{"title":"Implementation of evolutionary algorithms in vehicular ad-hoc network for cluster optimization","authors":"M. Fahad, Farhan Aadil, Sadia Ejaz, Asad Ali","doi":"10.1109/INTELLISYS.2017.8324281","DOIUrl":"https://doi.org/10.1109/INTELLISYS.2017.8324281","url":null,"abstract":"Among many other sub-types, one sub-type of ad hoc network is Vehicular ad hoc Network (VANET). VANET can be further categorized in sub-domains like Vehicle to Infrastructure (V2I), Vehicle to Vehicle (V2V), Vehicle to pedestrian or other equipment (V2X) and Hybrid (V2V+V2I+V2X). V2V communication is the primary focus of this paper. Different methodologies are available in the literature for optimization of V2V communication. Clustering is one of them, in clustering vehicles, the same vicinity are grouped together for efficient communication. Different evolutionary algorithms for clustering already have been implemented to route information among nodes. Two evolutionary algorithms are applied for optimizing communication among the vehicles and the clustering problem in the VANETs. The bio inspired evolutionary algorithms are Comprehensive Learning Particle Swarm Optimization (CLPSO) and Multi-Objective Particle Swarm Optimization (MOPSO). After implementation, comparison for the mentioned algorithms is used to depict the results. The experimental results show that CLPSO is providing better results than MOPSO.","PeriodicalId":131825,"journal":{"name":"2017 Intelligent Systems Conference (IntelliSys)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130901417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Kibria Saroare, Md. Syadus Sefat, S. Sen, M. Shahjahan
{"title":"A modified penalty function in fuzzy clustering algorithm","authors":"Md. Kibria Saroare, Md. Syadus Sefat, S. Sen, M. Shahjahan","doi":"10.1109/INTELLISYS.2017.8324332","DOIUrl":"https://doi.org/10.1109/INTELLISYS.2017.8324332","url":null,"abstract":"Clustering is one of the most challenging tasks to organize and categorize data with the presence of noise and outliers. With the increase of overlapping especially in gene expression data, clustering ability decreases considerably. A number of exigent algorithms are available to confront such data in the field of biomedical engineering. The proposed approach demonstrates the modified penalty function using co-variance of membership in the objective function of standard fuzzy clustering algorithm. This may resolve the missing interaction among membership variables. In this proposed algorithm, highly and lightly expressed data points are separated more efficiently due to covariance pressure. The algorithm is described and compared with the most elevated techniques such as k-means (KM), fuzzy c-means (FCM), and penalized fuzzy c-means (PFCM) clustering techniques. These techniques are verified for different validity measures for artificial dataset and a Brain Tumor gene expression dataset. Our proposed clustering algorithm shows a much higher usability than the other related techniques.","PeriodicalId":131825,"journal":{"name":"2017 Intelligent Systems Conference (IntelliSys)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128848685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and development of a skinny bidirectional soft glove for post-stroke hand rehabilitation","authors":"Boran Wang, A. McDaid, K. Aw, M. Biglari-Abhari","doi":"10.1109/INTELLISYS.2017.8324248","DOIUrl":"https://doi.org/10.1109/INTELLISYS.2017.8324248","url":null,"abstract":"Numerous endeavors have been dedicated in creating automated post-stroke hand rehabilitation and assistive devices over the last decade. An extensive variety of actuators have been investigated in directing the patients' finger to maneuver in a natural path. Despite the fact that their execution is considered satisfactory for some typical undertakings, there is ample room for improvement by applying late advances in lightweight, soft and flexible bending actuator. This paper presents an innovative design of a skinny rehabilitation glove by using a bi-directional soft pneumatic bending actuator. It describes the prototyping of a complete hand rehabilitation system, including the design of glove, control kit and user interface. Some preparatory test results demonstrate good repeatability and controllability of the prototype. Attributed to its light weight, low profile, anthropomorphic form, satisfactory output force and angular displacement in both contraction and extension, it shows a pragmatic solution to an automatic robot-aided post-stroke hand rehabilitation system.","PeriodicalId":131825,"journal":{"name":"2017 Intelligent Systems Conference (IntelliSys)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128922852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-world large-step stair-climbing for small humanoids using evolutionary computation","authors":"V. Berezhnoy, A. Klimchik, N. Mavridis","doi":"10.1109/INTELLISYS.2017.8324253","DOIUrl":"https://doi.org/10.1109/INTELLISYS.2017.8324253","url":null,"abstract":"This paper considers legged robots, in author's case Nao robot, and describes a method for Real-world large-step stair-climbing