首页 > 最新文献

International Journal of Intelligent Computing and Cybernetics最新文献

英文 中文
Posture Recognition and Imitation using Haar Wavelet Transform and Neural Networks 基于Haar小波变换和神经网络的姿态识别与模仿
IF 4.3 Q3 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2018-12-01 DOI: 10.6025/jic/2018/9/4/133-143
J. Khan, M. Mahmood
{"title":"Posture Recognition and Imitation using Haar Wavelet Transform and Neural Networks","authors":"J. Khan, M. Mahmood","doi":"10.6025/jic/2018/9/4/133-143","DOIUrl":"https://doi.org/10.6025/jic/2018/9/4/133-143","url":null,"abstract":"","PeriodicalId":45291,"journal":{"name":"International Journal of Intelligent Computing and Cybernetics","volume":"58 1","pages":""},"PeriodicalIF":4.3,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87888022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mining Periodic Patterns from Non-binary Transactions 从非二进制事务中挖掘周期模式
IF 4.3 Q3 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2018-12-01 DOI: 10.6025/jic/2018/9/4/144-156
Jhimli Adhikari
Pattern with time period is more valuable because it can better describe objective knowledge. Previous studies on periodic patterns from market basket data focus on patterns without considering the items with their purchased quantities. But in real-life transactions, an item could be purchased multiple times in a transaction and different items may have different quantity in the transactions. To solve this problem, we incorporate the concept of transaction frequency (TF) and database frequency (DF) of an item in a time interval. Our algorithm works in two phases. In first phase we mined locally frequent item sets along with the set of intervals and their database frequency range and second phase mines the two types of periodic patterns (cyclic and acyclic) from the list of intervals. Experimental results are provided to validate the study.
带时间段的模式更有价值,因为它能更好地描述客观知识。以往对市场篮子数据周期模式的研究主要集中在模式上,而没有考虑商品的购买数量。但在现实交易中,一件商品可能在一次交易中被购买多次,不同的商品在交易中可能有不同的数量。为了解决这个问题,我们结合了一个项目在一个时间间隔内的事务频率(TF)和数据库频率(DF)的概念。我们的算法分为两个阶段。在第一阶段,我们挖掘本地频繁的项目集以及一组间隔和它们的数据库频率范围,第二阶段从间隔列表中挖掘两种类型的周期模式(循环和非循环)。实验结果验证了本文的研究。
{"title":"Mining Periodic Patterns from Non-binary Transactions","authors":"Jhimli Adhikari","doi":"10.6025/jic/2018/9/4/144-156","DOIUrl":"https://doi.org/10.6025/jic/2018/9/4/144-156","url":null,"abstract":"Pattern with time period is more valuable because it can better describe objective knowledge. Previous studies on periodic patterns from market basket data focus on patterns without considering the items with their purchased quantities. But in real-life transactions, an item could be purchased multiple times in a transaction and different items may have different quantity in the transactions. To solve this problem, we incorporate the concept of transaction frequency (TF) and database frequency (DF) of an item in a time interval. Our algorithm works in two phases. In first phase we mined locally frequent item sets along with the set of intervals and their database frequency range and second phase mines the two types of periodic patterns (cyclic and acyclic) from the list of intervals. Experimental results are provided to validate the study.","PeriodicalId":45291,"journal":{"name":"International Journal of Intelligent Computing and Cybernetics","volume":"1 1","pages":""},"PeriodicalIF":4.3,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87878826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced Comparative Assessment of Ensemble Learning for Credit Scoring 信用评分集成学习的强化比较评估
IF 4.3 Q3 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2018-10-01 DOI: 10.6025/jic/2019/10/1/15-33
Youssef Tounsi, L. Hassouni, H. Anoun
One of the most important aspects of financial risk is credit risk management. Effective credit rating models are crucial for the credit institution in assessing credit applications, they have been widely studied in the field of statistics and machine learning. Given that small improvements in credit rating systems can generate significant profits, any improvement is of high interest to banks and financial institutions. The ensemble methods are a set of algorithms whose individual decisions are combined to perform classification tasks. In this work, we propose an enhanced experimental comparative study of five ensemble methods associated with seven base classifiers using six public credit scoring datasets. Four popular evaluation metrics, including area under the curve (AUC), accuracy, false positive rate (FPR) and Time taken to build the model, are employed to measure the performance of models. The experimental results and statistical tests show that Pegasos model has a better overall performance than the other methods analyzed her for Boosting and Credal Decision Tree (CDT) model has a better overall performance than the other algorithms in the case of Bagging, Random Subspace, DECORATE and Rotation Forest.
