1
|
Retraction Note to: Diagnosing breast cancer with an improved artificial immune recognition system. Soft comput 2021. [DOI: 10.1007/s00500-021-05597-5] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/05/2023]
|
2
|
Flash-flood hazard assessment using ensembles and Bayesian-based machine learning models: Application of the simulated annealing feature selection method. THE SCIENCE OF THE TOTAL ENVIRONMENT 2020; 711:135161. [PMID: 31818576 DOI: 10.1016/j.scitotenv.2019.135161] [Citation(s) in RCA: 54] [Impact Index Per Article: 13.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/16/2019] [Revised: 10/21/2019] [Accepted: 10/23/2019] [Indexed: 05/28/2023]
Abstract
Flash-floods are increasingly recognized as a frequent natural hazard worldwide. Iran has been among the mostdevastated regions affected by the major floods. While the temporal flash-flood forecasting models are mainly developed for warning systems, the models for assessing hazardous areas can greatly contribute to adaptation and mitigation policy-making and disaster risk reduction. Former researches in the flash-flood hazard mapping have heightened the urge for the advancement of more accurate models. Thus, the current research proposes the state-of-the-art ensemble models of boosted generalized linear model (GLMBoost) and random forest (RF), and Bayesian generalized linear model (BayesGLM) methods for higher performance modeling. Furthermore, a pre-processing method, namely simulated annealing (SA), is used to eliminate redundant variables from the modeling process. Results of the modeling based on the hit and miss analysis indicates high performance for both models (accuracy = 90-92%, Kappa = 79-84%, Success ratio = 94-96%, Threat score = 80-84%, and Heidke skill score = 79-84%). The variables of distance from the stream, vegetation, drainage density, land use, and elevation have shown more contribution among others for modeling the flash-flood. The results of this study can significantly facilitate mapping the hazardous areas and further assist watershed managers to control and remediate induced damages of flood in the data-scarce regions.
Collapse
|
3
|
Integrated machine learning methods with resampling algorithms for flood susceptibility prediction. THE SCIENCE OF THE TOTAL ENVIRONMENT 2020; 705:135983. [PMID: 31841902 DOI: 10.1016/j.scitotenv.2019.135983] [Citation(s) in RCA: 17] [Impact Index Per Article: 4.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/06/2019] [Revised: 12/05/2019] [Accepted: 12/05/2019] [Indexed: 06/10/2023]
Abstract
Flood susceptibility projections relying on standalone models, with one-time train-test data splitting for model calibration, yields biased results. This study proposed novel integrative flood susceptibility prediction models based on multi-time resampling approaches, random subsampling (RS) and bootstrapping (BT) algorithms, integrated with machine learning models: generalized additive model (GAM), boosted regression tree (BTR) and multivariate adaptive regression splines (MARS). RS and BT algorithms provided 10 runs of data resampling for learning and validation of the models. Then the mean of 10 runs of predictions is used to produce the flood susceptibility maps (FSM). This methodology was applied to Ardabil Province on coastal margins of the Caspian Sea which faced destructive floods. The area under curve (AUC) of receiver operating characteristic (ROC) and true skill statistic (TSS) and correlation coefficient (COR) were utilized to evaluate the predictive accuracy of the proposed models. Results demonstrated that resampling algorithms improved the performance of Standalone GAM, MARS and BRT models. Results also revealed that Standalone models had better performance with the BT algorithm compared to the RS algorithm. BT-GAM model attained superior performance in terms of statistical measures (AUC = 0.98, TSS = 0.93, COR = 0.91), followed by BT-MARS (AUC = 0.97, TSS = 0.91, COR = 0.91) and BT-BRT model (AUC = 0.95, TSS = 0.79, COR = 0.79). Results demonstrated that the proposed models outperformed the benchmark models such as Standalone GAM, MARS, BRT, multilayer perceptron (MLP) and support vector machine (SVM). Given the admirable performance of the proposed models in a large scale area, the promising results can be expected from these models for other regions.