for small humanoids using Evolutionary Computation. We start by providing background on existing climbing robots and popular methods to make them move, and then discuss the problem of stair climbing robots. Of particular interest is a class of problems, when the robot is not able to pick up its leg on height of one stair of the ladder because of the limitations of its geometrical parameters. We provide a genetic algorithm solution for this task; explain design of the chromosome, forming of initial population, crossover and mutation operations. Results of experiments in the Webots simulator are described. Finally, we describe our experiments with the real robot, and discuss our results.","PeriodicalId":131825,"journal":{"name":"2017 Intelligent Systems Conference (IntelliSys)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121632900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An hybrid front-end for robust speaker identification under noisy conditions","authors":"El Bachir Tazi, Noureddine El Makhfi","doi":"10.1109/INTELLISYS.2017.8324215","DOIUrl":"https://doi.org/10.1109/INTELLISYS.2017.8324215","url":null,"abstract":"The automatic speaker identification systems provide acceptable performances when they are used with clean speech. However they become practically unstable when they operate in noisy environments. So the robustness of these systems remains a delicate research problem. We study a novel hybrid features extractor based on a combination of robust Relative Spectral Transform Perceptual Linear Prediction (RASTA-PLP) method and the conventional Mel Frequency Cepstral Coefficients (MFCC). We show the experiments carried out on a database corresponding to a population of 51 speakers, with a system entrained on clean speech and the test data degraded by an additive white Gaussian noise of SNR level variable from 40 db to 0 db that the proposed hybrid front-end using MFCC parameters combined with those of RASTA-PLP in the same feature vector gives better results compared to those obtained using separating these previous methods. An improvement accuracy of about 3.38% was observed by comparison to the base line method MFCC.","PeriodicalId":131825,"journal":{"name":"2017 Intelligent Systems Conference (IntelliSys)","volume":"42 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120899776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dmitry S. Silnov, A. O. Prokofiev, G. Berezovskaya, V. A. Perevozchikov, S. S. Troitskiy, I. U. Shumakov
{"title":"A method of detecting a malicious actions using HTTP and FTP protocols","authors":"Dmitry S. Silnov, A. O. Prokofiev, G. Berezovskaya, V. A. Perevozchikov, S. S. Troitskiy, I. U. Shumakov","doi":"10.1109/INTELLISYS.2017.8324264","DOIUrl":"https://doi.org/10.1109/INTELLISYS.2017.8324264","url":null,"abstract":"This article is devoted to methods of improving the security systems efficiency using Honeypot technology. Basic principles of creating the protection system using this technology are observed. Also, the methods of web services organization which use affected software to efficiently detect intrusions are proposed. And several ways of the file storages effective organization are also proposed. Options of collecting statistical information about malicious actions and assessment of the effect on the proposed approaches are given.","PeriodicalId":131825,"journal":{"name":"2017 Intelligent Systems Conference (IntelliSys)","volume":"956 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127029194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How efficient is Twitter: Predicting 2012 U.S. presidential elections using Support Vector Machine via Twitter and comparing against Iowa Electronic Markets","authors":"A. Attarwala, Stanko Dimitrov, Amer Obeidi","doi":"10.1109/INTELLISYS.2017.8324363","DOIUrl":"https://doi.org/10.1109/INTELLISYS.2017.8324363","url":null,"abstract":"We test the efficient market hypothesis to see if Twitter aggregates information faster than a real-money prediction market. We use Support Vector Machines (SVMs), a supervised learning algorithm, to predict the outcome of the 2012 U.S. presidential elections via Twitter data. We then compare the prediction from SVM against the Iowa Electronic Markets (IEM). A total of 40 million unique tweets were collected and analyzed between September 29th 2012 and November 6th 2012. We observe: 1) The IEM is efficient on all the above days as per the semi-strong efficient market hypothesis definition [1]. SVM does not out predict the IEM. 2) The SVM prediction results are positively correlated with the IEM and predicts Obama winning the election, implying that Twitter can be considered as a valid source in predicting US presidential election outcomes. Using the Granger causality test, no causal relationship was inferred between the two-time series. 