; system; transition; tremor; vector cache: ijccc-498.pdf plain text: ijccc-498.txt item: #903 of 981 id: ijccc-4981 author: AlFayez, Fayez ; Bouhamed, Heni title: Machine learning and uLBP histograms for posture recognition of dependent people via Big Data Hadoop and Spark platform date: 2023-02-09 words: 5292 flesch: 57 summary: Although it is undeniably efficient in the field of image recognition, many researches have acknowledged that the CNN architecture is difficult to implement [10, 17, 23, 29]. 3 Machine learning formalism selection, application platform and performance evaluation During the conventional use of different machine learning formalisms in image classification, the exploited input is generally made up of the images all pixels. keywords: binary; cnn; data; fall; forest; hadoop; histograms; image; learning; machine; number; recognition; results; ulbp cache: ijccc-4981.pdf plain text: ijccc-4981.txt item: #904 of 981 id: ijccc-4988 author: Zhang, Mingyang; Lu, Jiayue ; Ma, Ning ; Cheng, T.C. Edwin ; Hua, Guowei title: A Feature Engineering and Ensemble Learning Based Approach for Repeated Buyers Prediction date: 2022-12-14 words: 8055 flesch: 50 summary: Further, user data can be divided into. https://doi.org/10.15837/ijccc.2022.6.4988 3 2 Literature Review In this paper, we use user behaviour data to predict whether he/she will become a repeat buyer. keywords: behaviour; commerce; data; engineering; ensemble; feature; journal; learning; machine; merchant; model; prediction; purchase; repeat; research; results; table; user cache: ijccc-4988.pdf plain text: ijccc-4988.txt item: #905 of 981 id: ijccc-4998 author: Alshammari, Mohammed; Alshammari, Aadil title: Friend Recommendation Engine for Facebook Users via Collaborative Filtering date: 2023-04-03 words: 4728 flesch: 55 summary: We propose a model using the matrix factorization technique that leverages interactions between Facebook users and generates a list of friendship connections that are very likely to be interactive. This finding correlates with what was reported about the low interaction rate among Facebook users. keywords: algorithm; data; facebook; friends; interactions; model; number; recommendation; recommender; systems; users cache: ijccc-4998.pdf plain text: ijccc-4998.txt item: #906 of 981 id: ijccc-50 author: P, santhi; Bhaskaran, V.Murali title: Improving the Efficiency of Image Clustering using Modified Non Euclidean Distance Measures in Data Mining date: 2014-01-03 words: 1611 flesch: 60 summary: The clustering is having many algorithms are partitioned based clustering, Hierarchical based clustering, dense based clustering and distribution based clustering. Display the output of pixel clustering In concentric circle based clustering; only one centre is used for all the clusters. keywords: clustering; distance; euclidean; image cache: ijccc-50.pdf plain text: ijccc-50.txt item: #907 of 981 id: ijccc-500 author: Mishra, Jaydev; Ghosh, Sharmistha title: Uncertain Query Processing using Vague Set or Fuzzy Set: Which One Is Better? date: 2014-10-11 words: 5351 flesch: 71 summary: It has been shown with examples that vague sets give more accurate result in comparison with fuzzy sets for any uncertain query. for each fuzzy/vague attribute do begin fdata ← data value for the fuzzy/vague attribute of the query range = maxDomainValue - minDomainValue avg ← mean value of the domain set of the fuzzy/vague attribute B ← avg while(avg ≤ range) do begin avg = avg + B end while loop for each tuple of the relation do begin tupleValue ← corresponding tuple value from the fuzzy/vague attribute domain membershipValue = 1-(|fdata-tupleValue| / avg) end for loop of tuple end for loop of fuzzy/vague attribute 5 Vague Sets have an extra edge over Fuzzy Sets In this section, we have experimentally shown with real life examples that vague sets give more accurate result than fuzzy sets. keywords: data; prof; query; set; sets; similarity; vague cache: ijccc-500.pdf plain text: ijccc-500.txt item: #908 of 981 id: ijccc-5004 author: Badulescu, Alina; Badulescu, Daniel; Simut, Ramona; Herte, Elena; Borma, Afrodita; Pandelica, Ionut title: Digitalisation and the sharing economy. A survey-based research on Airbnb in Romania date: 2022-12-14 words: 8612 flesch: 49 summary: Trust in the technology used by sharing platforms declines slightly with age, with the 46+ age group having an average trust in technology and IT systems. Nonetheless, the wide acceptance and use of sharing platforms is influenced by the quantity and relevance of included information, i.e. that suggestions provided are aimed at supporting their users in various decision-making processes, such as what items to buy, what music to listen, or what news to read [20, p. 231]. keywords: accommodation; age; airbnb platform; analysis; book; case; decision; economy; respondents; sample; sharing; tourists; trust; use cache: ijccc-5004.pdf plain text: ijccc-5004.txt item: #909 of 981 id: ijccc-5005 author: Wang, Quan Hai; Lan, Shao-Feng; Zhang, Dian; Wang, Yi-Qun; Zhu, Qun-Xi; Chen, Wen-Bai title: Invulnerability Improvement of Multipath Protocols in Different Scenarios date: 2023-04-10 words: 6555 flesch: 48 summary: https://doi.org/10.15837/ijccc.2023.3.5005 Introduction Modeling process of mobile multi-agent network Invulnerability of mobile multi-agent network Mobile multi-agent Invulnerability Simulation Platform Network impairment model Impairment model design Construction of network damage model based on OPNET Improved MD_ AODV multipath routing protocol Improvement of routing protocol Improved routing protocol design process Analysis on Invulnerability of multipath routing protocol Node damage recovers Invulnerability in network scenarios Network scenario settings Evaluation of Invulnerability Invulnerability under the scenario of irrecoverable network with node damage Network scenario settings Evaluation of Invulnerability Conclusion In this paper, the Invulnerabil- ity of mobile multi-agent network routing protocol will be evaluated in combination with network throughput, reliability and average routing hops. keywords: agent; aodv; damage; data; invulnerability; md_aodv; mobile; multi; network; node; number; protocol; route; routing; routing protocol cache: ijccc-5005.pdf plain text: ijccc-5005.txt item: #910 of 981 id: ijccc-5006 author: Alzyoud, Faisal title: Improved model for traffic accident management system using KDD and big data: case study Jordan date: 2023-05-09 words: 5726 flesch: 48 summary: Semi-structured data does not conform to the formal structure of data models used in relational databases and occurs when two data sources use different languages or schema structures, such as XML and OWL, and can include hosted data, mirage data, or data lake. Big data analysis can be approached in two ways: through data science and mathematical mod- elling. keywords: accidents; analysis; approach; data; factors; information; injuries; kdd; knowledge; model; number; road; study; traffic cache: ijccc-5006.pdf plain text: ijccc-5006.txt item: #911 of 981 id: ijccc-5011 author: Peng, Yunjuan; Qiu, Qi; Zhang, Dalin; Yang, Tianyu; Zhang, Hailong title: Ensemble Learning for Interpretable Concept Drift and Its Application to Drug Recommendation date: 2023-02-09 words: 7757 flesch: 49 summary: It’s important to explain and investigate the causes of drift, so as to ensure the reliability of drug recommendation system. Investigating and explaining the causes of drift is very important to provide reliability of drug recommendation systems and improve the ability to predict future drift. keywords: accuracy; base; block; classification; classifier; concept; concept drift; data; drift; drug; ensemble; medical; new; online; recommendation; recommendation system; results; system; time cache: ijccc-5011.pdf plain text: ijccc-5011.txt item: #912 of 981 id: ijccc-5013 author: Deng, Lei; Wang, Zhaoyang; Sun, Haoyang; Li, Bo; Yang, Xiao title: A deep reinforcement learning-based optimization method for