Collapse
|
4
|
Coronary Artery Disease Diagnosis; Ranking the Significant Features Using a Random Trees Model. INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH 2020; 17:ijerph17030731. [PMID: 31979257 PMCID: PMC7037941 DOI: 10.3390/ijerph17030731] [Citation(s) in RCA: 60] [Impact Index Per Article: 15.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/20/2019] [Revised: 01/15/2020] [Accepted: 01/20/2020] [Indexed: 12/14/2022]
Abstract
Heart disease is one of the most common diseases in middle-aged citizens. Among the vast number of heart diseases, coronary artery disease (CAD) is considered as a common cardiovascular disease with a high death rate. The most popular tool for diagnosing CAD is the use of medical imaging, e.g., angiography. However, angiography is known for being costly and also associated with a number of side effects. Hence, the purpose of this study is to increase the accuracy of coronary heart disease diagnosis through selecting significant predictive features in order of their ranking. In this study, we propose an integrated method using machine learning. The machine learning methods of random trees (RTs), decision tree of C5.0, support vector machine (SVM), and decision tree of Chi-squared automatic interaction detection (CHAID) are used in this study. The proposed method shows promising results and the study confirms that the RTs model outperforms other models.
Collapse
|
5
|
Spatial hazard assessment of the PM10 using machine learning models in Barcelona, Spain. THE SCIENCE OF THE TOTAL ENVIRONMENT 2020; 701:134474. [PMID: 31704408 DOI: 10.1016/j.scitotenv.2019.134474] [Citation(s) in RCA: 26] [Impact Index Per Article: 6.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/10/2019] [Revised: 09/13/2019] [Accepted: 09/14/2019] [Indexed: 05/26/2023]
Abstract
Air pollution, and especially atmospheric particulate matter (PM), has a profound impact on human mortality and morbidity, environment, and ecological system. Accordingly, it is very relevant predicting air quality. Although the application of the machine learning (ML) models for predicting air quality parameters, such as PM concentrations, has been evaluated in previous studies, those on the spatial hazard modeling of them are very limited. Due to the high potential of the ML models, the spatial modeling of PM can help managers to identify the pollution hotspots. Accordingly, this study aims at developing new ML models, such as Random Forest (RF), Bagged Classification and Regression Trees (Bagged CART), and Mixture Discriminate Analysis (MDA) for the hazard prediction of PM10 (particles with a diameter less than 10 µm) in the Barcelona Province, Spain. According to the annual PM10 concentration in 75 stations, the healthy and unhealthy locations are determined, and a ratio 70/30 (53/22 stations) is applied for calibrating and validating the ML models to predict the most hazardous areas for PM10. In order to identify the influential variables of PM modeling, the simulated annealing (SA) feature selection method is used. Seven features, among the thirteen features, are selected as critical features. According to the results, all the three-machine learning (ML) models achieve an excellent performance (Accuracy > 87% and precision > 86%). However, the Bagged CART and RF models have the same performance and higher than the MDA model. Spatial hazard maps predicted by the three models indicate that the high hazardous areas are located in the middle of the Barcelona Province more than in the Barcelona's Metropolitan Area.
Collapse
|
6
|
Effects of media, interpersonal communication and religious attitudes on HIV-related stigma in Tehran, Iran. INFORMATICS IN MEDICINE UNLOCKED 2020. [DOI: 10.1016/j.imu.2020.100291] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022] Open
|
7
|
Earth fissure hazard prediction using machine learning models. ENVIRONMENTAL RESEARCH 2019; 179:108770. [PMID: 31577962 DOI: 10.1016/j.envres.2019.108770] [Citation(s) in RCA: 16] [Impact Index Per Article: 3.2] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/08/2019] [Revised: 09/19/2019] [Accepted: 09/22/2019] [Indexed: 06/10/2023]
Abstract
Earth fissures are the cracks on the surface of the earth mainly formed in the arid and the semi-arid basins. The excessive withdrawal of groundwater, as well as the other underground natural resources, has been introduced as the significant causing of land subsidence and potentially, the earth fissuring. Fissuring is rapidly turning into the nations' major disasters which are responsible for significant economic, social, and environmental damages with devastating consequences. Modeling the earth fissure hazard is particularly important for identifying the vulnerable groundwater areas for the informed water management, and effectively enforce the groundwater recharge policies toward the sustainable conservation plans to preserve existing groundwater resources. Modeling the formation of earth fissures and ultimately prediction of the hazardous areas has been greatly challenged due to the complexity, and the multidisciplinary involved to predict the earth fissures. This paper aims at proposing novel machine learning models for prediction of earth fissuring hazards. The Simulated annealing feature selection (SAFS) method was applied to identify key features, and the generalized linear model (GLM), multivariate adaptive regression splines (MARS), classification and regression tree (CART), random forest (RF), and support vector machine (SVM) have been used for the first time to build the prediction models. Results indicated that all the models had good accuracy (>86%) and precision (>81%) in the prediction of the earth fissure hazard. The GLM model (as a linear model) had the lowest performance, while the RF model was the best model in the modeling process. Sensitivity analysis indicated that the hazardous class in the study area was mainly related to low elevations with characteristics of high groundwater withdrawal, drop in groundwater level, high well density, high road density, low precipitation, and Quaternary sediments distribution.
