for Journals by Title or ISSN
for Articles by Keywords
help
  Subjects -> MATHEMATICS (Total: 910 journals)
    - APPLIED MATHEMATICS (75 journals)
    - GEOMETRY AND TOPOLOGY (20 journals)
    - MATHEMATICS (677 journals)
    - MATHEMATICS (GENERAL) (41 journals)
    - NUMERICAL ANALYSIS (19 journals)
    - PROBABILITIES AND MATH STATISTICS (78 journals)

MATHEMATICS (677 journals)                  1 2 3 4 | Last

Showing 1 - 200 of 538 Journals sorted alphabetically
Abakós     Open Access   (Followers: 4)
Abhandlungen aus dem Mathematischen Seminar der Universitat Hamburg     Hybrid Journal   (Followers: 3)
Academic Voices : A Multidisciplinary Journal     Open Access   (Followers: 2)
Accounting Perspectives     Full-text available via subscription   (Followers: 7)
ACM Transactions on Algorithms (TALG)     Hybrid Journal   (Followers: 16)
ACM Transactions on Computational Logic (TOCL)     Hybrid Journal   (Followers: 3)
ACM Transactions on Mathematical Software (TOMS)     Hybrid Journal   (Followers: 6)
ACS Applied Materials & Interfaces     Full-text available via subscription   (Followers: 25)
Acta Applicandae Mathematicae     Hybrid Journal   (Followers: 1)
Acta Mathematica     Hybrid Journal   (Followers: 11)
Acta Mathematica Hungarica     Hybrid Journal   (Followers: 2)
Acta Mathematica Scientia     Full-text available via subscription   (Followers: 5)
Acta Mathematica Sinica, English Series     Hybrid Journal   (Followers: 6)
Acta Mathematica Vietnamica     Hybrid Journal  
Acta Mathematicae Applicatae Sinica, English Series     Hybrid Journal  
Advanced Science Letters     Full-text available via subscription   (Followers: 9)
Advances in Applied Clifford Algebras     Hybrid Journal   (Followers: 3)
Advances in Calculus of Variations     Hybrid Journal   (Followers: 2)
Advances in Catalysis     Full-text available via subscription   (Followers: 6)
Advances in Complex Systems     Hybrid Journal   (Followers: 7)
Advances in Computational Mathematics     Hybrid Journal   (Followers: 18)
Advances in Decision Sciences     Open Access   (Followers: 5)
Advances in Difference Equations     Open Access   (Followers: 2)
Advances in Fixed Point Theory     Open Access   (Followers: 5)
Advances in Geosciences (ADGEO)     Open Access   (Followers: 11)
Advances in Linear Algebra & Matrix Theory     Open Access   (Followers: 2)
Advances in Materials Sciences     Open Access   (Followers: 16)
Advances in Mathematical Physics     Open Access   (Followers: 5)
Advances in Mathematics     Full-text available via subscription   (Followers: 10)
Advances in Numerical Analysis     Open Access   (Followers: 4)
Advances in Operations Research     Open Access   (Followers: 12)
Advances in Porous Media     Full-text available via subscription   (Followers: 5)
Advances in Pure and Applied Mathematics     Hybrid Journal   (Followers: 6)
Advances in Pure Mathematics     Open Access   (Followers: 4)
Advances in Science and Research (ASR)     Open Access   (Followers: 6)
Aequationes Mathematicae     Hybrid Journal   (Followers: 2)
African Journal of Educational Studies in Mathematics and Sciences     Full-text available via subscription   (Followers: 5)
African Journal of Mathematics and Computer Science Research     Open Access   (Followers: 4)
Afrika Matematika     Hybrid Journal   (Followers: 1)
Air, Soil & Water Research     Open Access   (Followers: 9)
AKSIOMA Journal of Mathematics Education     Open Access   (Followers: 1)
Al-Jabar : Jurnal Pendidikan Matematika     Open Access  
Algebra and Logic     Hybrid Journal   (Followers: 4)
Algebra Colloquium     Hybrid Journal   (Followers: 4)
Algebra Universalis     Hybrid Journal   (Followers: 2)
Algorithmic Operations Research     Full-text available via subscription   (Followers: 5)
Algorithms     Open Access   (Followers: 11)
Algorithms Research     Open Access   (Followers: 1)
American Journal of Computational and Applied Mathematics     Open Access   (Followers: 5)
American Journal of Mathematical Analysis     Open Access  
American Journal of Mathematics     Full-text available via subscription   (Followers: 7)
American Journal of Operations Research     Open Access   (Followers: 5)
American Mathematical Monthly     Full-text available via subscription   (Followers: 7)
An International Journal of Optimization and Control: Theories & Applications     Open Access   (Followers: 8)
Analele Universitatii Ovidius Constanta - Seria Matematica     Open Access   (Followers: 1)
Analysis     Hybrid Journal   (Followers: 2)
Analysis and Applications     Hybrid Journal   (Followers: 1)
Analysis and Mathematical Physics     Hybrid Journal   (Followers: 3)
Analysis Mathematica     Full-text available via subscription  
Annales Mathematicae Silesianae     Open Access  
Annales mathématiques du Québec     Hybrid Journal   (Followers: 4)
Annales UMCS, Mathematica     Open Access   (Followers: 1)
Annales Universitatis Paedagogicae Cracoviensis. Studia Mathematica     Open Access  
Annali di Matematica Pura ed Applicata     Hybrid Journal   (Followers: 1)
Annals of Combinatorics     Hybrid Journal   (Followers: 3)
Annals of Data Science     Hybrid Journal   (Followers: 11)
Annals of Discrete Mathematics     Full-text available via subscription   (Followers: 6)
Annals of Mathematics     Full-text available via subscription  
Annals of Mathematics and Artificial Intelligence     Hybrid Journal   (Followers: 12)
Annals of Pure and Applied Logic     Open Access   (Followers: 2)
Annals of the Alexandru Ioan Cuza University - Mathematics     Open Access  
Annals of the Institute of Statistical Mathematics     Hybrid Journal   (Followers: 1)
Annals of West University of Timisoara - Mathematics     Open Access  
Annuaire du Collège de France     Open Access   (Followers: 5)
Applicable Algebra in Engineering, Communication and Computing     Hybrid Journal   (Followers: 2)
Applications of Mathematics     Hybrid Journal   (Followers: 1)
Applied Categorical Structures     Hybrid Journal   (Followers: 2)
Applied Computational Intelligence and Soft Computing     Open Access   (Followers: 12)
Applied Mathematics     Open Access   (Followers: 3)
Applied Mathematics     Open Access   (Followers: 6)
Applied Mathematics & Optimization     Hybrid Journal   (Followers: 6)
Applied Mathematics - A Journal of Chinese Universities     Hybrid Journal  
Applied Mathematics Letters     Full-text available via subscription   (Followers: 1)
Applied Mathematics Research eXpress     Hybrid Journal   (Followers: 1)
Applied Network Science     Open Access   (Followers: 1)
Applied Numerical Mathematics     Hybrid Journal   (Followers: 5)
Applied Spatial Analysis and Policy     Hybrid Journal   (Followers: 5)
Arab Journal of Mathematical Sciences     Open Access   (Followers: 3)
Arabian Journal of Mathematics     Open Access   (Followers: 2)
Archive for Mathematical Logic     Hybrid Journal   (Followers: 1)
Archive of Applied Mechanics     Hybrid Journal   (Followers: 5)
Archive of Numerical Software     Open Access  
Archives of Computational Methods in Engineering     Hybrid Journal   (Followers: 4)
Arkiv för Matematik     Hybrid Journal   (Followers: 1)
Arnold Mathematical Journal     Hybrid Journal   (Followers: 1)
Artificial Satellites : The Journal of Space Research Centre of Polish Academy of Sciences     Open Access   (Followers: 21)
Asia-Pacific Journal of Operational Research     Hybrid Journal   (Followers: 3)
Asian Journal of Algebra     Open Access   (Followers: 1)
Asian Journal of Current Engineering & Maths     Open Access  
Asian-European Journal of Mathematics     Hybrid Journal   (Followers: 2)
Australian Mathematics Teacher, The     Full-text available via subscription   (Followers: 7)
Australian Primary Mathematics Classroom     Full-text available via subscription   (Followers: 3)
Australian Senior Mathematics Journal     Full-text available via subscription   (Followers: 1)
Automatic Documentation and Mathematical Linguistics     Hybrid Journal   (Followers: 5)
Axioms     Open Access   (Followers: 1)
Baltic International Yearbook of Cognition, Logic and Communication     Open Access  
Basin Research     Hybrid Journal   (Followers: 5)
BIBECHANA     Open Access   (Followers: 2)
BIT Numerical Mathematics     Hybrid Journal  
BoEM - Boletim online de Educação Matemática     Open Access  
Boletim Cearense de Educação e História da Matemática     Open Access  
Boletim de Educação Matemática     Open Access  
Boletín de la Sociedad Matemática Mexicana     Hybrid Journal  
Bollettino dell'Unione Matematica Italiana     Full-text available via subscription   (Followers: 1)
British Journal of Mathematical and Statistical Psychology     Full-text available via subscription   (Followers: 21)
Bruno Pini Mathematical Analysis Seminar     Open Access  
Buletinul Academiei de Stiinte a Republicii Moldova. Matematica     Open Access   (Followers: 11)
Bulletin des Sciences Mathamatiques     Full-text available via subscription   (Followers: 4)
Bulletin of Dnipropetrovsk University. Series : Communications in Mathematical Modeling and Differential Equations Theory     Open Access   (Followers: 1)
Bulletin of Mathematical Sciences     Open Access   (Followers: 1)
Bulletin of the Brazilian Mathematical Society, New Series     Hybrid Journal  
Bulletin of the London Mathematical Society     Hybrid Journal   (Followers: 4)
Bulletin of the Malaysian Mathematical Sciences Society     Hybrid Journal  
Calculus of Variations and Partial Differential Equations     Hybrid Journal  
Canadian Journal of Science, Mathematics and Technology Education     Hybrid Journal   (Followers: 20)
Carpathian Mathematical Publications     Open Access   (Followers: 1)
Catalysis in Industry     Hybrid Journal   (Followers: 1)
CEAS Space Journal     Hybrid Journal   (Followers: 2)
CHANCE     Hybrid Journal   (Followers: 6)
Chaos, Solitons & Fractals     Hybrid Journal   (Followers: 3)
ChemSusChem     Hybrid Journal   (Followers: 7)
Chinese Annals of Mathematics, Series B     Hybrid Journal  
Chinese Journal of Catalysis     Full-text available via subscription   (Followers: 2)
Chinese Journal of Mathematics     Open Access  
Clean Air Journal     Full-text available via subscription   (Followers: 2)
Cogent Mathematics     Open Access   (Followers: 2)
Cognitive Computation     Hybrid Journal   (Followers: 4)
Collectanea Mathematica     Hybrid Journal  
College Mathematics Journal     Full-text available via subscription   (Followers: 3)
COMBINATORICA     Hybrid Journal  
Combustion Theory and Modelling     Hybrid Journal   (Followers: 14)
Commentarii Mathematici Helvetici     Hybrid Journal   (Followers: 1)
Communications in Combinatorics and Optimization     Open Access  
Communications in Contemporary Mathematics     Hybrid Journal  
Communications in Mathematical Physics     Hybrid Journal   (Followers: 2)
Communications On Pure & Applied Mathematics     Hybrid Journal   (Followers: 3)
Complex Analysis and its Synergies     Open Access   (Followers: 2)
Complex Variables and Elliptic Equations: An International Journal     Hybrid Journal  
Complexus     Full-text available via subscription  
Composite Materials Series     Full-text available via subscription   (Followers: 9)
Comptes Rendus Mathematique     Full-text available via subscription   (Followers: 1)
Computational and Applied Mathematics     Hybrid Journal   (Followers: 2)
Computational and Mathematical Methods in Medicine     Open Access   (Followers: 2)
Computational and Mathematical Organization Theory     Hybrid Journal   (Followers: 2)
Computational Complexity     Hybrid Journal   (Followers: 4)
Computational Mathematics and Modeling     Hybrid Journal   (Followers: 8)
Computational Mechanics     Hybrid Journal   (Followers: 4)
Computational Methods and Function Theory     Hybrid Journal  
Computational Optimization and Applications     Hybrid Journal   (Followers: 7)
Computers & Mathematics with Applications     Full-text available via subscription   (Followers: 7)
Concrete Operators     Open Access   (Followers: 4)
Confluentes Mathematici     Hybrid Journal  
Contributions to Game Theory and Management     Open Access  
COSMOS     Hybrid Journal  
Cryptography and Communications     Hybrid Journal   (Followers: 14)
Cuadernos de Investigación y Formación en Educación Matemática     Open Access  
Cubo. A Mathematical Journal     Open Access  
Current Research in Biostatistics     Open Access   (Followers: 10)
Czechoslovak Mathematical Journal     Hybrid Journal   (Followers: 1)
Demographic Research     Open Access   (Followers: 11)
Demonstratio Mathematica     Open Access  
Dependence Modeling     Open Access  
Design Journal : An International Journal for All Aspects of Design     Hybrid Journal   (Followers: 28)
Developments in Clay Science     Full-text available via subscription   (Followers: 1)
Developments in Mineral Processing     Full-text available via subscription   (Followers: 3)
Dhaka University Journal of Science     Open Access  
Differential Equations and Dynamical Systems     Hybrid Journal   (Followers: 3)
Differentsial'nye Uravneniya     Open Access  
Discrete Mathematics     Hybrid Journal   (Followers: 8)
Discrete Mathematics & Theoretical Computer Science     Open Access  
Discrete Mathematics, Algorithms and Applications     Hybrid Journal   (Followers: 2)
Discussiones Mathematicae - General Algebra and Applications     Open Access  
Discussiones Mathematicae Graph Theory     Open Access   (Followers: 1)
Diskretnaya Matematika     Full-text available via subscription  
Dnipropetrovsk University Mathematics Bulletin     Open Access  
Doklady Akademii Nauk     Open Access  
Doklady Mathematics     Hybrid Journal  
Duke Mathematical Journal     Full-text available via subscription   (Followers: 1)
Eco Matemático     Open Access  
Edited Series on Advances in Nonlinear Science and Complexity     Full-text available via subscription  
Electronic Journal of Differential Equations     Open Access  
Electronic Journal of Graph Theory and Applications     Open Access   (Followers: 2)
Electronic Notes in Discrete Mathematics     Full-text available via subscription   (Followers: 2)
Elemente der Mathematik     Full-text available via subscription   (Followers: 4)
Energy for Sustainable Development     Hybrid Journal   (Followers: 9)
Enseñanza de las Ciencias : Revista de Investigación y Experiencias Didácticas     Open Access  
Ensino da Matemática em Debate     Open Access  
Entropy     Open Access   (Followers: 5)
ESAIM: Control Optimisation and Calculus of Variations     Full-text available via subscription   (Followers: 1)
European Journal of Combinatorics     Full-text available via subscription   (Followers: 5)

