Science Publishing Group: International Journal of Intelligent Information Systems: Table of Contents
<i> International Journal of Intelligent Information Systems (IJIIS) </i> provides a forum wherein academics, researchers and practitioners may publish high-quality, original and state-of-the-art papers describing theoretical aspects, systems architectures, analysis and design tools and techniques, and implementation experiences in intelligent information systems. Articles published in IJMIS include: research papers, invited papers, meeting, workshop and conference announcements and reports, survey and tutorial articles, and book reviews.
http://www.sciencepublishinggroup.com/j/ijiis Science Publishing Group: International Journal of Intelligent Information Systems: Table of Contents
Science Publishing Group
en-US
International Journal of Intelligent Information Systems
International Journal of Intelligent Information Systems
http://image.sciencepublishinggroup.com/journal/135.gif
http://www.sciencepublishinggroup.com/j/ijiis
Crowd Anomaly Detection Using Standardized Modeled Input.
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20120101.11
A variety of techniques exist for tracking and detection of pedestrian traffic.The “proof of concept” or the utility of these methods is often illustrated by analysis of a video or photographs produced by the researcher as part of the development process of the algorithms.Although these images are often based on actual human subjects, they lack portability and ground truth or at best require tedious hand mapping to record ground truth.Hence, each algorithm is developed and tested for a unique situation.Consequently, as an alternative process we propose using gaming techniques to generate pedestrian and crowd like movements that readily produce ground truth referenced via data logs.For this initial study, we have used modifications of the Reynolds flocking model to generate crowd like behavior.Using these algorithms and open-source software platforms, we generated reference crowds and then added individual pedestrian behavior within the simulated crowd.Various detection methods were applied to differentcrowd scenarios to explore and assess the utility of detection methods, illustrate the possibilities of this technique, and demonstrate an initial screening for a detection algorithm.Although not a final proof of a detection process, this method allows facile, rapid, and comparative initial evaluation of the methods under consideration.
A variety of techniques exist for tracking and detection of pedestrian traffic.The “proof of concept” or the utility of these methods is often illustrated by analysis of a video or photographs produced by the researcher as part of the development process of the algorithms.Although these images are often based on actual human subjects, they lack portability and ground truth or at best require tedious hand mapping to record ground truth.Hence, each algorithm is developed and tested for a unique situation.Consequently, as an alternative process we propose using gaming techniques to generate pedestrian and crowd like movements that readily produce ground truth referenced via data logs.For this initial study, we have used modifications of the Reynolds flocking model to generate crowd like behavior.Using these algorithms and open-source software platforms, we generated reference crowds and then added individual pedestrian behavior within the simulated crowd.Various detection methods were applied to differentcrowd scenarios to explore and assess the utility of detection methods, illustrate the possibilities of this technique, and demonstrate an initial screening for a detection algorithm.Although not a final proof of a detection process, this method allows facile, rapid, and comparative initial evaluation of the methods under consideration.
Crowd Anomaly Detection Using Standardized Modeled Input.
doi:10.11648/j.ijiis.20120101.11
International Journal of Intelligent Information Systems
2014-01-01
© Science Publishing Group
Michael E. Long
Alexander Glade
Kevin J. Bierre
Bartholomew L. Moore
Crowd Anomaly Detection Using Standardized Modeled Input.
1
1
6
6
2014-01-01
2014-01-01
10.11648/j.ijiis.20120101.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20120101.11
© Science Publishing Group
Verification of Telecommunication Protocols Based on Formal Methods
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20130201.11
This article is devoted to the development method for verification and detecting errors that can occur in the operation of protocols for information exchange. The various steps of verification of telecommunication protocols are given in the article; the construction of counterexample, which helps to identify the logical operations that lead to errors in the protocols. Practical implementation of given method is shown on TCP.
This article is devoted to the development method for verification and detecting errors that can occur in the operation of protocols for information exchange. The various steps of verification of telecommunication protocols are given in the article; the construction of counterexample, which helps to identify the logical operations that lead to errors in the protocols. Practical implementation of given method is shown on TCP.
Verification of Telecommunication Protocols Based on Formal Methods
doi:10.11648/j.ijiis.20130201.11
International Journal of Intelligent Information Systems
2014-01-01
© Science Publishing Group
Tkacheva Elena Borisovna
Lubov Demchenko Vasilievna
Saied Halawa Fawaz
Verification of Telecommunication Protocols Based on Formal Methods
2
1
10
10
2014-01-01
2014-01-01
10.11648/j.ijiis.20130201.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20130201.11
© Science Publishing Group
A Design of the Preference Acquisition Detection System Using the EEG
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20130201.13
Estimation of emotional states has been multi-disciplinary research interests. Among them, although there are many ways of the estimation such as subjective evaluations and behavioral taxonomy, direct evaluation from the human brain is more reliable. Especially, electroencephalographic (EEG) signal analysis is widely used because of its simplicity and convenience. In our research, emotional states are investigated with a simple electroencephalography which has only one electrode. This device is lighter and cheaper than existing devices.However, its feasibility has yet been proven.
Estimation of emotional states has been multi-disciplinary research interests. Among them, although there are many ways of the estimation such as subjective evaluations and behavioral taxonomy, direct evaluation from the human brain is more reliable. Especially, electroencephalographic (EEG) signal analysis is widely used because of its simplicity and convenience. In our research, emotional states are investigated with a simple electroencephalography which has only one electrode. This device is lighter and cheaper than existing devices.However, its feasibility has yet been proven.
A Design of the Preference Acquisition Detection System Using the EEG
doi:10.11648/j.ijiis.20130201.13
International Journal of Intelligent Information Systems
2014-01-01
© Science Publishing Group
Hironobu Fukai
Yohei Tomita
Yasue Mitsukura
A Design of the Preference Acquisition Detection System Using the EEG
2
1
25
25
2014-01-01
2014-01-01
10.11648/j.ijiis.20130201.13
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20130201.13
© Science Publishing Group
Knowledge Acquisition for Expanding Semantic Network
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20130202.11
This article presents the issues of knowledge management, in particular knowledge acquisition. The article summarizes research work started with the SeiPro2S (Semantically Enhanced Intellectual Property Protection System) system designed to protect resources from the unauthorized use of intel¬lectual property. The system implements semantic network as a structure of knowledge repre¬sentation and a new idea of semantic compression. As the author proved that semantic compression is viable concept for English, he decided to focus on potential applications. An algorithm is presented that employ¬ing semantic network WiSENet for knowledge acquisition with flexible rules that yield high precision results. Detailed discussion is given with description of devised algorithm, usage examples and results of experi¬ments.
This article presents the issues of knowledge management, in particular knowledge acquisition. The article summarizes research work started with the SeiPro2S (Semantically Enhanced Intellectual Property Protection System) system designed to protect resources from the unauthorized use of intel¬lectual property. The system implements semantic network as a structure of knowledge repre¬sentation and a new idea of semantic compression. As the author proved that semantic compression is viable concept for English, he decided to focus on potential applications. An algorithm is presented that employ¬ing semantic network WiSENet for knowledge acquisition with flexible rules that yield high precision results. Detailed discussion is given with description of devised algorithm, usage examples and results of experi¬ments.
Knowledge Acquisition for Expanding Semantic Network
doi:10.11648/j.ijiis.20130202.11
International Journal of Intelligent Information Systems
2014-01-01
© Science Publishing Group
Dariusz Ceglarek
Knowledge Acquisition for Expanding Semantic Network
2
2
33
33
2014-01-01
2014-01-01
10.11648/j.ijiis.20130202.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20130202.11
© Science Publishing Group
An Application of the Logitboost Ensemble Algorithm in Loan Appraisals
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20130202.12
Mitigation of credit risk is a key aspect of portfolio management in any financial institution. This is primarily due to difficulties in uncovering uncertainties in information provided by credit applicants and also due to lack of reliable automated techniques that would improve the efficiency of manual underwriting procedures. In this paper, we report on the results of a MSc. Thesis1 in the application of an ensemble learning algorithm in development of a computer program that can greatly enhance the underwriting process. The implementation was based on the java netbeans development platform to create an interface that was used to train a model and its subsequent use in predicting credit decisions. The results obtained proved that such a mechanism can be applied to augment manual credit appraising processes, especially where large volumes of applications are to be processed within limited timeframes.
Mitigation of credit risk is a key aspect of portfolio management in any financial institution. This is primarily due to difficulties in uncovering uncertainties in information provided by credit applicants and also due to lack of reliable automated techniques that would improve the efficiency of manual underwriting procedures. In this paper, we report on the results of a MSc. Thesis1 in the application of an ensemble learning algorithm in development of a computer program that can greatly enhance the underwriting process. The implementation was based on the java netbeans development platform to create an interface that was used to train a model and its subsequent use in predicting credit decisions. The results obtained proved that such a mechanism can be applied to augment manual credit appraising processes, especially where large volumes of applications are to be processed within limited timeframes.
An Application of the Logitboost Ensemble Algorithm in Loan Appraisals
doi:10.11648/j.ijiis.20130202.12
International Journal of Intelligent Information Systems
2014-01-01
© Science Publishing Group
Z. Kirori
J. Ogutu
An Application of the Logitboost Ensemble Algorithm in Loan Appraisals
2
2
39
39
2014-01-01
2014-01-01
10.11648/j.ijiis.20130202.12
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20130202.12
© Science Publishing Group
Assessing the Readiness by SMEs and Financial Institutions in The Establishment of an Integrated ICT Infrastructure for Financial Transactions in Kenya
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20130202.13
Small and Medium Enterprises (SMEs), mostly in the third world countries face many challenges in the management of finances; namely: the ability to determine daily net earnings after the daily ratios for recurrent monthly deductions such loan premiums and utility bills are made. The main reason is the lack of an elaborate information technology infrastructure that directly targets this vital economic sub-sector for linking it to the general infrastructure that administers other financial transactions. In this article, we report the findings of a research conducted in assessing the readiness of SMEs and the Kenyan financial institutions in the use of information technology to specifically address these challenges.
Small and Medium Enterprises (SMEs), mostly in the third world countries face many challenges in the management of finances; namely: the ability to determine daily net earnings after the daily ratios for recurrent monthly deductions such loan premiums and utility bills are made. The main reason is the lack of an elaborate information technology infrastructure that directly targets this vital economic sub-sector for linking it to the general infrastructure that administers other financial transactions. In this article, we report the findings of a research conducted in assessing the readiness of SMEs and the Kenyan financial institutions in the use of information technology to specifically address these challenges.
Assessing the Readiness by SMEs and Financial Institutions in The Establishment of an Integrated ICT Infrastructure for Financial Transactions in Kenya
doi:10.11648/j.ijiis.20130202.13
International Journal of Intelligent Information Systems
2014-01-01
© Science Publishing Group
M. Achieng
Assessing the Readiness by SMEs and Financial Institutions in The Establishment of an Integrated ICT Infrastructure for Financial Transactions in Kenya
2
2
45
45
2014-01-01
2014-01-01
10.11648/j.ijiis.20130202.13
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20130202.13
© Science Publishing Group
System Design of a Computer-Based Clinical Decision Support System Management by Using Radial Basis Function Approach
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20130203.11
Effective corporate governance mechanisms and strategies are commonly referred to as the area of management that deals with getting the best performance from employees within the organization at hand. Whilst the activities involved in the management of people for their optimal performance have been carried out for generations, it is only relatively recently that attempts have been made to identify, describe and refine the practices of effective corporate governance mechanisms and strategies. The present paper introduces and outlines the framework of modern Optimal Human Resource Management of hospital with using Neural Network (NN) and its crucial connectivity to Optimal Performance of people within the organization at hand and what the organization needs to do in order to achieve such well sought after connectivity. The NN is described in the present paper identifying its basic structures, unique characteristics, advantages and. Hospital as the most well known organization provides this type of service that plays an important role in maintaining the health of patients. Improving the quality of health care and reducing medical errors seems to be essential that available strategies should be used to achieve this goal. One of the strategies is to design System that in the present study, the modeling of this system is based on decision support systems using RBF.
Effective corporate governance mechanisms and strategies are commonly referred to as the area of management that deals with getting the best performance from employees within the organization at hand. Whilst the activities involved in the management of people for their optimal performance have been carried out for generations, it is only relatively recently that attempts have been made to identify, describe and refine the practices of effective corporate governance mechanisms and strategies. The present paper introduces and outlines the framework of modern Optimal Human Resource Management of hospital with using Neural Network (NN) and its crucial connectivity to Optimal Performance of people within the organization at hand and what the organization needs to do in order to achieve such well sought after connectivity. The NN is described in the present paper identifying its basic structures, unique characteristics, advantages and. Hospital as the most well known organization provides this type of service that plays an important role in maintaining the health of patients. Improving the quality of health care and reducing medical errors seems to be essential that available strategies should be used to achieve this goal. One of the strategies is to design System that in the present study, the modeling of this system is based on decision support systems using RBF.
System Design of a Computer-Based Clinical Decision Support System Management by Using Radial Basis Function Approach
doi:10.11648/j.ijiis.20130203.11
International Journal of Intelligent Information Systems
2014-01-01
© Science Publishing Group
Neda Darvish
Khikmat Kh. Kuminov
Hoda Darvish
Marjan Fakhar
System Design of a Computer-Based Clinical Decision Support System Management by Using Radial Basis Function Approach
2
3
54
54
2014-01-01
2014-01-01
10.11648/j.ijiis.20130203.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20130203.11
© Science Publishing Group
Contextual Recommender Systems Using a Multidimensional Approach
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20130204.11
Recommender systems use the past experiences and preferences of the target users as a basis to provide personalized recommendations for them and as the same time, solve the information overloading problem. Context as the dynamic information describing the situation of items and users and affecting the user’s decision process is essential to be used by recommender systems. Multidimensional approach to recommender systems that can provide recommendations based on additional contextual information besides the typical information on users and items used in most of the current recommender systems. This approach supports multiple dimensions, profiling information, and hierarchical aggregation of recommendation. The recommender system could simultaneously possess the advantages of content-based recommendation, knowledge-based recommendation, collaborative filtering recommendation and On-Line Analytical Processing (OLAP) in segmenting the information. Following the improvement of the recommendation structure, it doesn’t have to limit its analysis on the user and product to compute for the recommendation result and it could also handle and determine more complex contextual information as recommendation computation foundation. It could develop better results if applied in different domains. This work extends the multidimensional recommendation model concept of Adomavicius and Tuzhilin (2001) and proposes a multidimensional recommendation environment to integrate the contextual information.
Recommender systems use the past experiences and preferences of the target users as a basis to provide personalized recommendations for them and as the same time, solve the information overloading problem. Context as the dynamic information describing the situation of items and users and affecting the user’s decision process is essential to be used by recommender systems. Multidimensional approach to recommender systems that can provide recommendations based on additional contextual information besides the typical information on users and items used in most of the current recommender systems. This approach supports multiple dimensions, profiling information, and hierarchical aggregation of recommendation. The recommender system could simultaneously possess the advantages of content-based recommendation, knowledge-based recommendation, collaborative filtering recommendation and On-Line Analytical Processing (OLAP) in segmenting the information. Following the improvement of the recommendation structure, it doesn’t have to limit its analysis on the user and product to compute for the recommendation result and it could also handle and determine more complex contextual information as recommendation computation foundation. It could develop better results if applied in different domains. This work extends the multidimensional recommendation model concept of Adomavicius and Tuzhilin (2001) and proposes a multidimensional recommendation environment to integrate the contextual information.
Contextual Recommender Systems Using a Multidimensional Approach
doi:10.11648/j.ijiis.20130204.11
International Journal of Intelligent Information Systems
2014-01-01
© Science Publishing Group
Mohammed Mahmudur Rahman
Contextual Recommender Systems Using a Multidimensional Approach
2
4
63
63
2014-01-01
2014-01-01
10.11648/j.ijiis.20130204.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20130204.11
© Science Publishing Group
Some Extensions of Positive and Negative Rules for Discovering Basic Interesting Rules
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20130204.12
Positive reasoning and negative reasoning have been applied to be very useful in practice as clear from the record of many real life applications, especially in medicine. These reasoning mechanisms play important role in cutting the search space, reflecting experts' decision, supporting decision by the cooperation of experts and computers. This paper proposes the concepts of extended negative rule, minimal rule and explores their properties. Furthermore, an algorithm for finding all minimal positive rule and minimal negative rule is given. This algorithm is effective to discover positive and negative rules which have not redundant formula. These rules support to deduce the other important positive and negative rules. Experiments are carried out on data sets of UCI machine learning repository to analyze the performance study.
Positive reasoning and negative reasoning have been applied to be very useful in practice as clear from the record of many real life applications, especially in medicine. These reasoning mechanisms play important role in cutting the search space, reflecting experts' decision, supporting decision by the cooperation of experts and computers. This paper proposes the concepts of extended negative rule, minimal rule and explores their properties. Furthermore, an algorithm for finding all minimal positive rule and minimal negative rule is given. This algorithm is effective to discover positive and negative rules which have not redundant formula. These rules support to deduce the other important positive and negative rules. Experiments are carried out on data sets of UCI machine learning repository to analyze the performance study.