Collapse
|
8
|
A novel bias correction framework of TMPA 3B42 daily precipitation data using similarity matrix/homogeneous conditions. THE SCIENCE OF THE TOTAL ENVIRONMENT 2019; 694:133680. [PMID: 31394326 DOI: 10.1016/j.scitotenv.2019.133680] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/19/2019] [Revised: 07/27/2019] [Accepted: 07/29/2019] [Indexed: 06/10/2023]
Abstract
Reduction of bias in remotely sensed precipitation products is a major challenge in environment modeling, hydrology, and managing the water resources. Various bias correction techniques are applied to reduce the bias from pixel to gauge data. However, a successful methodology to improve bias correction on the daily scale is often challenging and limited. We present a methodology that can be used to correct the daily bias in remote sensing rainfall data, and to demonstrate the Tropical Rainfall Measuring Mission (TRMM) Multi-satellite Precipitation Analysis (TMPA) 3B42 data was used. The proposed bias correction method is based on the concept of similarity (homogeneous) conditions developed based on the periodicity and different percentile-based precipitation amount, and by identifying the best donor pixel to transfer bias correction factor to a specific ungauged pixel (the receptor pixel) based on the similarity (elevation, latitude, and longitude). Bias correction factors were obtained using the mean bias-removal (MBR) and multiplicative ratio (MR) techniques in the cells of the similarity matrix. The proposed methodology demonstrates a significant removal of bias associated with TMPA 3B42 data sets and it is capable of removing the bias in daily precipitation data on an average by 57% (51%) in the gauged pixels, and 25% (22%) in the ungauged pixels for MBR (MR) method.
Collapse
|
9
|
Retraction Note: An architecture of agent-based multi-layer interactive e-learning and e-testing platform. QUALITY & QUANTITY 2019. [DOI: 10.1007/s11135-019-00948-9] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/05/2023]
|
10
|
Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography. SENSORS 2019; 19:s19214752. [PMID: 31683885 PMCID: PMC6864817 DOI: 10.3390/s19214752] [Citation(s) in RCA: 56] [Impact Index Per Article: 11.2] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/22/2019] [Revised: 09/11/2019] [Accepted: 09/12/2019] [Indexed: 11/16/2022]
Abstract
Despite the many conveniences of Radio Frequency Identification (RFID) systems, the underlying open architecture for communication between the RFID devices may lead to various security threats. Recently, many solutions were proposed to secure RFID systems and many such systems are based on only lightweight primitives, including symmetric encryption, hash functions, and exclusive OR operation. Many solutions based on only lightweight primitives were proved insecure, whereas, due to resource-constrained nature of RFID devices, the public key-based cryptographic solutions are unenviable for RFID systems. Very recently, Gope and Hwang proposed an authentication protocol for RFID systems based on only lightweight primitives and claimed their protocol can withstand all known attacks. However, as per the analysis in this article, their protocol is infeasible and is vulnerable to collision, denial-of-service (DoS), and stolen verifier attacks. This article then presents an improved realistic and lightweight authentication protocol to ensure protection against known attacks. The security of the proposed protocol is formally analyzed using Burrows Abadi-Needham (BAN) logic and under the attack model of automated security verification tool ProVerif. Moreover, the security features are also well analyzed, although informally. The proposed protocol outperforms the competing protocols in terms of security.