        1 2 3 4 | Last

Journal Cover Algorithms
  [SJR: 0.357]   [H-I: 17]   [11 followers]  Follow
    
  This is an Open Access Journal Open Access journal
   ISSN (Print) 1999-4893
   Published by MDPI Homepage  [157 journals]
  • Algorithms, Vol. 11, Pages 2: Models for Multiple Attribute
           Decision-Making with Dual Generalized Single-Valued Neutrosophic
           Bonferroni Mean Operators

    • Authors: Jie Wang, Xiyue Tang, Guiwu Wei
      First page: 2
      Abstract: In this article, we expand the dual generalized weighted BM (DGWBM) and dual generalized weighted geometric Bonferroni mean (DGWGBM) operator with single valued neutrosophic numbers (SVNNs) to propose the dual generalized single-valued neutrosophic number WBM (DGSVNNWBM) operator and dual generalized single-valued neutrosophic numbers WGBM (DGSVNNWGBM) operator. Then, the multiple attribute decision making (MADM) methods are proposed with these operators. In the end, we utilize an applicable example for strategic suppliers selection to prove the proposed methods.
      Citation: Algorithms
      PubDate: 2018-01-05
      DOI: 10.3390/a11010002
      Issue No: Vol. 11, No. 1 (2018)
       
  • Algorithms, Vol. 11, Pages 1: Iteration Scheme for Solving the System of
           Coupled Integro-Differential Equations for Excited and Ionized States of
           Molecular Systems

    • Authors: Anton Kasprzhitskii, Georgy Lazorenko, Victor Yavna
      First page: 1
      Abstract: Investigation of the interaction of electromagnetic radiation with molecular systems provides most of the information on their structure and properties. Interpretation of experimental data is directly determined by the knowledge of the structure of energy levels and its change in the transition of these systems to an excited state. A key task of the methods for calculating the molecular orbitals of excited states is to accurately describe the emerging vacancies of the molecular core, leading to radial relaxation of the electron density. We propose an iterative scheme for solving a system of coupled integro-differential equations for obtaining molecular orbitals of electron configurations with excited/ionized deep and subvalent shells in a single-center representation. The numerical procedure of the iterative scheme is reduced to solving a boundary value problem based on a combination of the three-point difference scheme of Numerov and Thomas algorithm. To increase the rate of convergence of the computational procedure, an accurate account is taken of the behavior of the electron density near the nuclei of the molecular system. The realization of the algorithm of the computational scheme is considered on the example of a diatomic hydrogen fluoride molecule. The energy characteristics of the ground and ionized states of the molecule are estimated, and also the spatial distribution of the electron density is presented for the example of the σ-symmetry shell.
      Citation: Algorithms
      PubDate: 2017-12-22
      DOI: 10.3390/a11010001
      Issue No: Vol. 11, No. 1 (2017)
       
  • Algorithms, Vol. 10, Pages 109: Properties of Vector Embeddings in Social
           Networks

    • Authors: Fatemeh Salehi Rizi, Michael Granitzer, Konstantin Ziegler
      First page: 109
      Abstract: Embedding social network data into a low-dimensional vector space has shown promising performance for many real-world applications, such as node classification, node clustering, link prediction and network visualization. However, the information contained in these vector embeddings remains abstract and hard to interpret. Methods for inspecting embeddings usually rely on visualization methods, which do not work on a larger scale and do not give concrete interpretations of vector embeddings in terms of preserved network properties (e.g., centrality or betweenness measures). In this paper, we study and investigate network properties preserved by recent random walk-based embedding procedures like node2vec, DeepWalk or LINE. We propose a method that applies learning to rank in order to relate embeddings to network centralities. We evaluate our approach with extensive experiments on real-world and artificial social networks. Experiments show that each embedding method learns different network properties. In addition, we show that our graph embeddings in combination with neural networks provide a computationally efficient way to approximate the Closeness Centrality measure in social networks.
      Citation: Algorithms
      PubDate: 2017-09-27
      DOI: 10.3390/a10040109
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 110: DDC Control Techniques for Three-Phase
           BLDC Motor Position Control

    • Authors: Rana Masood, Dao Wang, Zain Ali, Babar Khan
      First page: 110
      Abstract: In this article, a novel hybrid control scheme is proposed for controlling the position of a three-phase brushless direct current (BLDC) motor. The hybrid controller consists of discrete time sliding mode control (SMC) with model free adaptive control (MFAC) to make a new data-driven control (DDC) strategy that is able to reduce the simulation time and complexity of a nonlinear system. The proposed hybrid algorithm is also suitable for controlling the speed variations of a BLDC motor, and is also applicable for the real time simulation of platforms such as a gimbal platform. The DDC method does not require any system model because it depends on data collected by the system about its Inputs/Outputs (IOS). However, the model-based control (MBC) method is difficult to apply from a practical point of view and is time-consuming because we need to linearize the system model. The above proposed method is verified by multiple simulations using MATLAB Simulink. It shows that the proposed controller has better performance, more precise tracking, and greater robustness compared with the classical proportional integral derivative (PID) controller, MFAC, and model free learning adaptive control (MFLAC).
      Citation: Algorithms
      PubDate: 2017-09-25
      DOI: 10.3390/a10040110
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 111: Game Theory-Inspired Evolutionary
           Algorithm for Global Optimization

    • Authors: Guanci Yang
      First page: 111
      Abstract: Many approaches that model specific intelligent behaviors perform excellently in solving complex optimization problems. Game theory is widely recognized as an important tool in many fields. This paper introduces a game theory-inspired evolutionary algorithm for global optimization (GameEA). A formulation to estimate payoff expectations is provided, which is a mechanism to make a player become a rational decision-maker. GameEA has one population (i.e., set of players) and generates new offspring only through an imitation operator and a belief-learning operator. An imitation operator adopts learning strategies and actions from other players to improve its competitiveness and applies these strategies to future games where one player updates its chromosome by strategically copying segments of gene sequences from a competitor. Belief learning refers to models in which a player adjusts his/her strategies, behavior or chromosomes by analyzing the current history information to improve solution quality. Experimental results on various classes of problems show that GameEA outperforms the other four algorithms on stability, robustness, and accuracy.
      Citation: Algorithms
      PubDate: 2017-09-30
      DOI: 10.3390/a10040111
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 112: Mapping Higher-Order Network Flows in
           Memory and Multilayer Networks with Infomap

    • Authors: Daniel Edler, Ludvig Bohlin, and Rosvall
      First page: 112
      Abstract: Comprehending complex systems by simplifying and highlighting important dynamical patterns requires modeling and mapping higher-order network flows. However, complex systems come in many forms and demand a range of representations, including memory and multilayer networks, which in turn call for versatile community-detection algorithms to reveal important modular regularities in the flows. Here we show that various forms of higher-order network flows can be represented in a unified way with networks that distinguish physical nodes for representing a complex system’s objects from state nodes for describing flows between the objects. Moreover, these so-called sparse memory networks allow the information-theoretic community detection method known as the map equation to identify overlapping and nested flow modules in data from a range of different higher-order interactions such as multistep, multi-source, and temporal data. We derive the map equation applied to sparse memory networks and describe its search algorithm Infomap, which can exploit the flexibility of sparse memory networks. Together they provide a general solution to reveal overlapping modular patterns in higher-order flows through complex systems.
      Citation: Algorithms
      PubDate: 2017-09-30
      DOI: 10.3390/a10040112
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 113: Scale Reduction Techniques for Computing
           Maximum Induced Bicliques

    • Authors: Shahram Shahinpour, Shirin Shirvani, Zeynep Ertem, Sergiy Butenko
      First page: 113
      Abstract: Given a simple, undirected graph G, a biclique is a subset of vertices inducing a complete bipartite subgraph in G. In this paper, we consider two associated optimization problems, the maximum biclique problem, which asks for a biclique of the maximum cardinality in the graph, and the maximum edge biclique problem, aiming to find a biclique with the maximum number of edges in the graph. These NP-hard problems find applications in biclustering-type tasks arising in complex network analysis. Real-life instances of these problems often involve massive, but sparse networks. We develop exact approaches for detecting optimal bicliques in large-scale graphs that combine effective scale reduction techniques with integer programming methodology. Results of computational experiments with numerous real-life network instances demonstrate the performance of the proposed approach.
      Citation: Algorithms
      PubDate: 2017-10-04
      DOI: 10.3390/a10040113
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 114: Variable Selection in Time Series
           Forecasting Using Random Forests

    • Authors: Hristos Tyralis, Georgia Papacharalampous
      First page: 114
      Abstract: Time series forecasting using machine learning algorithms has gained popularity recently. Random forest is a machine learning algorithm implemented in time series forecasting; however, most of its forecasting properties have remained unexplored. Here we focus on assessing the performance of random forests in one-step forecasting using two large datasets of short time series with the aim to suggest an optimal set of predictor variables. Furthermore, we compare its performance to benchmarking methods. The first dataset is composed by 16,000 simulated time series from a variety of Autoregressive Fractionally Integrated Moving Average (ARFIMA) models. The second dataset consists of 135 mean annual temperature time series. The highest predictive performance of RF is observed when using a low number of recent lagged predictor variables. This outcome could be useful in relevant future applications, with the prospect to achieve higher predictive accuracy.
      Citation: Algorithms
      PubDate: 2017-10-04
      DOI: 10.3390/a10040114
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 115: A Multi-Threading Algorithm to Detect and
           Remove Cycles in Vertex- and Arc-Weighted Digraph