Some Extensions of Positive and Negative Rules for Discovering Basic Interesting Rules
doi:10.11648/j.ijiis.20130204.12
International Journal of Intelligent Information Systems
2014-01-01
© Science Publishing Group
Nguyen Duc Thuan
Some Extensions of Positive and Negative Rules for Discovering Basic Interesting Rules
2
4
69
69
2014-01-01
2014-01-01
10.11648/j.ijiis.20130204.12
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20130204.12
© Science Publishing Group
Forecasting the Saudi Arabia Stock Prices Based on Artificial Neural Networks Model
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20130205.12
In this paper, we have proposed artificial neural network for the prediction of Saudi stock market. The proposed predictions model, with its high degree of accuracy, could be used as investment advisor for the investors and traders in the Saudi stock market. The proposed model is based mainly on Saudi Stock market historical data covering a large span of time. Achieving reasonable accuracy rate of predication models will surely facilitate an increased confidence in the investment in the Saudi stock market. We have only used the closing price of the stock as the stock variable considered for input to the system. The number of windows gap to determine the numbers of previous days to be used in predicting the next day closing price data has been choosing based on experimental simulation carried out to determine the best possible value. Our results indicated that the proposed ANN model predicts the next day closing price stock market value with a very low RMSE down to 1.8174, very low MAD down to 18.2835, very low MAPE of down to 1.6476 and very high correlation coefficient of up to 99.9% for the test set, which is an indication that the model adequately mimics the trend of the market in its prediction. This performance is really encouraging and thus the proposed system will impact positively on the analysis and prediction of Saudi stock market in general.
In this paper, we have proposed artificial neural network for the prediction of Saudi stock market. The proposed predictions model, with its high degree of accuracy, could be used as investment advisor for the investors and traders in the Saudi stock market. The proposed model is based mainly on Saudi Stock market historical data covering a large span of time. Achieving reasonable accuracy rate of predication models will surely facilitate an increased confidence in the investment in the Saudi stock market. We have only used the closing price of the stock as the stock variable considered for input to the system. The number of windows gap to determine the numbers of previous days to be used in predicting the next day closing price data has been choosing based on experimental simulation carried out to determine the best possible value. Our results indicated that the proposed ANN model predicts the next day closing price stock market value with a very low RMSE down to 1.8174, very low MAD down to 18.2835, very low MAPE of down to 1.6476 and very high correlation coefficient of up to 99.9% for the test set, which is an indication that the model adequately mimics the trend of the market in its prediction. This performance is really encouraging and thus the proposed system will impact positively on the analysis and prediction of Saudi stock market in general.
Forecasting the Saudi Arabia Stock Prices Based on Artificial Neural Networks Model
doi:10.11648/j.ijiis.20130205.12
International Journal of Intelligent Information Systems
2014-01-01
© Science Publishing Group
S. O. Olatunji
Mohammad Saad Al-Ahmadi
Moustafa Elshafei
Yaser Ahmed Fallatah
Forecasting the Saudi Arabia Stock Prices Based on Artificial Neural Networks Model
2
5
86
86
2014-01-01
2014-01-01
10.11648/j.ijiis.20130205.12
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20130205.12
© Science Publishing Group
Taita Taveta University College E-Voting System: A Web Based Approach to Elections Management
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20130205.11
Most institutions of higher learning such as universities and colleges world over provide for an electioneering process where students elect their union leaders in a democratic manner. This is of great importance as it inculcates the principle of democracy into the students who are at the peak of their learning stage and would need these skills for better statesmanship. Proper management therefore is called for to provide foolproof processes which can be termed as free and fair in the standards of universal democracy and employment of Information Technology is a sure way to realize this. Online voting is the application of web based technologies to the automation of voting processes. In online voting a voter cast their ballot from a remote terminal that is connected to the central database where actual processing of the ballot is done. Online systems have the advantage of providing convenience to the voter and reduce the time wasted in the queuing process at election centers. This paper describes a research carried out at Taita Taveta University College, a higher learning institution in Kenya and the process undertaken to achieve development and deployment of a web based system to promote free and fair democratic electioneering process: computerizing registration, voting and tallying process involved. The system described is in form of a portal that is embedded on the Universities website. The system was developed using the incremental prototyping due to the adaptive nature of web based applications and the system proved that a computerized solution is possible with elimination of human related faults that are a commonplace in employment of human clerks to manage the election process. Integration with SMS functionalities helped increase safety and reliability of the system. Application of the online voting has resulted in many advantages in the efficiency of the entire electioneering process and reduced costs the university used to incur using the human clerk mechanism.
Most institutions of higher learning such as universities and colleges world over provide for an electioneering process where students elect their union leaders in a democratic manner. This is of great importance as it inculcates the principle of democracy into the students who are at the peak of their learning stage and would need these skills for better statesmanship. Proper management therefore is called for to provide foolproof processes which can be termed as free and fair in the standards of universal democracy and employment of Information Technology is a sure way to realize this. Online voting is the application of web based technologies to the automation of voting processes. In online voting a voter cast their ballot from a remote terminal that is connected to the central database where actual processing of the ballot is done. Online systems have the advantage of providing convenience to the voter and reduce the time wasted in the queuing process at election centers. This paper describes a research carried out at Taita Taveta University College, a higher learning institution in Kenya and the process undertaken to achieve development and deployment of a web based system to promote free and fair democratic electioneering process: computerizing registration, voting and tallying process involved. The system described is in form of a portal that is embedded on the Universities website. The system was developed using the incremental prototyping due to the adaptive nature of web based applications and the system proved that a computerized solution is possible with elimination of human related faults that are a commonplace in employment of human clerks to manage the election process. Integration with SMS functionalities helped increase safety and reliability of the system. Application of the online voting has resulted in many advantages in the efficiency of the entire electioneering process and reduced costs the university used to incur using the human clerk mechanism.
Taita Taveta University College E-Voting System: A Web Based Approach to Elections Management
doi:10.11648/j.ijiis.20130205.11
International Journal of Intelligent Information Systems
2014-01-01
© Science Publishing Group
J. M. Nzoka
N. M. Muthama
N. M. Mung’ithya
Taita Taveta University College E-Voting System: A Web Based Approach to Elections Management
2
5
76
76
2014-01-01
2014-01-01
10.11648/j.ijiis.20130205.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20130205.11
© Science Publishing Group
Algorithms for Trade Modeling with Agent-Based Systems
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20130205.13
This paper presents a set of algorithms for trade modeling with cellular automata (CA). The cellular automata simulator developed for this purpose has allowed the study of phenomena that occur within groups of agents that operate in a dynamic resource field. With this cellular automata simulator algorithms have been developed and tested for clustering of agents in agencies and for studying phenomena within agencies. It was thus evident that within agencies the agents try to group in the neighborhood of leading and rich agents with high performance, in order to learn from them the best rules. In terms of hierarchy, the results show that the places in the immediate neighborhood of the agents with leading positions can be occupied only by agents with wealth.
This paper presents a set of algorithms for trade modeling with cellular automata (CA). The cellular automata simulator developed for this purpose has allowed the study of phenomena that occur within groups of agents that operate in a dynamic resource field. With this cellular automata simulator algorithms have been developed and tested for clustering of agents in agencies and for studying phenomena within agencies. It was thus evident that within agencies the agents try to group in the neighborhood of leading and rich agents with high performance, in order to learn from them the best rules. In terms of hierarchy, the results show that the places in the immediate neighborhood of the agents with leading positions can be occupied only by agents with wealth.
Algorithms for Trade Modeling with Agent-Based Systems
doi:10.11648/j.ijiis.20130205.13
International Journal of Intelligent Information Systems
2014-01-01
© Science Publishing Group
Monica Dascalu
Lucian Milea
Gabriela Ivanus
Mihail Teodorescu
Eduard Franti
Algorithms for Trade Modeling with Agent-Based Systems
2
5
93
93
2014-01-01
2014-01-01
10.11648/j.ijiis.20130205.13
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20130205.13
© Science Publishing Group
Assessment of Productivity of Management Systems of the Multiservice Networks
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20130206.11
This article is devoted to the assessment of different service-oriented architectures and development new web-oriented architecture. The current service-oriented architecture such as SOA, COBRA, MWEB considered in the article, reviewed their main advantages and disadvantages in processing large amounts of data. In the range of article done analysis of the response time of distributed multi-service network for different data streams and proposed a new web-oriented architecture of distributed network management. Proposed architecture allows reducing the search time for applications stream that exceeds the service intensity.
This article is devoted to the assessment of different service-oriented architectures and development new web-oriented architecture. The current service-oriented architecture such as SOA, COBRA, MWEB considered in the article, reviewed their main advantages and disadvantages in processing large amounts of data. In the range of article done analysis of the response time of distributed multi-service network for different data streams and proposed a new web-oriented architecture of distributed network management. Proposed architecture allows reducing the search time for applications stream that exceeds the service intensity.
Assessment of Productivity of Management Systems of the Multiservice Networks
doi:10.11648/j.ijiis.20130206.11
International Journal of Intelligent Information Systems
2014-01-01
© Science Publishing Group
Duravkin Evgen
Mohammed Khodayer Hassan Al-Dulaimi
Aymen Mohammed Khodayer Al-Dulaimi
Assessment of Productivity of Management Systems of the Multiservice Networks
2
6
99
99
2014-01-01
2014-01-01
10.11648/j.ijiis.20130206.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20130206.11
© Science Publishing Group
An Effective Cluster-Aware Labeling Method for Web Search Results Using Concordant Document Frequencies
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20140301.11
In recent years, the amount of information on World Wide Web has exploded. Search engines are generally used for web searching; however, robot-type search engines have a few problems. One such problem is that it is difficult for a user to come up with an appropriate query for obtaining the search results she/he intends. Moreover, it is difficult for users to understand the contents of search results because a robot-type search engine outputs many search results in a long list format. To solve these problems, many methods have been proposed that classify the results of a robot-type search engine into clusters that are labeled and then shown to the user. To be effective, the cluster label needs to consist of appropriate words to describe the web sites within the cluster. In this study, we propose a labeling method using concordant document frequencies where the web search results of a query are classified into clusters and we use our techniques to assign the proper labels to those clusters. We then find the set of web sites that result from an AND-query using an original query word and the cluster label. If this set and the members of the cluster are common, we say that the concordant document frequency is high, and the cluster label is assigned a high weight. Thus, it is possible to assign an appropriate label using our proposed cluster-aware method. We demonstrate the effectiveness of our proposed method by simulation experiments.
In recent years, the amount of information on World Wide Web has exploded. Search engines are generally used for web searching; however, robot-type search engines have a few problems. One such problem is that it is difficult for a user to come up with an appropriate query for obtaining the search results she/he intends. Moreover, it is difficult for users to understand the contents of search results because a robot-type search engine outputs many search results in a long list format. To solve these problems, many methods have been proposed that classify the results of a robot-type search engine into clusters that are labeled and then shown to the user. To be effective, the cluster label needs to consist of appropriate words to describe the web sites within the cluster. In this study, we propose a labeling method using concordant document frequencies where the web search results of a query are classified into clusters and we use our techniques to assign the proper labels to those clusters. We then find the set of web sites that result from an AND-query using an original query word and the cluster label. If this set and the members of the cluster are common, we say that the concordant document frequency is high, and the cluster label is assigned a high weight. Thus, it is possible to assign an appropriate label using our proposed cluster-aware method. We demonstrate the effectiveness of our proposed method by simulation experiments.
An Effective Cluster-Aware Labeling Method for Web Search Results Using Concordant Document Frequencies
doi:10.11648/j.ijiis.20140301.11
International Journal of Intelligent Information Systems
2014-01-01
© Science Publishing Group
Masafumi Matsuhara
Toshihiro Yoshida
An Effective Cluster-Aware Labeling Method for Web Search Results Using Concordant Document Frequencies
3
1
7
7
2014-01-01
2014-01-01
10.11648/j.ijiis.20140301.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20140301.11
© Science Publishing Group
Processing Overlapped Cells Using K-Means and Watershed
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20140301.12
Processing overlapped cells are tricky process especially when an automatic computerized system deals with 2D images of cells needed to be processed in biomedical filed, if these cells are overlapped this might give the impression and wrong indication of abnormality presence. In this paper a methodology are suggested and implemented to separate the overlapped from non-overlapped cells giving as a result two groups (clusters) for each. And we try to give an estimation of numbers of cells that overlapped under the microscope, the success rates of separating the two clusters (overlapped and non overlapped cells) are 100% while the success rate of the estimating the number of correct cells that overlapped compared with medical personal point view are 79.3%.
Processing overlapped cells are tricky process especially when an automatic computerized system deals with 2D images of cells needed to be processed in biomedical filed, if these cells are overlapped this might give the impression and wrong indication of abnormality presence. In this paper a methodology are suggested and implemented to separate the overlapped from non-overlapped cells giving as a result two groups (clusters) for each. And we try to give an estimation of numbers of cells that overlapped under the microscope, the success rates of separating the two clusters (overlapped and non overlapped cells) are 100% while the success rate of the estimating the number of correct cells that overlapped compared with medical personal point view are 79.3%.
Processing Overlapped Cells Using K-Means and Watershed
doi:10.11648/j.ijiis.20140301.12
International Journal of Intelligent Information Systems
2014-05-28
© Science Publishing Group
Faten Faraj Abushmmala
Fadwa Faraj Abushmmala
Processing Overlapped Cells Using K-Means and Watershed
3
1
12
12
2014-05-28
2014-05-28
10.11648/j.ijiis.20140301.12
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20140301.12
© Science Publishing Group
Adaptive Texture Energy Measure Method
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20140302.11
Recent developments in image quality, data storage, and computational capacity have heightened the need for texture analysis in image process. To date various methods have been developed and introduced for assessing textures in images. One of the most popular texture analysis methods is the Texture Energy Measure (TEM) and it has been used for detecting edges, levels, waves, spots and ripples by employing predefined TEM masks to images. Despite several successful studies, TEM has a number of serious weaknesses in use. The major drawback is; the masks are predefined therefore they cannot be adapted to image. A new method, Adaptive Texture Energy Measure Method (aTEM), was offered to overcome this disadvantage of TEM by using adaptive masks by adjusting the contrast, sharpening and orientation angle of the mask. To assess the applicability of aTEM, it is compared with TEM. The accuracy of the classification of butterfly, flower seed and Brodatz datasets are 0.08, 0.3292 and 0.3343, respectively by TEM and 0.0053, 0.2417 and 0.3153, respectively by aTEM. The results of this study indicate that aTEM is a successful method for texture analysis.
Recent developments in image quality, data storage, and computational capacity have heightened the need for texture analysis in image process. To date various methods have been developed and introduced for assessing textures in images. One of the most popular texture analysis methods is the Texture Energy Measure (TEM) and it has been used for detecting edges, levels, waves, spots and ripples by employing predefined TEM masks to images. Despite several successful studies, TEM has a number of serious weaknesses in use. The major drawback is; the masks are predefined therefore they cannot be adapted to image. A new method, Adaptive Texture Energy Measure Method (aTEM), was offered to overcome this disadvantage of TEM by using adaptive masks by adjusting the contrast, sharpening and orientation angle of the mask. To assess the applicability of aTEM, it is compared with TEM. The accuracy of the classification of butterfly, flower seed and Brodatz datasets are 0.08, 0.3292 and 0.3343, respectively by TEM and 0.0053, 0.2417 and 0.3153, respectively by aTEM. The results of this study indicate that aTEM is a successful method for texture analysis.
Adaptive Texture Energy Measure Method
doi:10.11648/j.ijiis.20140302.11
International Journal of Intelligent Information Systems
2014-06-23
© Science Publishing Group
Ömer Faruk Ertuğrul
Adaptive Texture Energy Measure Method
3
2
18
18
2014-06-23
2014-06-23
10.11648/j.ijiis.20140302.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20140302.11
© Science Publishing Group
Medical Diagnostics with the Classification Task
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20140303.11
Modeling with reusable knowledge components on the basis of classification task for knowledge systems for medical diag-nostics is considered. New problem solving method (method of feature set analysis) for classification task is proposed. It works faster than the known method of potential candidates pruning (from the CommonKADS methodology) for the domain with the number of attributes over 40.
Modeling with reusable knowledge components on the basis of classification task for knowledge systems for medical diag-nostics is considered. New problem solving method (method of feature set analysis) for classification task is proposed. It works faster than the known method of potential candidates pruning (from the CommonKADS methodology) for the domain with the number of attributes over 40.