long-running applications container deployment date: 2023-06-20 words: 8640 flesch: 48 summary: The above greatly complicates container deployment and can easily lead to performance bottlenecks. The above problems greatly complicate container deployment and easily lead to performance bottlenecks. keywords: algorithm; batch; cluster; container; deployment; drl; figure; learning; lras; machine; memory; model; node; performance; pod; resource; scheduler; scheduling; simulation; time; training cache: ijccc-5013.pdf plain text: ijccc-5013.txt item: #913 of 981 id: ijccc-5029 author: Sarfraz, Muddassar; YE, Zhixiao; Dragan, Florin; Ivascu, Larisa; Artene, Alin title: Digital Transformation Strategy and Environmental Performance: A Case Study date: 2022-12-14 words: 7147 flesch: 36 summary: The results reveal that digital transformation strategy (DTS) positively and significantly affects innovation capabilities and environmental performance. Indeed, owning to the far-reaching consequences of digital transformation, the profound innovations taking over the world’s major indus- tries have made businesses adopt digital transformation strategies to achieve the goals. keywords: capabilities; culture; digital; firms; innovation; innovation capabilities; organization; performance; role; strategy; study; transformation; transformation strategy; vol cache: ijccc-5029.pdf plain text: ijccc-5029.txt item: #914 of 981 id: ijccc-5039 author: Simo, Attila; Dzitac, Simona; Badea, Gabriela Elena; Meianu, Dragos title: Smart Agriculture: IoT-based Greenhouse Monitoring System date: 2022-12-14 words: 5807 flesch: 51 summary: Figure 4: Environment monitoring device – prototype It is the responsibility of the embedded software to collect data from sensors, package the data, and send it to the data server, from where data is retrieved and displayed for viewing and analysis. https://doi.org/10.3390/pr10112402 [24] Aiello, G.; Giovino, I.; Vallone, M.; Cata-nia, P.; Argento, A. A decision support sys-tem based on multi sensor data fusion for sustainable greenhouse management. keywords: agriculture; control; data; device; energy; greenhouse; humidity; internet; iot; monitoring; sensor; soil; temperature; things cache: ijccc-5039.pdf plain text: ijccc-5039.txt item: #915 of 981 id: ijccc-504 author: He, Liwen; Huang, Feiyi; Zhang, Jie; Liu, Bin; Chen, Chunling; Zhang, Zonghua; Yang, Yang; Lu, Weifeng title: Dynamic Secure Interconnection for Security Enhancement in Cloud Computing date: 2016-03-24 words: 4716 flesch: 45 summary: Virtual bridges control the communication among DSI clients by relaying, blocking or rate-limiting packets to establish virtual trust zones. In particular, virtual trust zones can be established by building the tunnels among virtual bridges. keywords: cloud; computing; data; dsi; interconnection; management; security; server; trust; virtual; vms cache: ijccc-504.pdf plain text: ijccc-504.txt item: #916 of 981 id: ijccc-5045 author: Gao, Fei; Yang, Jing; Yang, Yang; Yuan, Xiaojing title: WOMDI-Apriori Data Mining Algorithm for Clustered Indicators Analysis of Specialty Groups in Higher Vocational Colleges date: 2023-05-09 words: 8281 flesch: 33 summary: Figure 4: Scatter plot of association rule mining results The scatter plot of association rules of the mining results in Figure 4 shows that the relative support of some association rules ranges from 0.30 to 0.65, and another part ranges from 0.75 to 0.95, indicating that high-frequency rules and low-frequency rules coexist among all threshold-eligible rules; from the confidence index, the relative confidence of most association rules is between 0.3 and 1, but the region below 0.9 relative confidence has a lighter color, which means that the relative lift of this part of association rules is not enough, and it is possible that the association rules with insufficient degree of association between item sets or even invalid ones; meanwhile, for the lift index, by observing the colors in the scatter plot, about half of the association rules have a relative lift less than 1, indicating that a large proportion of the rules fail to satisfy the constraint of a lift greater than 1, i.e., they are invalid association rules. 5.4 Recommendations based on association rule mining results For association rules in Tables 2 and 3 where the successor of the mining results is dominated by negative results, measures should be taken to avoid or reduce the possibility of their occurrence as much as possible. keywords: algorithm; apriori; association; association rules; data; high; item; mining; number; results; rules; specialty; support; time; value cache: ijccc-5045.pdf plain text: ijccc-5045.txt item: #917 of 981 id: ijccc-5049 author: Yang, Bin; Li, Huilai; Xing, Ying; Zeng, Fuping; Qian, Chengdong; Shen, Youzhi; Wang, Jiongbo title: Directed Search Based on Improved Whale Optimization Algorithm for Test Case Prioritization date: 2023-04-03 words: 9729 flesch: 52 summary: However, to overcome the shortcomings of slow convergence speed and easy fall into local optimum, the improved whale optimization algorithm is proposed for test case prioritization. Secondly, the enhanced whale optimization algorithm is applied to test case prioritization while the backtracking behavior is conducted for individuals when hitting the wall. keywords: algorithm; case prioritization; eet; iteration; number; objective; optimization; optimization algorithm; prioritization; rem; search; software; solution; space; test; test case; whale; woa cache: ijccc-5049.pdf plain text: ijccc-5049.txt item: #918 of 981 id: ijccc-5061 author: Li, Xianshan; Kang, Jingwen; Yang, Yang; Zhao, Fengda title: A Lightweight Attentional Shift Graph Convolutional Network for Skeleton-Based Action Recognition date: 2023-05-09 words: 7202 flesch: 53 summary: Skeleton-based action recognition with shift graph convolutional network, Pro- ceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 183–192, 2020. Richly activated graph convolutional network for robust skeleton-based action recognition, IEEE Transactions on Circuits and Systems for Video Technology, 31(5), 1915–1925, 2020. keywords: action; channel; convolution; graph; graph convolution; information; model; network; recognition; shift; shift graph; skeleton cache: ijccc-5061.pdf plain text: ijccc-5061.txt item: #919 of 981 id: ijccc-5062 author: Pan, Wei; Liu, Cheng title: A Graph-Based Soft Actor Critic Approach in Multi-Agent Reinforcement Learning date: 2023-02-09 words: 6841 flesch: 57 summary: With a counterfactual baseline, COMA achieves a credit assignment under multi agents, avoiding strategic interference from other agents and helping agents learn cooperative strategies while minimizing the influence of other agents as much as feasible. MADDPG and COMA need to use all agents’ state and observation data when constructing their centralized critic networks. In this way, agents can improve their understanding of the overall state of the environment and other agents in the environ- ment while avoiding dimensional explosion. keywords: actor; agents; critic; environment; graph; information; learning; method; multi; network; number; policy; reinforcement; reward; state cache: ijccc-5062.pdf plain text: ijccc-5062.txt item: #920 of 981 id: ijccc-5108 author: Badi Alekhya; R. Sasikumar; N. Sathish Kumar; Bharathiraja, N. title: Hybrid ICHO-HSDC Model For Accurate Covid-19 Detection and Classification From CT Scan And X-Ray Images date: 2023-06-20 words: 6532 flesch: 51 summary: When compared to SVM and CNN, the study provides the best accuracy, with scores of 94.6 for CT scan pictures and 95.6 for X-ray images. Speckle noise removal: In the case of X-ray images, a MADF (Median Absolute Difference Filter) approach is used to remove out generated speckle noise from the test images. keywords: based; chest; classification; cnn; covid-19; detection; feature; figure; hybrid; images; learning; method; model; pictures; ray; scan; svm cache: ijccc-5108.pdf plain text: ijccc-5108.txt