Pub Date : 2021-10-01DOI: 10.4018/IJCINI.20211001.OA22
Junjie Bai, Jun Peng, Dedong Tang, Zuojin Li, Kan Luo, Jianxing Li, Xue Zhang
Using thermal tactile sensing mechanism based on semi-infinite body model, and combining with the advantages of maximum proportional controller, fuzzy and PID controller, a thermal tactile perception and reproduction experiment device (TTPRED) was designed based on the composite control strategy of threshold switching. The finger difference threshold measurement experiment of thermal tactile was carried out, and the finger thermal tactile difference threshold was measured. The relationship between thermal tactile sensation and emotion based on temperature cues has been explored. The experiment results show that the temperature control range of TTPRED is from -10°C to 130°C, the temperature resolution and precision are 0.01°C and ±0.1°C respectively, the maximum heating or cooling rate is greater than 12°C, and the TTPRED can realize the temperature output of the specific waveform quickly and accurately. The experiment results of psychophysical experiment will provide the experimental foundations and technical support for the further study of thermal tactile perception and reproduction.
{"title":"Thermal Tactile Perception: Device, Technology, and Experiments","authors":"Junjie Bai, Jun Peng, Dedong Tang, Zuojin Li, Kan Luo, Jianxing Li, Xue Zhang","doi":"10.4018/IJCINI.20211001.OA22","DOIUrl":"https://doi.org/10.4018/IJCINI.20211001.OA22","url":null,"abstract":"Using thermal tactile sensing mechanism based on semi-infinite body model, and combining with the advantages of maximum proportional controller, fuzzy and PID controller, a thermal tactile perception and reproduction experiment device (TTPRED) was designed based on the composite control strategy of threshold switching. The finger difference threshold measurement experiment of thermal tactile was carried out, and the finger thermal tactile difference threshold was measured. The relationship between thermal tactile sensation and emotion based on temperature cues has been explored. The experiment results show that the temperature control range of TTPRED is from -10°C to 130°C, the temperature resolution and precision are 0.01°C and ±0.1°C respectively, the maximum heating or cooling rate is greater than 12°C, and the TTPRED can realize the temperature output of the specific waveform quickly and accurately. The experiment results of psychophysical experiment will provide the experimental foundations and technical support for the further study of thermal tactile perception and reproduction.","PeriodicalId":43637,"journal":{"name":"International Journal of Cognitive Informatics and Natural Intelligence","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77296178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-01DOI: 10.4018/IJCINI.20211001.OA34
Anand Handa, Rashi Agarwal, Narendra Kohli
Due to the highly variant face geometry and appearances, facial expression recognition (FER) is still a challenging problem. CNN can characterize 2D signals. Therefore, for emotion recognition in a video, the authors propose a feature selection model in AlexNet architecture to extract and filter facial features automatically. Similarly, for emotion recognition in audio, the authors use a deep LSTM-RNN. Finally, they propose a probabilistic model for the fusion of audio and visual models using facial features and speech of a subject. The model combines all the extracted features and use them to train the linear SVM (support vector machine) classifiers. The proposed model outperforms the other existing models and achieves state-of-the-art performance for audio, visual, and fusion models. The model classifies the seven known facial expressions, namely anger, happy, surprise, fear, disgust, sad, and neutral, on the eNTERFACE’05 dataset with an overall accuracy of 76.61%.
{"title":"Audio-Visual Emotion Recognition System Using Multi-Modal Features","authors":"Anand Handa, Rashi Agarwal, Narendra Kohli","doi":"10.4018/IJCINI.20211001.OA34","DOIUrl":"https://doi.org/10.4018/IJCINI.20211001.OA34","url":null,"abstract":"Due to the highly variant face geometry and appearances, facial expression recognition (FER) is still a challenging problem. CNN can characterize 2D signals. Therefore, for emotion recognition in a video, the authors propose a feature selection model in AlexNet architecture to extract and filter facial features automatically. Similarly, for emotion recognition in audio, the authors use a deep LSTM-RNN. Finally, they propose a probabilistic model for the fusion of audio and visual models using facial features and speech of a subject. The model combines all the extracted features and use them to train the linear SVM (support vector machine) classifiers. The proposed model outperforms the other existing models and achieves state-of-the-art performance for audio, visual, and fusion models. The model classifies the seven known facial expressions, namely anger, happy, surprise, fear, disgust, sad, and neutral, on the eNTERFACE’05 dataset with an overall accuracy of 76.61%.","PeriodicalId":43637,"journal":{"name":"International Journal of Cognitive Informatics and Natural Intelligence","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83156611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the advent and development of database applications such as big data and data mining, how to ensure the availability of data without revealing sensitive information has been a significant problem for database privacy protection. As a critical technology to solve this problem, homomorphic encryption has become a hot research area in information security at home and abroad in recent years. The paper sorted out, analyzed, and summarized the research progress of homomorphic encryption technology in database privacy protection. Moreover, the application of three different types of homomorphic encryption technology in database privacy protection was introduced respectively, and the rationale and characteristics of each technique were analyzed and explained. Ultimately, this research summarized the challenges and development trends of homomorphic encryption technology in the application of database privacy protection, which provides a reference for future research.