Medical Diagnostics with the Classification Task
doi:10.11648/j.ijiis.20140303.11
International Journal of Intelligent Information Systems
2014-08-19
© Science Publishing Group
Iaroslaw Kardash
Medical Diagnostics with the Classification Task
3
3
26
26
2014-08-19
2014-08-19
10.11648/j.ijiis.20140303.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20140303.11
© Science Publishing Group
Information Systems (IS) Strategy: Antecedents and Pursuit in Organizations in Ghana
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20140303.12
The relevance of Information Systems (IS) in organizations is evidenced by its increasing adoption and usage to shape and drive business goals. The pursuit of appropriate IS Strategy is therefore imperative for the effective utilization and management of the enterprise IS and related infrastructure. But what perceptions and understanding do organizations in Ghana have about IS Strategy and how do these antecedents (organizational understanding and perceptions) influence the choice and pursuit of a particular IS Strategy? The study adopts a quantitative design and a cross-sectional approach with responses from senior IT executives of Ghana Club 100 companies in Accra to examine the above phenomenon from an IS Strategy Conceptions perspective investigating the antecedents of IS Strategy in organizations. Results suggest that the choice of particular IS Strategy is greatly influenced by the organizational understanding and perceived role of IS Strategy. The conception of IS Strategy as a shared view of IS role in the organization drives organizations to adopt more definite IS Strategy (IS Innovator and IS Conservative). It is noted further that, organizations in their quest to stay competitive while maintaining operational efficiency tend to be ambidextrous - adopting a blend of innovative and conservative strategies.
The relevance of Information Systems (IS) in organizations is evidenced by its increasing adoption and usage to shape and drive business goals. The pursuit of appropriate IS Strategy is therefore imperative for the effective utilization and management of the enterprise IS and related infrastructure. But what perceptions and understanding do organizations in Ghana have about IS Strategy and how do these antecedents (organizational understanding and perceptions) influence the choice and pursuit of a particular IS Strategy? The study adopts a quantitative design and a cross-sectional approach with responses from senior IT executives of Ghana Club 100 companies in Accra to examine the above phenomenon from an IS Strategy Conceptions perspective investigating the antecedents of IS Strategy in organizations. Results suggest that the choice of particular IS Strategy is greatly influenced by the organizational understanding and perceived role of IS Strategy. The conception of IS Strategy as a shared view of IS role in the organization drives organizations to adopt more definite IS Strategy (IS Innovator and IS Conservative). It is noted further that, organizations in their quest to stay competitive while maintaining operational efficiency tend to be ambidextrous - adopting a blend of innovative and conservative strategies.
Information Systems (IS) Strategy: Antecedents and Pursuit in Organizations in Ghana
doi:10.11648/j.ijiis.20140303.12
International Journal of Intelligent Information Systems
2014-08-24
© Science Publishing Group
Okpattah, Bernard Kofi
Chisenga, Justin
Addo, Hilla
Information Systems (IS) Strategy: Antecedents and Pursuit in Organizations in Ghana
3
3
33
33
2014-08-24
2014-08-24
10.11648/j.ijiis.20140303.12
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20140303.12
© Science Publishing Group
Estimating Depth of Anesthesia from EEG Signals Using Wavelet Transform
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20140304.12
Electroencephalogram (EEG) is the brain signal containing valuable information about the conscious and unconscious states of the brain, which may provide a useful tool to measure depth of anesthesia. However, raw EEG signals received in various states of consciousness cannot be distinguished visually. In this paper an approach is presented to find out difference between EEG signals in fully awake and in deep sleep conditions with respect to the coefficients of wavelet transform. Continuous wavelet transform of the raw EEG signal obtained at different conscious state of a human subject have been performed. Statistical analyses were then performed on coefficient values to determine the differences between the sleep state and the awake state. From statistical t-test analysis significant difference of the two state of consciousness was found.
Electroencephalogram (EEG) is the brain signal containing valuable information about the conscious and unconscious states of the brain, which may provide a useful tool to measure depth of anesthesia. However, raw EEG signals received in various states of consciousness cannot be distinguished visually. In this paper an approach is presented to find out difference between EEG signals in fully awake and in deep sleep conditions with respect to the coefficients of wavelet transform. Continuous wavelet transform of the raw EEG signal obtained at different conscious state of a human subject have been performed. Statistical analyses were then performed on coefficient values to determine the differences between the sleep state and the awake state. From statistical t-test analysis significant difference of the two state of consciousness was found.
Estimating Depth of Anesthesia from EEG Signals Using Wavelet Transform
doi:10.11648/j.ijiis.20140304.12
International Journal of Intelligent Information Systems
2014-10-20
© Science Publishing Group
Nusrat Ferdous
Md. Adnan Kiber
Estimating Depth of Anesthesia from EEG Signals Using Wavelet Transform
3
4
44
44
2014-10-20
2014-10-20
10.11648/j.ijiis.20140304.12
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20140304.12
© Science Publishing Group
Assessment of Health Management Information System Implementation in Ayder Referral Hospital, Mekelle, Ethiopia
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20140304.11
Effective Health Management Information System (HMIS) is essential for setting priority for community based problems, for allocation of budget and human resource and decision making in general to managers and stakeholders. In Africa there are many problems in data management in the health sector in relation to missing of data in reports this leads to a picture which could not represent the country health information. A facility based cross sectional study was conducted in Ayder referral and teaching hospital. Six months reports have been assessed including all the data, which were registered in the six month. In addition the tally sheets generated during this six month were also included as part of the assessment. Out of the six-month data used 63.3% was accurate. More than 95% of the reviewed patient cards were complete. Out of the questioned 50 staffs (93%) have good attitude towards HMIS. Data consistency between register and the tally sheets was measured as 72.2% even though the value difference was not largely seen. There was 78.6% an average report completeness measure in the HMIS unit. There was no sign of using the information generated by the facility. Use of accurate data in the facility was low. In addition, information was not still used for action. The original HMIS tallies were not used in the hospital instead minimized and photocopied tallies were used. Refreshing training was not given to staff. Therefore; training should be given to the higher bodies and all staffs about the importance of HMIS and the value of health data in decision making. The performance monitoring team should have to be established. The HMIS unit staffs should have to be trained on basic indicators calculation.
Effective Health Management Information System (HMIS) is essential for setting priority for community based problems, for allocation of budget and human resource and decision making in general to managers and stakeholders. In Africa there are many problems in data management in the health sector in relation to missing of data in reports this leads to a picture which could not represent the country health information. A facility based cross sectional study was conducted in Ayder referral and teaching hospital. Six months reports have been assessed including all the data, which were registered in the six month. In addition the tally sheets generated during this six month were also included as part of the assessment. Out of the six-month data used 63.3% was accurate. More than 95% of the reviewed patient cards were complete. Out of the questioned 50 staffs (93%) have good attitude towards HMIS. Data consistency between register and the tally sheets was measured as 72.2% even though the value difference was not largely seen. There was 78.6% an average report completeness measure in the HMIS unit. There was no sign of using the information generated by the facility. Use of accurate data in the facility was low. In addition, information was not still used for action. The original HMIS tallies were not used in the hospital instead minimized and photocopied tallies were used. Refreshing training was not given to staff. Therefore; training should be given to the higher bodies and all staffs about the importance of HMIS and the value of health data in decision making. The performance monitoring team should have to be established. The HMIS unit staffs should have to be trained on basic indicators calculation.
Assessment of Health Management Information System Implementation in Ayder Referral Hospital, Mekelle, Ethiopia
doi:10.11648/j.ijiis.20140304.11
International Journal of Intelligent Information Systems
2014-10-17
© Science Publishing Group
Kidane Tadesse
Ejigu Gebeyoh
Girma Tadesse
Assessment of Health Management Information System Implementation in Ayder Referral Hospital, Mekelle, Ethiopia
3
4
39
39
2014-10-17
2014-10-17
10.11648/j.ijiis.20140304.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20140304.11
© Science Publishing Group
Performance Evaluation and Operation of Enterprise Resource Planning (ERP) Software Security System
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20140305.11
The criteria for selecting the specific systems are - containment of most common sources for attacks, knowledge of the exact location of each security hole, accessibility to the source code and selection of a typical web application such as a human resource management. We followed the human resource (recruiting and working procedure) to integrate all the facilities in a single programmable platform. The applied framework has been used to map a commercial security library to the target mobile application SoC (System-of-Chip). The applicability of our framework to software architecture has been explored in other multiprocessor scenarios. ERP software (or enterprise resource planning software) is an integrated system used by businesses to combine, organize and maintain the data necessary for operations. The fundamental advantage of ERP is that integrating the myriad processes by which businesses operate saves time and expenses. The whole process has been automated using a methodology that extracts the risk of ERP system by analyzing the class diagram of the system. ERP for the business to develop innovative services for new and existing organizations, has achieved operational excellence with streamlined logistics and manufacturing improve financial performance with tighter internal controls and insights connect headquarters, subsidiaries and partners in a single network. Any type of small and large organization who to maintain their work flow in an organized way and having an intensity of clear book keeping like as business & educational institutions as well as social organizations.
The criteria for selecting the specific systems are - containment of most common sources for attacks, knowledge of the exact location of each security hole, accessibility to the source code and selection of a typical web application such as a human resource management. We followed the human resource (recruiting and working procedure) to integrate all the facilities in a single programmable platform. The applied framework has been used to map a commercial security library to the target mobile application SoC (System-of-Chip). The applicability of our framework to software architecture has been explored in other multiprocessor scenarios. ERP software (or enterprise resource planning software) is an integrated system used by businesses to combine, organize and maintain the data necessary for operations. The fundamental advantage of ERP is that integrating the myriad processes by which businesses operate saves time and expenses. The whole process has been automated using a methodology that extracts the risk of ERP system by analyzing the class diagram of the system. ERP for the business to develop innovative services for new and existing organizations, has achieved operational excellence with streamlined logistics and manufacturing improve financial performance with tighter internal controls and insights connect headquarters, subsidiaries and partners in a single network. Any type of small and large organization who to maintain their work flow in an organized way and having an intensity of clear book keeping like as business & educational institutions as well as social organizations.
Performance Evaluation and Operation of Enterprise Resource Planning (ERP) Software Security System
doi:10.11648/j.ijiis.20140305.11
International Journal of Intelligent Information Systems
2014-09-05
© Science Publishing Group
Diponkar Paul
Md. Rafel Mridha
Md. Rashedul Hasan
Performance Evaluation and Operation of Enterprise Resource Planning (ERP) Software Security System
3
5
54
54
2014-09-05
2014-09-05
10.11648/j.ijiis.20140305.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20140305.11
© Science Publishing Group
Framework Model on Enterprise Information System Based on Internet of Things
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20140306.11
A high degree of information sharing can enable manufacturing and services industry to optimize business processes and improve the core competitiveness and innovation ability. This paper aims to explore a framework model to build a kind of management information system based on Internet of things. Starting from the demand and functions of the system, we firstly outline a conceptual model based on sensing networks. Next, we construct the systemic framework and illustrate its running procedure in detail. Finally, we give experimental schemes designed for each module under J2EE platform. Practical application proves that our system can display the important information of tracking object in real time and achieve a more efficient management. Based on this model, people can further research and establish custom rules used to general information processing, make manufacturing and services enterprises build a modern information system more efficiently and faster, and facilitate practical application for Internet of things technology.
A high degree of information sharing can enable manufacturing and services industry to optimize business processes and improve the core competitiveness and innovation ability. This paper aims to explore a framework model to build a kind of management information system based on Internet of things. Starting from the demand and functions of the system, we firstly outline a conceptual model based on sensing networks. Next, we construct the systemic framework and illustrate its running procedure in detail. Finally, we give experimental schemes designed for each module under J2EE platform. Practical application proves that our system can display the important information of tracking object in real time and achieve a more efficient management. Based on this model, people can further research and establish custom rules used to general information processing, make manufacturing and services enterprises build a modern information system more efficiently and faster, and facilitate practical application for Internet of things technology.
Framework Model on Enterprise Information System Based on Internet of Things
doi:10.11648/j.ijiis.20140306.11
International Journal of Intelligent Information Systems
2014-12-26
© Science Publishing Group
Zhengxi Wei
Framework Model on Enterprise Information System Based on Internet of Things
3
6
59
59
2014-12-26
2014-12-26
10.11648/j.ijiis.20140306.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20140306.11
© Science Publishing Group
Influence of Task Characteristics on Adoption of Project Management Information System in Non-Governmental Organizations’ Projects in Nakuru Town (Kenya)
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20140306.12
In the world today, Management Information System (MIS) is a buzz in all aspects of our economy in managing people and organizational processes; this is aimed at enhancing economic competitiveness and guaranteeing customer satisfaction. Whereas there is consensus that MIS has huge effect on a firm’s productivity, the effects are only realized if and when, MIS is accepted and used. It is essential therefore to understand the determinants of MIS adoption so as to appreciate the enormous benefits attached to it. An understanding of how MIS adoption theories can be beneficial to the attainment of the said benefits is important and especially in the non-governmental organizations (NGO’s) sector where the focus of this study was. This study sought to determine the influence of Task Technology Fit Framework on the adoption of Project Management Information System (PMIS) in NGO projects in Nakuru town. The study objectives were to establish the influence of task characteristics on adoption of PMIS by NGO’s, to examine the influence of technology characteristics in ascertaining adoption by NGO’s, to assess the influence of the individual characteristics in adoption of PMIS by NGO’s and to establish organizational management expectations that influence adoption of PMIS by NGO’s. The study was carried out in Nakuru town with focus on 40 NGO’s that were purposively selected. A study sample of 40 project managers and 80 project coordinators were used. The study adopted descriptive case study research design. The study samples were selected using systematic sampling approach for the identification of NGO’s (project managers) and simple random sampling in selection of project coordinators. Data was collected using two sets of questionnaires and interviews. Data collected was then analyzed using SPSS and Microsoft Excel software’s. The results were then presented in a tabular summaries form. The study revealed that there was a positive relationship between the nature of task characteristics. The study further implores researchers to keenly investigate all PMIS systems that are in use by NGO’s and to standardize their design and usage as seen in the construction industry. The study findings could be used by software developers in designing systems that work best and as well guide management of NGO’s in implementing successfully the integration of PMIS.
In the world today, Management Information System (MIS) is a buzz in all aspects of our economy in managing people and organizational processes; this is aimed at enhancing economic competitiveness and guaranteeing customer satisfaction. Whereas there is consensus that MIS has huge effect on a firm’s productivity, the effects are only realized if and when, MIS is accepted and used. It is essential therefore to understand the determinants of MIS adoption so as to appreciate the enormous benefits attached to it. An understanding of how MIS adoption theories can be beneficial to the attainment of the said benefits is important and especially in the non-governmental organizations (NGO’s) sector where the focus of this study was. This study sought to determine the influence of Task Technology Fit Framework on the adoption of Project Management Information System (PMIS) in NGO projects in Nakuru town. The study objectives were to establish the influence of task characteristics on adoption of PMIS by NGO’s, to examine the influence of technology characteristics in ascertaining adoption by NGO’s, to assess the influence of the individual characteristics in adoption of PMIS by NGO’s and to establish organizational management expectations that influence adoption of PMIS by NGO’s. The study was carried out in Nakuru town with focus on 40 NGO’s that were purposively selected. A study sample of 40 project managers and 80 project coordinators were used. The study adopted descriptive case study research design. The study samples were selected using systematic sampling approach for the identification of NGO’s (project managers) and simple random sampling in selection of project coordinators. Data was collected using two sets of questionnaires and interviews. Data collected was then analyzed using SPSS and Microsoft Excel software’s. The results were then presented in a tabular summaries form. The study revealed that there was a positive relationship between the nature of task characteristics. The study further implores researchers to keenly investigate all PMIS systems that are in use by NGO’s and to standardize their design and usage as seen in the construction industry. The study findings could be used by software developers in designing systems that work best and as well guide management of NGO’s in implementing successfully the integration of PMIS.
Influence of Task Characteristics on Adoption of Project Management Information System in Non-Governmental Organizations’ Projects in Nakuru Town (Kenya)
doi:10.11648/j.ijiis.20140306.12
International Journal of Intelligent Information Systems
2014-12-29
© Science Publishing Group
Tobias Oyugi
Harriet Kidombo
Ouinter Omware
Influence of Task Characteristics on Adoption of Project Management Information System in Non-Governmental Organizations’ Projects in Nakuru Town (Kenya)
3
6
68
68
2014-12-29
2014-12-29
10.11648/j.ijiis.20140306.12
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20140306.12
© Science Publishing Group
Factors Associated with Low Level of Health Information Utilization in Resources Limited Setting, Eastern Ethiopia
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20140306.13
Health information system (HIS) is a system that integrates data collection, processing, reporting and use of the information necessary for improving health service effectiveness and efficiency through better management at all levels of health services. Despite the credible use of HIS for evidence based decision making, countries with the highest burden of ill health and the most in-needs for accurate and timely data have the weakest HIS in the vast majority of world’s poorest countries. The main of this study was to assess the level of information utilization and identify factors affecting information use in, Ethiopian, health facilities. A cross sectional study was conducted by using structured questioners in Dire Dawa administration health facilities. All unit/department heads from all government health facilities were selected. The data was analyzed using STATA version 11. Frequency and percentages was computed to present the descriptive findings. Association between variables was computed using binary logistic regression. Over all utilization of health information was found to be 53.1%. Friendly format for reporting and managers provide regular feed back to their staff were found to be significantly associated with health information utilization, and their strength were (AOR=2.796,95% CI[1.478,5.288]) and (AOR=2.195,95%CI[1.213,3.974]) respectively. Overall HIS utilization was found to be below the national expectation level. Low utilization of HIS was found in health posts than health centers and hospitals. There was also shortage of assigned HIS personnel, separate HIS office and assigned budget for HIS in majority of units/departments.
