ISRN Artificial Intelligence
Latest Publications


TOTAL DOCUMENTS

38
(FIVE YEARS 0)

H-INDEX

8
(FIVE YEARS 0)

Published By Hindawi (International Scholarly Research Network)

2090-7443, 2090-7435

2014 ◽  
Vol 2014 ◽  
pp. 1-10 ◽  
Author(s):  
A. Wiliński ◽  
A. Bera ◽  
W. Nowicki ◽  
P. Błaszyński

This paper examines two transactional strategies based on the classifier which opens positions using some rules and closes them using different rules. A rule set contains time-varying parameters that when matched allow making an investment decision. Researches contain the study of variability of these parameters and the relationship between learning period and testing (using the learned parameters). The strategies are evaluated based on the time series of cumulative profit achieved in the test periods. The study was conducted on the most popular currency pair EURUSD (Euro-Dollar) sampled with interval of 1 hour. An important contribution to the theory of algotrading resulting from presented research is specification of the parameter space (quite large, consisting of 11 parameters) that achieves very good results using cross validation.


2014 ◽  
Vol 2014 ◽  
pp. 1-13 ◽  
Author(s):  
Hongxing Yao ◽  
Mary Opokua Ansong ◽  
Jun Steed Huang

In our previous work, a novel model called compact radial basis function (CRBF) in a routing topology control has been modelled. The computational burden of Zhang and Gaussian transfer functions was modified by removing the power parameters on the models. The results showed outstanding performance over the Zhang and Gaussian models. This study researched on several hybrids forms of the model where cosine (cos) and sine (sin) nonlinear weights were imposed on the two transfer functions such that Y(out)=logsig(R)+[exp⁡⁡(-abs(R))]*(±cos⁡  or±sin(R)). The purpose was to identify the best hybrid that optimized all of its parameters with a minimum error. The results of the nonlinear weighted hybrids were compared with a hybrid of Gaussian model. Simulation revealed that the negative nonlinear weights hybrids optimized all the parameters and it is substantially superior to the previous approaches presented in the literature, with minimized errors of 0.0098, 0.0121, 0.0135, and 0.0129 for the negative cosine (HSCR-BF-cos), positive cosine (HSCR-BF+cos), negative sine (HSCR-BF-sin), and positive sine (HSCR-BF+sin) hybrids, respectively, while sigmoid and Gaussian radial basis functions (HSGR-BF+cos) were 0.0117. The proposed hybrid could serve as an alternative approach to underground rescue operation.


2014 ◽  
Vol 2014 ◽  
pp. 1-13
Author(s):  
Md. Rabiul Islam ◽  
Md. Abdus Sobhan

This paper deals with a new and improved approach of Back-propagation learning neural network based likelihood ratio score fusion technique for audio-visual speaker Identification in various noisy environments. Different signal preprocessing and noise removing techniques have been used to process the speech utterance and LPC, LPCC, RCC, MFCC, ΔMFCC and ΔΔMFCC methods have been applied to extract the features from the audio signal. Active Shape Model has been used to extract the appearance and shape based facial features. To enhance the performance of the proposed system, appearance and shape based facial features are concatenated and Principal Component Analysis method has been used to reduce the dimension of the facial feature vector. The audio and visual feature vectors are then fed to Hidden Markov Model separately to find out the log-likelihood of each modality. The reliability of each modality has been calculated using reliability measurement method. Finally, these integrated likelihood ratios are fed to Back-propagation learning neural network algorithm to discover the final speaker identification result. For measuring the performance of the proposed system, three different databases, that is, NOIZEUS speech database, ORL face database and VALID audio-visual multimodal database have been used for audio-only, visual-only, and audio-visual speaker identification. To identify the accuracy of the proposed system with existing techniques under various noisy environment, different types of artificial noise have been added at various rates with audio and visual signal and performance being compared with different variations of audio and visual features.


2013 ◽  
Vol 2013 ◽  
pp. 1-13 ◽  
Author(s):  
Mostafa Ekhtiari ◽  
Shahab Poursafary

It has been always critical and inevitable to select and assess the appropriate and efficient vendors for the companies such that all the aspects and factors leading to the importance of the select process should be considered. This paper studies the process of selecting the vendors simultaneously in three aspects of multiple criteria, random factors, and reaching efficient solutions with the objective of improvement. Thus, selecting the vendors is introduced in the form of a mixed integer multiobjective stochastic problem and for the first time it is converted by CCGC (min-max) model to a mixed integer nonlinear single objective deterministic problem. As the converted problem is nonlinear and solving it in large scale will be time-consuming then the artificial bee colony (ABC) algorithm is used to solve it. Also, in order to better understand ABC efficiency, a comparison is performed between this algorithm and the particle swarm optimization (PSO) and the imperialist competitive algorithm (ICA) and Lingo software output. The results obtained from a real example show that ABC offers more efficient solutions to the problem solving in large scale and PSO spends less time to solve the same problem.