    • Authors: Huanqing Cui, Jian Niu, Chuanai Zhou, Minglei Shu
      First page: 115
      Abstract: A graph is a very important structure to describe many applications in the real world. In many applications, such as dependency graphs and debt graphs, it is an important problem to find and remove cycles to make these graphs be cycle-free. The common algorithm often leads to an out-of-memory exception in commodity personal computer, and it cannot leverage the advantage of multicore computers. This paper introduces a new problem, cycle detection and removal with vertex priority. It proposes a multithreading iterative algorithm to solve this problem for large-scale graphs on personal computers. The algorithm includes three main steps: simplification to decrease the scale of graph, calculation of strongly connected components, and cycle detection and removal according to a pre-defined priority in parallel. This algorithm avoids the out-of-memory exception by simplification and iteration, and it leverages the advantage of multicore computers by multithreading parallelism. Five different versions of the proposed algorithm are compared by experiments, and the results show that the parallel iterative algorithm outperforms the others, and simplification can effectively improve the algorithm's performance.
      Citation: Algorithms
      PubDate: 2017-10-10
      DOI: 10.3390/a10040115
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 116: Remote Sensing Image Enhancement Based on
           Non-Local Means Filter in NSCT Domain

    • Authors: Liangliang Li, Yujuan Si, Zhenhong Jia
      First page: 116
      Abstract: In this paper, a novel remote sensing image enhancement technique based on a non-local means filter in a nonsubsampled contourlet transform (NSCT) domain is proposed. The overall flow of the approach can be divided into the following steps: Firstly, the image is decomposed into one low-frequency sub-band and several high-frequency sub-bands with NSCT. Secondly, contrast stretching is adopted to deal with the low-frequency sub-band coefficients, and the non-local means filter is applied to suppress the noise contained in the first high-frequency sub-band coefficients. Thirdly, the processed coefficients are reconstructed with the inverse NSCT transform. Finally, the unsharp filter is used to enhance the details of the image. The simulation results show that the proposed algorithm has better performance in remote sensing image enhancement than the existing approaches.
      Citation: Algorithms
      PubDate: 2017-10-11
      DOI: 10.3390/a10040116
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 117: Fabric Weave Pattern and Yarn Color
           Recognition and Classification Using a Deep ELM Network

    • Authors: Babar Khan, Zhijie Wang, Fang Han, Ather Iqbal, Rana Masood
      First page: 117
      Abstract: Usually, a fabric weave pattern is recognized using methods which identify the warp floats and weft floats. Although these methods perform well for uniform or repetitive weave patterns, in the case of complex weave patterns, these methods become computationally complex and the classification error rates are comparatively higher. Furthermore, the fault-tolerance (invariance) and stability (selectivity) of the existing methods are still to be enhanced. We present a novel biologically-inspired method to invariantly recognize the fabric weave pattern (fabric texture) and yarn color from the color image input. We proposed a model in which the fabric weave pattern descriptor is based on the HMAX model for computer vision inspired by the hierarchy in the visual cortex, the color descriptor is based on the opponent color channel inspired by the classical opponent color theory of human vision, and the classification stage is composed of a multi-layer (deep) extreme learning machine. Since the weave pattern descriptor, yarn color descriptor, and the classification stage are all biologically inspired, we propose a method which is completely biologically plausible. The classification performance of the proposed algorithm indicates that the biologically-inspired computer-aided-vision models might provide accurate, fast, reliable and cost-effective solution to industrial automation.
      Citation: Algorithms
      PubDate: 2017-10-13
      DOI: 10.3390/a10040117
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 118: Iterative Parameter Estimation Algorithms
           for Dual-Frequency Signal Models

    • Authors: Siyu Liu, Ling Xu, Feng Ding
      First page: 118
      Abstract: This paper focuses on the iterative parameter estimation algorithms for dual-frequency signal models that are disturbed by stochastic noise. The key of the work is to overcome the difficulty that the signal model is a highly nonlinear function with respect to frequencies. A gradient-based iterative (GI) algorithm is presented based on the gradient search. In order to improve the estimation accuracy of the GI algorithm, a Newton iterative algorithm and a moving data window gradient-based iterative algorithm are proposed based on the moving data window technique. Comparative simulation results are provided to illustrate the effectiveness of the proposed approaches for estimating the parameters of signal models.
      Citation: Algorithms
      PubDate: 2017-10-14
      DOI: 10.3390/a10040118
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 119: An Optimization Algorithm Inspired by the
           Phase Transition Phenomenon for Global Optimization Problems with
           Continuous Variables

    • Authors: Zijian Cao, Lei Wang
      First page: 119
      Abstract: In this paper, we propose a novel nature-inspired meta-heuristic algorithm for continuous global optimization, named the phase transition-based optimization algorithm (PTBO). It mimics three completely different kinds of motion characteristics of elements in three different phases, which are the unstable phase, the meta-stable phase, and the stable phase. Three corresponding operators, which are the stochastic operator of the unstable phase, the shrinkage operator in the meta-stable phase, and the vibration operator of the stable phase, are designed in the proposed algorithm. In PTBO, the three different phases of elements dynamically execute different search tasks according to their phase in each generation. It makes it such that PTBO not only has a wide range of exploration capabilities, but also has the ability to quickly exploit them. Numerical experiments are carried out on twenty-eight functions of the CEC 2013 benchmark suite. The simulation results demonstrate its better performance compared with that of other state-of-the-art optimization algorithms.
      Citation: Algorithms
      PubDate: 2017-10-20
      DOI: 10.3390/a10040119
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 120: A Comparative Study on Recently-Introduced
           Nature-Based Global Optimization Methods in Complex Mechanical System
           Design

    • Authors: Abdulbaset Saad, Zuomin Dong, Meysam Karimi
      First page: 120
      Abstract: Advanced global optimization algorithms have been continuously introduced and improved to solve various complex design optimization problems for which the objective and constraint functions can only be evaluated through computation intensive numerical analyses or simulations with a large number of design variables. The often implicit, multimodal, and ill-shaped objective and constraint functions in high-dimensional and “black-box” forms demand the search to be carried out using low number of function evaluations with high search efficiency and good robustness. This work investigates the performance of six recently introduced, nature-inspired global optimization methods: Artificial Bee Colony (ABC), Firefly Algorithm (FFA), Cuckoo Search (CS), Bat Algorithm (BA), Flower Pollination Algorithm (FPA) and Grey Wolf Optimizer (GWO). These approaches are compared in terms of search efficiency and robustness in solving a set of representative benchmark problems in smooth-unimodal, non-smooth unimodal, smooth multimodal, and non-smooth multimodal function forms. In addition, four classic engineering optimization examples and a real-life complex mechanical system design optimization problem, floating offshore wind turbines design optimization, are used as additional test cases representing computationally-expensive black-box global optimization problems. Results from this comparative study show that the ability of these global optimization methods to obtain a good solution diminishes as the dimension of the problem, or number of design variables increases. Although none of these methods is universally capable, the study finds that GWO and ABC are more efficient on average than the other four in obtaining high quality solutions efficiently and consistently, solving 86% and 80% of the tested benchmark problems, respectively. The research contributes to future improvements of global optimization methods.
      Citation: Algorithms
      PubDate: 2017-10-17
      DOI: 10.3390/a10040120
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 121: Evolutionary Hybrid Particle Swarm
           Optimization Algorithm for Solving NP-Hard No-Wait Flow Shop Scheduling
           Problems

    • Authors: Laxmi Bewoor, V. Chandra Prakash, Sagar Sapkal
      First page: 121
      Abstract: The no-wait flow shop is a flowshop in which the scheduling of jobs is continuous and simultaneous through all machines without waiting for any consecutive machines. The scheduling of a no-wait flow shop requires finding an appropriate sequence of jobs for scheduling, which in turn reduces total processing time. The classical brute force method for finding the probabilities of scheduling for improving the utilization of resources may become trapped in local optima, and this problem can hence be observed as a typical NP-hard combinatorial optimization problem that requires finding a near optimal solution with heuristic and metaheuristic techniques. This paper proposes an effective hybrid Particle Swarm Optimization (PSO) metaheuristic algorithm for solving no-wait flow shop scheduling problems with the objective of minimizing the total flow time of jobs. This Proposed Hybrid Particle Swarm Optimization (PHPSO) algorithm presents a solution by the random key representation rule for converting the continuous position information values of particles to a discrete job permutation. The proposed algorithm initializes population efficiently with the Nawaz-Enscore-Ham (NEH) heuristic technique and uses an evolutionary search guided by the mechanism of PSO, as well as simulated annealing based on a local neighborhood search to avoid getting stuck in local optima and to provide the appropriate balance of global exploration and local exploitation. Extensive computational experiments are carried out based on Taillard’s benchmark suite. Computational results and comparisons with existing metaheuristics show that the PHPSO algorithm outperforms the existing methods in terms of quality search and robustness for the problem considered. The improvement in solution quality is confirmed by statistical tests of significance.
      Citation: Algorithms
      PubDate: 2017-10-28
      DOI: 10.3390/a10040121
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 122: Scheduling Non-Preemptible Jobs to
           Minimize Peak Demand

    • Authors: Sean Yaw, Brendan Mumey
      First page: 122
      Abstract: This paper examines an important problem in smart grid energy scheduling; peaks in power demand are proportionally more expensive to generate and provision for. The issue is exacerbated in local microgrids that do not benefit from the aggregate smoothing experienced by large grids. Demand-side scheduling can reduce these peaks by taking advantage of the fact that there is often flexibility in job start times. We focus attention on the case where the jobs are non-preemptible, meaning once started, they run to completion. The associated optimization problem is called the peak demand minimization problem, and has been previously shown to be NP-hard. Our results include an optimal fixed-parameter tractable algorithm, a polynomial-time approximation algorithm, as well as an effective heuristic that can also be used in an online setting of the problem. Simulation results show that these methods can reduce peak demand by up to 50% versus on-demand scheduling for household power jobs.
      Citation: Algorithms
      PubDate: 2017-10-28
      DOI: 10.3390/a10040122
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 123: A Selection Process for Genetic Algorithm
           Using Clustering Analysis

    • Authors: Adam Chehouri, Rafic Younes, Jihan Khoder, Jean Perron, Adrian Ilinca
      First page: 123
      Abstract: This article presents a newly proposed selection process for genetic algorithms on a class of unconstrained optimization problems. The k-means genetic algorithm selection process (KGA) is composed of four essential stages: clustering, membership phase, fitness scaling and selection. Inspired from the hypothesis that clustering the population helps to preserve a selection pressure throughout the evolution of the population, a membership probability index is assigned to each individual following the clustering phase. Fitness scaling converts the membership scores in a range suitable for the selection function which selects the parents of the next generation. Two versions of the KGA process are presented: using a fixed number of clusters K (KGAf) and via an optimal partitioning Kopt (KGAo) determined by two different internal validity indices. The performance of each method is tested on seven benchmark problems.
      Citation: Algorithms
      PubDate: 2017-11-02
      DOI: 10.3390/a10040123
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 124: Improvement of ID3 Algorithm Based on
           Simplified Information Entropy and Coordination Degree

