{"title":"Optimization of IoT-Enabled Physical Location Monitoring Using DT and VAR","authors":"A. S. Shitole, M. Devare","doi":"10.4018/IJCINI.287597","DOIUrl":"https://doi.org/10.4018/IJCINI.287597","url":null,"abstract":"This study shows an enhancement of IoT which gets sensor data and performs real-time face recognition to screen physical areas to find strange situations and send an alarm mail to the client to make remedial moves to avoid any potential misfortune in the environment. Sensor data is pushed onto the local system and GoDaddy Cloud, whenever the camera detects a person to optimize the Physical Location Monitoring System by reducing the bandwidth requirement and storage cost onto the Cloud using edge computation. The study reveals that Decision Tree (DT) and Random Forest give reasonably similar macro average f1-score to predict a person using sensor data. Experimental results show that DT is the most reliable predictive model for the Cloud datasets of three different physical locations to predict a person using timestamp with an accuracy of 83.99%, 88.92%, and 80.97%. This study also explains multivariate time series prediction using Vector Auto Regression that gives reasonably good Root Mean Squared Error to predict Temperature, Humidity, Light Dependent Resistor, and Gas time series.","PeriodicalId":43637,"journal":{"name":"International Journal of Cognitive Informatics and Natural Intelligence","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75789365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yingchi Liu, Du Jiang, Yibo Liu, Juntong Yun, D. Bai, Gongfa Li, Dalin Zhou
{"title":"Towards Multi-Finger Dexterous Hand Mechanics Control and Tactile Feedback","authors":"Yingchi Liu, Du Jiang, Yibo Liu, Juntong Yun, D. Bai, Gongfa Li, Dalin Zhou","doi":"10.4018/IJCINI.286770","DOIUrl":"https://doi.org/10.4018/IJCINI.286770","url":null,"abstract":"","PeriodicalId":43637,"journal":{"name":"International Journal of Cognitive Informatics and Natural Intelligence","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72957600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lei Yang, Xin Hu, Hui Wang, Wensheng Zhang, K. Huang, Dongya Wang
{"title":"An ACO-Based Clustering Algorithm With Chaotic Function Mapping","authors":"Lei Yang, Xin Hu, Hui Wang, Wensheng Zhang, K. Huang, Dongya Wang","doi":"10.4018/ijcini.20211001.oa20","DOIUrl":"https://doi.org/10.4018/ijcini.20211001.oa20","url":null,"abstract":"To overcome shortcomings when the ant colony optimization clustering algorithm (ACOC) deal with the clustering problem, this paper introduces a novel ant colony optimization clustering algorithm with chaos. The main idea of the algorithm is to apply the chaotic mapping function in the two stages of ant colony optimization: pheromone initialization and pheromone update. The application of chaotic mapping function in the pheromone initialization phase can encourage ants to be distributed in as many different initial states as possible. Applying the chaotic mapping function in the pheromone update stage can add disturbance factors to the algorithm, prompting the ants to explore new paths more, avoiding premature convergence and premature convergence to suboptimal solutions. Extensive experiments on the traditional and proposed algorithms on four widely used benchmarks are conducted to investigate the performance of the new algorithm. These experiments results demonstrate the competitive efficiency, effectiveness, and stability of the proposed algorithm.","PeriodicalId":43637,"journal":{"name":"International Journal of Cognitive Informatics and Natural Intelligence","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82959788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Differential Privacy and Bayesian for Context-Aware Recommender Systems","authors":"Shuxing Yang, Kaili Zhu","doi":"10.4018/ijcini.20211001.oa2","DOIUrl":"https://doi.org/10.4018/ijcini.20211001.oa2","url":null,"abstract":"Incorporate contextual information into recommendation systems can obtain better accuracy of recommendation, however, the users’ individual privacy may be disclosed by attackers. In order to resolve this problem, the authors propose a context-aware recommendation system that integrates Differential Privacy and Bayesian Network technologies (DPBCF). Firstly, the paper uses k-means algorithm to cluster items to relieve sparsity of rating matrix. Next, for the sake of protecting users’ privacy, the paper adds Laplace noises to ratings. And then adopts Bayesian Network technology to calculate the probability that users like a type of item with contextual information. At last, the authors illustrate the experimental evaluations to show that the proposed algorithm can provide a stronger privacy protection while improving the accuracy of recommendations.","PeriodicalId":43637,"journal":{"name":"International Journal of Cognitive Informatics and Natural Intelligence","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86246676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fuzzy Adaptive Firefly Algorithm for Multilevel Color Image Thresholding Based on Fuzzy Entropy","authors":"Yi Wang, Kangshun Li","doi":"10.4018/IJCINI.20211001.OA44","DOIUrl":"https://doi.org/10.4018/IJCINI.20211001.OA44","url":null,"abstract":"Multilevel thresholding image segmentation has been a hot issue of research in the last several years since it has a plenty of applications. The meta-heuristic search algorithm has unique advantages in solving multilevel threshold values. In this paper, a fuzzy adaptive firefly algorithm (FaFA) is proposed to solve the optimal multilevel thresholding for color images, and the fuzzy Kapur’s entropy is considered as its objective function. In the FaFA, a fuzzy logical controller is designed to adjust the control parameters. A total of six satellite remote sensing color images are conducted in the experiments. The performance of the FaFA is compared with FA, BWO, SSA, NaFA, and ODFA. Some measure metrics are performed in the experiments. The experimental results show that the FaFA obviously outperforms other five algorithms.","PeriodicalId":43637,"journal":{"name":"International Journal of Cognitive