Open Access
ARTICLE
Haresh Kumar Sharma, Kriti Kumari, Samarjit Kar
Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 1-14, 2019, DOI:10.31209/2018.100000036
Abstract This article focuses on the use of the rough set theory in modeling of time series
forecasting. In this paper, we have used the double exponential smoothing (DES)
model for forecasting. The classical DES model has been improved by using the
rough set technique. The improved double exponential smoothing (IDES) method can
be used for the time series data without any statistical assumptions. The proposed
method is applied on tourism demand of the air transportation passenger data set in
Australia and the results are compared with the classical DES model. It has been
observed that the forecasting accuracy of the… More >
Open Access
ARTICLE
Jun Ye
Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 15-23, 2019, DOI:10.31209/2018.100000067
Abstract Because existing proportional-integral-derivative (PID) tuning method using
similarity measures of single-valued neutrosophic sets (SVNSs) and an
increasing step algorithm shows its complexity and inconvenience, this paper
proposes a PID tuning method using a cosine similarity measure of SVNSs and
genetic algorithm (GA) to improve the existing PID tuning method. In the
tuning process, the step response characteristic values (rising time, settling
time, overshoot ratio, undershoot ratio, peak time, and steady-state error) of
the control system are converted into the single-valued neutrosophic set (SVNS)
by the neutrosophic membership functions (Neutrosophication). Then the
values of three appropriate parameters in a PID controller… More >
Open Access
ARTICLE
Xiang Cao1,2,3, Haichun Yu1,3, Hongbing Sun1,3
Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 25-34, 2019, DOI:10.31209/2018.100000038
Abstract For cooperative hunting by a multi-AUV (multiple autonomous underwater
vehicles) team, not only basic problems such as path planning and collision
avoidance should be considered but also task assignments in a dynamic way. In
this paper, an integrated algorithm is proposed by combining the self-organizing
map (SOM) neural network and the Glasius Bio-Inspired Neural Network
(GBNN) approach to improve the efficiency of multi-AUV cooperative hunting.
With this integrated algorithm, the SOM neural network is adopted for dynamic
allocation, while the GBNN is employed for path planning. It deals with various
situations for single/multiple target(s) hunting in underwater environments with
obstacles.… More >
Open Access
ARTICLE
Juan Li
Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 35-48, 2019, DOI:10.31209/2018.100000003
Abstract K-Nearest Neighbor algorithm (KNN) is a simple and mature classification
method. However there are susceptible factors influencing the classification
performance, such as k value determination, the overlarge search space,
unbalanced and multi-class patterns, etc. To deal with the above problems, a
new classification algorithm that absorbs tree structure, tree pruning and
adaptive k value method was proposed. The proposed algorithm can
overcome the shortcoming of KNN, improve the performance of multi-class
and unbalanced classification, reduce the scale of dataset maintaining the
comparable classification accuracy. The simulations are conducted and the
proposed algorithm is compared with several existing algorithms. The results… More >
Open Access
ARTICLE
Awais Qasima, Syed Asad Raza Kazmib
Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 49-63, 2019, DOI:10.31209/2018.100000012
Abstract The paradigm of multi-agent systems is very expressive to model distributed
real-time systems. These real-time multi-agent systems by their working nature
have temporal constraints as they need to operate in pervasive, dynamic and
unpredictable environments. To achieve better fault-tolerance, they need to
have the ability of self-adaptivity making them adaptable to the failures.