    • Authors: Yingying Wang, Yibin Li, Yong Song, Xuewen Rong, Shuaishuai Zhang
      First page: 124
      Abstract: The decision tree algorithm is a core technology in data classification mining, and ID3 (Iterative Dichotomiser 3) algorithm is a famous one, which has achieved good results in the field of classification mining. Nevertheless, there exist some disadvantages of ID3 such as attributes biasing multi-values, high complexity, large scales, etc. In this paper, an improved ID3 algorithm is proposed that combines the simplified information entropy based on different weights with coordination degree in rough set theory. The traditional ID3 algorithm and the proposed one are fairly compared by using three common data samples as well as the decision tree classifiers. It is shown that the proposed algorithm has a better performance in the running time and tree structure, but not in accuracy than the ID3 algorithm, for the first two sample sets, which are small. For the third sample set that is large, the proposed algorithm improves the ID3 algorithm for all of the running time, tree structure and accuracy. The experimental results show that the proposed algorithm is effective and viable.
      Citation: Algorithms
      PubDate: 2017-11-06
      DOI: 10.3390/a10040124
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 125: Simulation Optimization of Search and
           Rescue in Disaster Relief Based on Distributed Auction Mechanism

    • Authors: Jian Tang, Kejun Zhu, Haixiang Guo, Can Liao, Shuwen Zhang
      First page: 125
      Abstract: In this paper, we optimize the search and rescue (SAR) in disaster relief through agent-based simulation. We simulate rescue teams’ search behaviors with the improved Truncated Lévy walks. Then we propose a cooperative rescue plan based on a distributed auction mechanism, and illustrate it with the case of landslide disaster relief. The simulation is conducted in three scenarios, including “fatal”, “serious” and “normal”. Compared with the non-cooperative rescue plan, the proposed rescue plan in this paper would increase victims’ relative survival probability by 7–15%, increase the ratio of survivors getting rescued by 5.3–12.9%, and decrease the average elapsed time for one site getting rescued by 16.6–21.6%. The robustness analysis shows that search radius can affect the rescue efficiency significantly, while the scope of cooperation cannot. The sensitivity analysis shows that the two parameters, the time limit for completing rescue operations in one buried site and the maximum turning angle for next step, both have a great influence on rescue efficiency, and there exists optimal value for both of them in view of rescue efficiency.
      Citation: Algorithms
      PubDate: 2017-11-15
      DOI: 10.3390/a10040125
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 126: Linked Data for Life Sciences

    • Authors: Amrapali Zaveri, Gökhan Ertaylan
      First page: 126
      Abstract: Massive amounts of data are currently available and being produced at an unprecedented rate in all domains of life sciences worldwide. However, this data is disparately stored and is in different and unstructured formats making it very hard to integrate. In this review, we examine the state of the art and propose the use of the Linked Data (LD) paradigm, which is a set of best practices for publishing and connecting structured data on the Web in a semantically meaningful format. We argue that utilizing LD in the life sciences will make data sets better Findable, Accessible, Interoperable, and Reusable. We identify three tiers of the research cycle in life sciences, namely (i) systematic review of the existing body of knowledge, (ii) meta-analysis of data, and (iii) knowledge discovery of novel links across different evidence streams to primarily utilize the proposed LD paradigm. Finally, we demonstrate the use of LD in three use case scenarios along the same research question and discuss the future of data/knowledge integration in life sciences and the challenges ahead.
      Citation: Algorithms
      PubDate: 2017-11-16
      DOI: 10.3390/a10040126
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 127: A Real-Time Chinese Traffic Sign Detection
           Algorithm Based on Modified YOLOv2

    • Authors: Jianming Zhang, Manting Huang, Xiaokang Jin, Xudong Li
      First page: 127
      Abstract: Traffic sign detection is an important task in traffic sign recognition systems. Chinese traffic signs have their unique features compared with traffic signs of other countries. Convolutional neural networks (CNNs) have achieved a breakthrough in computer vision tasks and made great success in traffic sign classification. In this paper, we present a Chinese traffic sign detection algorithm based on a deep convolutional network. To achieve real-time Chinese traffic sign detection, we propose an end-to-end convolutional network inspired by YOLOv2. In view of the characteristics of traffic signs, we take the multiple 1 × 1 convolutional layers in intermediate layers of the network and decrease the convolutional layers in top layers to reduce the computational complexity. For effectively detecting small traffic signs, we divide the input images into dense grids to obtain finer feature maps. Moreover, we expand the Chinese traffic sign dataset (CTSD) and improve the marker information, which is available online. All experimental results evaluated according to our expanded CTSD and German Traffic Sign Detection Benchmark (GTSDB) indicate that the proposed method is the faster and more robust. The fastest detection speed achieved was 0.017 s per image.
      Citation: Algorithms
      PubDate: 2017-11-16
      DOI: 10.3390/a10040127
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 128: Truss Structure Optimization with Subset
           Simulation and Augmented Lagrangian Multiplier Method

    • Authors: Feng Du, Qiao-Yue Dong, Hong-Shuang Li
      First page: 128
      Abstract: This paper presents a global optimization method for structural design optimization, which integrates subset simulation optimization (SSO) and the dynamic augmented Lagrangian multiplier method (DALMM). The proposed method formulates the structural design optimization as a series of unconstrained optimization sub-problems using DALMM and makes use of SSO to find the global optimum. The combined strategy guarantees that the proposed method can automatically detect active constraints and provide global optimal solutions with finite penalty parameters. The accuracy and robustness of the proposed method are demonstrated by four classical truss sizing problems. The results are compared with those reported in the literature, and show a remarkable statistical performance based on 30 independent runs.
      Citation: Algorithms
      PubDate: 2017-11-21
      DOI: 10.3390/a10040128
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 129: Comparative Analysis of Classifiers for
           Classification of Emergency Braking of Road Motor Vehicles

    • Authors: Albert Podusenko, Vsevolod Nikulin, Ivan Tanev, Katsunori Shimohara
      First page: 129
      Abstract: We investigate the feasibility of classifying (inferring) the emergency braking situations in road vehicles from the motion pattern of the accelerator pedal. We trained and compared several classifiers and employed genetic algorithms to tune their associated hyperparameters. Using offline time series data of the dynamics of the accelerator pedal as the test set, the experimental results suggest that the evolved classifiers detect the emergency braking situation with at least 93% accuracy. The best performing classifier could be integrated into the agent that perceives the dynamics of the accelerator pedal in real time and—if emergency braking is detected—acts by applying full brakes well before the driver would have been able to apply them.
      Citation: Algorithms
      PubDate: 2017-11-22
      DOI: 10.3390/a10040129
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 130: 2-Phase NSGA II: An Optimized Reward and
           Risk Measurements Algorithm in Portfolio Optimization

    • Authors: Seyedeh Eftekharian, Mohammad Shojafar, Shahaboddin Shamshirband
      First page: 130
      Abstract: Portfolio optimization is a serious challenge for financial engineering and has pulled down special attention among investors. It has two objectives: to maximize the reward that is calculated by expected return and to minimize the risk. Variance has been considered as a risk measure. There are many constraints in the world that ultimately lead to a non–convex search space such as cardinality constraint. In conclusion, parametric quadratic programming could not be applied and it seems essential to apply multi-objective evolutionary algorithm (MOEA). In this paper, a new efficient multi-objective portfolio optimization algorithm called 2-phase NSGA II algorithm is developed and the results of this algorithm are compared with the NSGA II algorithm. It was found that 2-phase NSGA II significantly outperformed NSGA II algorithm.
      Citation: Algorithms
      PubDate: 2017-11-28
      DOI: 10.3390/a10040130
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 131: An Indoor Collaborative
           Coefficient-Triangle APIT Localization Algorithm

    • Authors: Su-Ting Chen, Chuang Zhang, Peng Li, Yan-Yan Zhang, Liang-Bao Jiao
      First page: 131
      Abstract: The Approximate Point-In-Triangulation (APIT) localization algorithm is a widely used indoor positioning technology due to its simplicity and low power consumption. However, in practice, In-to-Out misjudgments exist regularly in APIT, and a considerable amount of nodes cannot be positioned due to the low node density. To tackle this issue, a Collaborative Coefficient-triangle APIT Localization (CCAL) algorithm is proposed. Firstly, an effective triangle criterion is put forward to reduce the probability of In-to-Out misjudgment and reduce the computational complexity. Then, a further Received Signal Strength Indicator (RSSI) location and weighted triangle coordinate calculation method is adopted to reduce the positioning error. Meanwhile, the idea of iterative collaborative positioning of the positioned unknown nodes is introduced to remarkably expand the localization coverage rate. Simulation results show that the proposed algorithm outperforms APIT, RSSI, and other improved algorithms in terms of both node location error and localization coverage rate.
      Citation: Algorithms
      PubDate: 2017-11-28
      DOI: 10.3390/a10040131
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 132: Hyperspectral Data: Efficient and Secure
           Transmission

    • Authors: Raffaele Pizzolante, Bruno Carpentieri
      First page: 132
      Abstract: Airborne and spaceborne hyperspectral sensors collect information which is derived from the electromagnetic spectrum of an observed area. Hyperspectral data are used in several studies and they are an important aid in different real-life applications (e.g., mining and geology applications, ecology, surveillance, etc.). A hyperspectral image has a three-dimensional structure (a sort of datacube): it can be considered as a sequence of narrow and contiguous spectral channels (bands). The objective of this paper is to present a framework permits the efficient storage/transmission of an input hyperspectral image, and its protection. The proposed framework relies on a reversible invisible watermarking scheme and an efficient lossless compression algorithm. The reversible watermarking scheme is used in conjunction with digital signature techniques in order to permit the verification of the integrity of a hyperspectral image by the receiver.
      Citation: Algorithms
      PubDate: 2017-11-30
      DOI: 10.3390/a10040132
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 133: Neutrosophic Linear Equations and
           Application in Traffic Flow Problems

    • Authors: Jun Ye
      First page: 133
      Abstract: A neutrosophic number (NN) presented by Smarandache can express determinate and/or indeterminate information in real life. NN (z = a + uI) consists of the determinate part a and the indeterminate part uI for a, u ∈ R (R is all real numbers) and indeterminacy I, and is very suitable for representing and handling problems with both determinate and indeterminate information. Based on the concept of NNs, this paper presents for first time the concepts of neutrosophic linear equations and the neutrosophic matrix, and introduces the neutrosophic matrix operations. Then, we propose some solving methods, including the substitution method, the addition method, and the inverse matrix method, for the system of neutrosophic linear equations or the neutrosophic matrix equation. Finally, an applied example about a traffic flow problem is provided to illustrate the application and effectiveness of handling the indeterminate traffic flow problem by using the system of neutrosophic linear equations.
      Citation: Algorithms
      PubDate: 2017-12-01
      DOI: 10.3390/a10040133
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 134: Improved Integral Inequalities for
           Stability Analysis of Interval Time-Delay Systems

    • Authors: Shuai Zhang, Xiao Qi
      First page: 134
      Abstract: A novel stability analysis for the interval time-delay systems is proposed by employing a new series of integral inequalities for single and double integrals. Different from the recently introduced Wirtinger-based inequalities, refined Jensen inequalities and auxiliary function-based inequalities, the proposed ones can provide more accurate bounds for the cross terms in derivatives of the Lyapunov–Krasovskii functional (LKF) without involving additional slack variables. Based on the augmented LKF with triple-integral terms, their applications to stability analysis for interval time-delay systems are provided. By virtue of the newly derived inequalities, the resulting criteria are less conservative than some existing literature. Finally, numerical examples are provided to verify the effectiveness and improvement of the proposed approaches.
      Citation: Algorithms
      PubDate: 2017-12-03
      DOI: 10.3390/a10040134
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 135: Algebraic Dynamic Programming on Trees

    • Authors: Sarah Berkemer, Christian Höner zu Siederdissen, Peter Stadler
      First page: 135
      Abstract: Where string grammars describe how to generate and parse strings, tree grammars describe how to generate and parse trees. We show how to extend generalized algebraic dynamic programming to tree grammars. The resulting dynamic programming algorithms are efficient and provide the complete feature set available to string grammars, including automatic generation of outside parsers and algebra products for efficient backtracking. The complete parsing infrastructure is available as an embedded domain-specific language in Haskell. In addition to the formal framework, we provide implementations for both tree alignment and tree editing. Both algorithms are in active use in, among others, the area of bioinformatics, where optimization problems on trees are of considerable practical importance. This framework and the accompanying algorithms provide a beneficial starting point for developing complex grammars with tree- and forest-based inputs.
      Citation: Algorithms
      PubDate: 2017-12-06
      DOI: 10.3390/a10040135
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 136: Detecting Composite Functional Module in
           miRNA Regulation and mRNA Interaction Network