item: #921 of 981 id: ijccc-5118 author: Popa, Lorena title: A new ranking method for trapezoidal intuitionistic fuzzy numbers and its application to multi-criteria decision making date: 2023-04-03 words: 7016 flesch: 76 summary: INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL Online ISSN 1841-9844, ISSN-L 1841-9836, Volume: 18, Issue: 2, Month: April, Year: 2023 Article Number: 5118, https://doi.org/10.15837/ijccc.2023.2.5118 CCC Publications A new ranking method for trapezoidal intuitionistic fuzzy numbers and its application to multi-criteria decision making L. Popa Lorena Popa Department of Mathematics and Computer Science Aurel Vlaicu University of Arad, Romania 310330 Arad, Elena Dragoi, 2, Romania lorena.popa@uav.ro Abstract The ranking of intuitionistic fuzzy numbers is paramount in the decision making process in a fuzzy and uncertain environment. Thus, defining the ranking of intuitionistic fuzzy numbers has represented a significant scientific pursuit for researchers because they play an essential role, especially in the problems of Multi-Criteria Decision Making from various domains, e.g., Economics, Social Sciences, and Engineering. keywords: decision; method; numbers; r(ã; ranking cache: ijccc-5118.pdf plain text: ijccc-5118.txt item: #922 of 981 id: ijccc-5144 author: N. Ilakkiya; A. Rajaram title: Blockchain-assisted Secure Routing Protocol for Cluster-based Mobile-ad Hoc Networks date: 2023-04-03 words: 8434 flesch: 55 summary: However, security provisioning is https://doi.org/10.15837/ijccc.2023.2.5144 3 still challenging due to, • Network mobility • Mobile attackers • Strength of attackers • Central server-based authentication On the whole, data transmission and security provisioning are two major aspects of MANET networks. The combined algorithms used in the proposed protocol achieve better efficiency in PDR, throughput, time analysis, and security level, providing a more robust and reliable network 3 Problem statement The issues related in secure routing for mobile networks is a critical issue because of the dynamic and decentralized network. keywords: algorithm; blockchain; cluster; clustering; data; energy; formation; high; level; manet; mobile; network; nodes; route; routing; security; time; transmission cache: ijccc-5144.pdf plain text: ijccc-5144.txt item: #923 of 981 id: ijccc-5162 author: Miliauskaitė, Jolanta; Kalibatienė, Diana title: An Effect of User Experience on A Data-Driven Fuzzy Inference of Web Service Quality date: 2023-06-20 words: 8840 flesch: 55 summary: The obtained experiments of hybrid fuzzy inference WS QoSE planning showed a significant influence of QoS attributes on whole WS QoSE Performance value. This WS QoSE concept is implemented into hybrid fuzzy inference WS QoSE planning system, used to predict, plan and investigate the impact of subjective and objective attributes on WS QoSE. keywords: anfis; approach; attributes; data; doi; figure; fuzzy; inference; linguistic; performance; prediction; qoe; qose; quality; service; user; ws qose cache: ijccc-5162.pdf plain text: ijccc-5162.txt item: #924 of 981 id: ijccc-5173 author: Ma, Yixuan; Ma, Zeyao; Li, Yankai; Gao, Haoyu; Xue, Yukai title: A Project Recommender Based on Customized Graph Neural Networks in Online Labor Markets date: 2023-06-20 words: 5655 flesch: 51 summary: The challenge in project recommendation is to effectively capture the complex relationships between projects, skills, and freelancers in a high- dimensional space. The experiment results on real-world dataset demonstrate the effectiveness of the proposed method in solving the challenges in project recommendation in the online labor market. keywords: embedding; graph; labor; layer; lightgcn; model; networks; neural; project; recommendation; skills; user; worker cache: ijccc-5173.pdf plain text: ijccc-5173.txt item: #925 of 981 id: ijccc-5186 author: Markkandeyan, S.; Gupta, Shivani; Venkat Narayanan, G.; Jithender Reddy, M; Ahmad Al-Khasawneh, Mahmoud; Ishrat, Mohammad; Kiran, Ajmeera title: Deep learning based semantic segmentation approach for automatic detection of brain tumor date: 2023-06-20 words: 5886 flesch: 48 summary: 4 Performance Analysis Results and analysis of the suggested study’s performance analysis are shown below: the proposed study is automaticbrain tumor detection in brain images. The purpose of CNN dependent semantic image segmentation is to segment each label pixel of the image by a subset of the depicted thing that comes after the original. keywords: accuracy; analysis; approach; brain; classification; cnn; deep; figure; image; learning; method; mri; precision; segmentation; tumor cache: ijccc-5186.pdf plain text: ijccc-5186.txt item: #926 of 981 id: ijccc-5286 author: Visan, Maria M.; Mone, Firicel title: Computer-Supported Smart Green-Blue Infrastructure Management date: 2023-04-03 words: 9358 flesch: 35 summary: Finally, GBI DSS architectures should be evaluated based on their efficiency, effectiveness, and equity in achieving GBI goals like improving ecosystem services and promoting social inclusion. [39], mention the lack of GBI implementation and maintenance, in which DSS can play an important role by providing information, especially for current maintenance and operation activities, which not only monitor change but also optimize and extend the lifetime of GBI. keywords: activities; architecture; benefits; data; decision; development; dss; gbi; implementation; infrastructure; maintenance; making; management; multi; project; public; stakeholders; systems; time; urban cache: ijccc-5286.pdf plain text: ijccc-5286.txt item: #927 of 981 id: ijccc-5299 author: Chen, Xingyuan; Deng, Yong title: A new belief entropy and its application in software risk analysis date: 2023-04-03 words: 5959 flesch: 67 summary: A novel measure of belief entropy founded on Deng entropy is proposed. The structure of this paper is as follows: An summary of the Dempster-Shafer evidence theory, Shannon entropy, and Deng entropy principles is given in 2. Section 2 provides a brief overview of the concepts of Dempster-Shafer evidence theory, Shannon entropy, and Deng entropy. keywords: belief; deng; entropy; information; measure; risk; theory; uncertainty cache: ijccc-5299.pdf plain text: ijccc-5299.txt item: #928 of 981 id: ijccc-5320 author: Stanojević, Bogdana; Stanojević, Milan title: Optimization-Based Fuzzy Regression in Full Compliance with the Extension Principle date: 2023-04-03 words: 6117 flesch: 63 summary: Keywords: fuzzy regression, extension principle, optimization 1 Introduction Nowadays, the importance of handling Big Data is continuously increasing. Their approach to fuzzy regression followed the extension principle until they introduced a simplified computational procedure by replacing the variables ranging within the α−cut intervals of the observed data with their corresponding endpoints. keywords: analysis; approach; data; extension; outputs; principle; regression cache: ijccc-5320.pdf plain text: ijccc-5320.txt item: #929 of 981 id: ijccc-5392 author: Wu, Qin title: Analysis of Advertising Promotion Strategy Based on Improved Collaborative Filtering Algorithm under Digital Media Technology date: 2023-06-20 words: 6035 flesch: 40 summary: It utilizes the generalized linear model to learn feature relevance from the underlying data of ad users and the deep feedforward neural network to uncover the interaction between ad interactions among implicit features of users, resulting in a high accuracy rate of recommendations. The cold-start issue within ad recommendation primarily arises due to new users or ads, where the former has not visited any ads, and the latter have not been viewed by any users. keywords: ads; advertising; algorithm; data; information; keywords; model; number; pages; query; recall; recommendation; set; similarity; system; user cache: ijccc-5392.pdf plain text: ijccc-5392.txt item: #930 of 981 id: ijccc-54 author: Han, Shan; Chen, Lin; Zhang, Zhi; Li, Jianxun title: A New Information Filling