金融风险最重要的一个方面是信用风险管理。有效的信用评级模型是信用机构评估信用申请的关键,在统计学和机器学习领域得到了广泛的研究。鉴于信用评级体系的微小改进可以产生可观的利润,任何改进都是银行和金融机构的高度兴趣所在。集成方法是一组算法,其单个决策被组合起来执行分类任务。在这项工作中,我们提出了一个增强的实验比较研究,使用六个公共信用评分数据集,与七个基本分类器相关的五种集成方法。采用四种常用的评价指标,包括曲线下面积(AUC)、准确率、假阳性率(FPR)和构建模型所需的时间,来衡量模型的性能。实验结果和统计测试表明,Pegasos模型在Boosting情况下具有较好的综合性能,而Credal Decision Tree (CDT)模型在Bagging、Random Subspace、装饰和Rotation Forest情况下具有较好的综合性能。
{"title":"An Enhanced Comparative Assessment of Ensemble Learning for Credit Scoring","authors":"Youssef Tounsi, L. Hassouni, H. Anoun","doi":"10.6025/jic/2019/10/1/15-33","DOIUrl":"https://doi.org/10.6025/jic/2019/10/1/15-33","url":null,"abstract":"One of the most important aspects of financial risk is credit risk management. Effective credit rating models are crucial for the credit institution in assessing credit applications, they have been widely studied in the field of statistics and machine learning. Given that small improvements in credit rating systems can generate significant profits, any improvement is of high interest to banks and financial institutions. The ensemble methods are a set of algorithms whose individual decisions are combined to perform classification tasks. In this work, we propose an enhanced experimental comparative study of five ensemble methods associated with seven base classifiers using six public credit scoring datasets. Four popular evaluation metrics, including area under the curve (AUC), accuracy, false positive rate (FPR) and Time taken to build the model, are employed to measure the performance of models. The experimental results and statistical tests show that Pegasos model has a better overall performance than the other methods analyzed her for Boosting and Credal Decision Tree (CDT) model has a better overall performance than the other algorithms in the case of Bagging, Random Subspace, DECORATE and Rotation Forest.","PeriodicalId":45291,"journal":{"name":"International Journal of Intelligent Computing and Cybernetics","volume":"2013 1","pages":""},"PeriodicalIF":4.3,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87740259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Automatic Verification of Communicative Commitments using Reduction 使用约简法自动验证交际承诺
IF 4.3 Q3 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2018-09-01 DOI: 10.6025/JIC/2018/9/3/114-128
Mofleh Al-Diabat, Faisal Al-Saqqar, Ashraf Al-Saggar
In spite of the fact that modeling and verification of the Multi-Agent Systems (MASs) have been since long under study, there are several related challenges that should still be addressed. In effect, several frameworks have been established for modeling and verifying the MASs with regard to communicative commitments. A bulky volume of research has been conducted for defining semantics of these systems. Though, formal verification of these systems is still unresolved research problem. Within this context, this paper presents the CTL com that reforms the CTLC, i.e., the temporal logic of the commitments, so as to enable reasoning about the commitments and fulfillment.  Moreover, the paper introduces a fully-automated method for verification of the logic by means of trimming down the problem of a model that checks the CTLcom to a problem of a model that checks the GCTL*, which is a generalized version of the CTL* with action formulae. By so doing, we take advantage of the CWB-NC automata-based model checker as a tool for verification. Lastly, this paper presents a case study drawn from the business field, that is, the NetBill protocol, illustrates its implementation, and discusses the associated experimental results in order to illustrate the efficiency and effectiveness of the suggested technique. Keywords: Multi-Agent Systems, Model Checking, Communicative commitment's, Reduction.