    • Authors: Yi Yang, Chu Pan
      First page: 136
      Abstract: The detection of composite miRNA functional module (CMFM) is of tremendous significance and helps in understanding the organization, regulation and execution of cell processes in cancer, but how to identify functional CMFMs is still a computational challenge. In this paper we propose a novel module detection method called MBCFM (detecting Composite Function Modules based on Maximal Biclique enumeration), specifically designed to bicluster miRNAs and target messenger RNAs (mRNAs) on the basis of multiple biological interaction information and topical network features. In this method, we employ algorithm MICA to enumerate all maximal bicliques and further extract R-pairs from the miRNA-mRNA regulatory network. Compared with two existing methods, Mirsynergy and SNMNMF on ovarian cancer dataset, the proposed method of MBCFM is not only able to extract cohesiveness-preserved CMFMs but also has high efficiency in running time. More importantly, MBCFM can be applied to detect other cancer-associated miRNA functional modules.
      Citation: Algorithms
      PubDate: 2017-12-05
      DOI: 10.3390/a10040136
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 137: Weakly Coupled Distributed Calculation of
           Lyapunov Exponents for Non-Linear Dynamical Systems

    • Authors: Jorge Hernández-Gómez, Carlos Couder-Castañeda, Israel Herrera-Díaz, Norberto Flores-Guzmán, Enrique Gómez-Cruz
      First page: 137
      Abstract: Numerical estimation of Lyapunov exponents in non-linear dynamical systems results in a very high computational cost. This is due to the large-scale computational cost of several Runge–Kutta problems that need to be calculated. In this work we introduce a parallel implementation based on MPI (Message Passing Interface) for the calculation of the Lyapunov exponents for a multidimensional dynamical system, considering a weakly coupled algorithm. Since we work on an academic high-latency cluster interconnected with a gigabit switch, the design has to be oriented to reduce the number of messages required. With the design introduced in this work, the computing time is drastically reduced, and the obtained performance leads to close to optimal speed-up ratios. The implemented parallelisation allows us to carry out many experiments for the calculation of several Lyapunov exponents with a low-cost cluster. The numerical experiments showed a high scalability, which we showed with up to 68 cores.
      Citation: Algorithms
      PubDate: 2017-12-07
      DOI: 10.3390/a10040137
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 138: A Hierarchical Multi-Label Classification
           Algorithm for Gene Function Prediction

    • Authors: Shou Feng, Ping Fu, Wenbin Zheng
      First page: 138
      Abstract: Gene function prediction is a complicated and challenging hierarchical multi-label classification (HMC) task, in which genes may have many functions at the same time and these functions are organized in a hierarchy. This paper proposed a novel HMC algorithm for solving this problem based on the Gene Ontology (GO), the hierarchy of which is a directed acyclic graph (DAG) and is more difficult to tackle. In the proposed algorithm, the HMC task is firstly changed into a set of binary classification tasks. Then, two measures are implemented in the algorithm to enhance the HMC performance by considering the hierarchy structure during the learning procedures. Firstly, negative instances selecting policy associated with the SMOTE approach are proposed to alleviate the imbalanced data set problem. Secondly, a nodes interaction method is introduced to combine the results of binary classifiers. It can guarantee that the predictions are consistent with the hierarchy constraint. The experiments on eight benchmark yeast data sets annotated by the Gene Ontology show the promising performance of the proposed algorithm compared with other state-of-the-art algorithms.
      Citation: Algorithms
      PubDate: 2017-12-08
      DOI: 10.3390/a10040138
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 139: An EMD–SARIMA-Based Modeling Approach
           for Air Traffic Forecasting

    • Authors: Wei Nai, Lu Liu, Shaoyin Wang, Decun Dong
      First page: 139
      Abstract: The ever-increasing air traffic demand in China has brought huge pressure on the planning and management of, and investment in, air terminals as well as airline companies. In this context, accurate and adequate short-term air traffic forecasting is essential for the operations of those entities. In consideration of such a problem, a hybrid air traffic forecasting model based on empirical mode decomposition (EMD) and seasonal auto regressive integrated moving average (SARIMA) has been proposed in this paper. The model proposed decomposes the original time series into components at first, and models each component with the SARIMA forecasting model, then integrates all the models together to form the final combined forecast result. By using the monthly air cargo and passenger flow data from the years 2006 to 2014 available at the official website of the Civil Aviation Administration of China (CAAC), the effectiveness in forecasting of the model proposed has been demonstrated, and by a horizontal performance comparison between several other widely used forecasting models, the advantage of the proposed model has also been proved.
      Citation: Algorithms
      PubDate: 2017-12-14
      DOI: 10.3390/a10040139
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 140: Control-Oriented Models for SO Fuel Cells
           from the Angle of V&V: Analysis, Simplification Possibilities,
           Performance

    • Authors: Ekaterina Auer, Luise Senkel, Stefan Kiel, Andreas Rauh
      First page: 140
      Abstract: In this paper, we take a look at the analysis and parameter identification for control-oriented, dynamic models for the thermal subsystem of solid oxide fuel cells (SOFC) from the systematized point of view of verification and validation (V&V). First, we give a possible classification of models according to their verification degree which depends, for example, on the kind of arithmetic used for both formulation and simulation. Typical SOFC models, consisting of several coupled differential equations for gas preheaters and the temperature distribution in the stack module, do not have analytical solutions because of spatial nonlinearity. Therefore, in the next part of the paper, we describe in detail two possible ways to simplify such models so that the underlying differential equations can be solved analytically while still being sufficiently accurate to serve as the basis for control synthesis. The simplifying assumption is to approximate the heat capacities of the gases by zero-order polynomials (or first-oder polynomials, respectively) in the temperature. In the last, application-oriented part of the paper, we identify the parameters of these models as well as compare their performance and their ability to reflect the reality with the corresponding characteristics of models in which the heat capacities are represented by quadratic polynomials (the usual case). For this purpose, the framework UniVerMeC (Unified Framework for Verified GeoMetric Computations) is used, which allows us to employ different kinds of arithmetics including the interval one. This latter possibility ensures a high level of reliability of simulations and of the subsequent validation. Besides, it helps to take into account bounded uncertainty in measurements.
      Citation: Algorithms
      PubDate: 2017-12-18
      DOI: 10.3390/a10040140
      Issue No: Vol. 10, No. 4 (2017)
       
  • Algorithms, Vol. 10, Pages 72: Hierarchical Gradient Similarity Based
           Video Quality Assessment Metric

    • Authors: Jie Yang, Jian Xiong, Guan Gui, Rongfang Song, Wang Luo, Xianzhong Long
      First page: 72
      Abstract: Video quality assessment (VQA) plays an important role in video applications for quality evaluation and resource allocation. It aims to evaluate video quality in a way that is consistent with human perception. In this letter, a hierarchical gradient similarity based VQA metric is proposed inspired by the structure of the primate visual cortex, in which visual information is processed through sequential visual areas. These areas are modeled with the corresponding measures to evaluate the overall perceptual quality. Experimental results on the LIVE database show that the proposed VQA metric significantly outperforms most of the state-of-the-art VQA metrics.
      PubDate: 2017-06-23
      DOI: 10.3390/a10030072
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 73: Variable Selection Using Adaptive Band
           Clustering and Physarum Network

    • Authors: Huanyu Chen, Tong Chen, Zhihao Zhang, Guangyuan Liu
      First page: 73
      Abstract: Variable selection is a key step for eliminating redundant information in spectroscopy. Among various variable selection methods, the physarum network (PN) is a newly-introduced and efficient one. However, the whole spectrum has to be equally divided into sub-spectral bands in PN. These division criteria limit the selecting ability and prediction performance. In this paper, we transform the spectrum division problem into a clustering problem and solve the problem by using an affinity propagation (AP) algorithm, an adaptive clustering method, to find the optimized number of sub-spectral bands and the number of wavelengths in each sub-spectral band. Experimental results show that combining AP and PN together can achieve similar prediction accuracy with much less wavelength than what PN alone can achieve.
      PubDate: 2017-06-27
      DOI: 10.3390/a10030073
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 74: The Isomorphic Version of Brualdi’s and
           Sanderson’s Nestedness

    • Authors: Annabell Berger, Berit Schreck
      First page: 74
      Abstract: The discrepancy BR for an m × n 0, 1-matrix from Brualdi and Sanderson in 1998 is defined as the minimum number of 1 s that need to be shifted in each row to the left to achieve its Ferrers matrix, i.e., each row consists of consecutive 1 s followed by consecutive 0 s. For ecological bipartite networks, BR describes a nested set of relationships. Since two different labelled networks can be isomorphic, but possess different discrepancies due to different adjacency matrices, we define a metric determining the minimum discrepancy in an isomorphic class. We give a reduction to k ≤ n minimum weighted perfect matching problems. We show on 289 ecological matrices (given as a benchmark by Atmar and Patterson in 1995) that classical discrepancy can underestimate the nestedness by up to 30%.
      PubDate: 2017-06-27
      DOI: 10.3390/a10030074
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 75: Thresholds of the Inner Steps in Multi-Step
           Newton Method

    • Authors: Stefan Maruster
      First page: 75
      Abstract: We investigate the efficiency of multi-step Newton method (the classical Newton method in which the first derivative is re-evaluated periodically after m steps) for solving nonlinear equations, F ( x ) = 0 , F : D ⊆ R n → R n . We highlight the following property of multi-step Newton method with respect to some other Newton-type method: for a given n, there exist thresholds of m, that is an interval ( m i , m s ) , such that for m inside of this interval, the efficiency index of multi-step Newton method is better than that of other Newton-type method. We also search for optimal values of m.
      PubDate: 2017-06-27
      DOI: 10.3390/a10030075
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 76: A Genetic Algorithm Using Triplet
           Nucleotide Encoding and DNA Reproduction Operations for Unconstrained
           Optimization Problems

    • Authors: Wenke Zang, Weining Zhang, Wenqian Zhang, Xiyu Liu
      First page: 76
      Abstract: As one of the evolutionary heuristics methods, genetic algorithms (GAs) have shown a promising ability to solve complex optimization problems. However, existing GAs still have difficulties in finding the global optimum and avoiding premature convergence. To further improve the search efficiency and convergence rate of evolution algorithms, inspired by the mechanism of biological DNA genetic information and evolution, we present a new genetic algorithm, called GA-TNE+DRO, which uses a novel triplet nucleotide coding scheme to encode potential solutions and a set of new genetic operators to search for globally optimal solutions. The coding scheme represents potential solutions as a sequence of triplet nucleotides and the DNA reproduction operations mimic the DNA reproduction process more vividly than existing DNA-GAs. We compared our algorithm with several existing GA and DNA-based GA algorithms using a benchmark of eight unconstrained optimization functions. Our experimental results show that the proposed algorithm can converge to solutions much closer to the global optimal solutions in a much lower number of iterations than the existing algorithms. A complexity analysis also shows that our algorithm is computationally more efficient than the existing algorithms.
      PubDate: 2017-06-30
      DOI: 10.3390/a10030076
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 77: New Methodology to Approximate
           