Technique Based On Generalized Information Entropy date: 2014-02-28 words: 6660 flesch: 65 summary: A New Information Filling Technique Based On Generalized Information Entropy 181 Obviously, short estimation interval will decrease the intersection degree and reduce the objects in the classes made by interval similarity relation. It is an extension of classical set theory for the study of information systems characterized by inexact, uncertain and vague, and has been widely used in the fields of knowledge discovery, decision fusion, data mining, pattern recognition, and so on. keywords: data; decision; entropy; filling; information; interval; set; system cache: ijccc-54.pdf plain text: ijccc-54.txt item: #931 of 981 id: ijccc-5433 author: Breskuvienė, Dalia; Dzemyda, Gintautas title: Categorical Feature Encoding Techniques for Improved Classifier Performance when Dealing with Imbalanced Data of Fraudulent Transactions date: 2023-05-09 words: 7571 flesch: 51 summary: One potential solution to this problem is to use categorical feature encoding techniques to transform categorical data into numerical representations that machine learning classifiers can pro- cess more effectively. Section 2 provides an overview of related work in feature encoding techniques, specifically in imbalanced data. keywords: cardinality; categorical; data; datasets; decision; encoder; encoding; features; learning; machine; model; performance; target; techniques; values cache: ijccc-5433.pdf plain text: ijccc-5433.txt item: #932 of 981 id: ijccc-5465 author: Suduc, Ana-Maria; Bizoi, Mihai; Filip, Florin Gheorghe title: Status, Challenges and Trends in Videoconferencing Platforms date: 2023-05-09 words: 5272 flesch: 45 summary: 2.2 Statistics on the use and market of videoconferencing systems The global market for videoconferencing platforms is expected to grow significantly in the coming period, from USD 7.65 billion in 2022 to around USD 18.56 billion in 2030. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL Online ISSN 1841-9844, ISSN-L 1841-9836, Volume: 18, Issue: 3, Month: June, Year: 2023 Article Number: 5465, https://doi.org/10.15837/ijccc.2023.3.5465 CCC Publications Status, Challenges and Trends in Videoconferencing Platforms A.M. Suduc, M. Bizoi, F.G. Filip Ana-Maria Suduc* Valahia University of Targoviste Aleea Sinalia 13, 130004, Targoviste, Romania *Corresponding author: ana.suduc@valahia.ro Mihai Bizoi Valahia University of Targoviste Aleea Sinalia 13, 130004, Targoviste, Romania bizoi@valahia.ro Florin Gheorghe Filip Romanian Academy Calea Victoriei 125, Sector 1, 010071 Bucharest, Romania ffilip@acad.ro Abstract Although videoconferencing platforms were a growing market even before the Covid-19 pan- demic, they became very popular and widely used within weeks of the beginning of the pandemic. keywords: features; google; meetings; microsoft; pandemic; platforms; systems; teams; users; videoconferencing; webex; zoom cache: ijccc-5465.pdf plain text: ijccc-5465.txt item: #933 of 981 id: ijccc-5475 author: Petrovas, Aurimas; Bausys, Romualdas; Zavadskas, Edmundas title: Gestalt Principles Governed Fitness Function for Genetic Pythagorean Neutrosophic WASPAS Game Scene Generation date: 2023-06-20 words: 6388 flesch: 50 summary: The scoring for each population member is governed by the MCDM algorithm with game design criteria. Five gestalt principles were integrated into the model as fitness criteria functions: Similarity, Proximity, Continuity, Focal Points and Common Region. keywords: algorithm; creativity; criteria; figure; fitness; function; game; generation; gestalt; level; neutrosophic; objects; principles; scene; sets cache: ijccc-5475.pdf plain text: ijccc-5475.txt item: #934 of 981 id: ijccc-559 author: Carvajal-Schiaffino, Ruben; Firinguetti-Limone, Luis title: Petri Net Based Modelling of a Career Syllabus date: 2014-06-15 words: 4933 flesch: 58 summary: If we regard as the initial state the enrollment of a student in the program and the possibility of taking courses, then any t-invariant will be a sequence of passing/failing 402 R. Carvajal-Schiaffino, L. Firinguetti-Limone T-Semiflow Number of Failures Failed Courses Number of Periods t1 + t2 + t4 + t6 + t14 + t16 + t22 0 2 t1 + t3 + t4 + t6 + t8 + t14 + t16 + t22 1 A 3 t1 + t2 + t5 + t6 + t10 + t14 + t16 + t22 1 B 3 t1 + t2 + t4 + t7 + t12 + t14 + t16 + t22 1 C 3 t1 + t2 + t4 + t6 + t15 + t16 + t18 + t22 1 D 3 t1 + t2 + t4 + t6 + t14 + t17 + t20 + t22 1 E 3 t1 + t2 + t5 + t7 + t10 + t12 + t14 + t16 + t22 2 B,C 3 t1 + t2 + t5 + t6 + t10 + t15 + t16 + t18 + t22 2 B,D 3 t1 + t2 + t5 + t6 + t10 + t14 + t17 + t20 + t22 2 B,E 4 t1 + t2 + t4 + t7 + t12 + t15 + t16 + t18 + t22 2 C,D 3 t1 + t2 + t4 + t7 + t12 + t14 + t17 + t20 + t22 2 C,E 4 t1 + t2 + t4 + t6 + t15 + t17 + t18 + t20 + t22 2 D,E 3 t1 + t3 + t5 + t6 + t8 + t10 + t14 + t16 + t22 2 A,B 3 t1 + t3 + t4 + t7 + t8 + t12 + t14 + t16 + t22 2 A,C 3 t1 + t3 + t4 + t6 + t8 + t15 + t16 + t18 + t22 2 A,D 4 t1 + t3 + t4 + t6 + t8 + t14 + t17 + t20 + t22 2 A,E 3 t1 + t2 + t5 + t7 + t10 + t12 + t15 + t16 + t18 + t22 3 B,C,D 3 t1 + t2 + t5 + t7 + t10 + t12 + t14 + t17 + t20 + t22 3 B,C,E 4 t1 + t2 + t5 + t6 + t10 + t15 + t17 + t18 + t20 + t22 3 B,D,E 4 t1 + t2 + t4 + t7 + t12 + t15 + t17 + t18 + t20 + t22 3 C,D,E 4 t1 + t3 + t5 + t7 + t8 + t10 + t12 + t14 + t16 + t22 3 A,B,C 3 t1 + t3 + t5 + t6 + t8 + t10 + t15 + t16 + t18 + t22 3 A,B,D 4 t1 + t3 + t5 + t6 + t8 + t10 + t14 + t17 + t20 + t22 3 A,B,E 4 t1 + t3 + t4 + t7 + t8 + t12 + t15 + t16 + t18 + t22 3 A,C,D 4 t1 + t3 + t4 + t7 + t8 + t12 + t14 + t17 + t20 + t22 3 A,C,E 4 t1 + t3 + t4 + t6 + t8 + t15 + t17 + t18 + t20 + t22 3 A,D,E 4 t1 + t2 + t5 + t7 + t10 + t12 + t15 + t17 + t18 + t20 + t22 4 B,C,D,E 4 t1 + t3 + t5 + t7 + t8 + t10 + t12 + t15 + t16 + t18 + t22 4 A,B,C,D 4 t1 + t3 + t5 + t7 + t8 + t10 + t12 + t14 + t17 + t20 + t22 4 A,B,C,E 4 t1 + t3 + t5 + t6 + t8 + t10 + t15 + t17 + t18 + t20 + t22 4 A,B,D,E 4 t1 + t3 + t4 + t7 + t8 + t12 + t15 + t17 + t18 + t20 + t22 4 A,C,D,E 4 t1 + t3 + t5 + t7 + t8 + t10 + t12 + t15 + t17 + t18 + t20 + t22 5 A,B,C,D,E 4 Table 1: T-semiflows obtained from the net in figure 3 a course such that the last transition fired will be t22 which allows to comeback to the initial state. Besides, we have indicated how this model may be used by administrators and lectures to sug- gest students corrective actions to reduce drop-out caused by a bad selection of course sequences. keywords: courses; number; petri; program; student; t22 cache: ijccc-559.pdf plain text: ijccc-559.txt item: #935 of 981 id: ijccc-571 author: Viriri, Serestina; Lagerwall, Brett title: Increasing Face Recognition Rates Using Novel Classification Algorithms date: 2016-03-24 words: 4937 flesch: 52 summary: Yet, face recognition remains an important topic in computer vision because of the large number of real-world scenarios it can be applied to. Senior and Bolle [1] state that the three main application domains for face recognition are access control, identification systems and surveillance. keywords: algorithm; average; classification; database; face; images; recognition; subject cache: ijccc-571.pdf plain text: ijccc-571.txt item: #936 of 981 id: ijccc-572 author: Teodorescu, Horia-Nicolai L.; Iftene, Emanuel-Florin title: Efficiency of a Combined Protection Method against Correlation date: 2014-01-03 words: 3142 flesch: 54 summary: Table I shows that the maximal values of the self-correlations of unmasked instruction waveforms is (almost) 1 for all the instructions, as expected, while the maximal values of the intercorrelations between unmasked instructions is less than 0.8. 82 H.-N. Teodorescu, E.