尽管多智能体系统(MASs)的建模和验证已经进行了很长时间的研究,但仍有几个相关的挑战需要解决。实际上,已经建立了几个框架来模拟和验证关于交际承诺的质量。为了定义这些系统的语义,已经进行了大量的研究。然而,这些系统的正式验证仍然是一个未解决的研究问题。在此背景下,本文提出了对CTLC,即承诺的时间逻辑进行改革的CTL com,以实现对承诺和履行的推理。此外,本文介绍了一种完全自动化的逻辑验证方法,通过将检查CTLcom的模型问题简化为检查GCTL*的模型问题,GCTL*是带作用公式的CTL*的广义版本。通过这样做,我们利用了基于CWB-NC自动机的模型检查器作为验证工具。最后,本文以业务领域的NetBill协议为例,说明了其实现,并讨论了相关的实验结果,以说明所建议技术的效率和有效性。关键词:多智能体系统,模型检验,沟通承诺,约简
{"title":"Automatic Verification of Communicative Commitments using Reduction","authors":"Mofleh Al-Diabat, Faisal Al-Saqqar, Ashraf Al-Saggar","doi":"10.6025/JIC/2018/9/3/114-128","DOIUrl":"https://doi.org/10.6025/JIC/2018/9/3/114-128","url":null,"abstract":"In spite of the fact that modeling and verification of the Multi-Agent Systems (MASs) have been since long under study, there are several related challenges that should still be addressed. In effect, several frameworks have been established for modeling and verifying the MASs with regard to communicative commitments. A bulky volume of research has been conducted for defining semantics of these systems. Though, formal verification of these systems is still unresolved research problem. Within this context, this paper presents the CTL com that reforms the CTLC, i.e., the temporal logic of the commitments, so as to enable reasoning about the commitments and fulfillment.  Moreover, the paper introduces a fully-automated method for verification of the logic by means of trimming down the problem of a model that checks the CTLcom to a problem of a model that checks the GCTL*, which is a generalized version of the CTL* with action formulae. By so doing, we take advantage of the CWB-NC automata-based model checker as a tool for verification. Lastly, this paper presents a case study drawn from the business field, that is, the NetBill protocol, illustrates its implementation, and discusses the associated experimental results in order to illustrate the efficiency and effectiveness of the suggested technique. Keywords: Multi-Agent Systems, Model Checking, Communicative commitment's, Reduction.","PeriodicalId":45291,"journal":{"name":"International Journal of Intelligent Computing and Cybernetics","volume":"13 1","pages":""},"PeriodicalIF":4.3,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90507972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Hybrid Feature Selection Algorithm Based on Information Gain and Sequential Forward Floating Search 一种基于信息增益和顺序前向浮动搜索的混合特征选择算法
IF 4.3 Q3 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2018-09-01 DOI: 10.6025/JIC/2018/9/3/93-101
Jianli Ding, Li Fu
{"title":"A Hybrid Feature Selection Algorithm Based on Information Gain and Sequential Forward Floating Search","authors":"Jianli Ding, Li Fu","doi":"10.6025/JIC/2018/9/3/93-101","DOIUrl":"https://doi.org/10.6025/JIC/2018/9/3/93-101","url":null,"abstract":"","PeriodicalId":45291,"journal":{"name":"International Journal of Intelligent Computing and Cybernetics","volume":"50 1","pages":""},"PeriodicalIF":4.3,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78266599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Interval Intuitionistic Trapezoidal Fuzzy Prioritized Aggregating Operators and their Application to Multiple Attribute Decision Making 区间直觉梯形模糊优先聚合算子及其在多属性决策中的应用
IF 4.3 Q3 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2018-09-01 DOI: 10.6025/jic/2018/9/3/102-113
Xian-Ping Jiang
In this paper, we investigate the interval intuitionistic trapezoidal fuzzy multiple attribute decision making (MADM) problems in which the attributes are in different priority level. Motivated by the ideal of prioritized aggregation operators bu R.R. Yager, we developed some prioritized aggregation operators for aggregating interval intuitionistic trapezoidal fuzzy information, and then apply them to develop some models for interval intuitionistic trapezoidal fuzzy multiple attribute decision making (MADM) problems in which the attributes are in different priority level. Finally, a practical example about talent introduction is given to verify the developed approaches and to demonstrate its practicality and effectiveness.