Health information system (HIS) is a system that integrates data collection, processing, reporting and use of the information necessary for improving health service effectiveness and efficiency through better management at all levels of health services. Despite the credible use of HIS for evidence based decision making, countries with the highest burden of ill health and the most in-needs for accurate and timely data have the weakest HIS in the vast majority of world’s poorest countries. The main of this study was to assess the level of information utilization and identify factors affecting information use in, Ethiopian, health facilities. A cross sectional study was conducted by using structured questioners in Dire Dawa administration health facilities. All unit/department heads from all government health facilities were selected. The data was analyzed using STATA version 11. Frequency and percentages was computed to present the descriptive findings. Association between variables was computed using binary logistic regression. Over all utilization of health information was found to be 53.1%. Friendly format for reporting and managers provide regular feed back to their staff were found to be significantly associated with health information utilization, and their strength were (AOR=2.796,95% CI[1.478,5.288]) and (AOR=2.195,95%CI[1.213,3.974]) respectively. Overall HIS utilization was found to be below the national expectation level. Low utilization of HIS was found in health posts than health centers and hospitals. There was also shortage of assigned HIS personnel, separate HIS office and assigned budget for HIS in majority of units/departments.
Factors Associated with Low Level of Health Information Utilization in Resources Limited Setting, Eastern Ethiopia
doi:10.11648/j.ijiis.20140306.13
International Journal of Intelligent Information Systems
2014-12-31
© Science Publishing Group
Kidist Teklegiorgis
Kidane Tadesse
Gebremeskel Mirutse
Wondwossen Terefe
Factors Associated with Low Level of Health Information Utilization in Resources Limited Setting, Eastern Ethiopia
3
6
75
75
2014-12-31
2014-12-31
10.11648/j.ijiis.20140306.13
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20140306.13
© Science Publishing Group
Hospital Information Systems: A Survey of the Current Situation in Iran
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.31
The main objective of hospital information systems (HIS) is to support hospital activities at practical, tactical and strategic levels. Computer based hospital information systems use computer hardware and software to collect, store, process, review and establish link with administrative data related to all hospital activities and to satisfy all the needs of clients. Considering the assessment and poll conducted in 2010 as well as the collected comments of physicians, hospital personnel, managers, researchers and computer engineering experts, HIS software in Iran consist of 10 organizational components and 10 service providing components with respect to domestic conditions. Study of HIS software providing companies in Iran during 2010 and their comparison with current status (2013) suggested that the number of HIS software manufacturing companies has experienced a 35% growth and the number of outstanding and desirable HIS sub-systems in Iran shows a 142% growth while the percentage of acceptable and rejected sub-systems has decreased by 18% in spite of the 35% growth in the number of companies.
The main objective of hospital information systems (HIS) is to support hospital activities at practical, tactical and strategic levels. Computer based hospital information systems use computer hardware and software to collect, store, process, review and establish link with administrative data related to all hospital activities and to satisfy all the needs of clients. Considering the assessment and poll conducted in 2010 as well as the collected comments of physicians, hospital personnel, managers, researchers and computer engineering experts, HIS software in Iran consist of 10 organizational components and 10 service providing components with respect to domestic conditions. Study of HIS software providing companies in Iran during 2010 and their comparison with current status (2013) suggested that the number of HIS software manufacturing companies has experienced a 35% growth and the number of outstanding and desirable HIS sub-systems in Iran shows a 142% growth while the percentage of acceptable and rejected sub-systems has decreased by 18% in spite of the 35% growth in the number of companies.
Hospital Information Systems: A Survey of the Current Situation in Iran
doi:10.11648/j.ijiis.s.2014030601.31
International Journal of Intelligent Information Systems
2014-11-17
© Science Publishing Group
Mohsen Pourali
Abbas Ghodrat Panah
Hospital Information Systems: A Survey of the Current Situation in Iran
3
6
119
119
2014-11-17
2014-11-17
10.11648/j.ijiis.s.2014030601.31
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.31
© Science Publishing Group
The Magnetic Induction Communications for the Wireless Underground Sensor Networks
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.30
The most important difference between the wireless underground sensor networks (WUSNs) andthe wireless ground sensor networksis the propagation environment of the signal .In fact, the underground environments consist of soil, rock and water instead of the air. The challenging reasons of these environments to propagate the wireless signal via the Electro Magnetic (EM) 2waves are considered as: the high path loss, channel dynamic conditions and the high size of antenna. At the present study, the details of Bit Error Rate (BER) 3 for 2PSK modulation, path loss and the bandwidth of the Magnetic Induction (MI) 4Systems and Electro Magnetic (EM) Waveguide in the underground environment areevaluated. Meanwhile, a new method isintroduced via MI waveguide that provided the constant conditions of channel by the small inductive coils. At the end of this study,itisfounded that the transmission range in MI waveguide system would be raised and the path loss in that system would be declined severely.
The most important difference between the wireless underground sensor networks (WUSNs) andthe wireless ground sensor networksis the propagation environment of the signal .In fact, the underground environments consist of soil, rock and water instead of the air. The challenging reasons of these environments to propagate the wireless signal via the Electro Magnetic (EM) 2waves are considered as: the high path loss, channel dynamic conditions and the high size of antenna. At the present study, the details of Bit Error Rate (BER) 3 for 2PSK modulation, path loss and the bandwidth of the Magnetic Induction (MI) 4Systems and Electro Magnetic (EM) Waveguide in the underground environment areevaluated. Meanwhile, a new method isintroduced via MI waveguide that provided the constant conditions of channel by the small inductive coils. At the end of this study,itisfounded that the transmission range in MI waveguide system would be raised and the path loss in that system would be declined severely.
The Magnetic Induction Communications for the Wireless Underground Sensor Networks
doi:10.11648/j.ijiis.s.2014030601.30
International Journal of Intelligent Information Systems
2014-11-12
© Science Publishing Group
Farzam Saeednia
Shapour Khorshidi
Mohssen Masoumi
The Magnetic Induction Communications for the Wireless Underground Sensor Networks
3
6
114
114
2014-11-12
2014-11-12
10.11648/j.ijiis.s.2014030601.30
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.30
© Science Publishing Group
Modeling and Prediction of Changes in Anzali Pond Using Multiple Linear Regression and Neural Network
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.29
Iranian ponds and water ecosystems are valuable assets which play decisive roles in economic, social, security and political affairs. Within the past few years, many Iranian water ecosystems such asUrmia Lake, Karoun River and Anzali Pond have been under disappearance threat. Ponds are habitats which cannot be replaced and this makes it necessary to investigate their changes in order to save these valuable ecosystems. The present research aims to investigate and evaluate the trend of variations in Anzali Pond using meteorological data between 1991-2010 by means of GMDH, which is based upon genetic algorithm and is a powerful technique in modeling complex dynamic non-linear systems, and linear regression technique. Input variables of both methodsinclude all factors (inside system and outside system factors) which affect variations in Anzali Pond. Exactness of linear regression method was 78% and exactness of GMDH neural network method was more than 97%. As as result, exactness of GMDH neural network method is significantly better than regression model.
Iranian ponds and water ecosystems are valuable assets which play decisive roles in economic, social, security and political affairs. Within the past few years, many Iranian water ecosystems such asUrmia Lake, Karoun River and Anzali Pond have been under disappearance threat. Ponds are habitats which cannot be replaced and this makes it necessary to investigate their changes in order to save these valuable ecosystems. The present research aims to investigate and evaluate the trend of variations in Anzali Pond using meteorological data between 1991-2010 by means of GMDH, which is based upon genetic algorithm and is a powerful technique in modeling complex dynamic non-linear systems, and linear regression technique. Input variables of both methodsinclude all factors (inside system and outside system factors) which affect variations in Anzali Pond. Exactness of linear regression method was 78% and exactness of GMDH neural network method was more than 97%. As as result, exactness of GMDH neural network method is significantly better than regression model.
Modeling and Prediction of Changes in Anzali Pond Using Multiple Linear Regression and Neural Network
doi:10.11648/j.ijiis.s.2014030601.29
International Journal of Intelligent Information Systems
2014-11-11
© Science Publishing Group
Farshad Parhizkar Miandehi
Erfan Zidehsaraei
Mousa Doostdar
Modeling and Prediction of Changes in Anzali Pond Using Multiple Linear Regression and Neural Network
3
6
108
108
2014-11-11
2014-11-11
10.11648/j.ijiis.s.2014030601.29
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.29
© Science Publishing Group
Color Image Encryption by Code Image and Hill Algorithm
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.28
Today in a digital world, protection of information plays an essential role in message exchange and trading. Encryption is used to meet the security needs of safe transaction. Regarding the importance of the issue and the shift of traditional stage to digital stage, familiarity with encryption methods seems necessary. Different data have different methods of encryption. Images are also one type of data for which encryption is critically needed to prevent impermissible access. In this article, first a primary image is selected, then, based on the proportion of the image needing encryption, pixels from code image are picked and is being encrypted by a function. In the next stage, this proportion is being XOR-ed by the pixel proportion of the image needing encryption, and eventually the final proportion is encrypted by Hill Algorithm. MATLAB software has been used for studying the project, and efficiency of this method, in comparison to Hill Algorithm as a standard algorithm, is investigated. At the end, maintaining the image quality after decryption is evaluated by standards such as PSNR and SSID. The results indicate high efficiency of this method.
Today in a digital world, protection of information plays an essential role in message exchange and trading. Encryption is used to meet the security needs of safe transaction. Regarding the importance of the issue and the shift of traditional stage to digital stage, familiarity with encryption methods seems necessary. Different data have different methods of encryption. Images are also one type of data for which encryption is critically needed to prevent impermissible access. In this article, first a primary image is selected, then, based on the proportion of the image needing encryption, pixels from code image are picked and is being encrypted by a function. In the next stage, this proportion is being XOR-ed by the pixel proportion of the image needing encryption, and eventually the final proportion is encrypted by Hill Algorithm. MATLAB software has been used for studying the project, and efficiency of this method, in comparison to Hill Algorithm as a standard algorithm, is investigated. At the end, maintaining the image quality after decryption is evaluated by standards such as PSNR and SSID. The results indicate high efficiency of this method.
Color Image Encryption by Code Image and Hill Algorithm
doi:10.11648/j.ijiis.s.2014030601.28
International Journal of Intelligent Information Systems
2014-11-11
© Science Publishing Group
Ali Moradmard
Mohammad Tahghighi Sharabiani
Color Image Encryption by Code Image and Hill Algorithm
3
6
102
102
2014-11-11
2014-11-11
10.11648/j.ijiis.s.2014030601.28
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.28
© Science Publishing Group
Utilizing Automatic Recognition and Classification of Images for Pattern Recognition
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.25
Pattern recognition is a scientific approach for categorizing objects to class or subject numbers. These subjects need to be classified based on their applications (can be image, signal or any other type of measurements). Occupation, automation, military information, communication, industry and commercial applications and many other fields can benefit from Pattern recognition approaches. Perhaps, one the most important reasons that lead to pattern recognition prominent place in today's research studies, is the role of image auto-classifications. In this research, we investigate recent literatures about image auto-classification and image processing to identify patterns.
Pattern recognition is a scientific approach for categorizing objects to class or subject numbers. These subjects need to be classified based on their applications (can be image, signal or any other type of measurements). Occupation, automation, military information, communication, industry and commercial applications and many other fields can benefit from Pattern recognition approaches. Perhaps, one the most important reasons that lead to pattern recognition prominent place in today's research studies, is the role of image auto-classifications. In this research, we investigate recent literatures about image auto-classification and image processing to identify patterns.
Utilizing Automatic Recognition and Classification of Images for Pattern Recognition
doi:10.11648/j.ijiis.s.2014030601.25
International Journal of Intelligent Information Systems
2014-11-05
© Science Publishing Group
Mohammad Hadi Yousofi
Habib Yousofi
Sayyed Amir Mohammad Razavi
Utilizing Automatic Recognition and Classification of Images for Pattern Recognition
3
6
83
83
2014-11-05
2014-11-05
10.11648/j.ijiis.s.2014030601.25
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.25
© Science Publishing Group
An Efficient Approach Toward Increasing Wireless Sensor Networks Lifetime Using Novel Clustering in Fuzzy Logic
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.17
Wireless sensor network (WSN) is composed of a large number of sensor nodes that are connected to each other. In order to collect more efficient information, wireless sensor networks are classified into groups. Classification is an efficient way to increase the lifetime of wireless sensor networks. In this network, devices have limited power processing and memory. Due to limited resources in wireless sensor networks, increasing lifetime was always of attention. An efficient routing method is called clustering based routing that finds optimum cluster heads and finding the correct number of them in each cluster remains a challenge. In this paper, we propose a novel and efficient method for clustering using fuzzy logic with four appropriate inputs and combine it with the good features of Low-Energy Adaptive Clustering Hierarchy (LEACH). Simulation results show that our method is more efficient compared to other distributed algorithms, because the proposed method if fully distributed. The result show that compared to centralized, the speed is more and its energy consumption is less.
Wireless sensor network (WSN) is composed of a large number of sensor nodes that are connected to each other. In order to collect more efficient information, wireless sensor networks are classified into groups. Classification is an efficient way to increase the lifetime of wireless sensor networks. In this network, devices have limited power processing and memory. Due to limited resources in wireless sensor networks, increasing lifetime was always of attention. An efficient routing method is called clustering based routing that finds optimum cluster heads and finding the correct number of them in each cluster remains a challenge. In this paper, we propose a novel and efficient method for clustering using fuzzy logic with four appropriate inputs and combine it with the good features of Low-Energy Adaptive Clustering Hierarchy (LEACH). Simulation results show that our method is more efficient compared to other distributed algorithms, because the proposed method if fully distributed. The result show that compared to centralized, the speed is more and its energy consumption is less.
An Efficient Approach Toward Increasing Wireless Sensor Networks Lifetime Using Novel Clustering in Fuzzy Logic
doi:10.11648/j.ijiis.s.2014030601.17
International Journal of Intelligent Information Systems
2014-10-27
© Science Publishing Group
Morteza Asghari Reykandeh
Ismaeil Asghari Reykandeh
An Efficient Approach Toward Increasing Wireless Sensor Networks Lifetime Using Novel Clustering in Fuzzy Logic
3
6
44
44
2014-10-27
2014-10-27
10.11648/j.ijiis.s.2014030601.17
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.17
© Science Publishing Group
Presenting an Algorithm for Choosing an Optimum Local Service Based on the Qualitative Feature of Combining
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.20
The combination of web services is the result of complex and increasing needs of the users and disability of single web services in resolving the users’ needs. One of the important challenges in the field of web 2.0 is the combination of web services based on their qualitative features. Since it is probable that there would be several different combinations of services for achieving a specific goal, choosing the service is based on some qualitative features like combining, availability, acceptability, service cost and security. One of the important issues is the quantitative survey of combining rate of the two services shared on the combination. So in this research, in the first stage, for measuring the combining rate, the effective factors on this feature would be surveyed. In the second stage, for choosing the optimum service based on the qualitative feature of combining, the local strategy is used. The proposed algorithm in local strategy selects services that their combining rate is more than a specific threshold. The implementations and analysis show that the proposed algorithm presents the optimum service in user's view with an acceptable combining capability. Also, the analysis of results and an evaluation with a case study show the optimized results of the local proposed algorithms compared to existing methods.
The combination of web services is the result of complex and increasing needs of the users and disability of single web services in resolving the users’ needs. One of the important challenges in the field of web 2.0 is the combination of web services based on their qualitative features. Since it is probable that there would be several different combinations of services for achieving a specific goal, choosing the service is based on some qualitative features like combining, availability, acceptability, service cost and security. One of the important issues is the quantitative survey of combining rate of the two services shared on the combination. So in this research, in the first stage, for measuring the combining rate, the effective factors on this feature would be surveyed. In the second stage, for choosing the optimum service based on the qualitative feature of combining, the local strategy is used. The proposed algorithm in local strategy selects services that their combining rate is more than a specific threshold. The implementations and analysis show that the proposed algorithm presents the optimum service in user's view with an acceptable combining capability. Also, the analysis of results and an evaluation with a case study show the optimized results of the local proposed algorithms compared to existing methods.