{"title":"Research Review on the Application of Homomorphic Encryption in Database Privacy Protection","authors":"Yong Ma, Jiale Zhao, Kangshun Li, Yuanlong Cao, Huyuan Chen, Youcheng Zhang","doi":"10.4018/ijcini.287600","DOIUrl":"https://doi.org/10.4018/ijcini.287600","url":null,"abstract":"With the advent and development of database applications such as big data and data mining, how to ensure the availability of data without revealing sensitive information has been a significant problem for database privacy protection. As a critical technology to solve this problem, homomorphic encryption has become a hot research area in information security at home and abroad in recent years. The paper sorted out, analyzed, and summarized the research progress of homomorphic encryption technology in database privacy protection. Moreover, the application of three different types of homomorphic encryption technology in database privacy protection was introduced respectively, and the rationale and characteristics of each technique were analyzed and explained. Ultimately, this research summarized the challenges and development trends of homomorphic encryption technology in the application of database privacy protection, which provides a reference for future research.","PeriodicalId":43637,"journal":{"name":"International Journal of Cognitive Informatics and Natural Intelligence","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83865012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-01DOI: 10.4018/ijcini.20211001.oa27
Haixia Gui, Banglei Zhao, Huizong Li, Wanliu Che
Overlapping coalition formation is a very active research field in multi-agent systems (MAS). In overlapping coalition, each agent can participate in different coalitions corresponding to multiple tasks at the same time. As each agent has limited resources, resource conflicts will occur. In order to resolve resource conflicts, we develop an improved encoding revision algorithm in this paper which can revise an invalid two-dimensional binary encoding into a valid one by checking the encoding for each row. To verify the effectiveness of the algorithm, differential evolution was used as the experimental platform and compared with Zhang et al. The experimental results show that the algorithm in this paper is superior to Zhang et al. in both solution quality and encoding revision time.
{"title":"Application of an Encoding Revision Algorithm in Overlapping Coalition Formation","authors":"Haixia Gui, Banglei Zhao, Huizong Li, Wanliu Che","doi":"10.4018/ijcini.20211001.oa27","DOIUrl":"https://doi.org/10.4018/ijcini.20211001.oa27","url":null,"abstract":"Overlapping coalition formation is a very active research field in multi-agent systems (MAS). In overlapping coalition, each agent can participate in different coalitions corresponding to multiple tasks at the same time. As each agent has limited resources, resource conflicts will occur. In order to resolve resource conflicts, we develop an improved encoding revision algorithm in this paper which can revise an invalid two-dimensional binary encoding into a valid one by checking the encoding for each row. To verify the effectiveness of the algorithm, differential evolution was used as the experimental platform and compared with Zhang et al. The experimental results show that the algorithm in this paper is superior to Zhang et al. in both solution quality and encoding revision time.","PeriodicalId":43637,"journal":{"name":"International Journal of Cognitive Informatics and Natural Intelligence","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81685971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
According to the psychology literature, there is a strong correlation between the personality traits and the linguistic behavior of people. Due to increase in computer based communication, individuals express their personalities in written forms on social media. Hence, social media became a convenient resource to analyze the relationship between the personality traits and the lingusitic behaviour. Although there is a vast amount of studies on social media, only a small number of them focus on personality prediction. In this work, we aim to model the relationship between the social media messages of individuals and Big Five Personality Traits as a supervised learning problem. We use Twitter posts and user statistics for analysis. We investigated various approaches for user profile representation, explored several supervised learning techniques, and presented comparative analysis results. Our results confirm the findings of psychology literature, and we show that computational analysis of tweets using supervised learning methods can be used to determine the personality of individuals.