-F. Iftene Figure 2: Examples of intercorrelations with masked instructions 4 Results and assessment of the robustness against CPA-SCA The main results refer to the efficiency of the masking as determined by the lack of corre- lation between the unmasked pattern of the instruction and the masked ones. keywords: analysis; attacks; clock; correlation; instructions; method; power; protection cache: ijccc-572.pdf plain text: ijccc-572.txt item: #937 of 981 id: ijccc-577 author: Jing, Yuanchun title: A Model for Collaborative Filtering Recommendation in E-Commerce Environment date: 2013-08-01 words: 4684 flesch: 54 summary: [14] Lan W. and Zhengjun Z., Collaborative filtering algorithm based on time weight, Journal of computer application, 27(9): 2302-2303, 2007. The kernel of collaborative filtering problem is analysis of user interests, and finding some similar (interest) users for the specified user in the user group. keywords: collaborative; customer; data; filtering; information; matrix; model; product; recommendation; time; weight cache: ijccc-577.pdf plain text: ijccc-577.txt item: #938 of 981 id: ijccc-578 author: JoldeÅŸ, Iulian; Pí¢rv, Bazil; Parpucea, Ilie; LupÅŸe, Vasile title: PyBNEq - A Tool for Computing Bayes-Nash Equilibria date: 2013-08-01 words: 2053 flesch: 61 summary: [1] analyze three algorithms for such games in strategic form: Lemke-Howson (LH), Porter-Nudelman-Shoham (PNS), and Sandholm-Gilpin-Conitzer (SGC), and propose an extension of PNS to Bayesian games (B-PNS), which is implemented in our tool. E-mail: joldesiulian@yahoo.com, bparv@cs.ubbcluj.ro Ilie Parpucea Babeş-Bolyai University Department of Mathematics and Statistics Romania, 400591 Cluj-Napoca, 58-60 Teodor Mihali Str. E-mail: ilie.parpucea@gmail.com Vasile Lupşe Technical University Cluj-Napoca North Center Baia Mare Romania, 430083 Baia Mare, 62/A Dr. Victor Babeş Str. E-mail: vasilelupse@ubm.ro Abstract: This paper describes PyBNEq - a tool for computing Bayes-Nash equilibria for games of incomplete information. keywords: agent; bayes; game; nash; tool cache: ijccc-578.pdf plain text: ijccc-578.txt item: #939 of 981 id: ijccc-579 author: Li, Meng’gang; Tang, Mincong title: Information Security Engineering: a Framework for Research and Practices date: 2013-08-01 words: 3818 flesch: 21 summary: As a subset of systems engineering, ISE is the embodiment of information system securities for systems security engineering, systems engineering and system acquisitions. 2) Define information security system: users’ requirements of information protection and description of information system environment are interpreted as the objectives and func- tionalities of information security system. keywords: engineering; information; information security; ise; management; research; secure; security; systems cache: ijccc-579.pdf plain text: ijccc-579.txt item: #940 of 981 id: ijccc-580 author: Razavi Hajiagha, Seyed Hossein; Mahdiraji, Hannan Amoozad; Zavadskas, Edmundas Kazimieras; Hashemi, Shide Sadat title: A Fuzzy Data Envelopment Analysis Approach based on Parametric Programming date: 2013-08-01 words: 5744 flesch: 79 summary: Since that time, there are a continuously increasing interest on fuzzy DEA methods and applications. A Fuzzy Data Envelopment Analysis Approach based on Parametric Programming 607 [23] Luban F., Measuring efficiency of a hierarchical organization with fuzzy DEA method, ECONOMIA. keywords: data; dea; efficiency; fuzzy; l α; model; r=1; u α cache: ijccc-580.pdf plain text: ijccc-580.txt item: #941 of 981 id: ijccc-581 author: Xiang, Anbo; Xu, Liang; Niu, Baozhuang title: Knapsack-model-based Schemes and WLB Algorithm for the Capacity and Efficiency Management of Web Cache date: 2013-08-01 words: 5501 flesch: 60 summary: In general, serving a request directly from Web cache cluster, i.e., a cache hit, is significantly faster than forwarding the request to the back-end server for generation. Based on Knapsack models, we characterize three new placemen- t/replacement schemes for Web contents caching and then conduct the comparison based on WLB algorithm. keywords: algorithm; cache; cluster; content; load; policy; rate; replacement; request; size; web cache: ijccc-581.pdf plain text: ijccc-581.txt item: #942 of 981 id: ijccc-584 author: Avelin Diana, A.; Sundarakantham, K.; Mercy Shalinie, S. title: Alleviation of Binding Update Re-registration Handoff Latency at Home Agent Failure in MIPv6 Network date: 2015-08-01 words: 2668 flesch: 61 summary: MIPv6 allows the deployment of redundant HAs to overcome HA failure. This paper evaluates the BU registration handoff latency of various approaches during HA failure and proposes a RHAD mechanism to mitigate the registration delay of MN with the new active HA. keywords: failure; home; registration; time cache: ijccc-584.pdf plain text: ijccc-584.txt item: #943 of 981 id: ijccc-59 author: Ranjani, Mani; Murugesan, Palzha title: Modeling and Simulation of Genetic Fuzzy Controller for L-type ZCS Quasi-Resonant Converter date: 2014-01-03 words: 2271 flesch: 57 summary: The simulation structure of optimized fuzzy speed controller with the IAE is shown in fig.7 & fig.8 respectively. Keywords: Fuzzy logic controller (FLC), Zero Current Switching Quasi-Resonant Converter (ZCS-QRC), Genetic Algorithm (GA), Integral Absolute Error (IAE), Di- rect Current (DC) 1 Introduction The dc motor drives have the advantage of high controllability and are used in many ap- plications such as robotic manipulators, position control, steel mining, and paper and textile industries. keywords: controller; error; flc; qrc; zcs cache: ijccc-59.pdf plain text: ijccc-59.txt item: #944 of 981 id: ijccc-6 author: Bocu, Dorin; Bocu, Razvan title: Remarks on Interface Oriented Software Systems Modelling date: 2013-09-17 words: 4981 flesch: 45 summary: This is especially true nowadays, when the topological diversification of software systems has gone so far [2]. The structuring activity emphasized and sometimes turned into a fetish the necessity to structure data and the operations, following specific rules, with the goal to realize reliable and easy-to- maintain software systems. keywords: interface; modelling; modelling activity; perspectives; software; software system; structure; system cache: ijccc-6.pdf plain text: ijccc-6.txt item: #945 of 981 id: ijccc-60 author: Stoica, Florin; Boitor, Cornel title: Using the Breeder genetic algorithm to optimize a multiple regression analysis model used in prediction of the mesiodistal width of unerupted teeth date: 2014-01-03 words: 3226 flesch: 40 summary: To improve prediction equations, we divided data into training and validation sets. [17] Bonetti, G.A.; Verganti, S.; Zamarini, M.; Bonetti, S.; Mixed dentition space analisis for a northern Italian population: new regression equations for unerupted teeth, Progress in Ortodontics, 12(2):94-96, 2011. keywords: algorithm; breeder; canines; equations; prediction; premolars; regression cache: ijccc-60.pdf plain text: ijccc-60.txt item: #946 of 981 id: ijccc-617 author: Ji, Shuai; Zhang, Chengrui; Hu, Tianliang; Wang, Ke title: A Hardware Independent Real-time Ethernet for Motion Control Systems date: 2015-11-16 words: 4305 flesch: 53 summary: [7] L. Seno, S. Vitturi, and C. Zunino(2009); Real time Ethernet networks evaluation using performance indicators, Emerging Technologies & Factory Automation, 2009. Master node delivered the configuration frame to slave nodes, and slave nodes return their configuration results. keywords: communication; control; ethermac; ethernet; figure; frame; master; node; slave; synchronization; time cache: ijccc-617.pdf plain text: ijccc-617.txt item: #947 of 981 id: ijccc-63 author: Zhang, Junsan; Qu, Youli; Tian, Shengfeng title: A Novel Entity Type Filtering Model for Related Entity Finding date: 2014-01-03 words: 5027 flesch: 54 summary: We utilize the Wikipedia category information as the source of entities types. We apply Wikipedia category information to as the source of entities types. keywords: entities; entity; filtering; filtering model; model; novel; ranking; target; type; type filtering cache: ijccc-63.pdf plain text: ijccc-63.txt item: #948 of 981 id: ijccc-634 author: Silva-Faundez, Joaquin Alder; Duran-Faundez, Cristian; Melin, Pedro; Aguilera, Cristhian title: An Anticipatory Control for a Flexible Manufacturing System Based on the