Presenting an Algorithm for Choosing an Optimum Local Service Based on the Qualitative Feature of Combining
doi:10.11648/j.ijiis.s.2014030601.20
International Journal of Intelligent Information Systems
2014-10-29
© Science Publishing Group
Aalia Hemmati
Sima Emadi
Presenting an Algorithm for Choosing an Optimum Local Service Based on the Qualitative Feature of Combining
3
6
60
60
2014-10-29
2014-10-29
10.11648/j.ijiis.s.2014030601.20
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.20
© Science Publishing Group
Parallel Image Processing Using Algorithmic Skeletons
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.12
In the last few decades, image processing has achieved significant theoretical and practical progress. It has been so fast that image processing can be easily traced in several disciplines and industries. At present, various methods have been proposed to implement image processing. The present paper aims to present a technique for image processing which utilizes design and analysis of parallel algorithms. It employs a new approach called “algorithmic skeletons” which is composed of a set of programming templates; hence facilitating the programmers’ work.
In the last few decades, image processing has achieved significant theoretical and practical progress. It has been so fast that image processing can be easily traced in several disciplines and industries. At present, various methods have been proposed to implement image processing. The present paper aims to present a technique for image processing which utilizes design and analysis of parallel algorithms. It employs a new approach called “algorithmic skeletons” which is composed of a set of programming templates; hence facilitating the programmers’ work.
Parallel Image Processing Using Algorithmic Skeletons
doi:10.11648/j.ijiis.s.2014030601.12
International Journal of Intelligent Information Systems
2014-10-17
© Science Publishing Group
Sare Eslami Khorami
Parallel Image Processing Using Algorithmic Skeletons
3
6
14
14
2014-10-17
2014-10-17
10.11648/j.ijiis.s.2014030601.12
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.12
© Science Publishing Group
Solving Quadratic Assignment Problem Using Water Cycle Optimization Algorithm
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.24
The Quadratic Assignment Problem (QAP) is one of combinatorial optimization problems which devote some facilities to some locations. The aim of this problem is assignment of each facility to a location which minimizes total cost. Because the QAP is NP-hard, so it couldn’t be solved by exact methods. In recent years, meta-heuristic algorithms are used in solving NP-hard optimization problems increasingly. In this article Water Cycle Optimization Algorithms (WCO) is used to solve QAP. The implementation of proposed algorithms on standard test functions and also its result comparison with other meta-heuristics algorithms express algorithm`s desirable quality and its prominence to other meta-heuristics algorithms.
The Quadratic Assignment Problem (QAP) is one of combinatorial optimization problems which devote some facilities to some locations. The aim of this problem is assignment of each facility to a location which minimizes total cost. Because the QAP is NP-hard, so it couldn’t be solved by exact methods. In recent years, meta-heuristic algorithms are used in solving NP-hard optimization problems increasingly. In this article Water Cycle Optimization Algorithms (WCO) is used to solve QAP. The implementation of proposed algorithms on standard test functions and also its result comparison with other meta-heuristics algorithms express algorithm`s desirable quality and its prominence to other meta-heuristics algorithms.
Solving Quadratic Assignment Problem Using Water Cycle Optimization Algorithm
doi:10.11648/j.ijiis.s.2014030601.24
International Journal of Intelligent Information Systems
2014-11-03
© Science Publishing Group
Maryam Parhizgar
Farhad Mortezapour Shiri
Solving Quadratic Assignment Problem Using Water Cycle Optimization Algorithm
3
6
79
79
2014-11-03
2014-11-03
10.11648/j.ijiis.s.2014030601.24
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.24
© Science Publishing Group
An Introduction to Software-Defined Networking
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.23
Although computer networks have spread worldwide, organizations that use networking technologies, have complained about the fact that no new feature has been added. Due to their newly emerged needs, they also prefer to automate many tasks. Moreover, they prefer their networks to be developed using software, rather than expensive and new hardware. Software-defined networking and Open Flow protocol separate data level from control level which makes the network smarter and more manageable. Network's main infrastructure is also separate from applications. This makes organizations to program, automate, and control networks more efficiently. In this paper we will introduce this technology by reviewing the literature.
Although computer networks have spread worldwide, organizations that use networking technologies, have complained about the fact that no new feature has been added. Due to their newly emerged needs, they also prefer to automate many tasks. Moreover, they prefer their networks to be developed using software, rather than expensive and new hardware. Software-defined networking and Open Flow protocol separate data level from control level which makes the network smarter and more manageable. Network's main infrastructure is also separate from applications. This makes organizations to program, automate, and control networks more efficiently. In this paper we will introduce this technology by reviewing the literature.
An Introduction to Software-Defined Networking
doi:10.11648/j.ijiis.s.2014030601.23
International Journal of Intelligent Information Systems
2014-11-03
© Science Publishing Group
Babak Darabinejad
Seyed Rasoul Mousavi Fayyeh
An Introduction to Software-Defined Networking
3
6
74
74
2014-11-03
2014-11-03
10.11648/j.ijiis.s.2014030601.23
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.23
© Science Publishing Group
Segmentation of Cells from 3-D Confocal Images of Live Embryo
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.18
Partial-differential-equation- based segmentation has been employed to accurately extract the shapes of membranes and nuclei from time lapse confocal microscopy images, taken throughout early Zebrafish embryogenesis. This strategy is a prerequisite for an accurate quantitative analysis of cell shape and morphodynamics during organogenesis and is the basis for an integrated understanding of biological processes. This data will also serve for the measurement of the variability between individuals in a population. The segmentation of cellular structures is achieved by first using an edge-preserving image filtering method for noise reduction and then applying an algorithm for cell shape reconstruction based on the Subjective Surfaces technique.
Partial-differential-equation- based segmentation has been employed to accurately extract the shapes of membranes and nuclei from time lapse confocal microscopy images, taken throughout early Zebrafish embryogenesis. This strategy is a prerequisite for an accurate quantitative analysis of cell shape and morphodynamics during organogenesis and is the basis for an integrated understanding of biological processes. This data will also serve for the measurement of the variability between individuals in a population. The segmentation of cellular structures is achieved by first using an edge-preserving image filtering method for noise reduction and then applying an algorithm for cell shape reconstruction based on the Subjective Surfaces technique.
Segmentation of Cells from 3-D Confocal Images of Live Embryo
doi:10.11648/j.ijiis.s.2014030601.18
International Journal of Intelligent Information Systems
2014-10-27
© Science Publishing Group
Ali Zeynali Aaq Qaleh
Seyyed Mahdi Haji Mirahmadi
Segmentation of Cells from 3-D Confocal Images of Live Embryo
3
6
48
48
2014-10-27
2014-10-27
10.11648/j.ijiis.s.2014030601.18
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.18
© Science Publishing Group
Software Development for Identifying Persian Text Similarity
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.21
The vast span of nouns, words and verbs in Persian language and the availability of information in all fields in the form of paper, book and internet arises the need of a system to compare texts and evaluate their similarities. In this paper a system has been presented for comparing the text and determining the degree of Persian (Farsi) text similarities. This system uses TF-IDF method to give weight to sentences. Moreover, the roots of the nouns have been found and identical score has been given to synonyms and word families. The results gained from implementation indicate that the proposed system has a desired efficiency in comparing short texts.
The vast span of nouns, words and verbs in Persian language and the availability of information in all fields in the form of paper, book and internet arises the need of a system to compare texts and evaluate their similarities. In this paper a system has been presented for comparing the text and determining the degree of Persian (Farsi) text similarities. This system uses TF-IDF method to give weight to sentences. Moreover, the roots of the nouns have been found and identical score has been given to synonyms and word families. The results gained from implementation indicate that the proposed system has a desired efficiency in comparing short texts.
Software Development for Identifying Persian Text Similarity
doi:10.11648/j.ijiis.s.2014030601.21
International Journal of Intelligent Information Systems
2014-10-29
© Science Publishing Group
Elham Mahdipour
Rahele Shojaeian Razavi
Zahra Gheibi
Software Development for Identifying Persian Text Similarity
3
6
66
66
2014-10-29
2014-10-29
10.11648/j.ijiis.s.2014030601.21
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.21
© Science Publishing Group
Improving Honeyd for Automatic Generation of Attack Signatures
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.14
In this paper, we design and implement a new Plugin to Honeyd which generates attack signature, automatically. Current network intrusion detection systems work on misuse detectors, where the packets in the monitored network are compared against a repository of signatures. But, we focus on automatic signature generation from malicious network traffic. Our proposed system inspects honeypot traffic and generates intrusion signatures for unknown traffic.The signature is based on traffic patterns, using Longest Common Substring (LCS) algorithm. It is noteworthy that our system is a plugin to honeyd - a low interaction honeypot. The system's output is a file containing honeypot intrusion signatures in pseudo-snort format. Signature generation system has been implemented for Linux Operating System (OS) but due to the common use of Windows OS, we implement for Windows OS, using C programming language.
In this paper, we design and implement a new Plugin to Honeyd which generates attack signature, automatically. Current network intrusion detection systems work on misuse detectors, where the packets in the monitored network are compared against a repository of signatures. But, we focus on automatic signature generation from malicious network traffic. Our proposed system inspects honeypot traffic and generates intrusion signatures for unknown traffic.The signature is based on traffic patterns, using Longest Common Substring (LCS) algorithm. It is noteworthy that our system is a plugin to honeyd - a low interaction honeypot. The system's output is a file containing honeypot intrusion signatures in pseudo-snort format. Signature generation system has been implemented for Linux Operating System (OS) but due to the common use of Windows OS, we implement for Windows OS, using C programming language.
Improving Honeyd for Automatic Generation of Attack Signatures
doi:10.11648/j.ijiis.s.2014030601.14
International Journal of Intelligent Information Systems
2014-10-20
© Science Publishing Group
Motahareh Dehghan
Babak Sadeghiyan
Improving Honeyd for Automatic Generation of Attack Signatures
3
6
27
27
2014-10-20
2014-10-20
10.11648/j.ijiis.s.2014030601.14
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.14
© Science Publishing Group
A new Method to Detect Circles in Images Based on Genetic Algorithms
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.19
Object detection is one of the key issues in digital image processing. Over the years, many algorithms have been created for detecting meaningful objects on the image which are based on specific characteristics of object or complex mathematical methods. Circle detection is one of these types of methods. One of the best methods for circle detection on digital images and discussion of machine vision is the Hough transform. The Hough transform can be described as the transformation of a point in the x-y-plane to the parameter space. Parameter space can be defined by the shape of the object. Using the special character of each image in space, we are able to retrieve and extract the image circle. Importantly, this method is time consuming and a large amount of memory is required for the image. The undesirable features have reduced the popularity of this method. The idea of using genetic algorithm for detecting a circle in the picture is very attractive and functional. This method can be used in Robot Soccer, targeting systems and iris recognition. In this method, accuracy and speed are among important parameters. For example, in the case of robot, it should detect ball in monochromatic and sometimes crowded areas (due to accumulation of other bots around the ball). Using a genetic algorithm for circle detection on images, Hough transform weaknesses have been removed. It also increases the computation speed and accurate detection of circle. In this paper, the Hough transform method will be presented and then we will describe the process of implementing genetic algorithms to find a circle in the picture.
Object detection is one of the key issues in digital image processing. Over the years, many algorithms have been created for detecting meaningful objects on the image which are based on specific characteristics of object or complex mathematical methods. Circle detection is one of these types of methods. One of the best methods for circle detection on digital images and discussion of machine vision is the Hough transform. The Hough transform can be described as the transformation of a point in the x-y-plane to the parameter space. Parameter space can be defined by the shape of the object. Using the special character of each image in space, we are able to retrieve and extract the image circle. Importantly, this method is time consuming and a large amount of memory is required for the image. The undesirable features have reduced the popularity of this method. The idea of using genetic algorithm for detecting a circle in the picture is very attractive and functional. This method can be used in Robot Soccer, targeting systems and iris recognition. In this method, accuracy and speed are among important parameters. For example, in the case of robot, it should detect ball in monochromatic and sometimes crowded areas (due to accumulation of other bots around the ball). Using a genetic algorithm for circle detection on images, Hough transform weaknesses have been removed. It also increases the computation speed and accurate detection of circle. In this paper, the Hough transform method will be presented and then we will describe the process of implementing genetic algorithms to find a circle in the picture.
A new Method to Detect Circles in Images Based on Genetic Algorithms
doi:10.11648/j.ijiis.s.2014030601.19
International Journal of Intelligent Information Systems
2014-10-27
© Science Publishing Group
Navid Khalili Dizaji
Nazila Masoudi
Aidin Sakhvati
A new Method to Detect Circles in Images Based on Genetic Algorithms
3
6
55
55
2014-10-27
2014-10-27
10.11648/j.ijiis.s.2014030601.19
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.19
© Science Publishing Group
Area and Depth Investigation of Anzali Pond Using Satellite Imageries and Group Method of Data Handling Neural Network
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.22
Analysis of changes in natural resources is one of the fundamental issues in remote sensing. Several research studies regarding the process of changes in natural resources using satellite imageries and image processing techniques have been done. Anzali pond is one of the important ecosystems in Iran that under the impact of some factors such as drought has the gradual drying trend over the last years. This study measures the area of basin surface and predicts the process of changes in the climate of the pond neighborhood during the next years, using GMDH neural network. Satellite imagery and meteorological data is used for this analysis. The final results represent reduction in area from 82 km^2 in 1998 to 51 km^2 in 2010. The average depth of the pond decreased to less than 4m in 2010 from 9m in 1998. The main reason for this reduction is diversion of rivers, sediment entering and changes in land use around the pond. If this trend continues, the amount of pollutants and toxins will reach to warning and this is a serious threat for animals and pond dwellers.
Analysis of changes in natural resources is one of the fundamental issues in remote sensing. Several research studies regarding the process of changes in natural resources using satellite imageries and image processing techniques have been done. Anzali pond is one of the important ecosystems in Iran that under the impact of some factors such as drought has the gradual drying trend over the last years. This study measures the area of basin surface and predicts the process of changes in the climate of the pond neighborhood during the next years, using GMDH neural network. Satellite imagery and meteorological data is used for this analysis. The final results represent reduction in area from 82 km^2 in 1998 to 51 km^2 in 2010. The average depth of the pond decreased to less than 4m in 2010 from 9m in 1998. The main reason for this reduction is diversion of rivers, sediment entering and changes in land use around the pond. If this trend continues, the amount of pollutants and toxins will reach to warning and this is a serious threat for animals and pond dwellers.
Area and Depth Investigation of Anzali Pond Using Satellite Imageries and Group Method of Data Handling Neural Network
doi:10.11648/j.ijiis.s.2014030601.22
International Journal of Intelligent Information Systems
2014-10-31
© Science Publishing Group
Farshad Parhizkar Miandehi
Asadollah Shahbahrami
Area and Depth Investigation of Anzali Pond Using Satellite Imageries and Group Method of Data Handling Neural Network
3
6
70
70
2014-10-31
2014-10-31
10.11648/j.ijiis.s.2014030601.22
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.22
© Science Publishing Group
Integrating Type-1 Fuzzy and Type-2 Fuzzy Clustering with K-Means for Pre-Processing Input Data in Classification Algorithms
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.27
In several papers, clustering has been used for preprocessing datasets before applying classification algorithms in order to enhance classification results. A strong clustered dataset as input to classification algorithms can significantly improve the computation time. This can be particularly useful in “Big Data” where computation time is equally or more important than accuracy. However, there is a trade-off between computation time (speed) and accuracy among clustering algorithms. Specifically, general type-2 fuzzy c-means (GT2 FCM) is considered to be a highly accurate clustering approach, but it is computationally intensive. To improve its computation time we propose a hybrid clustering algorithm called KFGT2FCM that combines GT2 FCM with two fast algorithms k-means and Fuzzy C-means algorithm for input data preprocessing of classification algorithms. The proposed algorithm shows improved computation time when compared with GT2 FCM on five benchmarks from university of California Irvine (UCI) library.
In several papers, clustering has been used for preprocessing datasets before applying classification algorithms in order to enhance classification results. A strong clustered dataset as input to classification algorithms can significantly improve the computation time. This can be particularly useful in “Big Data” where computation time is equally or more important than accuracy. However, there is a trade-off between computation time (speed) and accuracy among clustering algorithms. Specifically, general type-2 fuzzy c-means (GT2 FCM) is considered to be a highly accurate clustering approach, but it is computationally intensive. To improve its computation time we propose a hybrid clustering algorithm called KFGT2FCM that combines GT2 FCM with two fast algorithms k-means and Fuzzy C-means algorithm for input data preprocessing of classification algorithms. The proposed algorithm shows improved computation time when compared with GT2 FCM on five benchmarks from university of California Irvine (UCI) library.
Integrating Type-1 Fuzzy and Type-2 Fuzzy Clustering with K-Means for Pre-Processing Input Data in Classification Algorithms
doi:10.11648/j.ijiis.s.2014030601.27
International Journal of Intelligent Information Systems
2014-11-06
© Science Publishing Group
Vahid Nouri
Mohammad Reza Akbarzadeh
Tootoonchi, Alireza Rowhanimanesh
Integrating Type-1 Fuzzy and Type-2 Fuzzy Clustering with K-Means for Pre-Processing Input Data in Classification Algorithms
3
6
97
97
2014-11-06
2014-11-06
10.11648/j.ijiis.s.2014030601.27
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.27
© Science Publishing Group
Malware Detection Using Data Mining Techniques
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.16
Nowadays, malicious software attacks and threats against data and information security has become a complex process. The variety and number of these attacks and threats has resulted in providing various type of defending ways against them, but unfortunately current detection technologies are ineffective to cope with new techniques of malware designers which use them to escape from anti-malwares. In current research, we present a combination of static and dynamic methods to accelerate and improve malware detection process and to enable malware detection systems to detect malware with high precision, in less time and help network security experts to react well since time detection of security threats has a high importance in dealing with attacks.