Collapse
|
11
|
Predicting solubility of CO2 in brine by advanced machine learning systems: Application to carbon capture and sequestration. J CO2 UTIL 2019. [DOI: 10.1016/j.jcou.2019.05.009] [Citation(s) in RCA: 29] [Impact Index Per Article: 5.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/19/2022]
|
12
|
|
13
|
Computer-aided decision-making for predicting liver disease using PSO-based optimized SVM with feature selection. INFORMATICS IN MEDICINE UNLOCKED 2019. [DOI: 10.1016/j.imu.2019.100255] [Citation(s) in RCA: 30] [Impact Index Per Article: 6.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/24/2022] Open
|
14
|
Retraction Note to: Support vector regression methodology for prediction of input displacement of adaptive compliant robotic gripper. APPL INTELL 2018. [DOI: 10.1007/s10489-018-1367-z] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
|
15
|
Using multi-attribute decision-making approaches in the selection of a hospital management system. Technol Health Care 2018; 26:279-295. [PMID: 29309042 DOI: 10.3233/thc-170947] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
Abstract
The most appropriate organizational software is always a real challenge for managers, especially, the IT directors. The illustration of the term "enterprise software selection", is to purchase, create, or order a software that; first, is best adapted to require of the organization; and second, has suitable price and technical support. Specifying selection criteria and ranking them, is the primary prerequisite for this action. This article provides a method to evaluate, rank, and compare the available enterprise software for choosing the apt one. The prior mentioned method is constituted of three-stage processes. First, the method identifies the organizational requires and assesses them. Second, it selects the best method throughout three possibilities; indoor-production, buying software, and ordering special software for the native use. Third, the method evaluates, compares and ranks the alternative software. The third process uses different methods of multi attribute decision making (MADM), and compares the consequent results. Based on different characteristics of the problem; several methods had been tested, namely, Analytic Hierarchy Process (AHP), Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS), Elimination and Choice Expressing Reality (ELECTURE), and easy weight method. After all, we propose the most practical method for same problems.
Collapse
|
16
|
Determination of thermal conductivity ratio of CuO/ethylene glycol nanofluid by connectionist approach. J Taiwan Inst Chem Eng 2018. [DOI: 10.1016/j.jtice.2018.06.003] [Citation(s) in RCA: 39] [Impact Index Per Article: 6.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/03/2023]
|
17
|
Abstract
Abstract
Acceptance and intention to use mobile applications in a library context is attracting a great deal of interest in education field. A sparse amount of research was conducted in mobile library applications (MLA) previously, investigating the influential factors of intention to use MLA. Research here aims to provide empirical support on acceptance of MLA, library access through mobile applications, with the model developed by taking a technology acceptance model (TAM) in MLA context by adding perceived mobility value, system accessibility and satisfaction for investigating the influence on behavioural intention to use MLA. A self-administrated cross-sectional survey was conducted to collect data from 321 users of MLA in the COMSATS Institute of Information Technology (CIIT) in Islamabad, while a structural equation model (SEM) using analysis of moment structure (AMOS) software was used for examining quantitative data. Results revealed that satisfaction and perceived ease of use are direct significant predictors of intention to use MLA, whereas system accessibility was influenced by the perceived ease of use. However, the perceived mobility value shows a weak effect on intention to use MLA in terms of perceived usefulness. Results serve as a guide for effective decision-making in development and resource allocation to ensure the success of the library’s vision and mission.
Collapse
|
18
|
Computational intelligence approaches for classification of medical data: State-of-the-art, future challenges and research directions. Neurocomputing 2018. [DOI: 10.1016/j.neucom.2017.01.126] [Citation(s) in RCA: 70] [Impact Index Per Article: 11.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/13/2023]
|
19
|
Neuro-fuzzy method for predicting the viability of stem cells treated at different time-concentration conditions. Technol Health Care 2017; 25:1041-1051. [DOI: 10.3233/thc-170922] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/08/2023]
|
20
|
Source camera identification: a distributed computing approach using Hadoop. JOURNAL OF CLOUD COMPUTING: ADVANCES, SYSTEMS AND APPLICATIONS 2017. [DOI: 10.1186/s13677-017-0088-x] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/10/2022] Open
|
21
|
Comparison of experimental data, modelling and non-linear regression on transport properties of mineral oil based nanofluids. POWDER TECHNOL 2017. [DOI: 10.1016/j.powtec.2017.04.034] [Citation(s) in RCA: 72] [Impact Index Per Article: 10.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
|
22
|
Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. EGYPTIAN INFORMATICS JOURNAL 2017. [DOI: 10.1016/j.eij.2016.11.001] [Citation(s) in RCA: 189] [Impact Index Per Article: 27.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
|
23
|
Predicting turbulent flow friction coefficient using ANFIS technique. SIGNAL, IMAGE AND VIDEO PROCESSING 2017; 11:341-347. [DOI: 10.1007/s11760-016-0948-8] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/03/2015] [Revised: 06/23/2016] [Accepted: 07/15/2016] [Indexed: 09/01/2023]
|
24
|
Abstract
Purpose
This paper aims to present a hybrid approach based on classification algorithms that was capable of identifying different types of phishing pages. In this approach, after eliminating features that do not play an important role in identifying phishing attacks and also after adding the technique of searching page title in the search engine, the capability of identifying journal phishing and phishing pages embedded in legal sites was added to the presented approach in this paper.