{"title":"Personality Analysis Using Classification on Turkish Tweets","authors":"G. Mavis, I. H. Toroslu, P. Senkul","doi":"10.4018/ijcini.287596","DOIUrl":"https://doi.org/10.4018/ijcini.287596","url":null,"abstract":"According to the psychology literature, there is a strong correlation between the personality traits and the linguistic behavior of people. Due to increase in computer based communication, individuals express their personalities in written forms on social media. Hence, social media became a convenient resource to analyze the relationship between the personality traits and the lingusitic behaviour. Although there is a vast amount of studies on social media, only a small number of them focus on personality prediction. In this work, we aim to model the relationship between the social media messages of individuals and Big Five Personality Traits as a supervised learning problem. We use Twitter posts and user statistics for analysis. We investigated various approaches for user profile representation, explored several supervised learning techniques, and presented comparative analysis results. Our results confirm the findings of psychology literature, and we show that computational analysis of tweets using supervised learning methods can be used to determine the personality of individuals.","PeriodicalId":43637,"journal":{"name":"International Journal of Cognitive Informatics and Natural Intelligence","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89938083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-01DOI: 10.4018/IJCINI.20211001.OA29
Weiwei Yu, Li Zhang, Chengwang Xie
Many-objective optimization problems (MaOPs) refer to those multi-objective problems (MOPs) with more than three objectives. In order to solve MaOPs, a multi-objective particle swarm optimization algorithm based on new fitness assignment and multi cooperation strategy (FAMSHMPSO) is proposed. Firstly, this paper proposes a new fitness allocation method based on fuzzy information theory to enhance the convergence of the algorithm. Then a new multi-criteria mutation strategy is introduced to disturb the population and improve the diversity of the algorithm. Finally, the external files are maintained by the three-point shortest path method, which improves the quality of the solution. The performance of FAMSHMPSO algorithm is evaluated by evaluating the mean value, standard deviation, and IGD+ index of the target value on dtlz test function set of different targets of FAMSHMPSO algorithm and other five representative multi-objective evolutionary algorithms. The experimental results show that FAMSHMPSO algorithm has obvious performance advantages in convergence, diversity, and robustness.
{"title":"Many-Objective Particle Swarm Optimization Algorithm Based on New Fitness Allocation and Multiple Cooperative Strategies","authors":"Weiwei Yu, Li Zhang, Chengwang Xie","doi":"10.4018/IJCINI.20211001.OA29","DOIUrl":"https://doi.org/10.4018/IJCINI.20211001.OA29","url":null,"abstract":"Many-objective optimization problems (MaOPs) refer to those multi-objective problems (MOPs) with more than three objectives. In order to solve MaOPs, a multi-objective particle swarm optimization algorithm based on new fitness assignment and multi cooperation strategy (FAMSHMPSO) is proposed. Firstly, this paper proposes a new fitness allocation method based on fuzzy information theory to enhance the convergence of the algorithm. Then a new multi-criteria mutation strategy is introduced to disturb the population and improve the diversity of the algorithm. Finally, the external files are maintained by the three-point shortest path method, which improves the quality of the solution. The performance of FAMSHMPSO algorithm is evaluated by evaluating the mean value, standard deviation, and IGD+ index of the target value on dtlz test function set of different targets of FAMSHMPSO algorithm and other five representative multi-objective evolutionary algorithms. The experimental results show that FAMSHMPSO algorithm has obvious performance advantages in convergence, diversity, and robustness.","PeriodicalId":43637,"journal":{"name":"International Journal of Cognitive Informatics and Natural Intelligence","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75471118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-01DOI: 10.4018/IJCINI.20211001.OA3
Shruthi Komarla Rammurthy, S. B. Patil
{"title":"An LSTM-Based Approach to Predict Stock Price Movement for IT Sector Companies","authors":"Shruthi Komarla Rammurthy, S. B. Patil","doi":"10.4018/IJCINI.20211001.OA3","DOIUrl":"https://doi.org/10.4018/IJCINI.20211001.OA3","url":null,"abstract":"","PeriodicalId":43637,"journal":{"name":"International Journal of Cognitive Informatics and Natural Intelligence","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74008958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Firefly algorithm is a meta-heuristic stochastic search algorithm with strong robustness and easy implementation. However, it also has some shortcomings, such as the “oscillation” phenomenon caused by too many attractions, which makes the convergence speed too slow or premature. In the original FA, the full attraction model makes the algorithm consume a lot of evaluation times, and the time complexity is high. Therefore, in this paper, a novel firefly algorithm (EMDmFA) based on Euclidean metric (EM) and dimensional mutation (DM) is proposed. The EM strategy makes the firefly learn from its nearest neighbors. When the firefly is better than its neighbors, it learns from the best individuals in the population. It improves the FA attraction model and dramatically reduces the computational time complexity. At the same time, DM strategy improves the ability of the algorithm to jump out of the local optimum. The experimental results show that the proposed EMDmFA significantly improves the accuracy of the solution and better than most state-of-the-art FA variants.