Nowadays, malicious software attacks and threats against data and information security has become a complex process. The variety and number of these attacks and threats has resulted in providing various type of defending ways against them, but unfortunately current detection technologies are ineffective to cope with new techniques of malware designers which use them to escape from anti-malwares. In current research, we present a combination of static and dynamic methods to accelerate and improve malware detection process and to enable malware detection systems to detect malware with high precision, in less time and help network security experts to react well since time detection of security threats has a high importance in dealing with attacks.
Malware Detection Using Data Mining Techniques
doi:10.11648/j.ijiis.s.2014030601.16
International Journal of Intelligent Information Systems
2014-10-20
© Science Publishing Group
Sara Najari
Iman Lotfi
Malware Detection Using Data Mining Techniques
3
6
37
37
2014-10-20
2014-10-20
10.11648/j.ijiis.s.2014030601.16
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.16
© Science Publishing Group
Measuring the Qualitative Feature of Combined Services
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.15
The combination of web services is the result of complex and increasing needs of the users and disability of single web services in resolving the user’s needs. One of the important challenges in the field of web 2.0 is the combination of web services based on their qualitative features. Since it is probable that there would be several different combinations of services for achieving a specific goal, choosing the service is based on some qualitative features like combining, availability, acceptability, service cost and security. One of the important issues is the quantitative survey of combining rate of the two services shared on the combination so that they have the ability to combine with each other, correctly. In order to measure the combining ability of services, in the first stage, the more number of effective factors on combining features of services are surveyed in comparison with the present methods. In the second stage, metric is introduced for the effective factors, and in the third stage, an appropriate weight for each factor is found and finally, based on their relationships with each other, a more accurate rate of combining is obtained.
The combination of web services is the result of complex and increasing needs of the users and disability of single web services in resolving the user’s needs. One of the important challenges in the field of web 2.0 is the combination of web services based on their qualitative features. Since it is probable that there would be several different combinations of services for achieving a specific goal, choosing the service is based on some qualitative features like combining, availability, acceptability, service cost and security. One of the important issues is the quantitative survey of combining rate of the two services shared on the combination so that they have the ability to combine with each other, correctly. In order to measure the combining ability of services, in the first stage, the more number of effective factors on combining features of services are surveyed in comparison with the present methods. In the second stage, metric is introduced for the effective factors, and in the third stage, an appropriate weight for each factor is found and finally, based on their relationships with each other, a more accurate rate of combining is obtained.
Measuring the Qualitative Feature of Combined Services
doi:10.11648/j.ijiis.s.2014030601.15
International Journal of Intelligent Information Systems
2014-10-20
© Science Publishing Group
Aalia Hemmati
Sima Emadi
Measuring the Qualitative Feature of Combined Services
3
6
32
32
2014-10-20
2014-10-20
10.11648/j.ijiis.s.2014030601.15
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.15
© Science Publishing Group
Automatic Persian Text Summarizer Using Simulated Annealing and Genetic Algorithm
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.26
Automatic text summarization is a process to reduce the volume of text documents using computer programs to create a text summary with keeping the key terms of the documents. Due to cumulative growth of information and data, automatic text summarization technique needs to be applied in various domains. The approach helps in decreasing the quantity of the document without changing the context of information. In this paper, the proposed Persian text summarizer system employs combination of graph-based and the TF-IDF methods after word stemming in order to weight the sentences. SA-GA based sentence selection is used to make a summary, and once the summary is created. The SA-GA is a hybrid algorithm that combines Genetic Algorithm (GA) and Simulated Annealing (SA). The fitness function is based on three following factors: Readability Factor, Cohesion Factor, and Topic-Relation Factor. Evaluation results demonstrated the efficiency of the proposed system.
Automatic text summarization is a process to reduce the volume of text documents using computer programs to create a text summary with keeping the key terms of the documents. Due to cumulative growth of information and data, automatic text summarization technique needs to be applied in various domains. The approach helps in decreasing the quantity of the document without changing the context of information. In this paper, the proposed Persian text summarizer system employs combination of graph-based and the TF-IDF methods after word stemming in order to weight the sentences. SA-GA based sentence selection is used to make a summary, and once the summary is created. The SA-GA is a hybrid algorithm that combines Genetic Algorithm (GA) and Simulated Annealing (SA). The fitness function is based on three following factors: Readability Factor, Cohesion Factor, and Topic-Relation Factor. Evaluation results demonstrated the efficiency of the proposed system.
Automatic Persian Text Summarizer Using Simulated Annealing and Genetic Algorithm
doi:10.11648/j.ijiis.s.2014030601.26
International Journal of Intelligent Information Systems
2014-11-06
© Science Publishing Group
Elham Mahdipour
Masoumeh Bagheri
Automatic Persian Text Summarizer Using Simulated Annealing and Genetic Algorithm
3
6
90
90
2014-11-06
2014-11-06
10.11648/j.ijiis.s.2014030601.26
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.26
© Science Publishing Group
A New Organization Model for Self-Organizing Multi-Agent Systems Based on Self-Adaptation Features
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.13
Complexity of information technology systems is increasing continually. A very good solution would be using agents in implementing and controlling these systems. Multi-Agent Systems are good examples of using agents for system control and implementation. On the other hand, Multi-Agent systems need to be controlled and managed too. Using organizations is one of the best solutions. Many research studies have been done in this field. In this paper we will try to introduce, explain, and compare some related works. We will extract their pros and cons. For the weaknesses of this research studies, we have proposed some solutions. In this paper we propose our model of organization, which implements Self-Adaptation features using Self-Organization and can improve extracted problems of existing models. Altogether, we have tried to analyze and compare some of main proposed models for Multi-Agent systems’ organization. Finally we have proposed a model to improve Self-Organized organizations of Multi-Agent systems.
Complexity of information technology systems is increasing continually. A very good solution would be using agents in implementing and controlling these systems. Multi-Agent Systems are good examples of using agents for system control and implementation. On the other hand, Multi-Agent systems need to be controlled and managed too. Using organizations is one of the best solutions. Many research studies have been done in this field. In this paper we will try to introduce, explain, and compare some related works. We will extract their pros and cons. For the weaknesses of this research studies, we have proposed some solutions. In this paper we propose our model of organization, which implements Self-Adaptation features using Self-Organization and can improve extracted problems of existing models. Altogether, we have tried to analyze and compare some of main proposed models for Multi-Agent systems’ organization. Finally we have proposed a model to improve Self-Organized organizations of Multi-Agent systems.
A New Organization Model for Self-Organizing Multi-Agent Systems Based on Self-Adaptation Features
doi:10.11648/j.ijiis.s.2014030601.13
International Journal of Intelligent Information Systems
2014-10-17
© Science Publishing Group
Amin Rahmanzadeh
Ali Farahani
Eslam Nazemi
A New Organization Model for Self-Organizing Multi-Agent Systems Based on Self-Adaptation Features
3
6
22
22
2014-10-17
2014-10-17
10.11648/j.ijiis.s.2014030601.13
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.13
© Science Publishing Group
Effective Load Balancing in Cloud Computing
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.11
Internet, from its beginning so far, has undergone a lot of changes which some of them has changed human’s lifestyle in recent decades. One of the latest changes in the functionality of the Internet has been the introduction of Cloud Computing. Cloud Computing is a new internet service, which involves virtualization, distributed computing, networking, software etc. This technology is becoming popular to provide various services to users. Naturally, any changes and new concepts in the world of technology have its own problems and complexities. Using Cloud Computing is no exception and has many challenges facing the authorities in this area such as load balancing, security, reliability, ownership, data backup and data portability. Load balancing is one of the essential factors to enhance the working performance of the Cloud service provider by shifting of workload among the processors. Proper load balancing aids in minimizing resource consumption, implementing fail-over, enabling scalability, avoiding bottlenecks and over- provisioning etc. Given the importance of the process of load balancing in Cloud Computing, the aim of this paper is to review the process and to compare techniques in this field.
Internet, from its beginning so far, has undergone a lot of changes which some of them has changed human’s lifestyle in recent decades. One of the latest changes in the functionality of the Internet has been the introduction of Cloud Computing. Cloud Computing is a new internet service, which involves virtualization, distributed computing, networking, software etc. This technology is becoming popular to provide various services to users. Naturally, any changes and new concepts in the world of technology have its own problems and complexities. Using Cloud Computing is no exception and has many challenges facing the authorities in this area such as load balancing, security, reliability, ownership, data backup and data portability. Load balancing is one of the essential factors to enhance the working performance of the Cloud service provider by shifting of workload among the processors. Proper load balancing aids in minimizing resource consumption, implementing fail-over, enabling scalability, avoiding bottlenecks and over- provisioning etc. Given the importance of the process of load balancing in Cloud Computing, the aim of this paper is to review the process and to compare techniques in this field.
Effective Load Balancing in Cloud Computing
doi:10.11648/j.ijiis.s.2014030601.11
International Journal of Intelligent Information Systems
2014-09-27
© Science Publishing Group
Zeinab Goudarzi
Ahmad Faraahi
Effective Load Balancing in Cloud Computing
3
6
9
9
2014-09-27
2014-09-27
10.11648/j.ijiis.s.2014030601.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2014030601.11
© Science Publishing Group
“Soft” System of Coordinates in Regular Simplexes
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20150401.11
In different areas of knowledge, there are common problems of coding and ordering of multicomponent compositions of objects as well as representation of their processes of change. These problems are solved by the language-method RHAT. It can be considered as a coordinate system of regions in space limited by regular simplex. Here R is a sequence of composition components by decrease – names of sectors in the simplex distinguished by hypermedians, a semiquantitative substantial characteristic of compositions, "word" of a new type; H – Shannon information entropy – entropy of mixing; A – anentropy – entropy of separation; T – tolerance. The arrangement of coordinates allows obtaining an alphabetical hierarchical periodic system of compositions (HPSC) of objects of different nature, in particular, the Hierarchical Periodic System of Chemical Compositions (HPSCC) that uses the Periodic System of Elements (PSE) as an alphabet, as well as the Hierarchical Periodic System of Molecular Compositions (HPSMC) that uses HPSCC as an alphabet. Diagrams HA or HT are designed to display random and ordered sets of compositions of any nature as the most appropriate means of studying the processes of separation and mixing. The applicability of the method has been tested on analytical materials in natural and social science fields.
In different areas of knowledge, there are common problems of coding and ordering of multicomponent compositions of objects as well as representation of their processes of change. These problems are solved by the language-method RHAT. It can be considered as a coordinate system of regions in space limited by regular simplex. Here R is a sequence of composition components by decrease – names of sectors in the simplex distinguished by hypermedians, a semiquantitative substantial characteristic of compositions, "word" of a new type; H – Shannon information entropy – entropy of mixing; A – anentropy – entropy of separation; T – tolerance. The arrangement of coordinates allows obtaining an alphabetical hierarchical periodic system of compositions (HPSC) of objects of different nature, in particular, the Hierarchical Periodic System of Chemical Compositions (HPSCC) that uses the Periodic System of Elements (PSE) as an alphabet, as well as the Hierarchical Periodic System of Molecular Compositions (HPSMC) that uses HPSCC as an alphabet. Diagrams HA or HT are designed to display random and ordered sets of compositions of any nature as the most appropriate means of studying the processes of separation and mixing. The applicability of the method has been tested on analytical materials in natural and social science fields.
“Soft” System of Coordinates in Regular Simplexes
doi:10.11648/j.ijiis.20150401.11
International Journal of Intelligent Information Systems
2015-01-26
© Science Publishing Group
Tomas Georgievich Petrov
“Soft” System of Coordinates in Regular Simplexes
4
1
7
7
2015-01-26
2015-01-26
10.11648/j.ijiis.20150401.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20150401.11
© Science Publishing Group
Research on Service Reputation Evaluation Method Based on Cloud Model
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20150401.12
With the increasingly evident advantages of service-oriented software architecture, Web service received widespread attention, and the numbers of Web Services are increasing constantly. It is more difficult to select high-quality Web service that meets user requirements. Because traditional service reputation evaluation approaches cannot ensure the authenticity and reliability of user ratings, this paper proposes a cloud-based reputation evaluation approach for assessing the history behavior of service consumers, and also takes into account the rating similarity to generate rating quality cloud. With the parameters of cloud model, we can measure the quality level and stability of rankings, which provide additional evidence for trust decision-making. The result of simulating experiments shows that the proposed approach can improve the accuracy of reputation evaluation and the quality of Web service selection, and defend against malicious attacks, so that the interests of service requesters and service providers can be protected.
With the increasingly evident advantages of service-oriented software architecture, Web service received widespread attention, and the numbers of Web Services are increasing constantly. It is more difficult to select high-quality Web service that meets user requirements. Because traditional service reputation evaluation approaches cannot ensure the authenticity and reliability of user ratings, this paper proposes a cloud-based reputation evaluation approach for assessing the history behavior of service consumers, and also takes into account the rating similarity to generate rating quality cloud. With the parameters of cloud model, we can measure the quality level and stability of rankings, which provide additional evidence for trust decision-making. The result of simulating experiments shows that the proposed approach can improve the accuracy of reputation evaluation and the quality of Web service selection, and defend against malicious attacks, so that the interests of service requesters and service providers can be protected.
Research on Service Reputation Evaluation Method Based on Cloud Model
doi:10.11648/j.ijiis.20150401.12
International Journal of Intelligent Information Systems
2015-01-27
© Science Publishing Group
Tingwei Chen
Jing Lei
Research on Service Reputation Evaluation Method Based on Cloud Model
4
1
15
15
2015-01-27
2015-01-27
10.11648/j.ijiis.20150401.12
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20150401.12
© Science Publishing Group
Hybrid Techniques for Arabic Letter Recognition
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20150401.14
In this paper we investigate the use of the feed-forward back propagation neural networks (FFBPNN) for automatic speech recognition of Arabic letters with their four vowels (Fatha, dhamma, Kasra, Soukoun). This investigation will constitute a basically step for the recognition of continuous Speech. Features were extracted from recorded corpus by using a variety of conventional methods such as Linear Predictive Codes (LPC), Perceptual Linear Prediction (PLP), Relative Spectral Perceptual Linear Prediction (RASTA-PLP), Mel Frequency Cepstral Coefficients (MFCC), Continuous Wavelet Transform (CWT), etc. Here, several hybrid methods have been used too. Since the extracted features have large dimensionalities they were reduced by conserving the most discriminatory information with the Principal Component Analysis (PCA) technique. The recognition performance has been improved particularly when we use the PLP method followed by PCA technique.
In this paper we investigate the use of the feed-forward back propagation neural networks (FFBPNN) for automatic speech recognition of Arabic letters with their four vowels (Fatha, dhamma, Kasra, Soukoun). This investigation will constitute a basically step for the recognition of continuous Speech. Features were extracted from recorded corpus by using a variety of conventional methods such as Linear Predictive Codes (LPC), Perceptual Linear Prediction (PLP), Relative Spectral Perceptual Linear Prediction (RASTA-PLP), Mel Frequency Cepstral Coefficients (MFCC), Continuous Wavelet Transform (CWT), etc. Here, several hybrid methods have been used too. Since the extracted features have large dimensionalities they were reduced by conserving the most discriminatory information with the Principal Component Analysis (PCA) technique. The recognition performance has been improved particularly when we use the PLP method followed by PCA technique.
Hybrid Techniques for Arabic Letter Recognition
doi:10.11648/j.ijiis.20150401.14
International Journal of Intelligent Information Systems
2015-02-02
© Science Publishing Group
Mohamed Hassine
Lotfi Boussaid
Hassani Massouad
Hybrid Techniques for Arabic Letter Recognition
4
1
34
34
2015-02-02
2015-02-02
10.11648/j.ijiis.20150401.14
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20150401.14
© Science Publishing Group
Relationship between Human Characteristics and Adoption of Project Management Information System in Non-Governmental Organizations’ Projects in Nakuru Town (Kenya)
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20150401.13
The purpose of this study was to determine the relationship between human characteristics and adoption of project management information system (PMIS) in non-governmental organizations’ projects in Nakuru Town. The independent variable (Human characteristics) was conceptualized into; resistance to change, project management skills, user’s skills and awareness, power struggles and perfectionism. These indicators were individually related with adoption of project management information system. This study adopted both descriptive and correlational design. It was a survey and primary data was collected through structured questionnaires and interviews. Both descriptive and inferential analysis was employed in this study. The research findings were presented through tables. The research findings revealed that one’s competence level in using PMIS, level of training received, willingness to adapt to using PMIS, attitude towards technology and own expectation when using PMIS are positively related with adoption of project management information system. Attitudinal change and support in using the system also appeared to hugely influence adoption of PMIS. The study underscored the analogy that before the management puts pressure on using the system, they must first adopt its usage then spiral it down to subordinates. The study recommended that mentorship and training are critical drivers to successful implementation of PMIS. Training not only should be at the initiation phase of the system but embedded as a continuous skill enhancement and as part of professional development in the organization. A part from training, employees must be motivated and involved at all stages of the implementation process.