Design/methodology/approach
The hybrid approach of this paper for identifying phishing web sites is presented. This approach consists of four basic sections. The action of identifying phishing web sites and journal phishing attacks is performed via selecting two classification algorithms separately. To identify phishing attacks embedded in legal web sites also the method of page title searching is used and then the result is returned. To facilitate identifying phishing pages the black list approach is used along with the proposed approach so that the operation of identifying phishing web sites can be performed more accurately, and, finally, by using a decision table, it is judged that the intended web site is phishing or legal.
Findings
In this paper, a hybrid approach based on classification algorithms to identify phishing web sites is presented that has the ability to identify a new type of phishing attack known as journal phishing. The presented approach considers the most used features and adds new features to identify these attacks and to eliminate unused features in the identifying process of these attacks, does not have the problems of previous techniques and can identify journal phishing too.
Originality/value
The major advantage of this technique was considering all of the possible and effective features in identifying phishing attacks and eliminating unused features of previous techniques; also, this technique in comparison with other similar techniques has the ability of identifying journal phishing attacks and phishing pages embedded in legal sites.
Collapse
|
25
|
A novel evolutionary-negative correlated mixture of experts model in tourism demand estimation. COMPUTERS IN HUMAN BEHAVIOR 2016. [DOI: 10.1016/j.chb.2016.07.004] [Citation(s) in RCA: 12] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
|
26
|
DyHAP: Dynamic Hybrid ANFIS-PSO Approach for Predicting Mobile Malware. PLoS One 2016; 11:e0162627. [PMID: 27611312 PMCID: PMC5017788 DOI: 10.1371/journal.pone.0162627] [Citation(s) in RCA: 34] [Impact Index Per Article: 4.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/19/2016] [Accepted: 08/25/2016] [Indexed: 11/19/2022] Open
Abstract
To deal with the large number of malicious mobile applications (e.g. mobile malware), a number of malware detection systems have been proposed in the literature. In this paper, we propose a hybrid method to find the optimum parameters that can be used to facilitate mobile malware identification. We also present a multi agent system architecture comprising three system agents (i.e. sniffer, extraction and selection agent) to capture and manage the pcap file for data preparation phase. In our hybrid approach, we combine an adaptive neuro fuzzy inference system (ANFIS) and particle swarm optimization (PSO). Evaluations using data captured on a real-world Android device and the MalGenome dataset demonstrate the effectiveness of our approach, in comparison to two hybrid optimization methods which are differential evolution (ANFIS-DE) and ant colony optimization (ANFIS-ACO).
Collapse
|
27
|
|
28
|
Forecasting of Underactuated Robotic Finger Contact Forces by Support Vector Regression Methodology. INT J PATTERN RECOGN 2016; 30:1659019. [DOI: 10.1142/s0218001416590199] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
Abstract
Robotic manipulators have very strong nonlinearities. Analytical modeling of the robotic gripper is very challenging task. Therefore in this paper soft computing methods is applied in order to estimate contact forces of the robotic finger. Support vector regression (SVR) with radial and polynomial basis functions and the soft computing methods were used. The primary purpose of this study are in clarification of kinetostatic examining of a new finger mechanism utilizing pseudo-unbending body model. The results show the better prediction accuracy with SVR methodology with radial basis function (RBF).
Collapse
|
29
|
|
30
|
Sensitivity analysis of catalyzed-transesterification as a renewable and sustainable energy production system by adaptive neuro-fuzzy methodology. J Taiwan Inst Chem Eng 2016. [DOI: 10.1016/j.jtice.2015.12.001] [Citation(s) in RCA: 16] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
|
31
|
Adaptive Neuro-Fuzzy Determination of the Effect of Experimental Parameters on Vehicle Agent Speed Relative to Vehicle Intruder. PLoS One 2016; 11:e0155697. [PMID: 27219539 PMCID: PMC4878754 DOI: 10.1371/journal.pone.0155697] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/08/2015] [Accepted: 05/03/2016] [Indexed: 11/18/2022] Open
Abstract
Intelligent Transportation Systems rely on understanding, predicting and affecting the interactions between vehicles. The goal of this paper is to choose a small subset from the larger set so that the resulting regression model is simple, yet have good predictive ability for Vehicle agent speed relative to Vehicle intruder. The method of ANFIS (adaptive neuro fuzzy inference system) was applied to the data resulting from these measurements. The ANFIS process for variable selection was implemented in order to detect the predominant variables affecting the prediction of agent speed relative to intruder. This process includes several ways to discover a subset of the total set of recorded parameters, showing good predictive capability. The ANFIS network was used to perform a variable search. Then, it was used to determine how 9 parameters (Intruder Front sensors active (boolean), Intruder Rear sensors active (boolean), Agent Front sensors active (boolean), Agent Rear sensors active (boolean), RSSI signal intensity/strength (integer), Elapsed time (in seconds), Distance between Agent and Intruder (m), Angle of Agent relative to Intruder (angle between vehicles °), Altitude difference between Agent and Intruder (m)) influence prediction of agent speed relative to intruder. The results indicated that distance between Vehicle agent and Vehicle intruder (m) and angle of Vehicle agent relative to Vehicle Intruder (angle between vehicles °) is the most influential parameters to Vehicle agent speed relative to Vehicle intruder.