{"title":"Firefly Algorithm Based on Euclidean Metric and Dimensional Mutation","authors":"Jing Wang, Yanfeng Ji","doi":"10.4018/IJCINI.286769","DOIUrl":"https://doi.org/10.4018/IJCINI.286769","url":null,"abstract":"Firefly algorithm is a meta-heuristic stochastic search algorithm with strong robustness and easy implementation. However, it also has some shortcomings, such as the “oscillation” phenomenon caused by too many attractions, which makes the convergence speed too slow or premature. In the original FA, the full attraction model makes the algorithm consume a lot of evaluation times, and the time complexity is high. Therefore, in this paper, a novel firefly algorithm (EMDmFA) based on Euclidean metric (EM) and dimensional mutation (DM) is proposed. The EM strategy makes the firefly learn from its nearest neighbors. When the firefly is better than its neighbors, it learns from the best individuals in the population. It improves the FA attraction model and dramatically reduces the computational time complexity. At the same time, DM strategy improves the ability of the algorithm to jump out of the local optimum. The experimental results show that the proposed EMDmFA significantly improves the accuracy of the solution and better than most state-of-the-art FA variants.","PeriodicalId":43637,"journal":{"name":"International Journal of Cognitive Informatics and Natural Intelligence","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78087792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-01DOI: 10.4018/ijcini.20211001.oa21
A. Arpitha, Lalitha Rangarajan
The primary goal in this paper is to automate radiological measurements of Vertebral Body (VB) in Magnetic Resonance Imaging (MRI) spinal scans. It starts by preprocessing the images, then detect and localize the VB regions, next segment and label VBs and finally classify each VB into three cases as being normal or fractured in case 1, benign or malignant in case 2 and normal, benign or malignant in case 3. The task is accomplished by extracting and combining distinct features of VB such as boundary, gray levels, shape and texture features using various Machine Learning techniques. The class balance deficit dataset towards normal and fractures is balanced by data augmentation which provides an enriched dataset for the learning system to perform precise differentiation between classes. On a clinical spine dataset, the method is tested and validated on 535 VBs for segmentation attaining an average accuracy 94.59% and on 315 VBs for classification with an average accuracy of 96.07% for case 1, 93.23% for case 2 and 92.3% for case 3.
{"title":"Computational Analysis of Vertebral Body for Compression Fracture Using Texture and Shape Features","authors":"A. Arpitha, Lalitha Rangarajan","doi":"10.4018/ijcini.20211001.oa21","DOIUrl":"https://doi.org/10.4018/ijcini.20211001.oa21","url":null,"abstract":"The primary goal in this paper is to automate radiological measurements of Vertebral Body (VB) in Magnetic Resonance Imaging (MRI) spinal scans. It starts by preprocessing the images, then detect and localize the VB regions, next segment and label VBs and finally classify each VB into three cases as being normal or fractured in case 1, benign or malignant in case 2 and normal, benign or malignant in case 3. The task is accomplished by extracting and combining distinct features of VB such as boundary, gray levels, shape and texture features using various Machine Learning techniques. The class balance deficit dataset towards normal and fractures is balanced by data augmentation which provides an enriched dataset for the learning system to perform precise differentiation between classes. On a clinical spine dataset, the method is tested and validated on 535 VBs for segmentation attaining an average accuracy 94.59% and on 315 VBs for classification with an average accuracy of 96.07% for case 1, 93.23% for case 2 and 92.3% for case 3.","PeriodicalId":43637,"journal":{"name":"International Journal of Cognitive Informatics and Natural Intelligence","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78731465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-01DOI: 10.4018/IJCINI.20211001.OA31
Bo Wei, Ying Xing, Xuewen Xia, Ling Gui
{"title":"A Novel Particle Swarm Optimization With Genetic Operator and Its Application to TSP","authors":"Bo Wei, Ying Xing, Xuewen Xia, Ling Gui","doi":"10.4018/IJCINI.20211001.OA31","DOIUrl":"https://doi.org/10.4018/IJCINI.20211001.OA31","url":null,"abstract":"","PeriodicalId":43637,"journal":{"name":"International Journal of Cognitive Informatics and Natural Intelligence","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76298254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}