The purpose of this study was to determine the relationship between human characteristics and adoption of project management information system (PMIS) in non-governmental organizations’ projects in Nakuru Town. The independent variable (Human characteristics) was conceptualized into; resistance to change, project management skills, user’s skills and awareness, power struggles and perfectionism. These indicators were individually related with adoption of project management information system. This study adopted both descriptive and correlational design. It was a survey and primary data was collected through structured questionnaires and interviews. Both descriptive and inferential analysis was employed in this study. The research findings were presented through tables. The research findings revealed that one’s competence level in using PMIS, level of training received, willingness to adapt to using PMIS, attitude towards technology and own expectation when using PMIS are positively related with adoption of project management information system. Attitudinal change and support in using the system also appeared to hugely influence adoption of PMIS. The study underscored the analogy that before the management puts pressure on using the system, they must first adopt its usage then spiral it down to subordinates. The study recommended that mentorship and training are critical drivers to successful implementation of PMIS. Training not only should be at the initiation phase of the system but embedded as a continuous skill enhancement and as part of professional development in the organization. A part from training, employees must be motivated and involved at all stages of the implementation process.
Relationship between Human Characteristics and Adoption of Project Management Information System in Non-Governmental Organizations’ Projects in Nakuru Town (Kenya)
doi:10.11648/j.ijiis.20150401.13
International Journal of Intelligent Information Systems
2015-02-06
© Science Publishing Group
Oyugi Tobias
Maina Kairu
Relationship between Human Characteristics and Adoption of Project Management Information System in Non-Governmental Organizations’ Projects in Nakuru Town (Kenya)
4
1
26
26
2015-02-06
2015-02-06
10.11648/j.ijiis.20150401.13
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20150401.13
© Science Publishing Group
Lane Detection Method of Statistical Hough Transform Based on Gradient Constraint
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20150402.12
A lane detection method of statistical Hough transform based on gradient constraint is proposed to solve the problem of computational cost and grid quantization precision of classical Hough transform. Statistical Hough transform uses the Gaussian kernel function to model each pixel in the image .The size of initial data set is limited by using the method of gradient constraint. Eventually lane parameters’ continuous probability density function is given. The results of the experimentation show that under highway circumstance the provided method can rapidly and robustly detect the lane.
A lane detection method of statistical Hough transform based on gradient constraint is proposed to solve the problem of computational cost and grid quantization precision of classical Hough transform. Statistical Hough transform uses the Gaussian kernel function to model each pixel in the image .The size of initial data set is limited by using the method of gradient constraint. Eventually lane parameters’ continuous probability density function is given. The results of the experimentation show that under highway circumstance the provided method can rapidly and robustly detect the lane.
Lane Detection Method of Statistical Hough Transform Based on Gradient Constraint
doi:10.11648/j.ijiis.20150402.12
International Journal of Intelligent Information Systems
2015-03-30
© Science Publishing Group
Peng Yan-zhou
Gao Hong-feng
Lane Detection Method of Statistical Hough Transform Based on Gradient Constraint
4
2
45
45
2015-03-30
2015-03-30
10.11648/j.ijiis.20150402.12
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20150402.12
© Science Publishing Group
Local Search Heuristic for Multiple Knapsack Problem
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20150402.11
In this paper we will present a heuristic method to solve the Multiple Knapsack Problem. The proposed method is an improvement of the IRT heuristic described in [2].the experimental study shows that our improvement leads some gain in time and solution quality against IRT, MTHM, Mulknap and ILOG CPLEX.
In this paper we will present a heuristic method to solve the Multiple Knapsack Problem. The proposed method is an improvement of the IRT heuristic described in [2].the experimental study shows that our improvement leads some gain in time and solution quality against IRT, MTHM, Mulknap and ILOG CPLEX.
Local Search Heuristic for Multiple Knapsack Problem
doi:10.11648/j.ijiis.20150402.11
International Journal of Intelligent Information Systems
2015-02-16
© Science Publishing Group
Balbal Samir
Laalaoui Yacine
Benyettou Mohamed
Local Search Heuristic for Multiple Knapsack Problem
4
2
39
39
2015-02-16
2015-02-16
10.11648/j.ijiis.20150402.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20150402.11
© Science Publishing Group
On-Line Scheduling Algorithm for Real-Time Multiprocessor Systems with ACO
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2015040201.13
The Ant Colony Optimization algorithms (ACO) are computational models inspired by the collective foraging behavior of ants. By looking at the strengths of ACO, they are the most appropriate for scheduling of tasks in soft real-time systems. In this paper, ACO based scheduling algorithm for real-time operating systems (RTOS) has been proposed. During simulation, results are obtained with periodic tasks, measured in terms of Success Ratio & Effective CPU Utilization and compared with Kotecha’s algorithm in the same environment. It has been observed that the proposed algorithm is equally optimal during underloaded conditions and it performs better during overloaded conditions.
The Ant Colony Optimization algorithms (ACO) are computational models inspired by the collective foraging behavior of ants. By looking at the strengths of ACO, they are the most appropriate for scheduling of tasks in soft real-time systems. In this paper, ACO based scheduling algorithm for real-time operating systems (RTOS) has been proposed. During simulation, results are obtained with periodic tasks, measured in terms of Success Ratio & Effective CPU Utilization and compared with Kotecha’s algorithm in the same environment. It has been observed that the proposed algorithm is equally optimal during underloaded conditions and it performs better during overloaded conditions.
On-Line Scheduling Algorithm for Real-Time Multiprocessor Systems with ACO
doi:10.11648/j.ijiis.s.2015040201.13
International Journal of Intelligent Information Systems
2015-01-29
© Science Publishing Group
Cheng Zhao
Myungryun Yoo
Takanori Yokoyama
On-Line Scheduling Algorithm for Real-Time Multiprocessor Systems with ACO
4
2
17
17
2015-01-29
2015-01-29
10.11648/j.ijiis.s.2015040201.13
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2015040201.13
© Science Publishing Group
Packet Switch Scheduler for Increasing Sending Packet
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2015040201.12
Recently, the need of the high speed packet switch is increased. The Re-2DRR scheduling algorithm based on 2DRR scheduling algorithm provides high throughput communication on a packet switch. However, computer network is using many cases, that huge data communication, complex, and other. This paper proposes a new method to increase choices in algorithm variation for three specific systems and more easily implementation than Re-2DRR. The effectiveness of the proposed algorithm is shown through simulation studies.
Recently, the need of the high speed packet switch is increased. The Re-2DRR scheduling algorithm based on 2DRR scheduling algorithm provides high throughput communication on a packet switch. However, computer network is using many cases, that huge data communication, complex, and other. This paper proposes a new method to increase choices in algorithm variation for three specific systems and more easily implementation than Re-2DRR. The effectiveness of the proposed algorithm is shown through simulation studies.
Packet Switch Scheduler for Increasing Sending Packet
doi:10.11648/j.ijiis.s.2015040201.12
International Journal of Intelligent Information Systems
2015-01-29
© Science Publishing Group
Kazunori Omori
Myungryun Yoo
Takanori Yokoyama
Packet Switch Scheduler for Increasing Sending Packet
4
2
12
12
2015-01-29
2015-01-29
10.11648/j.ijiis.s.2015040201.12
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2015040201.12
© Science Publishing Group
Optimization of Closed-Loop Supply Chain Problem for Calculation Logistics Cost Accounting
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2015040201.11
This paper aims to build closed loop supply chain model (CLSCM) and propose a multi-objective genetic algorithm. This paper designs the method of calculation for a solution using optimization algorithms with the priority-based genetic algorithm (priGA), and Adaptive Weight Approach (AWA).In this paper, we present a multi-objective closed loop supply chain model in integrated logistics system. We formulated a mathematical model with two objectives functions: (1) minimize transportation cost, open cost, inventory cost, purchase cost, disposal cost and saving cost of integrated facilities of CLSCM, (2) minimize the delivery time tardiness in all periods. Finally, a simulation is investigated to demonstrate the applicability of the proposed multi-objective closed loop supply chain model (CLSCM) and solution approaches.
This paper aims to build closed loop supply chain model (CLSCM) and propose a multi-objective genetic algorithm. This paper designs the method of calculation for a solution using optimization algorithms with the priority-based genetic algorithm (priGA), and Adaptive Weight Approach (AWA).In this paper, we present a multi-objective closed loop supply chain model in integrated logistics system. We formulated a mathematical model with two objectives functions: (1) minimize transportation cost, open cost, inventory cost, purchase cost, disposal cost and saving cost of integrated facilities of CLSCM, (2) minimize the delivery time tardiness in all periods. Finally, a simulation is investigated to demonstrate the applicability of the proposed multi-objective closed loop supply chain model (CLSCM) and solution approaches.
Optimization of Closed-Loop Supply Chain Problem for Calculation Logistics Cost Accounting
doi:10.11648/j.ijiis.s.2015040201.11
International Journal of Intelligent Information Systems
2015-01-29
© Science Publishing Group
Lee Jeongeun
Rhee Kyonggu
Optimization of Closed-Loop Supply Chain Problem for Calculation Logistics Cost Accounting
4
2
6
6
2015-01-29
2015-01-29
10.11648/j.ijiis.s.2015040201.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2015040201.11
© Science Publishing Group
Evaluating Reverse Logistics Networks with Centralized Centers: An Adaptive Genetic Algorithm Approach Based on Fuzzy Logic Controller
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2015040201.15
This paper proposes an adaptive genetic algorithm (FLC-aGA) approach based on fuzzy logic controller (FLC) for evaluating the reverse logistics (RL) networks with centralized centers. For the FLC-aGA approach, an adaptive scheme using a fuzzy logic controller is applied to GA loop. Five components which are composed of customers, collection centers, recovery centers, redistribution centers, and secondary markets are used to design the RL networks. For the RL with centralized centers (RLCC), collection center, recovery center, redistribution center and secondary market will be opened alone. The RLCC will be formulated as a mixed integer programming (MIP) model and its objective function is to minimize the total cost of unit transportation costs, fixed costs, and variable costs under considering various constraints. The MIP model for the RLCC is solved by using the FLC-aGA approach. Three test problems with various sizes of collection centers, recovery centers, redistribution centers, and secondary markets are considered and they are compared the FLC-aGA approach with other competing approaches. Finally, the optimal solutions by the FLC-aGA and other competing approaches are demonstrated each other using some measures of performance.
This paper proposes an adaptive genetic algorithm (FLC-aGA) approach based on fuzzy logic controller (FLC) for evaluating the reverse logistics (RL) networks with centralized centers. For the FLC-aGA approach, an adaptive scheme using a fuzzy logic controller is applied to GA loop. Five components which are composed of customers, collection centers, recovery centers, redistribution centers, and secondary markets are used to design the RL networks. For the RL with centralized centers (RLCC), collection center, recovery center, redistribution center and secondary market will be opened alone. The RLCC will be formulated as a mixed integer programming (MIP) model and its objective function is to minimize the total cost of unit transportation costs, fixed costs, and variable costs under considering various constraints. The MIP model for the RLCC is solved by using the FLC-aGA approach. Three test problems with various sizes of collection centers, recovery centers, redistribution centers, and secondary markets are considered and they are compared the FLC-aGA approach with other competing approaches. Finally, the optimal solutions by the FLC-aGA and other competing approaches are demonstrated each other using some measures of performance.
Evaluating Reverse Logistics Networks with Centralized Centers: An Adaptive Genetic Algorithm Approach Based on Fuzzy Logic Controller
doi:10.11648/j.ijiis.s.2015040201.15
International Journal of Intelligent Information Systems
2015-02-08
© Science Publishing Group
YoungSu Yun
Evaluating Reverse Logistics Networks with Centralized Centers: An Adaptive Genetic Algorithm Approach Based on Fuzzy Logic Controller
4
2
38
38
2015-02-08
2015-02-08
10.11648/j.ijiis.s.2015040201.15
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2015040201.15
© Science Publishing Group
Diagnosis of Production System of Marine Frozen Products by Inventory Management Theory - A Case of Blue Fins
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2015040201.14
The purpose of this paper is a characteristic analysis of current production and inventory system for frozen products of blue fins under a fishery instability caused by the warming of the earth and an indiscriminate fishing. For the analysis, a simulation is performed quoted by Vassian’s production management theory. The result of the analysis is that the current system is aimed at minimizing a variation of the inventory at the end of the period.
The purpose of this paper is a characteristic analysis of current production and inventory system for frozen products of blue fins under a fishery instability caused by the warming of the earth and an indiscriminate fishing. For the analysis, a simulation is performed quoted by Vassian’s production management theory. The result of the analysis is that the current system is aimed at minimizing a variation of the inventory at the end of the period.
Diagnosis of Production System of Marine Frozen Products by Inventory Management Theory - A Case of Blue Fins
doi:10.11648/j.ijiis.s.2015040201.14
International Journal of Intelligent Information Systems
2015-02-08
© Science Publishing Group
Koichi Murata
Nao Watanabe
Reakook Hwang
Seiichiro Isobe
Hiroshi Katayama
Diagnosis of Production System of Marine Frozen Products by Inventory Management Theory - A Case of Blue Fins
4
2
24
24
2015-02-08
2015-02-08
10.11648/j.ijiis.s.2015040201.14
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2015040201.14
© Science Publishing Group
Analysis of Information Logistics in Order Management Process - Focusing on Make-to-Order Small and Medium Company
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2015040201.16
This paper discusses an analysis of an order management process (OMP) in a make to order production system. An inquiry process is particularly focused in this study. It is a delivery process of order information in OMP. The proposed procedure of this paper consists of the following five steps; 1) identification of inquiry process in OMP, 2) investigation of identified inquiry process, 3) creation of categories of attributes of identified inquiry process, 4) quantification of characteristic of identified inquiry process and 5) consideration of improvement of identified inquiry process. Through using the experimental result by the proposed procedure, a clarification of the characteristics of identified inquiry processes and a determination of the order of the processes to improve are possible.
This paper discusses an analysis of an order management process (OMP) in a make to order production system. An inquiry process is particularly focused in this study. It is a delivery process of order information in OMP. The proposed procedure of this paper consists of the following five steps; 1) identification of inquiry process in OMP, 2) investigation of identified inquiry process, 3) creation of categories of attributes of identified inquiry process, 4) quantification of characteristic of identified inquiry process and 5) consideration of improvement of identified inquiry process. Through using the experimental result by the proposed procedure, a clarification of the characteristics of identified inquiry processes and a determination of the order of the processes to improve are possible.
Analysis of Information Logistics in Order Management Process - Focusing on Make-to-Order Small and Medium Company
doi:10.11648/j.ijiis.s.2015040201.16
International Journal of Intelligent Information Systems
2015-02-09
© Science Publishing Group
Reakook Hwang
Koichi Murata
Hiroshi Katayama
Analysis of Information Logistics in Order Management Process - Focusing on Make-to-Order Small and Medium Company
4
2
48
48
2015-02-09
2015-02-09
10.11648/j.ijiis.s.2015040201.16
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2015040201.16
© Science Publishing Group
On Heijunka Design of Assembly Load Balancing Problem: Genetic Algorithm & Ameliorative Procedure-Combined Approach
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2015040201.17
Mixed-model straight/U-shaped assembly line has been recognized as a relevant component of Just-In-Time (JIT) production line system. For this system, “Heijunka” design is also challenged as both the task assignment and the production sequence affect the workload imbalance among workstations. In this context and recognizing uncertain task time environment that is often observed in actual manufacturing scene, this research addresses the Line Balancing Problem (LBP) and the Product Sequencing Problem (PSP) jointly and proposes a mathematical model with stochastic task time which is subjected to normal distribution. The objectives of this model are to maximize line efficiency and to minimize the variation of work overload time. A Multi-objective Genetic Algorithm (MOGA) and an Ameliorative Structure of Multi-objective Genetic Algorithm (ASMOGA) with Priority-based Chromosome (PBC) are applied to solve this problem. At last, this research conducts an experimental simulation on a set of benchmark problems to verify the outperformance of the proposed algorithm.
Mixed-model straight/U-shaped assembly line has been recognized as a relevant component of Just-In-Time (JIT) production line system. For this system, “Heijunka” design is also challenged as both the task assignment and the production sequence affect the workload imbalance among workstations. In this context and recognizing uncertain task time environment that is often observed in actual manufacturing scene, this research addresses the Line Balancing Problem (LBP) and the Product Sequencing Problem (PSP) jointly and proposes a mathematical model with stochastic task time which is subjected to normal distribution. The objectives of this model are to maximize line efficiency and to minimize the variation of work overload time. A Multi-objective Genetic Algorithm (MOGA) and an Ameliorative Structure of Multi-objective Genetic Algorithm (ASMOGA) with Priority-based Chromosome (PBC) are applied to solve this problem. At last, this research conducts an experimental simulation on a set of benchmark problems to verify the outperformance of the proposed algorithm.