    • Authors: Emanuel Ontiveros-Robles, Patricia Melin, Oscar Castillo
      First page: 77
      Abstract: Interval Type-2 fuzzy systems allow the possibility of considering uncertainty in models based on fuzzy systems, and enable an increase of robustness in solutions to applications, but also increase the complexity of the fuzzy system design. Several attempts have been previously proposed to reduce the computational cost of the type-reduction stage, as this process requires a lot of computing time because it is basically a numerical approximation based on sampling, and the computational cost is proportional to the number of samples, but also the error is inversely proportional to the number of samples. Several works have focused on reducing the computational cost of type-reduction by developing strategies to reduce the number of operations. The first type-reduction method was proposed by Karnik and Mendel (KM), and then was followed by its enhanced version called EKM. Then continuous versions were called CKM and CEKM, and there were variations of this and also other types of variations that eliminate the type-reduction process reducing the computational cost to a Type-1 defuzzification, such as the Nie-Tan versions and similar enhancements. In this work we analyzed and proposed a variant of CEKM by viewing this process as solving a root-finding problem, in this way taking advantage of existing numerical methods to solve the type-reduction problem, the main objective being eliminating the type-reduction process and also providing a continuous solution of the defuzzification.
      Citation: Algorithms
      PubDate: 2017-07-05
      DOI: 10.3390/a10030077
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 78: An Efficient Algorithm for the Separable
           Nonlinear Least Squares Problem

    • Authors: Yunqiu Shen, Tjalling Ypma
      First page: 78
      Abstract: The nonlinear least squares problem m i n y , z ∥ A ( y ) z + b ( y ) ∥ , where A ( y ) is a full-rank ( N + ℓ ) × N matrix, y ∈ R n , z ∈ R N and b ( y ) ∈ R N + ℓ with ℓ ≥ n , can be solved by first solving a reduced problem m i n y ∥ f ( y ) ∥ to find the optimal value y * of y, and then solving the resulting linear least squares problem m i n z ∥ A ( y * ) z + b ( y * ) ∥ to find the optimal value z * of z. We have previously justified the use of the reduced function f ( y ) = C T ( y ) b ( y ) , where C ( y ) is a matrix whose columns form an orthonormal basis for the nullspace of A T ( y ) , and presented a quadratically convergent Gauss–Newton type method for solving m i n y ∥ C T ( y ) b ( y ) ∥ based on the use of QR factorization. In this note, we show how LU factorization can replace the QR factorization in those computations, halving the associated computational cost while also providing opportunities to exploit sparsity and thus further enhance computational efficiency.
      Citation: Algorithms
      PubDate: 2017-07-10
      DOI: 10.3390/a10030078
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 79: Design of an Optimized Fuzzy Classifier for
           the Diagnosis of Blood Pressure with a New Computational Method for Expert
           Rule Optimization

    • Authors: Juan Carlos Guzman, Patricia Melin, German Prado-Arechiga
      First page: 79
      Abstract: A neuro fuzzy hybrid model (NFHM) is proposed as a new artificial intelligence method to classify blood pressure (BP). The NFHM uses techniques such as neural networks, fuzzy logic and evolutionary computation, and in the last case genetic algorithms (GAs) are used. The main goal is to model the behavior of blood pressure based on monitoring data of 24 h per patient and based on this to obtain the trend, which is classified using a fuzzy system based on rules provided by an expert, and these rules are optimized by a genetic algorithm to obtain the best possible number of rules for the classifier with the lowest classification error. Simulation results are presented to show the advantage of the proposed model.
      Citation: Algorithms
      PubDate: 2017-07-14
      DOI: 10.3390/a10030079
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 80: A Hybrid Algorithm for Optimal Wireless
           Sensor Network Deployment with the Minimum Number of Sensor Nodes

    • Authors: Yasser El Khamlichi, Abderrahim Tahiri, Anouar Abtoy, Inmaculada Medina-Bulo, Francisco Palomo-Lozano
      First page: 80
      Abstract: Wireless sensor network (WSN) applications are rapidly growing and are widely used in various disciplines. Deployment is one of the key issues to be solved in WSNs, since the sensor nodes’ positioning affects highly the system performance. An optimal WSN deployment should maximize the collection of the desired interest phenomena, guarantee the required coverage and connectivity, extend the network lifetime, and minimize the network cost in terms of energy consumption. Most of the research effort in this area aims to solve the deployment issue, without minimizing the network cost by reducing unnecessary working nodes in the network. In this paper, we propose a deployment approach based on the gradient method and the Simulated Annealing algorithm to solve the sensor deployment problem with the minimum number of sensor nodes. The proposed algorithm is able to heuristically optimize the number of sensors and their positions in order to achieve the desired application requirements.
      Citation: Algorithms
      PubDate: 2017-07-18
      DOI: 10.3390/a10030080
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 81: Low-Resource Cross-Domain Product Review
           Sentiment Classification Based on a CNN with an Auxiliary Large-Scale
           Corpus

    • Authors: Xiaocong Wei, Hongfei Lin, Yuhai Yu, Liang Yang
      First page: 81
      Abstract: The literature [-5]contains several reports evaluating the abilities of deep neural networks in text transfer learning. To our knowledge, however, there have been few efforts to fully realize the potential of deep neural networks in cross-domain product review sentiment classification. In this paper, we propose a two-layer convolutional neural network (CNN) for cross-domain product review sentiment classification (LM-CNN-LB). Transfer learning research into product review sentiment classification based on deep neural networks has been limited by the lack of a large-scale corpus; we sought to remedy this problem using a large-scale auxiliary cross-domain dataset collected from Amazon product reviews. Our proposed framework exhibits the dramatic transferability of deep neural networks for cross-domain product review sentiment classification and achieves state-of-the-art performance. The framework also outperforms complex engineered features used with a non-deep neural network method. The experiments demonstrate that introducing large-scale data from similar domains is an effective way to resolve the lack of training data. The LM-CNN-LB trained on the multi-source related domain dataset outperformed the one trained on a single similar domain.
      Citation: Algorithms
      PubDate: 2017-07-19
      DOI: 10.3390/a10030081
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 82: Optimization of Intelligent Controllers
           Using a Type-1 and Interval Type-2 Fuzzy Harmony Search Algorithm

    • Authors: Cinthia Peraza, Fevrier Valdez, Patricia Melin
      First page: 82
      Abstract: This article focuses on the dynamic parameter adaptation in the harmony search algorithm using Type-1 and interval Type-2 fuzzy logic. In particular, this work focuses on the adaptation of the parameters of the original harmony search algorithm. At present there are several types of algorithms that can solve complex real-world problems with uncertainty management. In this case the proposed method is in charge of optimizing the membership functions of three benchmark control problems (water tank, shower, and mobile robot). The main goal is to find the best parameters for the membership functions in the controller to follow a desired trajectory. Noise experiments are performed to test the efficacy of the method.
      Citation: Algorithms
      PubDate: 2017-07-20
      DOI: 10.3390/a10030082
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 83: Fuzzy Fireworks Algorithm Based on a Sparks
           Dispersion Measure

    • Authors: Juan Barraza, Patricia Melin, Fevrier Valdez, Claudia Gonzalez
      First page: 83
      Abstract: The main goal of this paper is to improve the performance of the Fireworks Algorithm (FWA). To improve the performance of the FWA we propose three modifications: the first modification is to change the stopping criteria, this is to say, previously, the number of function evaluations was utilized as a stopping criteria, and we decided to change this to specify a particular number of iterations; the second and third modifications consist on introducing a dispersion metric (dispersion percent), and both modifications were made with the goal of achieving dynamic adaptation of the two parameters in the algorithm. The parameters that were controlled are the explosion amplitude and the number of sparks, and it is worth mentioning that the control of these parameters is based on a fuzzy logic approach. To measure the impact of these modifications, we perform experiments with 14 benchmark functions and a comparative study shows the advantage of the proposed approach. We decided to call the proposed algorithms Iterative Fireworks Algorithm (IFWA) and two variants of the Dispersion Percent Iterative Fuzzy Fireworks Algorithm (DPIFWA-I and DPIFWA-II, respectively).
      Citation: Algorithms
      PubDate: 2017-07-21
      DOI: 10.3390/a10030083
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 84: Auxiliary Model Based Multi-Innovation
           Stochastic Gradient Identification Algorithm for Periodically
           Non-Uniformly Sampled-Data Hammerstein Systems

    • Authors: Li Xie, Huizhong Yang
      First page: 84
      Abstract: Due to the lack of powerful model description methods, the identification of Hammerstein systems based on the non-uniform input-output dataset remains a challenging problem. This paper introduces a time-varying backward shift operator to describe periodically non-uniformly sampled-data Hammerstein systems, which can simplify the structure of the lifted models using the traditional lifting technique. Furthermore, an auxiliary model-based multi-innovation stochastic gradient algorithm is presented to estimate the parameters involved in the linear and nonlinear blocks. The simulation results confirm that the proposed algorithm is effective and can achieve a high estimation performance.
      Citation: Algorithms
      PubDate: 2017-07-31
      DOI: 10.3390/a10030084
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 85: A New Meta-Heuristics of Optimization with
           Dynamic Adaptation of Parameters Using Type-2 Fuzzy Logic for Trajectory
           Control of a Mobile Robot

    • Authors: Camilo Caraveo, Fevrier Valdez, Oscar Castillo
      First page: 85
      Abstract: Fuzzy logic is a soft computing technique that has been very successful in recent years when it is used as a complement to improve meta-heuristic optimization. In this paper, we present a new variant of the bio-inspired optimization algorithm based on the self-defense mechanisms of plants in the nature. The optimization algorithm proposed in this work is based on the predator-prey model originally presented by Lotka and Volterra, where two populations interact with each other and the objective is to maintain a balance. The system of predator-prey equations use four variables (α, β, λ, δ) and the values of these variables are very important since they are in charge of maintaining a balance between the pair of equations. In this work, we propose the use of Type-2 fuzzy logic for the dynamic adaptation of the variables of the system. This time a fuzzy controller is in charge of finding the optimal values for the model variables, the use of this technique will allow the algorithm to have a higher performance and accuracy in the exploration of the values.
      Citation: Algorithms
      PubDate: 2017-07-26
      DOI: 10.3390/a10030085
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 86: An Improved MOEA/D with Optimal DE Schemes
           for Many-Objective Optimization Problems

    • Authors: Wei Zheng, Yanyan Tan, Xiaonan Fang, Shengtao Li
      First page: 86
      Abstract: MOEA/D is a promising multi-objective evolutionary algorithm based on decomposition, and it has been used to solve many multi-objective optimization problems very well. However, there is a class of multi-objective problems, called many-objective optimization problems, but the original MOEA/D cannot solve them well. In this paper, an improved MOEA/D with optimal differential evolution (oDE) schemes is proposed, called MOEA/D-oDE, aiming to solve many-objective optimization problems. Compared with MOEA/D, MOEA/D-oDE has two distinguishing points. On the one hand, MOEA/D-oDE adopts a newly-introduced decomposition approach to decompose the many-objective optimization problems, which combines the advantages of the weighted sum approach and the Tchebycheff approach. On the other hand, a kind of combination mechanism for DE operators is designed for finding the best child solution so as to do the a posteriori computing. In our experimental study, six continuous test instances with 4–6 objectives comparing NSGA-II (nondominated sorting genetic algorithm II) and MOEA/D as accompanying experiments are applied. Additionally, the final results indicate that MOEA/D-oDE outperforms NSGA-II and MOEA/D in almost all cases, particularly in those problems that have complicated Pareto shapes and higher dimensional objectives, where its advantages are more obvious.
      Citation: Algorithms
      PubDate: 2017-07-26
      DOI: 10.3390/a10030086
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 87: Evolutionary Optimization for Robust
           Epipolar-Geometry Estimation and Outlier Detection

    • Authors: Mozhdeh Shahbazi, Gunho Sohn, Jérôme Théau
      First page: 87
      Abstract: In this paper, a robust technique [-5]based on a genetic algorithm is proposed for estimating two-view epipolar-geometry of uncalibrated perspective stereo images from putative correspondences containing a high percentage of outliers. The advantages of this technique are three-fold: (i) replacing random search with evolutionary search applying new strategies of encoding and guided sampling; (ii) robust and fast estimation of the epipolar geometry via detecting a more-than-enough set of inliers without making any assumptions about the probability distribution of the residuals; (iii) determining the inlier-outlier threshold based on the uncertainty of the estimated model. The proposed method was evaluated both on synthetic data and real images. The results were compared with the most popular techniques from the state-of-the-art, including RANSAC (random sample consensus), MSAC, MLESAC, Cov-RANSAC, LO-RANSAC, StaRSAC, Multi-GS RANSAC and least median of squares (LMedS). Experimental results showed that the proposed approach performed better than other methods regarding the accuracy of inlier detection and epipolar-geometry estimation, as well as the computational efficiency for datasets majorly contaminated by outliers and noise.
      Citation: Algorithms
      PubDate: 2017-07-27
      DOI: 10.3390/a10030087
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 88: On the Lagged Diffusivity Method for the
           Solution of Nonlinear Finite Difference Systems