Collapse
|
32
|
A Lightweight Radio Propagation Model for Vehicular Communication in Road Tunnels. PLoS One 2016; 11:e0152727. [PMID: 27031989 PMCID: PMC4816450 DOI: 10.1371/journal.pone.0152727] [Citation(s) in RCA: 12] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/21/2016] [Accepted: 03/19/2016] [Indexed: 11/19/2022] Open
Abstract
Radio propagation models (RPMs) are generally employed in Vehicular Ad Hoc Networks (VANETs) to predict path loss in multiple operating environments (e.g. modern road infrastructure such as flyovers, underpasses and road tunnels). For example, different RPMs have been developed to predict propagation behaviour in road tunnels. However, most existing RPMs for road tunnels are computationally complex and are based on field measurements in frequency band not suitable for VANET deployment. Furthermore, in tunnel applications, consequences of moving radio obstacles, such as large buses and delivery trucks, are generally not considered in existing RPMs. This paper proposes a computationally inexpensive RPM with minimal set of parameters to predict path loss in an acceptable range for road tunnels. The proposed RPM utilizes geometric properties of the tunnel, such as height and width along with the distance between sender and receiver, to predict the path loss. The proposed RPM also considers the additional attenuation caused by the moving radio obstacles in road tunnels, while requiring a negligible overhead in terms of computational complexity. To demonstrate the utility of our proposed RPM, we conduct a comparative summary and evaluate its performance. Specifically, an extensive data gathering campaign is carried out in order to evaluate the proposed RPM. The field measurements use the 5 GHz frequency band, which is suitable for vehicular communication. The results demonstrate that a close match exists between the predicted values and measured values of path loss. In particular, an average accuracy of 94% is found with R2 = 0.86.
Collapse
|
33
|
An overview of phishing attacks and their detection techniques. INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY 2016. [DOI: 10.1504/ijipt.2016.081319] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
|
34
|
Impact of multi-task on symptomatic patient affected by chronical vestibular disorders. Acta Bioeng Biomech 2016; 18:123-129. [PMID: 27840446] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 06/06/2023]
Abstract
PURPOSE After a vestibular deficit some patients may be affected by chronical postural instability. The aim of this study was to identify the emotional and cognitive factors of these symptomatic patients. In particular, the double cognitive task and the anxiety disorder were identified by our patients. Through a retrospective study, 14 patients (65.4 ± 18 years) participated in the experiment. METHOD The experimentation consists in the study of the standing position of our patients through the aggregate of the trajectories of the center of pressure (COP) using a force plate device. With the aim of isolating the emotional and cognitive influence, this experimentation was defined in two conditions. In the first one, the patients were asked to maintain their balance without additional tasks. In the second one, the patients were submitted to an additional cognitive arithmetic task. The stabilogram surface, length (the forward and backward displacement distance during deviations in COP), lateral and the antero-posterior deviations were assessed. RESULTS Our results showed an increase of postural instability of patients affected by chronical vestibular disorders when submitted to the double task. The patients submitted to the cognitive task present a larger surface of activity in comparison with the free-task one (Wilcoxon test p-value equals p = 0.0453). In addition, their displacements inside this area are more important (p = 0.0338). The COP of all our patients deviated forward in the presence of the double task. CONCLUSION The increase in instability during the double cognitive task could be explained by an additional stress caused by the desire to make a success of the cognitive task.