研究了属性处于不同优先级的区间直觉梯形模糊多属性决策问题。在R.R. Yager的优先聚合算子理想的激励下,开发了一些用于区间直觉梯形模糊信息聚合的优先聚合算子,并将其应用于属性处于不同优先级的区间直觉梯形模糊多属性决策问题的模型。最后,以人才引进为例,验证了本文提出的方法的实用性和有效性。
{"title":"Interval Intuitionistic Trapezoidal Fuzzy Prioritized Aggregating Operators and their Application to Multiple Attribute Decision Making","authors":"Xian-Ping Jiang","doi":"10.6025/jic/2018/9/3/102-113","DOIUrl":"https://doi.org/10.6025/jic/2018/9/3/102-113","url":null,"abstract":"In this paper, we investigate the interval intuitionistic trapezoidal fuzzy multiple attribute decision making (MADM) problems in which the attributes are in different priority level. Motivated by the ideal of prioritized aggregation operators bu R.R. Yager, we developed some prioritized aggregation operators for aggregating interval intuitionistic trapezoidal fuzzy information, and then apply them to develop some models for interval intuitionistic trapezoidal fuzzy multiple attribute decision making (MADM) problems in which the attributes are in different priority level. Finally, a practical example about talent introduction is given to verify the developed approaches and to demonstrate its practicality and effectiveness.","PeriodicalId":45291,"journal":{"name":"International Journal of Intelligent Computing and Cybernetics","volume":"22 1","pages":""},"PeriodicalIF":4.3,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91123825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Credential Data Privacy Preserving in web Environment using Secure Data Contribution Retrieval Algorithm 基于安全数据贡献检索算法的web环境下凭证数据隐私保护
IF 4.3 Q3 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2017-06-30 DOI: 10.22266/IJIES2017.0630.41
K. Umapathy, Neelu Khare
Preservation of privacy is a significant aspect of data mining and as the secrecy of sensitive information must be maintained while sharing the data among different untrusted parties. There are many application is suffering from vulnerable, data leakage, data misuse, and sensitive data disclosure issues. To protect the privacy of sensitive data without losing the usability of data, various techniques have been used in privacy-preserving data mining (PPDM). Some of the approaches are available to maintain the tight privacy, but they fail to minimize the execution time and error rate. The main objective of the article is to contribute and retrieve the data with minimal classification error and execution time with enhanced privacy. To overcome the issues, the paper introduces the Secure Data Contribution Retrieval algorithm (SDCRA) to fulfill the current issues. Proposed algorithms define a privacy policy and arrange the security based on requirements. This design applies the privacy based on the compatibility of applications. This approach is capable of satisfying the accuracy constraints for multiple datasets. It also considers the efficient data extraction with a good ranking of attributes in tables. Here, proposed SDCRA is compared with existing approaches namely as Perturbation, singular value decomposition (SVD), Singular Value Decomposition data Perturbation (SVD+DP), K-anonymity with Decision Tree (KA+DT)[] for Cancer, HIV, Diabetes dataset. Based on experimental result proposed approach performs well regarding success rate, error rate and system execution time compare than existing methods. Proposed approach improves Success Rate 1.83% reduces the Error Rate 2.33% and minimizes the system execution time 2 seconds.