    • Authors: Francesco Mezzadri, Emanuele Galligani
      First page: 88
      Abstract: In this paper, we extend the analysis of the Lagged Diffusivity Method for nonlinear, non-steady reaction-convection-diffusion equations. In particular, we describe how the method can be used to solve the systems arising from different discretization schemes, recalling some results on the convergence of the method itself. Moreover, we also analyze the behavior of the method in case of problems presenting boundary layers or blow-up solutions.
      Citation: Algorithms
      PubDate: 2017-08-02
      DOI: 10.3390/a10030088
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 89: On the Existence of Solutions of Nonlinear
           Fredholm Integral Equations from Kantorovich’s Technique

    • Authors: José Ezquerro, Miguel Hernández-Verón
      First page: 89
      Abstract: The well-known Kantorovich technique based on majorizing sequences is used to analyse the convergence of Newton’s method when it is used to solve nonlinear Fredholm integral equations. In addition, we obtain information about the domains of existence and uniqueness of a solution for these equations. Finally, we illustrate the above with two particular Fredholm integral equations.
      Citation: Algorithms
      PubDate: 2017-08-02
      DOI: 10.3390/a10030089
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 90: Local Community Detection Based on Small
           Cliques

    • Authors: Michael Hamann, Eike Röhrs, Dorothea Wagner
      First page: 90
      Abstract: Community detection aims to find dense subgraphs in a network. We consider the problem of finding a community locally around a seed node both in unweighted and weighted networks. This is a faster alternative to algorithms that detect communities that cover the whole network when actually only a single community is required. Further, many overlapping community detection algorithms use local community detection algorithms as basic building block. We provide a broad comparison of different existing strategies of expanding a seed node greedily into a community. For this, we conduct an extensive experimental evaluation both on synthetic benchmark graphs as well as real world networks. We show that results both on synthetic as well as real-world networks can be significantly improved by starting from the largest clique in the neighborhood of the seed node. Further, our experiments indicate that algorithms using scores based on triangles outperform other algorithms in most cases. We provide theoretical descriptions as well as open source implementations of all algorithms used.
      Citation: Algorithms
      PubDate: 2017-08-11
      DOI: 10.3390/a10030090
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 91: Transformation-Based Fuzzy Rule
           Interpolation Using Interval Type-2 Fuzzy Sets

    • Authors: Chengyuan Chen, Qiang Shen
      First page: 91
      Abstract: In support of reasoning with sparse rule bases, fuzzy rule interpolation (FRI) offers a helpful inference mechanism for deriving an approximate conclusion when a given observation has no overlap with any rule in the existing rule base. One of the recent and popular FRI approaches is the scale and move transformation-based rule interpolation, known as T-FRI in the literature. It supports both interpolation and extrapolation with multiple multi-antecedent rules. However, the difficult problem of defining the precise-valued membership functions required in the representation of fuzzy rules, or of the observations, restricts its applications. Fortunately, this problem can be alleviated through the use of type-2 fuzzy sets, owing to the fact that the membership functions of such fuzzy sets are themselves fuzzy, providing a more flexible means of modelling. This paper therefore, extends the existing T-FRI approach using interval type-2 fuzzy sets, which covers the original T-FRI as its specific instance. The effectiveness of this extension is demonstrated by experimental investigations and, also, by a practical application in comparison to the state-of-the-art alternative approach developed using rough-fuzzy sets.
      Citation: Algorithms
      PubDate: 2017-08-15
      DOI: 10.3390/a10030091
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 92: Automatic Modulation Recognition Using
           Compressive Cyclic Features

    • Authors: Lijin Xie, Qun Wan
      First page: 92
      Abstract: Higher-order cyclic cumulants (CCs) have been widely adopted for automatic modulation recognition (AMR) in cognitive radio. However, the CC-based AMR suffers greatly from the requirement of high-rate sampling. To overcome this limit, we resort to the theory of compressive sensing (CS). By exploiting the sparsity of CCs, recognition features can be extracted from a small amount of compressive measurements via a rough CS reconstruction algorithm. Accordingly, a CS-based AMR scheme is formulated. Simulation results demonstrate the availability and robustness of the proposed approach.
      Citation: Algorithms
      PubDate: 2017-08-18
      DOI: 10.3390/a10030092
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 93: Post-Processing Partitions to Identify
           Domains of Modularity Optimization

    • Authors: William Weir, Scott Emmons, Ryan Gibson, Dane Taylor, Peter Mucha
      First page: 93
      Abstract: We introduce the Convex Hull of Admissible Modularity Partitions (CHAMP) algorithm to prune and prioritize different network community structures identified across multiple runs of possibly various computational heuristics. Given a set of partitions, CHAMP identifies the domain of modularity optimization for each partition—i.e., the parameter-space domain where it has the largest modularity relative to the input set—discarding partitions with empty domains to obtain the subset of partitions that are “admissible” candidate community structures that remain potentially optimal over indicated parameter domains. Importantly, CHAMP can be used for multi-dimensional parameter spaces, such as those for multilayer networks where one includes a resolution parameter and interlayer coupling. Using the results from CHAMP, a user can more appropriately select robust community structures by observing the sizes of domains of optimization and the pairwise comparisons between partitions in the admissible subset. We demonstrate the utility of CHAMP with several example networks. In these examples, CHAMP focuses attention onto pruned subsets of admissible partitions that are 20-to-1785 times smaller than the sets of unique partitions obtained by community detection heuristics that were input into CHAMP.
      Citation: Algorithms
      PubDate: 2017-08-19
      DOI: 10.3390/a10030093
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 94: NBTI and Power Reduction Using an Input
           Vector Control and Supply Voltage Assignment Method

    • Authors: Peng Sun, Zhiming Yang, Yang Yu, Junbao Li, Xiyuan Peng
      First page: 94
      Abstract: As technology scales, negative bias temperature instability (NBTI) becomes one of the primary failure mechanisms for Very Large Scale Integration (VLSI) circuits. Meanwhile, the leakage power increases dramatically as the supply/threshold voltage continues to scale down. These two issues pose severe reliability problems for complementary metal oxide semiconductor (CMOS) devices. Because both the NBTI and leakage are dependent on the input vector of the circuit, we present an input vector control (IVC) method based on a linear programming algorithm, which can co-optimize circuit aging and power dissipation simultaneously. In addition, our proposed IVC method is combined with the supply voltage assignment technique to further reduce delay degradation and leakage power. Experimental results on various circuits show the effectiveness of the proposed combination method.
      Citation: Algorithms
      PubDate: 2017-08-19
      DOI: 10.3390/a10030094
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 95: A Parallel Two-Stage Iteration Method for
           Solving Continuous Sylvester Equations

    • Authors: Manyu Xiao, Quanyi Lv, Zhuo Xing, Yingchun Zhang
      First page: 95
      Abstract: In this paper we propose a parallel two-stage iteration algorithm for solving large-scale continuous Sylvester equations. By splitting the coefficient matrices, the original linear system is transformed into a symmetric linear system which is then solved by using the SYMMLQ algorithm. In order to improve the relative parallel efficiency, an adjusting strategy is explored during the iteration calculation of the SYMMLQ algorithm to decrease the degree of the reduce-operator from two to one communications at each step. Moreover, the convergence of the iteration scheme is discussed, and finally numerical results are reported showing that the proposed method is an efficient and robust algorithm for this class of continuous Sylvester equations on a parallel machine.
      Citation: Algorithms
      PubDate: 2017-08-21
      DOI: 10.3390/a10030095
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 96: Double-Threshold Cooperative Spectrum
           Sensing Algorithm Based on Sevcik Fractal Dimension

    • Authors: Xueying Diao, Qianhui Dong, Zijian Yang, Yibing Li
      First page: 96
      Abstract: Spectrum sensing is of great importance in the cognitive radio (CR) networks. Compared with individual spectrum sensing, cooperative spectrum sensing (CSS) has been shown to greatly improve the accuracy of the detection. However, the existing CSS algorithms are sensitive to noise uncertainty and are inaccurate in low signal-to-noise ratio (SNR) detection. To address this, we propose a double-threshold CSS algorithm based on Sevcik fractal dimension (SFD) in this paper. The main idea of the presented scheme is to sense the presence of primary users in the local spectrum sensing by analyzing different characteristics of the SFD between signals and noise. Considering the stochastic fluctuation characteristic of the noise SFD in a certain range, we adopt the double-threshold method in the multi-cognitive user CSS so as to improve the detection accuracy, where thresholds are set according to the maximum and minimum values of the noise SFD. After obtaining the detection results, the cognitive user sends local detection results to the fusion center for reliability fusion. Simulation results demonstrate that the proposed method is insensitive to noise uncertainty. Simulations also show that the algorithm presented in this paper can achieve high detection performance at the low SNR region.
      Citation: Algorithms
      PubDate: 2017-08-21
      DOI: 10.3390/a10030096
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 97: A Simplified Matrix Formulation for
           Sensitivity Analysis of Hidden Markov Models

    • Authors: Seifemichael B. Amsalu,  Abdollah Homaifar, Albert Esterline
      First page: 97
      Abstract: In this paper, a new algorithm for sensitivity analysis of discrete hidden Markov models (HMMs) is proposed. Sensitivity analysis is a general technique for investigating the robustness of the output of a system model. Sensitivity analysis of probabilistic networks has recently been studied extensively. This has resulted in the development of mathematical relations between a parameter and an output probability of interest and also methods for establishing the effects of parameter variations on decisions. Sensitivity analysis in HMMs has usually been performed by taking small perturbations in parameter values and re-computing the output probability of interest. As recent studies show, the sensitivity analysis of an HMM can be performed using a functional relationship that describes how an output probability varies as the network’s parameters of interest change. To derive this sensitivity function, existing Bayesian network algorithms have been employed for HMMs. These algorithms are computationally inefficient as the length of the observation sequence and the number of parameters increases. In this study, a simplified efficient matrix-based algorithm for computing the coefficients of the sensitivity function for all hidden states and all time steps is proposed and an example is presented.
      Citation: Algorithms
      PubDate: 2017-08-22
      DOI: 10.3390/a10030097
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 98: Adaptive Virtual RSU Scheduling for
           Scalable Coverage under Bidirectional Vehicle Traffic Flow

    • Authors: Fei Chen, Xiaohong Bi, Ruimin Lyu, Zhongwei Hua, Yuan Liu, Xiaoting Zhang
      First page: 98
      Abstract: Over the past decades, vehicular ad hoc networks (VANETs) have been a core networking technology to provide drivers and passengers with safety and convenience. As a new emerging technology, the vehicular cloud computing (VCC) can provide cloud services for various data-intensive applications in VANETs, such as multimedia streaming. However, the vehicle mobility and intermittent connectivity present challenges to the large-scale data dissemination with underlying computing and networking architecture. In this paper, we will explore the service scheduling of virtual RSUs for diverse request demands in the dynamic traffic flow in vehicular cloud environment. Specifically, we formulate the RSU allocation problem as maximum service capacity with multiple-source and multiple-destination, and propose a bidirectional RSU allocation strategy. In addition, we formulate the content replication in distributed RSUs as the minimum replication set coverage problem in a two-layer mapping model, and analyze the solutions in different scenarios. Numerical results further prove the superiority of our proposed solution, as well as the scalability to various traffic condition variations.
      Citation: Algorithms
      PubDate: 2017-08-24
      DOI: 10.3390/a10030098
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 99: Hybrid Learning for General Type-2 TSK
           Fuzzy Logic Systems