2013 ◽  
Vol 2013 ◽  
pp. 1-10
Author(s):  
Binu Thomas ◽  
G. Raju

In associative classification method, the rules generated from association rule mining are converted into classification rules. The concept of association rule mining can be extended in web mining environment to find associations between web pages visited together by the internet users in their browsing sessions. The weighted fuzzy association rule mining techniques are capable of finding natural associations between items by considering the significance of their presence in a transaction. The significance of an item in a transaction is usually referred as the weight of an item in the transaction and finding associations between such weighted items is called fuzzy weighted association rule mining. In this paper, we are presenting a novel web classification algorithm using the principles of fuzzy association rule mining to classify the web pages into different web categories, depending on the manner in which they appear in user sessions. The results are finally represented in the form of classification rules and these rules are compared with the result generated using famous Boolean Apriori association rule mining algorithm.


2013 ◽  
Vol 2013 ◽  
pp. 1-18 ◽  
Author(s):  
Joseph J. LaViola

3D gestural interaction provides a powerful and natural way to interact with computers using the hands and body for a variety of different applications including video games, training and simulation, and medicine. However, accurately recognizing 3D gestures so that they can be reliably used in these applications poses many different research challenges. In this paper, we examine the state of the field of 3D gestural interfaces by presenting the latest strategies on how to collect the raw 3D gesture data from the user and how to accurately analyze this raw data to correctly recognize 3D gestures users perform. In addition, we examine the latest in 3D gesture recognition performance in terms of accuracy and gesture set size and discuss how different applications are making use of 3D gestural interaction. Finally, we present ideas for future research in this thriving and active research area.


2013 ◽  
Vol 2013 ◽  
pp. 1-18 ◽  
Author(s):  
Antti Evesti ◽  
Eila Ovaska

Dynamically changing environments and threat landscapes require adaptive information security. Adaptive information security makes it possible to change and modify security mechanisms at runtime. Hence, all security decisions are not enforced at design-time. This paper builds a framework to compare security adaptation approaches. The framework contains three viewpoints, that is, adaptation, security, and lifecycle. Furthermore, the paper describes five security adaptation approaches and compares them by means of the framework. The comparison reveals that the existing security adaptation approaches widely cover the information gathering. However, the compared approaches do not describe how to decide a method to perform a security adaptation. Similarly, means how to provide input knowledge for the security adaptation is not covered. Hence, these research areas have to be covered in the future. The achieved results are applicable for software developers when selecting a security adaptation approach and for researchers when considering future research items.


2013 ◽  
Vol 2013 ◽  
pp. 1-11
Author(s):  
Markus Schatten

In a multiagent system (MAS), agents can have different opinions about a given problem. In order to solve the problem collectively they have to reach consensus about the ontology of the problem. A solution to probabilistic reasoning in such an environment by using a social network of trust is given. It is shown that frame logic can be annotated and amalgamated by using this approach which gives a foundation for collective ontology development in MAS. Consider the following problem: a set of agents in a multiagent system (MAS) model a certain domain in order to collectively solve a problem. Their opinions about the domain differ in various ways. The agents are connected into a social network defined by trust relations. The problem to be solved is how to obtain consensus about the domain.


2013 ◽  
Vol 2013 ◽  
pp. 1-11 ◽  
Author(s):  
Johannes Svante Spurkeland ◽  
Andreas Schmidt Jensen ◽  
Jørgen Villadsen

Agents in a multiagent system may in many cases find themselves in situations where inconsistencies arise. In order to properly deal with these, a good belief revision procedure is required. This paper illustrates the usefulness of such a procedure: a certain belief revision algorithm is considered in order to deal with inconsistencies and, particularly, the issue of inconsistencies, and belief revision is examined in relation to the GOAL agent programming language.


2013 ◽  
Vol 2013 ◽  
pp. 1-9 ◽  
Author(s):  
Kefaya Qaddoum ◽  
E. L. Hines ◽  
D. D. Iliescu

In the area of greenhouse operation, yield prediction still relies heavily on human expertise. This paper proposes an automatic tomato yield predictor to assist the human operators in anticipating more effectively weekly fluctuations and avoid problems of both overdemand and overproduction if the yield cannot be predicted accurately. The parameters used by the predictor consist of environmental variables inside the greenhouse, namely, temperature, CO2, vapour pressure deficit (VPD), and radiation, as well as past yield. Greenhouse environment data and crop records from a large scale commercial operation, Wight Salads Group (WSG) in the Isle of Wight, United Kingdom, collected during the period 2004 to 2008, were used to model tomato yield using an Intelligent System called “Evolving Fuzzy Neural Network” (EFuNN). Our results show that the EFuNN model predicted weekly fluctuations of the yield with an average accuracy of 90%. The contribution suggests that the multiple EFUNNs can be mapped to respective task-oriented rule-sets giving rise to adaptive knowledge bases that could assist growers in the control of tomato supplies and more generally could inform the decision making concerning overall crop management practices.


Sign in / Sign up

Export Citation Format

Share Document