隐私保护是数据挖掘的一个重要方面,因为在不同的不可信方之间共享数据时必须保持敏感信息的保密性。许多应用程序都存在易受攻击、数据泄露、数据滥用和敏感数据泄露等问题。为了在不丧失数据可用性的前提下保护敏感数据的隐私,在隐私保护数据挖掘(PPDM)中使用了各种技术。有些方法可以保持严格的隐私,但它们不能最大限度地减少执行时间和错误率。本文的主要目标是以最小的分类错误和执行时间提供和检索数据,并增强隐私性。为了克服这些问题,本文引入了安全数据贡献检索算法(SDCRA)来解决当前的问题。提出的算法定义了隐私策略,并根据需求安排安全性。该设计基于应用程序的兼容性来实现隐私保护。该方法能够满足多数据集的精度约束。它还考虑了有效的数据提取和表中属性的良好排序。本文将提出的SDCRA与现有的针对癌症、HIV、糖尿病数据集的摄动、奇异值分解(SVD)、奇异值分解数据摄动(SVD+DP)、k -匿名决策树(KA+DT)[]方法进行了比较。实验结果表明,该方法在成功率、错误率和系统执行时间方面均优于现有方法。该方法提高了1.83%的成功率,降低了2.33%的错误率,使系统执行时间缩短了2秒。
{"title":"A Credential Data Privacy Preserving in web Environment using Secure Data Contribution Retrieval Algorithm","authors":"K. Umapathy, Neelu Khare","doi":"10.22266/IJIES2017.0630.41","DOIUrl":"https://doi.org/10.22266/IJIES2017.0630.41","url":null,"abstract":"Preservation of privacy is a significant aspect of data mining and as the secrecy of sensitive information must be maintained while sharing the data among different untrusted parties. There are many application is suffering from vulnerable, data leakage, data misuse, and sensitive data disclosure issues. To protect the privacy of sensitive data without losing the usability of data, various techniques have been used in privacy-preserving data mining (PPDM). Some of the approaches are available to maintain the tight privacy, but they fail to minimize the execution time and error rate. The main objective of the article is to contribute and retrieve the data with minimal classification error and execution time with enhanced privacy. To overcome the issues, the paper introduces the Secure Data Contribution Retrieval algorithm (SDCRA) to fulfill the current issues. Proposed algorithms define a privacy policy and arrange the security based on requirements. This design applies the privacy based on the compatibility of applications. This approach is capable of satisfying the accuracy constraints for multiple datasets. It also considers the efficient data extraction with a good ranking of attributes in tables. Here, proposed SDCRA is compared with existing approaches namely as Perturbation, singular value decomposition (SVD), Singular Value Decomposition data Perturbation (SVD+DP), K-anonymity with Decision Tree (KA+DT)[] for Cancer, HIV, Diabetes dataset. Based on experimental result proposed approach performs well regarding success rate, error rate and system execution time compare than existing methods. Proposed approach improves Success Rate 1.83% reduces the Error Rate 2.33% and minimizes the system execution time 2 seconds.","PeriodicalId":45291,"journal":{"name":"International Journal of Intelligent Computing and Cybernetics","volume":"8 1","pages":""},"PeriodicalIF":4.3,"publicationDate":"2017-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85625296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Observer-based finite-time sliding mode control for reentry vehicle 基于观测器的再入飞行器有限时间滑模控制
IF 4.3 Q3 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2015-11-09 DOI: 10.1108/IJICC-05-2015-0016
X. Liu, Xiaohuan Ren, Y. Sheng
Purpose – The purpose of this paper is to design a disturbance observer-based finite-time global sliding mode control scheme for the attitude tracking control problem of the reentry vehicle with parameter uncertainties and disturbances. Design/methodology/approach – Feedback linearization is first introduced to transform vehicle model into three independent second order uncertain subsystems. Then a finite-time controller (FTC) is proposed for the nominal system on the basis of the homogeneity theory. Thereafter the integral sliding mode method is introduced for the vehicle with disturbances. The finite time convergence is achieved and global robustness is also assured by the combination of finite time control method and integral sliding mode strategy. Furthermore, to improve the attitude angle tracking accuracy a novel finite time disturbance observer (DO) is constructed. Findings – Simulation is made for the reentry vehicle with disturbances involved. And the results show the finite-time convergence, tra...