Presently there is a lack of vocabulary for the formal modelling of real-time
multi-agent systems with self-adaptive ability. In this research we proposed a
framework named SMARTS for the formal modelling of self-adaptive real-time
multi-agent systems. Our framework integrates MAPE-K interfaces, reflection
perspective and unification with distribution… More >
Open Access
ARTICLE
Jiping Liua,b, Xiaochen Kanga,*, Chun Donga, Fuhao Zhanga
Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 65-77, 2019, DOI:10.31209/2018.100000013
Abstract To guarantee both the efficiency and accuracy of the transportation system, the
real-time status should be analyzed to provide a reasonable plan for the near
future. This paper proposes a model for simulating the real-world transportation
networks by representing the irregular road networks with static and dynamic
attributes, and the vehicles as moving agents constrained by the road
networks. The all pairs shortest paths (APSP) for the networks are calculated in
a real-time manner, and the ever-changing paths can be used for navigating
the moving vehicles with real-time positioning devices. In addition, parallel
computation is used to accelerate the shortest… More >
Open Access
ARTICLE
Yu-Cheng Chou1, Wei-Chieh Liao2, Yan-Liang Chen2, Ming Chang2, Po Ting Lin3
Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 79-90, 2019, DOI:10.31209/2018.100000011
Abstract This paper presents the Distributed Heterogeneous Inspection System (DHIS),
which comprises two CUDA workstations and is equipped with CPU distributed
computing, CPU concurrent computing, and GPU concurrent computing
functions. Thirty-two grayscale images, each with 5,000× 12,288 pixels and
simulated defect patterns, were created to evaluate the performances of three
system configurations: (1) DHIS; (2) two CUDA workstations with CPU
distributed computing and GPU concurrent computing; (3) one CUDA
workstation with GPU concurrent computing. Experimental results indicated
that: (1) only DHIS can satisfy the time limit, and the average turnaround time
of DHIS is 37.65% of the time limit; (2) a… More >
Open Access
ARTICLE
Yasir Mehmood, Waseem Shahzad
Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 91-103, 2019, DOI:10.31209/2018.100000017
Abstract Particle swarm optimization (PSO) algorithm is a global optimization technique
that is used to find the optimal solution in multimodal problems. However, one
of the limitation of PSO is its slow convergence rate along with a local trapping
dilemma in complex multimodal problems. To address this issue, this paper
provides an alternative technique known as ACPSO algorithm, which enables to
adopt a new simplified velocity update rule to enhance the performance of PSO.
As a result, the efficiency of convergence speed and solution accuracy can be
maximized. The experimental results show that the ACPSO outperforms most of
the compared PSO… More >
Open Access
ARTICLE
Belayat Hossaina, Takatoshi Morookab, Makiko Okunob, Manabu Niia, Shinichi Yoshiyab, Syoji Kobashia
Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 105-115, 2019, DOI:10.31209/2018.100000034
Abstract This work aimed to predict postoperative knee functions of a new patient prior to
total knee arthroplasty (TKA) surgery using machine learning, because such
prediction is essential for surgical planning and for patients to better understand
the TKA outcome. However, the main difficulty is to determine the relationships
among individual varieties of preoperative and postoperative knee kinematics.
The problem was solved by constructing predictive models from the knee
kinematics data of 35 osteoarthritis patients, operated by posterior stabilized
implant, based on generalized linear regression (GLR) analysis. Two prediction
methods (without and with principal component analysis followed by GLR) along
with… More >
Open Access
EDITORIAL
Ilsun You, Chang Choi, Vishal Sharma, Isaac Woungang, Bharat K. Bhargava
Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 117-119, 2019, DOI:10.31209/2018.100000048
Abstract This article has no abstract. More >
Open Access
ARTICLE
Zubair Baig1, Sherali Zeadally2
Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 121-129, 2019, DOI:10.31209/2018.100000049
Abstract A critical infrastructure provides essential services to a nation’s population.
Interruptions in its smooth operations are highly undesirable because they will
cause significant and devastating consequences on all stakeholders in the
society. In order to provide sustained protection to a nation’s critical
infrastructure, we must continually assess and evaluate the risks thereof. We
propose a risk assessment framework that can evaluate the risks posed to the
security of a critical infrastructure from threat agents, with a special emphasis
on the smart grid communications infrastructure. The framework defines finegrained risk identification to help quantify and assess exploitable vulnerabilities
within a critical… More >
Open Access
ARTICLE
Jianfeng Guan*, Jiawei Li, Zhongbai Jiang
Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 131-141, 2019, DOI:10.31209/2018.100000050
Abstract The traditional web anomaly detection systems face the challenges derived from the
constantly evolving of the web malicious attacks, which therefore result in high false
positive rate, poor adaptability, easy over-fitting, and high time complexity. Due to
these limitations, we need a new anomaly detection system to satisfy the
requirements of enterprise-level anomaly detection. There are lots of anomaly
detection systems designed for different application domains. However, as for web
anomaly detection, it has to describe the network accessing behaviours characters
from as many dimensions as possible to improve the performance. In this paper we
design and implement a Multidimensional… More >
Open Access
ARTICLE
Kyeonghwan Lim1, Nak Young Kim1, Younsik Jeong1, Seong-je Cho1, Sangchul Han2, Minkyu Park2
Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 143-153, 2019, DOI:10.31209/2018.100000051
Abstract The Android application package (APK) uses the DEX format as an executable
file format. Since DEX files are in Java bytecode format, you can easily get Java
source code using static reverse engineering tools. This feature makes it easy
to steal Android applications. Tools such as ijiami, liapp, alibaba, etc. can be
used to protect applications from static reverse engineering attacks. These tools
typically save encrypted classes.dex in the APK file, and then decrypt and load
dynamically when the application starts. However, these tools do not protect
multidex Android applications. A multidex Android application is an APK that
contains multiple… More >
Open Access
ARTICLE
Borja Bordela, Ramon Alcarriab, Diego Martína, Álvaro Sánchez-Picota
Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 155-170, 2019, DOI:10.31209/2018.100000052
Abstract The Internet-of-Things (IoT) paradigm faces new and genuine challenges and
problems associated, mainly, with the ubiquitous access to the Internet, the
huge number of devices involved and the heterogeneity of the components
making up this new global network. In this context, protecting these systems
against cyberattacks and cybercrimes has turn into a basic issue. In relation to
this topic, most proposed solutions in the literature are focused on security;
however other aspects have to be considered (such as privacy or trust).