Collapse
|
35
|
An overview of phishing attacks and their detection techniques. INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY 2016. [DOI: 10.1504/ijipt.2016.10002236] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
|
36
|
Performance investigation of micro- and nano-sized particle erosion in a 90° elbow using an ANFIS model. POWDER TECHNOL 2015. [DOI: 10.1016/j.powtec.2015.06.073] [Citation(s) in RCA: 105] [Impact Index Per Article: 11.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
|
37
|
Hybrid intelligent model for approximating unconfined compressive strength of cement-based bricks with odd-valued array of peat content (0–29%). POWDER TECHNOL 2015. [DOI: 10.1016/j.powtec.2015.07.026] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
|
38
|
Identification and prioritization of critical issues for the promotion of e-learning in Pakistan. COMPUTERS IN HUMAN BEHAVIOR 2015. [DOI: 10.1016/j.chb.2015.04.037] [Citation(s) in RCA: 22] [Impact Index Per Article: 2.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
|
39
|
A systematic literature review on agile requirements engineering practices and challenges. COMPUTERS IN HUMAN BEHAVIOR 2015. [DOI: 10.1016/j.chb.2014.10.046] [Citation(s) in RCA: 108] [Impact Index Per Article: 12.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
|
40
|
Prediction of ultrasonic pulse velocity for enhanced peat bricks using adaptive neuro-fuzzy methodology. ULTRASONICS 2015; 61:103-113. [PMID: 25957464 DOI: 10.1016/j.ultras.2015.04.002] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/09/2014] [Revised: 03/03/2015] [Accepted: 04/06/2015] [Indexed: 06/04/2023]
Abstract
Ultrasonic pulse velocity is affected by defects in material structure. This study applied soft computing techniques to predict the ultrasonic pulse velocity for various peats and cement content mixtures for several curing periods. First, this investigation constructed a process to simulate the ultrasonic pulse velocity with adaptive neuro-fuzzy inference system. Then, an ANFIS network with neurons was developed. The input and output layers consisted of four and one neurons, respectively. The four inputs were cement, peat, sand content (%) and curing period (days). The simulation results showed efficient performance of the proposed system. The ANFIS and experimental results were compared through the coefficient of determination and root-mean-square error. In conclusion, use of ANFIS network enhances prediction and generation of strength. The simulation results confirmed the effectiveness of the suggested strategies.
Collapse
|
41
|
RETRACTED ARTICLE: Diagnosing breast cancer with an improved artificial immune recognition system. Soft comput 2015. [DOI: 10.1007/s00500-015-1742-1] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/08/2023]
|
42
|
Application of adaptive neuro-fuzzy technique to predict the unconfined compressive strength of PFA-sand-cement mixture. POWDER TECHNOL 2015. [DOI: 10.1016/j.powtec.2015.02.045] [Citation(s) in RCA: 25] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
|
43
|
RAIRS2 a new expert system for diagnosing tuberculosis with real-world tournament selection mechanism inside artificial immune recognition system. Med Biol Eng Comput 2015; 54:385-99. [PMID: 26081904 DOI: 10.1007/s11517-015-1323-6] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/12/2014] [Accepted: 05/30/2015] [Indexed: 02/05/2023]
Abstract
Tuberculosis is a major global health problem that has been ranked as the second leading cause of death from an infectious disease worldwide, after the human immunodeficiency virus. Diagnosis based on cultured specimens is the reference standard; however, results take weeks to obtain. Slow and insensitive diagnostic methods hampered the global control of tuberculosis, and scientists are looking for early detection strategies, which remain the foundation of tuberculosis control. Consequently, there is a need to develop an expert system that helps medical professionals to accurately diagnose the disease. The objective of this study is to diagnose tuberculosis using a machine learning method. Artificial immune recognition system (AIRS) has been used successfully for diagnosing various diseases. However, little effort has been undertaken to improve its classification accuracy. In order to increase the classification accuracy, this study introduces a new hybrid system that incorporates real tournament selection mechanism into the AIRS. This mechanism is used to control the population size of the model and to overcome the existing selection pressure. Patient epacris reports obtained from the Pasteur laboratory in northern Iran were used as the benchmark data set. The sample consisted of 175 records, from which 114 (65 %) were positive for TB, and the remaining 61 (35 %) were negative. The classification performance was measured through tenfold cross-validation, root-mean-square error, sensitivity, and specificity. With an accuracy of 100 %, RMSE of 0, sensitivity of 100 %, and specificity of 100 %, the proposed method was able to successfully classify tuberculosis cases. In addition, the proposed method is comparable with top classifiers used in this research.