Perception of Mobile Units Using WSNs date: 2015-07-24 words: 8315 flesch: 57 summary: The objectives of these tests are: (1) to compare system performance for different transmitting nodes, (2) to compare performance of the system under different ini- tializations of the error covariance matrix, (3) to measure overall system performance, and (4) to observe the effect of sampling rate variations in the system estimates. System parameters calibration was performed by the Greedy algorithm keywords: antenna; control; controller; conveyor; distance; error; figure; nodes; pallet; parameters; performance; robot; stop; system; time; xbee cache: ijccc-634.pdf plain text: ijccc-634.txt item: #949 of 981 id: ijccc-641 author: Bai, Jianbo title: Development an Adaptive Incremental Fuzzy PI Controller for a HVAC System date: 2013-09-17 words: 3264 flesch: 53 summary: The control scheme is mainly com- posed of two parts: Fuzzy controller and PI controller, the increment of proportional and integral gains of the PI controller can be adjusted by the Fuzzy controller in real-time according to the error of the system output and the change of the error. A problem using conventional PI controllers in HVAC control systems is that control performance varies as conditions change and loops may become sluggish or oscillatory at certain times [2]. keywords: air; controller; humidity; hvac; load; system; temperature cache: ijccc-641.pdf plain text: ijccc-641.txt item: #950 of 981 id: ijccc-643 author: Caţaron, Angel; Andonie, Răzvan; Chueh, Yvonne title: Asymptotically Unbiased Estimator of the Informational Energy with kNN date: 2013-09-17 words: 4070 flesch: 59 summary: − k − 1)! − k − 1)! n! , which can be rewritten as: EPik(ϵ)(pi(ϵ)) keywords: energy; estimator; range; sample; size; ˆie cache: ijccc-643.pdf plain text: ijccc-643.txt item: #951 of 981 id: ijccc-644 author: El Ferchichi, Sabra; Zidi, Salah; Maouche, Salah; Laabidi, Kaouther; Ksouri, Moufida title: Feature Clustering based MIM for a New Feature Extraction Method date: 2013-09-17 words: 3997 flesch: 56 summary: Analyzing the tendency of feature vectors was proposed to identify the similarity between them. Keywords: feature extraction, Mutual Information Maximization (MIM), similarity measure, clustering. keywords: accuracy; classification; clustering; extraction; feature; femc; information cache: ijccc-644.pdf plain text: ijccc-644.txt item: #952 of 981 id: ijccc-645 author: Wu, Peng; Jing, Shourang; Liu, Wenxiang; Wang, Feixue title: A Quick Location Method for High Dynamic GNSS Receiver Based on Time Assistance date: 2013-09-17 words: 2474 flesch: 57 summary: 1 Introduction Since the low speed of the message affects the speed of frame synchronization [1], the tradi- tional non-auxiliary GPS receiver can not obtained the complete time of satellite signal emission instantly, which will affect TTFF (Time to First Fix). Take the GPS L1 as an example, from catching to accomplishing code phase synchronization of several satellites, ordinary receivers take one or two seconds to receive the time of satellite signal emission. keywords: clock; error; gps; method; receiver; satellites; time cache: ijccc-645.pdf plain text: ijccc-645.txt item: #953 of 981 id: ijccc-661 author: Zhang, Weiping; Thurow, Kerstin; Stoll, Regina title: A Knowledge-based Telemonitoring Platform for Application in Remote Healthcare date: 2014-08-05 words: 4371 flesch: 52 summary: In this work, it is used to define information and re- lations, including sensor data, medical tasks, control strategies, and a patients personal domain knowledge. We designed the ontology context model to describe physiological parameters, medical tasks and the patients personal profile. keywords: context; data; healthcare; information; knowledge; ontology; patient; sensor; server; system; task cache: ijccc-661.pdf plain text: ijccc-661.txt item: #954 of 981 id: ijccc-69 author: Oh, Se-bin; Chung, Yeon Ho title: Smart and Safe Vehicle Monitoring with Fuzzy Integral and Haar-like Features date: 2013-08-01 words: 2032 flesch: 54 summary: Then, by making use of the center of gravity, the angle of vehicle shock can be determined. The Haar-like features are digital image features used in object detection and recognition keywords: accidents; detection; like; monitoring; system; vehicle cache: ijccc-69.pdf plain text: ijccc-69.txt item: #955 of 981 id: ijccc-7 author: Tuba, Milan; Jovanovic, Raka title: Improved ACO Algorithm with Pheromone Correction Strategy for the Traveling Salesman Problem date: 2013-06-02 words: 4371 flesch: 56 summary: [24] Gan, R., Guo, Q., Chang, H., and Yi, Y., Improved ant colony optimization algorithm for the traveling salesman problems, Journal of Systems Engineering and Electronics, 21(2):329– 333, 2010. [31] Gan, R., Guo, Q., Chang, H., and Yi, Y., Improved ant colony optimization algorithm for the traveling salesman problems, Journal of Systems Engineering and Electronics, 21(2):329– 333, 2010. keywords: aco; algorithm; ant; colony; correction; optimization; pheromone; problem; salesman; solution cache: ijccc-7.pdf plain text: ijccc-7.txt item: #956 of 981 id: ijccc-700 author: Ma, Jun; Luo, Senlin; Yao, Jianguo; Cheng, Shuxin; Chen, Xi title: Efficient Opinion Summarization on Comments with Online-LDA date: 2016-03-24 words: 6817 flesch: 54 summary: Then we compare different approaches of topic extraction and highlight the advantage of online inference LDA model for comments topic extraction. Section II surveys existing studies on com- ments summarization in topic models. keywords: classification; comments; data; framework; hotel; lda; model; online; opinion; opinion summarization; performance; selection; summarization; topics cache: ijccc-700.pdf plain text: ijccc-700.txt item: #957 of 981 id: ijccc-702 author: Ngo, ThanhQuyen; Phuong, TaVan title: Robust Adaptive Self-Organizing Wavelet Fuzzy CMAC Tracking Control for De-icing Robot Manipulator date: 2015-06-23 words: 5119 flesch: 57 summary: control system, b) Image of practical control system. According to these experiment and simulation results of proposed RASOWFCM control system due to sinusoidal and periodic step reference commands indicate that the high-accuracy tracking position responses can be achieved by using the proposed RASOWFCM control system for difference reference commands under a wide range of external disturbance. keywords: control; deicing; function; layer; manipulator; rasowfcm; robot; system; tracking; wavelet; wfcmac cache: ijccc-702.pdf plain text: ijccc-702.txt item: #958 of 981 id: ijccc-704 author: Manglem Singh, K.; Chanu, Yambem Jina; Tuithung, Themrichon title: Steganalysis of ±k Steganography based on Noncausal Linear Predictor date: 2014-08-05 words: 4007 flesch: 62 summary: Yambem Jina Chanu*, Themrichon Tuithung Department of Computer Science & Engineering, NERIST, Itanagar, India *Corresponding author: jina.yambem@gmail.com tth@nerist.ac.in Abstract: The paper proposes a novel steganalytic technique for ±k steganography based on noncausal linear predictor using prediction coefficients obtained from the au- tocorrelation matrix for a block of pixels in the stego-image. This paper proposes a new steganalytic technique for k steganography using noncausal linear predictor based on prediction coefficients obtained from the autocorrelation matrix for each block of pixels in the image. keywords: block; linear; noncausal; order; pixel; prediction; steganography; x(m cache: ijccc-704.pdf plain text: ijccc-704.txt item: #959 of 981 id: ijccc-731 author: Pratap Singh, Akhilendra; Vyas, O.P.; Varma, Shirshu title: Flexible Service Oriented Network Architecture for Wireless Sensor Networks date: 2014-08-05 words: 5980 flesch: 44 summary: Our Flexible service Oriented Network architecture supports for wide range of wireless sensor network services. Parametric users are service users, who have detailed technical knowledge of application requirements. keywords: application; architecture; communication; data; flexible; middleware; network; requirements; sensor; service; user; wireless