Informatics and Natural Intelligence","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79905268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Traffic Sign Recognition Using CLAHE-Based Image Enhancement and ResNet CNN Architectures","authors":"Utkarsh Dubey, R. Chaurasiya","doi":"10.4018/ijcini.295811","DOIUrl":"https://doi.org/10.4018/ijcini.295811","url":null,"abstract":"Recognition and classification of traffic signs and other numerous displays on the road are very crucial for autonomous driving, navigation, and safety systems on roads. Machine learning or deep learning methods are generally employed to develop a traffic sign recognition (TSR) system. This paper proposes a novel two-step TSR approach consisting of contrast limited adaptive histogram equalization (CLAHE)-based image enhancement and convolutional neural network (CNN) as multiclass classifier. Three CNN architectures viz. LeNet, VggNet, and ResNet were employed for classification. All the methods were tested for classification of German traffic sign recognition benchmark (GTSRB) dataset. The experimental results presented in the paper endorse the capability of the proposed work. Based on experimental results, it has also been illustrated that the proposed novel architecture consisting of CLAHE-based image enhancement & ResNet-based classifier has helped to obtain better classification accuracy as compared to other similar approaches.","PeriodicalId":43637,"journal":{"name":"International Journal of Cognitive Informatics and Natural Intelligence","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77640137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Application of Encryption System Based on Quantum Circuit for Mobile Internet Security","authors":"Yuehua Li, Chengcheng Wang, Jiahao Sun, Zhijin Guan, Jiaqing Chen, Zelin Wang","doi":"10.4018/IJCINI.20211001.OA26","DOIUrl":"https://doi.org/10.4018/IJCINI.20211001.OA26","url":null,"abstract":"Information technology is developing rapidly, which not only brings opportunities to the society, but also causes various problems of mobile internet information security. Quantum circuits have many characteristics, such as high-complexity and no feedback. This paper applies quantum circuits to the field of encryption technology. A quantum circuit encryption system is designed based on AES. The system uses quantum circuits to construct the encryption algorithm and realizes the mathematical operations and transformation in quantum logic which can be realized through quantum logic gates. Encryption system of quantum circuits can improve the encryption complexity. Its anti-attack ability is (2^n-1)! times of the traditional method, thus it can effectively protect the information security of the IoT. In order to increase the practicability of the system, an interface module is also designed to facilitate the interaction of the system with the outside world. Finally, the encryption rate, resource utilization, and encryption effect of the quantum circuit encryption system are tested, which shows the advantages of it.","PeriodicalId":43637,"journal":{"name":"International Journal of Cognitive Informatics and Natural Intelligence","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86425214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of Image Recognition of Plant Diseases and Pests Based on Deep Learning","authors":"W. Feng, Huang Xue Hua","doi":"10.4018/ijcini.295810","DOIUrl":"https://doi.org/10.4018/ijcini.295810","url":null,"abstract":"Deep learning has attracted more and more attention in speech recognition, visual recognition and other fields. In the field of image processing, using deep learning method can obtain high recognition rate. In this paper, the convolution neural network is used as the basic model of deep learning. The shortcomings of the model are analyzed, and the DBN is used for the image recognition of diseases and insect pests. In the experiment, firstly, we select 10 kinds of disease and pest leaves and 50000 normal leaves, each of which is used for the comparison of algorithm performance.In the judgment of disease and pest species, the algorithm proposed in this study can identify all kinds of diseases and insect pests to the maximum extent, but the corresponding software (openCV, Access) recognition accuracy will gradually reduce along with the increase of the types of diseases and insect pests. In this study, the algorithm proposed in the identification of diseases and insect pests has been kept at about 45%.","PeriodicalId":43637,"journal":{"name":"International Journal of Cognitive Informatics and Natural Intelligence","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86886313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Segmentation of Brain Tumors Using Three-Dimensional Convolutional Neural Network on MRI Images 3D MedImg-CNN","authors":"A. Kharrat, M. Neji","doi":"10.4018/ijcini.20211001.oa4","DOIUrl":"https://doi.org/10.4018/ijcini.20211001.oa4","url":null,"abstract":"We consider the problem of fully automatic brain tumor segmentation in MR images containing glioblastomas. We propose a three Dimensional Convolutional Neural Network (3D MedImg-CNN) approach which achieves high performance while being extremely efficient, a balance that existing methods have struggled to achieve. Our 3D MedImg-CNN is formed directly on the raw image modalities and thus learn a characteristic representation directly from the data. We propose a new cascaded architecture with two pathways that each model normal details in tumors. Fully exploiting the convolutional nature of our model also allows us to segment a complete cerebral image in one minute. The performance of the proposed 3D MedImg-CNN with CNN segmentation method is computed using dice similarity coefficient (DSC). In experiments on the 2013, 2015 and 2017 BraTS challenges datasets; we unveil that our approach is among the most powerful methods in the literature, while also being very effective.","PeriodicalId":43637,"journal":{"name":"International Journal of Cognitive Informatics and Natural Intelligence","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85491377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}