3) The candidate frequency count distribution independent of any sentiment analysis on all days is also positively correlated with IEM and SVM. Using Granger causality test, we determined that IEM statistically causes the candidate frequency count distribution in Twitter at the 1% level.","PeriodicalId":131825,"journal":{"name":"2017 Intelligent Systems Conference (IntelliSys)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126246954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Presence analytics: Detecting classroom-based social patterns using WLAN traces","authors":"M. H. S. Eldaw, M. Levene, George Roussos","doi":"10.1109/INTELLISYS.2017.8324316","DOIUrl":"https://doi.org/10.1109/INTELLISYS.2017.8324316","url":null,"abstract":"We demonstrate how density-based clustering of WLAN traces can be utilised to discover social groups of students within a university campus. For this purpose we deploy a temporally restricted version of the Social-DBSCAN algorithm [2] to discover social groups of students who attend the same classes. We detect the existence of social relationships between the students attending the same class by analysing their behaviour of visit during break-times. The intuition is that if a group of two or more students are friends, who attend the same classes, then they are likely to be socialising/meeting more often at locations such as the Coffee-shop during break-times. By leveraging information extracted from the timetable as well as the teaching practices at the case-study university, we inform our model about the duration of the break-times. Utilising a large data set of Eduroam traces, collected at the main site of the case-study institution, we chose as a proof concept, a set of locations for the evaluation of the proposed method, which we successfully employed to detect the social groups of students who attended regular classes at those chosen locations.","PeriodicalId":131825,"journal":{"name":"2017 Intelligent Systems Conference (IntelliSys)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133737820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The cyber teamwork system based on cloud to maximize the teamwork capability","authors":"Narungsun Wilaisakoolyong","doi":"10.1109/INTELLISYS.2017.8324317","DOIUrl":"https://doi.org/10.1109/INTELLISYS.2017.8324317","url":null,"abstract":"The cyber teamwork system based on cloud was created to support working group and maximize the teamwork capability. The cyber teamwork system comprised of five components. They were Collaboration, Communication, Project management, Document management and Operation control. The main aims of this research were (1) to develop the cyber teamwork system based on cloud (2) to maximize the teamwork capability (3) to evaluate the quality of each team's project and (4) to evaluate satisfaction of system users. Researcher brought this system to trial with 20 teamwork groups. Each team used the cyber teamwork system based on cloud to do their own project. The experimental design was Quasi Experimental Pre-test Post-test Control Group Design. The statistics employed for analyzing the data were mean, standard deviation and independent t-test. The research results show that there were 13 of 20 teamwork's projects which evaluated over a “very good” level. The teamwork ability after using the cyber teamwork system was higher than that before using the system at 0.05 level of significance. The satisfactions of system users were evaluated at a good level.","PeriodicalId":131825,"journal":{"name":"2017 Intelligent Systems Conference (IntelliSys)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116597349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lamya Albraheem, Amal Al-Abdulkarim, Arwa Al-Dosari, Leena Al-Abdulkarim, Raghad Al-Khudair, Wafa Al-Jasser, Weam Al-Angari
{"title":"Smart city project using proximity marketing technology","authors":"Lamya Albraheem, Amal Al-Abdulkarim, Arwa Al-Dosari, Leena Al-Abdulkarim, Raghad Al-Khudair, Wafa Al-Jasser, Weam Al-Angari","doi":"10.1109/INTELLISYS.2017.8324288","DOIUrl":"https://doi.org/10.1109/INTELLISYS.2017.8324288","url":null,"abstract":"Proximity Marketing is a technology that has been used for developing smart cities and recently is given a huge attention. Proximity Marketing is defined as delivering advertisements to users according to their locations. In fact, customers often find it difficult to take advantage of offers because advertisements can be invisible like street signs or can be irrelevant like SMS messages. Direct advertising can be deliverd using many technologies, such as GPS, RFID, NFC, and Wi-Fi. However, they have different limitations and implementation issues. In this paper, we plan to develop a system that uses iBeacon technology which can be used for delivering advertisements to passengers of public transportation or any individual who happened to be near the public transportation stations. Therefore, a review of the existing projects that were developed in different countries in the field of smart public transportation and proximity marketing are discussed, and a comparison between applications that use iBeacon technology in the same field is provided. Morevoer, the best features for designing this project are considered.","PeriodicalId":131825,"journal":{"name":"2017 Intelligent Systems Conference (IntelliSys)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131512655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}