目的:针对具有参数不确定性和扰动的再入飞行器姿态跟踪控制问题,设计了一种基于扰动观测器的有限时间全局滑模控制方案。设计/方法/方法-首先引入反馈线性化将车辆模型转化为三个独立的二阶不确定子系统。然后,在同质性理论的基础上,提出了标称系统的有限时间控制器。在此基础上,介绍了含扰动车辆的积分滑模方法。将有限时间控制方法与积分滑模策略相结合,实现了系统的有限时间收敛,并保证了系统的全局鲁棒性。此外,为了提高姿态角跟踪精度,构造了一种新的有限时间扰动观测器。研究结果-对涉及干扰的再入飞行器进行了模拟。结果表明,该方法具有有限时间收敛性。
{"title":"Observer-based finite-time sliding mode control for reentry vehicle","authors":"X. Liu, Xiaohuan Ren, Y. Sheng","doi":"10.1108/IJICC-05-2015-0016","DOIUrl":"https://doi.org/10.1108/IJICC-05-2015-0016","url":null,"abstract":"Purpose – The purpose of this paper is to design a disturbance observer-based finite-time global sliding mode control scheme for the attitude tracking control problem of the reentry vehicle with parameter uncertainties and disturbances. Design/methodology/approach – Feedback linearization is first introduced to transform vehicle model into three independent second order uncertain subsystems. Then a finite-time controller (FTC) is proposed for the nominal system on the basis of the homogeneity theory. Thereafter the integral sliding mode method is introduced for the vehicle with disturbances. The finite time convergence is achieved and global robustness is also assured by the combination of finite time control method and integral sliding mode strategy. Furthermore, to improve the attitude angle tracking accuracy a novel finite time disturbance observer (DO) is constructed. Findings – Simulation is made for the reentry vehicle with disturbances involved. And the results show the finite-time convergence, tra...","PeriodicalId":45291,"journal":{"name":"International Journal of Intelligent Computing and Cybernetics","volume":"8 1","pages":"345-362"},"PeriodicalIF":4.3,"publicationDate":"2015-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1108/IJICC-05-2015-0016","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62692657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Situation reasoning for an adjustable autonomy system 可调自主系统的情境推理
IF 4.3 Q3 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2012-06-01 DOI: 10.1108/17563781211231552
Yin Li-li, Zhang Rubo, Gu Hengwen
Purpose – The purpose of this paper is to provide a more capable and holistic adjustable autonomy system, involving situation reasoning among all involved information sources, to make an adjustable autonomy system which knows what the situation is currently, what needs to be done in the present situation, and how risky the task is in the present situation. This will enhance efficiency for calculating the level of autonomy.Design/methodology/approach – Situation reasoning methodologies are present in many autonomous systems which are called situation awareness. Situation awareness in autonomous systems is divided into three levels, situation perception, situation comprehension and situation projection. Situation awareness in these systems aims to make the tactical plans cognitive, but situation reasoning in adjustable autonomous systems aim to communicate mission assessments to unmanned vehicle or humans. Thus, in solving this problem, it is important to design a new situation reasoning module for the adju...
目的-本文的目的是提供一个更有能力和更全面的可调节自治系统,在所有涉及的信息源中进行情境推理,使一个可调节的自治系统知道当前的情况是什么,在当前的情况下需要做什么,以及在当前的情况下任务的风险有多大。这将提高计算自治程度的效率。设计/方法论/方法——情境推理方法存在于许多被称为情境感知的自主系统中。自主系统中的态势感知分为态势感知、态势理解和态势投射三个层次。这些系统中的态势感知旨在使战术计划具有认知性,而可调节自主系统中的态势推理旨在将任务评估传达给无人驾驶车辆或人类。因此,在解决这一问题时,设计一种新的情境推理模块是非常重要的。
{"title":"Situation reasoning for an adjustable autonomy system","authors":"Yin Li-li, Zhang Rubo, Gu Hengwen","doi":"10.1108/17563781211231552","DOIUrl":"https://doi.org/10.1108/17563781211231552","url":null,"abstract":"Purpose – The purpose of this paper is to provide a more capable and holistic adjustable autonomy system, involving situation reasoning among all involved information sources, to make an adjustable autonomy system which knows what the situation is currently, what needs to be done in the present situation, and how risky the task is in the present situation. This will enhance efficiency for calculating the level of autonomy.Design/methodology/approach – Situation reasoning methodologies are present in many autonomous systems which are called situation awareness. Situation awareness in autonomous systems is divided into three levels, situation perception, situation comprehension and situation projection. Situation awareness in these systems aims to make the tactical plans cognitive, but situation reasoning in adjustable autonomous systems aim to communicate mission assessments to unmanned vehicle or humans. Thus, in solving this problem, it is important to design a new situation reasoning module for the adju...","PeriodicalId":45291,"journal":{"name":"International Journal of Intelligent Computing and Cybernetics","volume":"5 1","pages":"226-238"},"PeriodicalIF":4.3,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1108/17563781211231552","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62171662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Binarization of pre-filtered historical manuscripts images 预滤波历史手稿图像的二值化
IF 4.3 Q3 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2009-01-01 DOI: 10.1108/17563780910939282
Nikolaos Ntogas, D. Ventzas
Purpose – The purpose of this paper is to introduce an innovative procedure for digital historical documents image binarization based on image pre-processing and image condition classification. The estimated results for each class of images and each method have shown improved image quality for the six categories of document images described by their separate characteristics. Design/methodology/approach – The applied technique consists of five stages, i.e. text image acquisition, image preparation, denoising, image type classification in six categories according to image condition, image thresholding and final refinement, a very effective approach to binarize document images. The results achieved by the authors’ method require minimal pre-processing steps for best quality of the image and increased text readability. This methodology performs better compared to current state-of-the-art adaptive thresholding techniques. Findings – An innovative procedure for digital historical documents image binarization based on image pre-processing, image type classification in categories according to image condition and further enhancement. This methodology is robust and simple, with minimal pre-processing steps for best quality of the image, increased text readability and it performs better compared to available thresholding techniques. Research limitations/implications – The technique consists of limited but optimized pre-processing sequential steps, and attention should be given in document image preparation and denoising, and on image condition classification for thresholding and refinement, since bad results in a single stage corrupt the final document image quality and text readability. Originality/value – The paper contributes in digital image binarization of text images suggesting a procedure based on image preparation, image type classification and thresholding and image refinement with applicability on Byzantine historical documents.