cache: ijccc-731.pdf plain text: ijccc-731.txt item: #960 of 981 id: ijccc-753 author: Lai, Jingang; Zhou, Hong; Hu, Wenshan title: A New Adaptive Fuzzy PID Control Method and Its Applicance in FCBTM date: 2016-03-24 words: 4124 flesch: 56 summary: The use of fuzzy PID composite control, combining the PID control and fuzzy control, which Copyright © 2006-2016 by CCC Publications A New Adaptive Fuzzy PID Control Method and Its Application in FCBTM 395 can not only play the fuzzy control advantage of robustness, good dynamic response, fast rise time and overshoot small, but also have features of both quality and steady precision dynamic tracking characteristics. At this point, if the acceleration ER (the second derivative of the error) of the error changes EC is added as fuzzy PID control input, it will make the system have a good steady precision. keywords: control; controller; error; fcbtm; input; motor; pid; system cache: ijccc-753.pdf plain text: ijccc-753.txt item: #961 of 981 id: ijccc-760 author: Guan, Xiaolan; Zhang, Zhenji; Zhang, Shugang title: Operation Mechanism of the Driving Force System of Ecosystem of Cyber-society Based on the System Dynamics date: 2013-11-11 words: 5545 flesch: 27 summary: However, since the driving force system consists of a lot of driving forces, its hierarchy is very complex with multi-levels, and different structures may emerge unexpected functions, so we need to find out an effective way to analyze it. There are three major subsystems in the driving force system of Ecosystem of Cyber-society, namely subsystem of driving forces, stimulate subsystem of driving forces and carrier subsystem of driving forces, as shown in Figure 1. keywords: cyber; development; driving; driving force; ecosystem; force system; society cache: ijccc-760.pdf plain text: ijccc-760.txt item: #962 of 981 id: ijccc-761 author: Li, Xiaowu; Feng, Quanyuan title: A Improved EPC Class 1 Gen 2 Protocol with FCFS Feature in the Mobile RFID Systems date: 2013-11-11 words: 4249 flesch: 65 summary: In the mobile RFID systems, some tags may leave the coverage area unidentified under the condition of high tag tag density or is high tag moving speed, etc. The improved protocol overcomes RLI problem and converts random access for tags into sequential 856 X. Li, Y. Quan access for tag groups. keywords: c1g2; protocol; reader; rfid; tag; tags; time cache: ijccc-761.pdf plain text: ijccc-761.txt item: #963 of 981 id: ijccc-763 author: Qu, Shi; Wu, Ling-da; Yu, Rong-huan; Wei, Ying-mei title: Dimensionality Reduction and Generation of Human Motion date: 2013-11-11 words: 3466 flesch: 54 summary: So, a feature vector y can be constructed to represent human motion posture, which consists of all rotation degrees of freedom. In FASGPLVM, the probability space of motion posture is modeled, in which the posture near sample postures has bigger probability. keywords: data; dimensionality; editing; fasgplvm; generation; motion; new; posture cache: ijccc-763.pdf plain text: ijccc-763.txt item: #964 of 981 id: ijccc-764 author: Ramanauskaite, Simona; Olifer, Dmitrij; Olifer, Dmitrij; Goranin, Nikolaj; Goranin, Nikolaj; Čenys, Antanas; Čenys, Antanas title: Security Ontology for Adaptive Mapping of Security Standards date: 2013-11-11 words: 5932 flesch: 42 summary: Employment of security on- tology to map different standards can reduce the mapping complexity however the choice of security ontology is of high importance and there are no analyses on security ontology suitability for adaptive standards mapping. Keywords: security ontology, security standards, adaptive mapping. keywords: concepts; fenz; herzog; information; mapping; ontologies; ontology; security; standards cache: ijccc-764.pdf plain text: ijccc-764.txt item: #965 of 981 id: ijccc-765 author: Wang, Hongwei; Yu, Chi title: Design of Congestion Control Scheme for Uncertain Discrete Network Systems date: 2013-11-11 words: 2213 flesch: 73 summary: Keywords: sliding mode control, network systems, linear matrix inequality(LMI) 1 Introduction As the rapid expansion of network scale, congestion control has become an important issue. [−M̄Az (k) + (1 − ηT) s (k) − (1 − e−|s(k)| − η) |s (k)|Tsgn(s (k)) − M̄ (z (k) − Az (k − 1) − Bu(k − 1)) ] , − p0 ≤ u (k) ≤ 1 keywords: control; law; mode; network; time cache: ijccc-765.pdf plain text: ijccc-765.txt item: #966 of 981 id: ijccc-794 author: Zhang, Gexiang; Cheng, Jixiang; Gheorghe, Marian title: Dynamic Behavior Analysis of Membrane-Inspired Evolutionary Algorithms date: 2014-02-28 words: 6980 flesch: 61 summary: The analysis is performed on the MIEA, QEPS (a quantum-inspired evolutionary algorithm based on membrane computing), and its counterpart algorithm, QIEA (a quantum-inspired evolutionary algorithm), using a comparative approach in an experimental context to better un- derstand their characteristics and performances. Results show that QEPS can achieve better balance between convergence and diversity than QIEA, which indicates QEPS has a stronger capacity of balancing exploration and exploitation than QIEA in order to prevent premature convergence that might occur. keywords: bit; convergence; diversity; items; measures; membrane; nofe; population; qeps; qiea; qiea qeps cache: ijccc-794.pdf plain text: ijccc-794.txt item: #967 of 981 id: ijccc-8 author: Acarman, Tankut; Ercan, Mutlu title: Processing Capacity and Response Time Enhancement by Using Iterative Learning Approach with an Application to Insurance Policy Server Operation date: 2013-07-26 words: 5323 flesch: 52 summary: This leads to cache as many as job results instead of caching few larger results. When the individual service rate, µi, increases, psci decreases leading to the choice of caching larger service time requiring jobs results instead of caching the jobs that can be processed faster. keywords: caching; computing; cpu; ilc; individual; jobs; memory; results; system; time; window cache: ijccc-8.pdf plain text: ijccc-8.txt item: #968 of 981 id: ijccc-802 author: Patrascu, Alecsandru; Patriciu, Victor-Valeriu title: Logging for Cloud Computing Forensic Systems date: 2015-02-15 words: 3573 flesch: 51 summary: We can say with great confidence that cloud computing forensics has become more and more a need in todays distributed digital world. 5 Conclusion As we have seen in this paper, the topic of cloud computing forensics is very large and poses great challenges in the field of logging. keywords: cloud; computing; data; forensic; framework; layer; logging; modules cache: ijccc-802.pdf plain text: ijccc-802.txt item: #969 of 981 id: ijccc-803 author: Stoica, Laura Florentina; Stoica, Florin; Boian, Florian Mircea title: Verification of JADE Agents Using ATL Model Checking date: 2015-07-24 words: 6167 flesch: 54 summary: Figure 2: The performance of ATL model checker related to database server used 724 L.F. Stoica, F. Stoica, F.M. Boian 4 Using ATL model checking in agent-based systems In the following we will show how our tool can be used for applying the ATL technology in the field of agent-based applications. In this paper, using components of our tool, we will show how ATL model checking technology can be used for automated verification of multi-agent systems, developed with JADE. keywords: agent; atl; atl model; checker; checking; fsm; jade; model; set; state cache: ijccc-803.pdf plain text: ijccc-803.txt item: #970 of 981 id: ijccc-82 author: Ramalingam, Ponnusamy; Babu, Satish; Chitralekha, T. title: Development of an Agent Based Specialized Multi-Lingual Web Browser for Visually Handicapped date: 2014-01-03 words: 4739 flesch: 59 summary: Active X controls (small program building blocks), can 40 R. Ponnusamy, M.S.S. Babu, T. Chitralekha Figure 1: SPECS Architecture, LLAA – Language Learning Adaptation Agent, DA – Dialogue Agent, MHA – Message Handling Agent Figure 2: Layered Representation of Specialized Browser serve to create distributed applications working over the Internet through