On Heijunka Design of Assembly Load Balancing Problem: Genetic Algorithm & Ameliorative Procedure-Combined Approach
doi:10.11648/j.ijiis.s.2015040201.17
International Journal of Intelligent Information Systems
2015-02-10
© Science Publishing Group
Zhi Zhuo Hou
Hiroshi Katayama
Reakook Hwang
On Heijunka Design of Assembly Load Balancing Problem: Genetic Algorithm & Ameliorative Procedure-Combined Approach
4
2
58
58
2015-02-10
2015-02-10
10.11648/j.ijiis.s.2015040201.17
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2015040201.17
© Science Publishing Group
A User Interest Model Based on the Analysis of User Behaviors
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2015040202.12
Understanding the users' interest is the base for the industralization of website. In order to provide individualized service better for the users, on the basis of analyzing the users' browse behavioral characteristics and according to the users' retention time in the page, and users' click frequency to the hyperlink and page, a model of computer user interest degree is established, and a neutral network is proposed to describe their correlation, and the reasonableness and effectiveness of this model are verified through experiment. The experiemtn result shows aathat this model can accurately find out the page that the users are interested in.
Understanding the users' interest is the base for the industralization of website. In order to provide individualized service better for the users, on the basis of analyzing the users' browse behavioral characteristics and according to the users' retention time in the page, and users' click frequency to the hyperlink and page, a model of computer user interest degree is established, and a neutral network is proposed to describe their correlation, and the reasonableness and effectiveness of this model are verified through experiment. The experiemtn result shows aathat this model can accurately find out the page that the users are interested in.
A User Interest Model Based on the Analysis of User Behaviors
doi:10.11648/j.ijiis.s.2015040202.12
International Journal of Intelligent Information Systems
2015-02-13
© Science Publishing Group
Zhu Jinghua
A User Interest Model Based on the Analysis of User Behaviors
4
2
8
8
2015-02-13
2015-02-13
10.11648/j.ijiis.s.2015040202.12
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2015040202.12
© Science Publishing Group
Sparse Spectral Hashing for Content-Based Image Retrieval
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2015040202.11
In allusion to similarity calculation difficulty caused by high maintenance of image data, this paper introduces sparse principal component algorithm to figure out embedded subspace after dimensionality reduction of image visual words on the basis of traditional spectral hashing image index method so that image high-dimension index results can be explained overall. This method is called sparse spectral hashing index. The experiments demonstrate the method proposed in this paper superior to LSH, RBM and spectral hashing index methods.
In allusion to similarity calculation difficulty caused by high maintenance of image data, this paper introduces sparse principal component algorithm to figure out embedded subspace after dimensionality reduction of image visual words on the basis of traditional spectral hashing image index method so that image high-dimension index results can be explained overall. This method is called sparse spectral hashing index. The experiments demonstrate the method proposed in this paper superior to LSH, RBM and spectral hashing index methods.
Sparse Spectral Hashing for Content-Based Image Retrieval
doi:10.11648/j.ijiis.s.2015040202.11
International Journal of Intelligent Information Systems
2015-02-13
© Science Publishing Group
Li Jun-yi
Li Jian-hua
Sparse Spectral Hashing for Content-Based Image Retrieval
4
2
4
4
2015-02-13
2015-02-13
10.11648/j.ijiis.s.2015040202.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2015040202.11
© Science Publishing Group
APLSSVM: Hybrid Entropy Models for Image Retrieval
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2015040202.13
Aiming at properties of remote sensing image data such as high-dimension, nonlinearity and massive unlabeled samples, a kind of probability least squares support vector machine (PLSSVM) classification method based on hybrid entropy and L1 norm was proposed. Firstly, hybrid entropy was designed by combining quasi-entropy with entropy difference, which was used to select the most “valuable” samples to be labeled from massive unlabeled sample set. Secondly, a L1 norm distance measuring was used to further select and remove outliers and redundant data from the sample set to be labeled. Finally, based on originally labeled samples and screened samples, PLSSVM was gained through training. Experimental results on classification of ROSIS hyperspectral remote sensing images show that the overall accuracy and Kappa coefficient of the proposed classification method reach 89.90% and 0.8685 respectively. The proposed method can obtain higher classification accuracy with few training samples, which is much applicable to classification problem of remote sensing images.
Aiming at properties of remote sensing image data such as high-dimension, nonlinearity and massive unlabeled samples, a kind of probability least squares support vector machine (PLSSVM) classification method based on hybrid entropy and L1 norm was proposed. Firstly, hybrid entropy was designed by combining quasi-entropy with entropy difference, which was used to select the most “valuable” samples to be labeled from massive unlabeled sample set. Secondly, a L1 norm distance measuring was used to further select and remove outliers and redundant data from the sample set to be labeled. Finally, based on originally labeled samples and screened samples, PLSSVM was gained through training. Experimental results on classification of ROSIS hyperspectral remote sensing images show that the overall accuracy and Kappa coefficient of the proposed classification method reach 89.90% and 0.8685 respectively. The proposed method can obtain higher classification accuracy with few training samples, which is much applicable to classification problem of remote sensing images.
APLSSVM: Hybrid Entropy Models for Image Retrieval
doi:10.11648/j.ijiis.s.2015040202.13
International Journal of Intelligent Information Systems
2015-05-05
© Science Publishing Group
Li Jun-yi
Li Jian-hua
Zhu Jin-hua
Chen Xiao-hui
APLSSVM: Hybrid Entropy Models for Image Retrieval
4
2
14
14
2015-05-05
2015-05-05
10.11648/j.ijiis.s.2015040202.13
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2015040202.13
© Science Publishing Group
The Operation of the Cross-Border e-commerce Logistics in China
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2015040202.14
According to the cross-border e-commerce background, the article is analyzed its operation on the cross-border e-commerce logistics in china. Firstly, this paper illustrates the operation characteristics of cross-border e-commerce logistics, then analyzes some aspects of the cross-border e-commerce logistics, like operations, logistics cost management and so on. Secondly, this paper analyzes existing problems in cross-border e-commerce logistics from the development of electronic commerce logistics cross-border in China. Finally, some suggestions were put forward on cross-border e-commerce logistics operation from the two aspects of macro level of cross-border e-commerce and micro level of cross-border e-commerce enterprise.
According to the cross-border e-commerce background, the article is analyzed its operation on the cross-border e-commerce logistics in china. Firstly, this paper illustrates the operation characteristics of cross-border e-commerce logistics, then analyzes some aspects of the cross-border e-commerce logistics, like operations, logistics cost management and so on. Secondly, this paper analyzes existing problems in cross-border e-commerce logistics from the development of electronic commerce logistics cross-border in China. Finally, some suggestions were put forward on cross-border e-commerce logistics operation from the two aspects of macro level of cross-border e-commerce and micro level of cross-border e-commerce enterprise.
The Operation of the Cross-Border e-commerce Logistics in China
doi:10.11648/j.ijiis.s.2015040202.14
International Journal of Intelligent Information Systems
2015-06-10
© Science Publishing Group
Xiaojun Liu
Dongyan Chen
Jieshan Cai
The Operation of the Cross-Border e-commerce Logistics in China
4
2
18
18
2015-06-10
2015-06-10
10.11648/j.ijiis.s.2015040202.14
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.s.2015040202.14
© Science Publishing Group
Organization of Multi-Agent Systems: An Overview
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20150403.11
In complex, open, and heterogeneous environments, agents must be able to reorganize towards the most appropriate organizations to adapt unpredictable environment changes within Multi-Agent Systems (MAS). Types of reorganization can be seen from two different levels. The individual agents level (micro-level) in which an agent changes its behaviors and interactions with other agents to adapt its local environment. And the organizational level (macro-level) in which the whole system changes it structure by adding or removing agents. This chapter is dedicated to overview different aspects of what is called MAS Organization including its motivations, paradigms, models, and techniques adopted for statically or dynamically organizing agents in MAS.
In complex, open, and heterogeneous environments, agents must be able to reorganize towards the most appropriate organizations to adapt unpredictable environment changes within Multi-Agent Systems (MAS). Types of reorganization can be seen from two different levels. The individual agents level (micro-level) in which an agent changes its behaviors and interactions with other agents to adapt its local environment. And the organizational level (macro-level) in which the whole system changes it structure by adding or removing agents. This chapter is dedicated to overview different aspects of what is called MAS Organization including its motivations, paradigms, models, and techniques adopted for statically or dynamically organizing agents in MAS.
Organization of Multi-Agent Systems: An Overview
doi:10.11648/j.ijiis.20150403.11
International Journal of Intelligent Information Systems
2015-06-29
© Science Publishing Group
Hosny Ahmed Abbas
Samir Ibrahim Shaheen
Mohammed Hussein Amin
Organization of Multi-Agent Systems: An Overview
4
3
57
57
2015-06-29
2015-06-29
10.11648/j.ijiis.20150403.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20150403.11
© Science Publishing Group
Vehicle Fault Diagnostics Using Text Mining, Vehicle Engineering Structure and Machine Learning
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20150403.12
This paper presents an intelligent vehicle fault diagnostics system, SeaProSel(Search-Prompt-Select). SeaProSel takes a casual description of vehicle problems as input and searches for a diagnostic code that accurately matches the problem description. SeaProSel was developed using automatic text classification and machine learning techniques combined with a prompt-and-select technique based on the vehicle diagnostic engineering structure to provide robust classification of the diagnostic code that accurately matches the problem description. Machine learning algorithms are developed to automatically learn words and terms, and their variations commonly used in verbal descriptions of vehicle problems, and to build a TCW(Term-Code-Weight) matrix that is used for measuring similarity between a document vector and a diagnostic code class vector. When no exactly matched diagnostic code is found based on the direct search using the TCW matrix, the SeaProSel system will search the vehicle fault diagnostic structure for the proper questions to pose to the user in order to obtain more details about the problem. A LSI (Latent Semantic Indexing) model is also presented and analyzed in the paper. The performances of the LSI model and TCW models are presented and discussed. An in-depth study of different term weight functions and their performances are presented. All experiments are conducted on real-world vehicle diagnostic data, and the results show that the proposed SeaProSel system generates accurate results efficiently for vehicle fault diagnostics.
This paper presents an intelligent vehicle fault diagnostics system, SeaProSel(Search-Prompt-Select). SeaProSel takes a casual description of vehicle problems as input and searches for a diagnostic code that accurately matches the problem description. SeaProSel was developed using automatic text classification and machine learning techniques combined with a prompt-and-select technique based on the vehicle diagnostic engineering structure to provide robust classification of the diagnostic code that accurately matches the problem description. Machine learning algorithms are developed to automatically learn words and terms, and their variations commonly used in verbal descriptions of vehicle problems, and to build a TCW(Term-Code-Weight) matrix that is used for measuring similarity between a document vector and a diagnostic code class vector. When no exactly matched diagnostic code is found based on the direct search using the TCW matrix, the SeaProSel system will search the vehicle fault diagnostic structure for the proper questions to pose to the user in order to obtain more details about the problem. A LSI (Latent Semantic Indexing) model is also presented and analyzed in the paper. The performances of the LSI model and TCW models are presented and discussed. An in-depth study of different term weight functions and their performances are presented. All experiments are conducted on real-world vehicle diagnostic data, and the results show that the proposed SeaProSel system generates accurate results efficiently for vehicle fault diagnostics.
Vehicle Fault Diagnostics Using Text Mining, Vehicle Engineering Structure and Machine Learning
doi:10.11648/j.ijiis.20150403.12
International Journal of Intelligent Information Systems
2015-07-09
© Science Publishing Group
Yi Lu Murphey
Liping Huang
Hao Xing Wang
Yinghao Huang
Vehicle Fault Diagnostics Using Text Mining, Vehicle Engineering Structure and Machine Learning
4
3
70
70
2015-07-09
2015-07-09
10.11648/j.ijiis.20150403.12
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20150403.12
© Science Publishing Group
Weak Amplitude Modulated (AM) Signal Detection Algorithm for Software-Defined Radio Receivers
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20150404.12
In this paper a software implementation of a reconfigurable Amplitude Modulated (AM) receiver for weak AM signals detection with reduced processing latency is presented. The Stochastic Resonance (SR) algorithm, which is a technique for weak signal detection was developed for software defined, AM receiver. The performance of the SR based AM receiver was evaluated in terms of its output Signal to Noise (SNR) Ratio, and processing latency. From the results from our simulations, this approach provides better performance and lesser processing latency requirement than conventional signal processing methods for detecting AM signals.
In this paper a software implementation of a reconfigurable Amplitude Modulated (AM) receiver for weak AM signals detection with reduced processing latency is presented. The Stochastic Resonance (SR) algorithm, which is a technique for weak signal detection was developed for software defined, AM receiver. The performance of the SR based AM receiver was evaluated in terms of its output Signal to Noise (SNR) Ratio, and processing latency. From the results from our simulations, this approach provides better performance and lesser processing latency requirement than conventional signal processing methods for detecting AM signals.
Weak Amplitude Modulated (AM) Signal Detection Algorithm for Software-Defined Radio Receivers
doi:10.11648/j.ijiis.20150404.12
International Journal of Intelligent Information Systems
2015-07-25
© Science Publishing Group
Thomas Kokumo Yesufu
Abimbola Oyewole Atijosan
Weak Amplitude Modulated (AM) Signal Detection Algorithm for Software-Defined Radio Receivers
4
4
83
83
2015-07-25
2015-07-25
10.11648/j.ijiis.20150404.12
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20150404.12
© Science Publishing Group
Development of Operating Instructional System Using AR Technology in Chemical Plants
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20150404.11
In recent years, Japan's industrial accident rate has shown an increasing trend. This is especially remarkable due to chemical industrial complexes. As is well-known, many kinds of hazardous materials are being controlled in chemical facilities. If a serious accident occurs, there is the potential for severe damage to employees and the residents of local communities. A primary factor in these accidents is the lack of safety awareness, safety knowledge, safety management system deficiencies, and insufficiency of safety ethics. In addition, industrial technology is highly diversified and complicated. As a result, operators cannot grasp the whole situation of the abnormalities and potential crises present. In other words, operators are unable to take the appropriate safety measures to prevent accidents. In some cases, equipment failure shave developed into serious accidents due to incorrect operation by the operator. This paper presents systems that provide information to operators by using augmented reality (AR) technology in chemical plants. AR can enhance real-world environments using virtual objects such as computer graphics. This system can help plant operators to confirm procedures in order to ensure proper operation. Furthermore, the operator can recognize the equipment to be operated properly using a tablet PC with a built-in camera. The proposed system can provide the plant information based on the dynamic simulator (DS). In an emergency, chemical plant operators are required to make quick decisions to prevent the escalation of an accident. To convey accurate indication information of the work, it is useful to recognize target equipment using AR marker in addition to the output information by individual voice from control room. Our developed systems can support chemical plant operators to make quick decisions and to follow correct operating procedures.
In recent years, Japan's industrial accident rate has shown an increasing trend. This is especially remarkable due to chemical industrial complexes. As is well-known, many kinds of hazardous materials are being controlled in chemical facilities. If a serious accident occurs, there is the potential for severe damage to employees and the residents of local communities. A primary factor in these accidents is the lack of safety awareness, safety knowledge, safety management system deficiencies, and insufficiency of safety ethics. In addition, industrial technology is highly diversified and complicated. As a result, operators cannot grasp the whole situation of the abnormalities and potential crises present. In other words, operators are unable to take the appropriate safety measures to prevent accidents. In some cases, equipment failure shave developed into serious accidents due to incorrect operation by the operator. This paper presents systems that provide information to operators by using augmented reality (AR) technology in chemical plants. AR can enhance real-world environments using virtual objects such as computer graphics. This system can help plant operators to confirm procedures in order to ensure proper operation. Furthermore, the operator can recognize the equipment to be operated properly using a tablet PC with a built-in camera. The proposed system can provide the plant information based on the dynamic simulator (DS). In an emergency, chemical plant operators are required to make quick decisions to prevent the escalation of an accident. To convey accurate indication information of the work, it is useful to recognize target equipment using AR marker in addition to the output information by individual voice from control room. Our developed systems can support chemical plant operators to make quick decisions and to follow correct operating procedures.
Development of Operating Instructional System Using AR Technology in Chemical Plants
doi:10.11648/j.ijiis.20150404.11
International Journal of Intelligent Information Systems
2015-07-11
© Science Publishing Group
Atsuko Nakai
Shun Motoyoshi
Fuminori Oomori
Kazuhiko Suzuki
Development of Operating Instructional System Using AR Technology in Chemical Plants
4
4
78
78
2015-07-11
2015-07-11
10.11648/j.ijiis.20150404.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=135&doi=10.11648/j.ijiis.20150404.11
© Science Publishing Group