目的:本文的目的是介绍一种基于图像预处理和图像条件分类的数字历史文献图像二值化的创新方法。对每一类图像和每一种方法的估计结果表明,对于按其各自特征描述的六类文档图像,图像质量有所改善。设计/方法/方法-应用的技术包括五个阶段,即文本图像采集,图像预处理,去噪,根据图像条件将图像类型分为六类,图像阈值化和最终细化,这是一种非常有效的二值化文档图像的方法。通过作者的方法获得的结果需要最少的预处理步骤,以获得最佳的图像质量和增加的文本可读性。与当前最先进的自适应阈值技术相比,该方法性能更好。基于图像预处理、图像类型分类和进一步增强的数字历史文献图像二值化创新过程。该方法鲁棒且简单,只需最少的预处理步骤即可获得最佳图像质量,增加文本可读性,并且与可用的阈值技术相比性能更好。研究局限/启示-该技术由有限但优化的预处理顺序步骤组成,应该注意文档图像的准备和去噪,以及图像条件分类的阈值和细化,因为单个阶段的不良结果会破坏最终的文档图像质量和文本可读性。原创性/价值-本文在文本图像的数字图像二值化方面做出了贡献,提出了一种基于图像准备、图像类型分类和阈值分割以及图像细化的程序,适用于拜占庭历史文献。
{"title":"Binarization of pre-filtered historical manuscripts images","authors":"Nikolaos Ntogas, D. Ventzas","doi":"10.1108/17563780910939282","DOIUrl":"https://doi.org/10.1108/17563780910939282","url":null,"abstract":"Purpose – The purpose of this paper is to introduce an innovative procedure for digital historical documents image binarization based on image pre-processing and image condition classification. The estimated results for each class of images and each method have shown improved image quality for the six categories of document images described by their separate characteristics. Design/methodology/approach – The applied technique consists of five stages, i.e. text image acquisition, image preparation, denoising, image type classification in six categories according to image condition, image thresholding and final refinement, a very effective approach to binarize document images. The results achieved by the authors’ method require minimal pre-processing steps for best quality of the image and increased text readability. This methodology performs better compared to current state-of-the-art adaptive thresholding techniques. Findings – An innovative procedure for digital historical documents image binarization based on image pre-processing, image type classification in categories according to image condition and further enhancement. This methodology is robust and simple, with minimal pre-processing steps for best quality of the image, increased text readability and it performs better compared to available thresholding techniques. Research limitations/implications – The technique consists of limited but optimized pre-processing sequential steps, and attention should be given in document image preparation and denoising, and on image condition classification for thresholding and refinement, since bad results in a single stage corrupt the final document image quality and text readability. Originality/value – The paper contributes in digital image binarization of text images suggesting a procedure based on image preparation, image type classification and thresholding and image refinement with applicability on Byzantine historical documents.","PeriodicalId":45291,"journal":{"name":"International Journal of Intelligent Computing and Cybernetics","volume":"2 1","pages":"148-174"},"PeriodicalIF":4.3,"publicationDate":"2009-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1108/17563780910939282","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62171651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Intelligent Computing and Cybernetics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1