Therefore, in this paper we define a theoretical framework for trust in IoT
scenarios, including a mathematical formalization and… More >
Open Access
ARTICLE
Wenbo Shi1, Jiaqi Wang2, Jinxiu Zhu3, YuPeng Wang4, Dongmin Choi5
Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 171-181, 2019, DOI:10.31209/2018.100000053
Abstract With the further development of Internet, the decision-making ability of the
smart service is getting stronger and stronger, and the electronic auction is
paid attention to as one of the ways of decision system. In this paper, a secure
multi-attribute reverse auction protocol without the trusted third party is
proposed. It uses the Paillier public key cryptosystem with homomorphism and
combines with oblivious transfer and anonymization techniques. A single
auction server easily collides with a bidder, in order to solve this problem, a
single auction server is replaced with multiple auction servers. The proposed
scheme uses multiple auction servers to… More >
Open Access
ARTICLE
Tien‐Ho Chang1, Chia‐Mei Chen2, Han‐Wei Hsiao3, Gu‐Hsin Lai4
Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 183-192, 2019, DOI:10.31209/2018.100000054
Abstract Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two
security protocols developed by the Wi-Fi Alliance to secure wireless computer
networks. The prevailing usage of GPUs improves the brute force attacks and
cryptanalysis on access points of the wireless networks. It is time-consuming
for the cryptanalysis with the huge total combinations of 9563 max. Now, it is
the turning point that the leap progress of GPUs makes the Wi-Fi cryptanalysis
much more efficient than before. In this research, we proposed a rule-based
password cracking scheme without dictionary files which improves the efficiency
of cracking WPA/WPA2 protected access… More >
Open Access
ARTICLE
Gyu Ho Choia, Jae Hyo Jungb, Hae Min Moonc, Youn Tae Kimb, Sung Bum Panc
Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 193-204, 2019, DOI:10.31209/2018.100000055
Abstract Recently, ECG-based user authentication technology, which is strong against
forgery and falsification, has been actively studied compared to fingerprint and
face authentication. It is impossible to measure the open ECG DB measured
with expensive medical equipment in daily living, and the ECG measured with
the developed device for easy ECG measurement has much noise. In this
paper, we developed a device that easily measures the ECG for user
authentication in everyday life, measured the ECG through the development
equipment, adjusted the baseline correction of the measured ECG, extracted it
from the adjusted ECG do. The proposed system includes the steps… More >
Open Access
ARTICLE
Yong‐Hwan Lee, Hyochang Ahn, Hyo‐Beom Ahn, Sun‐Young Lee
Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 205-215, 2019, DOI:10.31209/2018.100000056
Abstract Object tracking plays an important role in many vision applications. This paper
proposes a novel and robust object detection and tracking method to localize
and track a visual object in video stream. The proposed method is consisted of
three modules; object detection, tracking and learning. Detection module finds
and localizes all apparent objects, corrects the tracker if necessary. Tracking
module follows the interest object by every frame of sequences. Learning
module estimates a detecting error, and updates its value of credibility level.
With a validity level where the tracking is failed on tracing the learned object,
detection module finds again… More >
Open Access
ARTICLE
Hsing‐Chung Chen1,2, Shyi‐Shiun Kuo1,3
Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 217-228, 2019, DOI:10.31209/2018.100000057
Abstract Nowadays, more and more smartphones communicate to each other’s by using
some popular Next Generation Instant Messaging (NGIM) applications (Apps)
which are based on the blockchain (BC) technologies, such as XChat, via
IPv4/IPv6 dual stack network environments. Owing to XChat addresses are
soon to be implemented as stealth addresses, any DoS attack activated form
malicious XChat node will be treated as a kind of DDoS attack. Therefore, the
huge NGIM usages with stealth addresses in IPv4/IPv6 dual stack mobile
networks, mobile devices will suffer the Distributed Denial of Service (DDoS)
attack from Internet. The probing method is deployed in this… More >