Collapse
|
44
|
|
45
|
|
46
|
Diagnosing tuberculosis with a novel support vector machine-based artificial immune recognition system. IRANIAN RED CRESCENT MEDICAL JOURNAL 2015; 17:e24557. [PMID: 26023340 PMCID: PMC4443397 DOI: 10.5812/ircmj.17(4)2015.24557] [Citation(s) in RCA: 21] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Subscribe] [Scholar Register] [Received: 10/13/2014] [Revised: 01/28/2015] [Accepted: 02/07/2015] [Indexed: 12/04/2022]
Abstract
Background: Tuberculosis (TB) is a major global health problem, which has been ranked as the second leading cause of death from an infectious disease worldwide. Diagnosis based on cultured specimens is the reference standard, however results take weeks to process. Scientists are looking for early detection strategies, which remain the cornerstone of tuberculosis control. Consequently there is a need to develop an expert system that helps medical professionals to accurately and quickly diagnose the disease. Artificial Immune Recognition System (AIRS) has been used successfully for diagnosing various diseases. However, little effort has been undertaken to improve its classification accuracy. Objectives: In order to increase the classification accuracy of AIRS, this study introduces a new hybrid system that incorporates a support vector machine into AIRS for diagnosing tuberculosis. Patients and Methods: Patient epacris reports obtained from the Pasteur laboratory of Iran were used as the benchmark data set, with the sample size of 175 (114 positive samples for TB and 60 samples in the negative group). The strategy of this study was to ensure representativeness, thus it was important to have an adequate number of instances for both TB and non-TB cases. The classification performance was measured through 10-fold cross-validation, Root Mean Squared Error (RMSE), sensitivity and specificity, Youden’s Index, and Area Under the Curve (AUC). Statistical analysis was done using the Waikato Environment for Knowledge Analysis (WEKA), a machine learning program for windows. Results: With an accuracy of 100%, sensitivity of 100%, specificity of 100%, Youden’s Index of 1, Area Under the Curve of 1, and RMSE of 0, the proposed method was able to successfully classify tuberculosis patients. Conclusions: There have been many researches that aimed at diagnosing tuberculosis faster and more accurately. Our results described a model for diagnosing tuberculosis with 100% sensitivity and 100% specificity. This model can be used as an additional tool for experts in medicine to diagnose TBC more accurately and quickly.
Collapse
|
47
|
A systematic review of approaches to assessing cybersecurity awareness. KYBERNETES 2015; 44:606-622. [DOI: 10.1108/k-12-2014-0283] [Citation(s) in RCA: 16] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/02/2023]
Abstract
Purpose
– The purpose of this paper is to survey, explore and inform researchers about the previous methodologies applied, target audience and coverage of previous assessment of cybersecurity awareness by capturing, summarizing, synthesizing and critically comment on it. It is also conducted to identify the gaps in the cybersecurity awareness assessment research which warrants the future work.
Design/methodology/approach
– The authors used a systematic literature review technique to search the relevant online databases by using pre-defined keywords. The authors limited the search to retrieve only English language academic articles published from 2005 to 2014. Relevant information was extracted from the retrieved articles, and the ensuing discussion centres on providing the answers to the research questions.
Findings
– From the online searches, 23 studies that matched the search criteria were retrieved, and the information extracted from each study includes the authors, publication year, assessment method used, target audiences, coverage of assessment and assessment goals.
Originality/value
– The review of the retrieved articles indicates that no previous research was conducted in the assessment of the cybersecurity awareness using a programme evaluation technique. It was also found that few studies focused on youngsters and on the issue of safeguarding personal information.
Collapse
|
48
|
|
49
|
A Survey on Obstacle Modeling Patterns in Radio Propagation Models for Vehicular Ad Hoc Networks. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING 2015. [DOI: 10.1007/s13369-015-1600-6] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
|
50
|
Support vector machine firefly algorithm based optimization of lens system. APPLIED OPTICS 2015; 54:37-45. [PMID: 25967004 DOI: 10.1364/ao.54.000037] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/02/2014] [Accepted: 10/03/2014] [Indexed: 06/04/2023]
Abstract
Lens system design is an important factor in image quality. The main aspect of the lens system design methodology is the optimization procedure. Since optimization is a complex, nonlinear task, soft computing optimization algorithms can be used. There are many tools that can be employed to measure optical performance, but the spot diagram is the most useful. The spot diagram gives an indication of the image of a point object. In this paper, the spot size radius is considered an optimization criterion. Intelligent soft computing scheme support vector machines (SVMs) coupled with the firefly algorithm (FFA) are implemented. The performance of the proposed estimators is confirmed with the simulation results. The result of the proposed SVM-FFA model has been compared with support vector regression (SVR), artificial neural networks, and generic programming methods. The results show that the SVM-FFA model performs more accurately than the other methodologies. Therefore, SVM-FFA can be used as an efficient soft computing technique in the optimization of lens system designs.
Collapse
|