web browsers. [14] (formerly Microsoft Internet Explorer; commonly abbreviated to IE), is a series of graphical web browsers developed by Microsoft and included as part of the Microsoft Windows line of operating systems. keywords: access; agent; braille; browser; internet; language; learning; specs; system; user; vhu; web cache: ijccc-82.pdf plain text: ijccc-82.txt item: #971 of 981 id: ijccc-866 author: Morgos, Lucian title: Non-Negative Factorization for Clustering of Microarray Data date: 2014-01-03 words: 3844 flesch: 57 summary: Non-Negative Factorization for Clustering of Microarray Data L. Morgos Lucian Morgos Dept. of Electronics and Telecommunications Faculty of Electrical Engineering and Information Technology University of Oradea Romania, 419987 Oradea, Universitatii, 1 lmorgos@uoradea.ro Abstract: Typically, gene expression data are formed by thousands of genes asso- ciated to tens or hundreds of samples. Gene expression data comprise relevant (dis- criminant) information as well as irrelevant information often interpreted as noise. keywords: approach; clustering; data; expression; factorization; gene; nmf cache: ijccc-866.pdf plain text: ijccc-866.txt item: #972 of 981 id: ijccc-867 author: Nouri, Mahdi; Safarinia, Mahyar; Pourmahdi, Payam; Garshasebi, Mohammad Hossein title: The Parallel One-way Hash Function Based on Chebyshev-Halley Methods with Variable Parameter date: 2014-01-03 words: 5227 flesch: 56 summary: Theoretical analysis and computer simulation indicate that the algorithm can assure all performance requirements of hash function in an efficient and flexible style and secure against birthday attacks or meet-in-the-middle attacks, which is good choice for data integrity or authentication. Keywords: Hash function; Chebyshev-Halley methods; Two-dimensional coupled map lattices; Spatiotemporal chaos; Chaotic nonlinear map; variable parameter. keywords: algorithm; bit; bits; figure; function; hash; hash function; message; number; parameter; value cache: ijccc-867.pdf plain text: ijccc-867.txt item: #973 of 981 id: ijccc-869 author: Wang, Zhendong; Wang, Huiqiang; Lv, Hongwu; Feng, Guangsheng title: Spectrum Migration Approach Based on Pre-decision Aid and Interval Mamdani Fuzzy Inference in Cognitive Radio Networks date: 2014-01-03 words: 3430 flesch: 56 summary: To shorten spectrum migration decision time and seek the optimal spectrum holes, interval Mamdani fuzzy inference is put forward. At last, we propose interval Mamdani fuzzy inference (IMFI) method based on Mamdani fuzzy inference to shorten spectrum migration decision time and search for suitable spectrum holes. keywords: decision; inference; interval; migration; probability; spectrum; sus cache: ijccc-869.pdf plain text: ijccc-869.txt item: #974 of 981 id: ijccc-87 author: Susnea, Ioan title: Engineering Human Stigmergy date: 2015-04-28 words: 3609 flesch: 48 summary: Keywords: Human stigmergy, virtual pheromones, pheromone maps, intelli- gent transportation systems, stigmergic shopping, stigmergic learning. This paper proposes the con- cept of virtual pheromones, defined as engrams created by the agents not in the environment, but in a representation thereof – a map, and outlines several use cases, wherein pheromones embedded in maps are the key element for in- ducing stigmergic behavior in human multi-agent systems. keywords: agents; behavior; environment; human; map; maps; pheromone; stigmergy; systems cache: ijccc-87.pdf plain text: ijccc-87.txt item: #975 of 981 id: ijccc-889 author: Lee, Sangdong; Lim, Sang Boem title: Applications of Ubiquitous Sensor Network: Micro-Scale Air Quality Monitoring date: 2015-04-28 words: 4220 flesch: 51 summary: The Socket communication module is used between Local AirScope and the sensor gateway to collect sensor data. Once our idea is implemented in the Seoul metro area, we plan to divide our system functionalities into two systems Local AirScope to manage sensors and sensor data for small areas and Global AirScope to manage the various Local AirScopes and user information. keywords: airscope; application; data; information; local; quality; sensor; system; user cache: ijccc-889.pdf plain text: ijccc-889.txt item: #976 of 981 id: ijccc-897 author: Rajendran Baskaran, Kuttuva; Kalaiarasan, Chellan title: Improved Performance by Combining Web Pre-Fetching Using Clustering with Web Caching Based on SVM Learning Method date: 2016-01-26 words: 4081 flesch: 61 summary: The factors (features) of Web objects that influence Web proxy caching considered in this work are, namely: recency (object’s last reference time), frequency (number of requests made to an object), size (size of the requested Web object) and access latency of Web object. Web log file contents are preprocessed and trained using the features namely: recency, frequency, retrieval time and size of web object. keywords: cache; caching; fetching; object; pre; term; web cache: ijccc-897.pdf plain text: ijccc-897.txt item: #977 of 981 id: ijccc-9 author: Kasnakoglu, Cosku title: Active Queue Management of TCP Flows with Self-scheduled Linear Parameter Varying Controllers date: 2013-11-11 words: 2708 flesch: 66 summary: In [12] switching between multiple controllers designed for different RTTs is considered and it is seen that higher number of controllers results in improved performance. However, if the number of controllers is too high, the implementation becomes very difficult and complicated. keywords: aqm; controller; queue; rtt; tcp; time cache: ijccc-9.pdf plain text: ijccc-9.txt item: #978 of 981 id: ijccc-925 author: Zheleva, Mariya; Lee, HyungJune title: Power-Aware Relay Selection and Routing Scheme for Multi-Interface Sensor Networks date: 2015-04-28 words: 5314 flesch: 56 summary: 5.3 Effects of packet delivery deadline Next we explore the effects of packet delivery deadline on network performance. We assume fixed packet size and power transmission for each interface type. keywords: deadline; delivery; interface; networks; nodes; packet; power; relay; route; routing; selection; sensor cache: ijccc-925.pdf plain text: ijccc-925.txt item: #979 of 981 id: ijccc-94 author: Gupta, Neelesh; Gupta, Roopam title: LAR-1: Affirmative influences on Energy-Conservation and Network Lifetime in MANET date: 2014-04-04 words: 3082 flesch: 56 summary: As a result, the routing overhead reduces and better performance of LAR-1 protocol is achieved in the network Comparison of performance metrics like PDF, throughput, Normalized Routing Load (NRL), E2E delay and average node energy consumption is displayed in figures 2, 3, 4, 5 and 6 respectively. keywords: conservation; dsr; energy; manet; network; nodes; routing cache: ijccc-94.pdf plain text: ijccc-94.txt item: #980 of 981 id: ijccc-96 author: Nithya Kalyani, S.; Sasikala, E.; Gopinath, B. title: Collaborative Data Processing in WSN Using Voronoi Fuzzy Clustering date: 2015-04-28 words: 3613 flesch: 64 summary: To find the membership function of each sensor node, let assume certain the number of sensor node as cluster head. 3.2 Evaluation of running time by varying the number of cluster heads Here, the running time is evaluated by keep the number of sensor nodes (1000) at constant and varying the number of cluster heads for each time. keywords: algorithm; cluster; cluster head; data; head; node; number; sensor cache: ijccc-96.pdf plain text: ijccc-96.txt item: #981 of 981 id: ijccc-987 author: Zhang, Ping; Du, Guanglong; Liang, Bin; Wang, Xueqian title: Human-Manipulator Interface Using Hybrid Sensors via CMAC for Dual Robots date: 2015-02-15 words: 4499 flesch: 58 summary: Since the signals of the position and the orientation of human hand are time-varying and they are ill-defined when occlusion is encountered, an adaptive filter is required. Keywords: Cerebellar Model Articulation Controller (CMAC), robot teleoperation, human-robot interface. keywords: hand; human; interface; method; motion; operator; orientation; position; robot; tracking cache: ijccc-987.pdf plain text: ijccc-987.txt