    • Authors: Mauricio Sanchez, Juan Castro, Violeta Ocegueda-Miramontes, Leticia Cervantes
      First page: 99
      Abstract: This work is focused on creating fuzzy granular classification models based on general type-2 fuzzy logic systems when consequents are represented by interval type-2 TSK linear functions. Due to the complexity of general type-2 TSK fuzzy logic systems, a hybrid learning approach is proposed, where the principle of justifiable granularity is heuristically used to define an amount of uncertainty in the system, which in turn is used to define the parameters in the interval type-2 TSK linear functions via a dual LSE algorithm. Multiple classification benchmark datasets were tested in order to assess the quality of the formed granular models; its performance is also compared against other common classification algorithms. Shown results conclude that classification performance in general is better than results obtained by other techniques, and in general, all achieved results, when averaged, have a better performance rate than compared techniques, demonstrating the stability of the proposed hybrid learning technique.
      Citation: Algorithms
      PubDate: 2017-08-25
      DOI: 10.3390/a10030099
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 100: Biogeography-Based Optimization of the
           Portfolio Optimization Problem with Second Order Stochastic Dominance
           Constraints

    • Authors: Tao Ye, Ziqiang Yang, Siling Feng
      First page: 100
      Abstract: The portfolio optimization problem is the central problem of modern economics and decision theory; there is the Mean-Variance Model and Stochastic Dominance Model for solving this problem. In this paper, based on the second order stochastic dominance constraints, we propose the improved biogeography-based optimization algorithm to optimize the portfolio, which we called ε BBO. In order to test the computing power of ε BBO, we carry out two numerical experiments in several kinds of constraints. In experiment 1, comparing the Stochastic Approximation (SA) method with the Level Function (LF) algorithm and Genetic Algorithm (GA), we get a similar optimal solution by ε BBO in [ 0 , 0 . 6 ] and [ 0 , 1 ] constraints with the return of 1.174% and 1.178%. In [ - 1 , 2 ] constraint, we get the optimal return of 1.3043% by ε BBO, while the return of SA and LF is 1.23% and 1.26%. In experiment 2, we get the optimal return of 0.1325% and 0.3197% by ε BBO in [ 0 , 0 . 1 ] and [ - 0 . 05 , 0 . 15 ] constraints. As a comparison, the return of FTSE100 Index portfolio is 0.0937%. The results prove that ε BBO algorithm has great potential in the field of financial decision-making, it also shows that ε BBO algorithm has a better performance in optimization problem.
      Citation: Algorithms
      PubDate: 2017-08-25
      DOI: 10.3390/a10030100
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 101: Comparative Study of Type-2 Fuzzy Particle
           

    • Authors: Frumen Olivas, Leticia Amador-Angulo, Jonathan Perez, Camilo Caraveo, Fevrier Valdez, Oscar Castillo
      First page: 101
      Abstract: In this paper, a comparison among Particle swarm optimization (PSO), Bee Colony Optimization (BCO) and the Bat Algorithm (BA) is presented. In addition, a modification to the main parameters of each algorithm through an interval type-2 fuzzy logic system is presented. The main aim of using interval type-2 fuzzy systems is providing dynamic parameter adaptation to the algorithms. These algorithms (original and modified versions) are compared with the design of fuzzy systems used for controlling the trajectory of an autonomous mobile robot. Simulation results reveal that PSO algorithm outperforms the results of the BCO and BA algorithms.
      Citation: Algorithms
      PubDate: 2017-08-28
      DOI: 10.3390/a10030101
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 102: Local Community Detection in Dynamic
           Graphs Using Personalized Centrality

    • Authors: Eisha Nathan, Anita Zakrzewska, Jason Riedy, David Bader
      First page: 102
      Abstract: Analyzing massive graphs poses challenges due to the vast amount of data available. Extracting smaller relevant subgraphs allows for further visualization and analysis that would otherwise be too computationally intensive. Furthermore, many real data sets are constantly changing, and require algorithms to update as the graph evolves. This work addresses the topic of local community detection, or seed set expansion, using personalized centrality measures, specifically PageRank and Katz centrality. We present a method to efficiently update local communities in dynamic graphs. By updating the personalized ranking vectors, we can incrementally update the corresponding local community. Applying our methods to real-world graphs, we are able to obtain speedups of up to 60× compared to static recomputation while maintaining an average recall of 0.94 of the highly ranked vertices returned. Next, we investigate how approximations of a centrality vector affect the resulting local community. Specifically, our method guarantees that the vertices returned in the community are the highly ranked vertices from a personalized centrality metric.
      Citation: Algorithms
      PubDate: 2017-08-29
      DOI: 10.3390/a10030102
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 103: An Enhanced Dynamic Spectrum Allocation
           Algorithm Based on Cournot Game in Maritime Cognitive Radio Communication
           System

    • Authors: Jingbo Zhang, Henan Yu, Shufang Zhang
      First page: 103
      Abstract: The recent development of maritime transport has resulted in the demand for a wider communication bandwidth being more intense. Cognitive radios can dynamically manage resources in a spectrum. Thus, building a new type of maritime cognitive radio communication system (MCRCS) is an effective solution. In this paper, the enhanced dynamic spectrum allocation algorithm (EDSAA) is proposed, which is based on the Cournot game model. In EDSAA, the decision-making center (DC) sets the weights according to the detection capability of the secondary user (SU), before adding these weighting coefficients in the price function. Furthermore, the willingness of the SU will reduce after meeting their basic communication needs when it continues to increase the leasable spectrum by adding the elastic model in the SU’s revenue function. On this basis, the profit function is established. The simulation results show that the EDSAA has Nash equilibrium and conforms to the actual situation. It shows that the results of spectrum allocation are fair, efficient and reasonable.
      Citation: Algorithms
      PubDate: 2017-09-03
      DOI: 10.3390/a10030103
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 104: Contract-Based Incentive Mechanism for
           Mobile Crowdsourcing Networks

    • Authors: Nan Zhao, Menglin Fan, Chao Tian, Pengfei Fan
      First page: 104
      Abstract: Mobile crowdsourcing networks (MCNs) are a promising method of data collecting and processing by leveraging the mobile devices’ sensing and computing capabilities. However, because of the selfish characteristics of the service provider (SP) and mobile users (MUs), crowdsourcing participants only aim to maximize their own benefits. This paper investigates the incentive mechanism between the above two parties to create mutual benefits. By modeling MCNs as a labor market, a contract-based crowdsourcing model with moral hazard is proposed under the asymmetric information scenario. In order to incentivize the potential MUs to participate in crowdsourcing tasks, the optimization problem is formulated to maximize the SP’s utility by jointly examining the crowdsourcing participants’ risk preferences. The impact of crowdsourcing participants’ attitudes of risks on the incentive mechanism has been studied analytically and experimentally. Numerical simulation results demonstrate the effectiveness of the proposed contract design scheme for the crowdsourcing incentive.
      Citation: Algorithms
      PubDate: 2017-09-04
      DOI: 10.3390/a10030104
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 105: Comparison of Internal Clustering
           Validation Indices for Prototype-Based Clustering

    • Authors: Joonas Hämäläinen, Susanne Jauhiainen, Tommi Kärkkäinen
      First page: 105
      Abstract: Clustering is an unsupervised machine learning and pattern recognition method. In general, in addition to revealing hidden groups of similar observations and clusters, their number needs to be determined. Internal clustering validation indices estimate this number without any external information. The purpose of this article is to evaluate, empirically, characteristics of a representative set of internal clustering validation indices with many datasets. The prototype-based clustering framework includes multiple, classical and robust, statistical estimates of cluster location so that the overall setting of the paper is novel. General observations on the quality of validation indices and on the behavior of different variants of clustering algorithms will be given.
      Citation: Algorithms
      PubDate: 2017-09-06
      DOI: 10.3390/a10030105
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 106: Type-1 Fuzzy Sets and Intuitionistic Fuzzy
           Sets

    • Authors: Krassimir Atanassov
      First page: 106
      Abstract: A comparison between type-1 fuzzy sets (T1FSs) and intuitionistic fuzzy sets (IFSs) is made. The operators defined over IFSs that do not have analogues in T1FSs are shown, and such analogues are introduced whenever possible.
      Citation: Algorithms
      PubDate: 2017-09-13
      DOI: 10.3390/a10030106
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 107: A Monarch Butterfly Optimization for the
           Dynamic Vehicle Routing Problem

    • Authors: Shifeng Chen, Rong Chen, Jian Gao
      First page: 107
      Abstract: The dynamic vehicle routing problem (DVRP) is a variant of the Vehicle Routing Problem (VRP) in which customers appear dynamically. The objective is to determine a set of routes that minimizes the total travel distance. In this paper, we propose a monarch butterfly optimization (MBO) algorithm to solve DVRPs, utilizing a greedy strategy. Both migration operation and the butterfly adjusting operator only accept the offspring of butterfly individuals that have better fitness than their parents. To improve performance, a later perturbation procedure is implemented, to maintain a balance between global diversification and local intensification. The computational results indicate that the proposed technique outperforms the existing approaches in the literature for average performance by at least 9.38%. In addition, 12 new best solutions were found. This shows that this proposed technique consistently produces high-quality solutions and outperforms other published heuristics for the DVRP.
      Citation: Algorithms
      PubDate: 2017-09-12
      DOI: 10.3390/a10030107
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 108: Performance Analysis of Four
           Decomposition-Ensemble Models for One-Day-Ahead Agricultural Commodity
           Futures Price Forecasting

    • Authors: Deyun Wang, Chenqiang Yue, Shuai Wei, Jun Lv
      First page: 108
      Abstract: Agricultural commodity futures prices play a significant role in the change tendency of these spot prices and the supply–demand relationship of global agricultural product markets. Due to the nonlinear and nonstationary nature of this kind of time series data, it is inevitable for price forecasting research to take this nature into consideration. Therefore, we aim to enrich the existing research literature and offer a new way of thinking about forecasting agricultural commodity futures prices, so that four hybrid models are proposed based on the back propagation neural network (BPNN) optimized by the particle swarm optimization (PSO) algorithm and four decomposition methods: empirical mode decomposition (EMD), wavelet packet transform (WPT), intrinsic time-scale decomposition (ITD) and variational mode decomposition (VMD). In order to verify the applicability and validity of these hybrid models, we select three futures prices of wheat, corn and soybean to conduct the experiment. The experimental results show that (1) all the hybrid models combined with decomposition technique have a better performance than the single PSO–BPNN model; (2) VMD contributes the most in improving the forecasting ability of the PSO–BPNN model, while WPT ranks second; (3) ITD performs better than EMD in both cases of corn and soybean; and (4) the proposed models perform well in the forecasting of agricultural commodity futures prices.
      Citation: Algorithms
      PubDate: 2017-09-12
      DOI: 10.3390/a10030108
      Issue No: Vol. 10, No. 3 (2017)
       
  • Algorithms, Vol. 10, Pages 43: Reliable Portfolio Selection Problem in
           Fuzzy Environment: An mλ Measure Based Approach

    • Authors: Yuan Feng, Li Wang, Xinhong Liu
      First page: 43
      Abstract: This paper investigates a fuzzy portfolio selection problem with guaranteed reliability, in which the fuzzy variables are used to capture the uncertain returns of different securities. To effectively handle the fuzziness in a mathematical way, a new expected value operator and variance of fuzzy variables are defined based on the m λ measure that is a linear combination of the possibility measure and necessity measure to balance the pessimism and optimism in the decision-making process. To formulate the reliable portfolio selection problem, we particularly adopt the expected total return and standard variance of the total return to evaluate the reliability of the investment strategies, producing three risk-guaranteed reliable portfolio selection models. To solve the proposed models, an effective genetic algorithm is designed to generate the approximate optimal solution to the considered problem. Finally, the numerical examples are given to show the performance of the proposed models and algorithm.
      PubDate: 2017-04-18
      DOI: 10.3390/a10020043
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 44: Revised Gravitational Search Algorithms
           Based on Evolutionary-Fuzzy Systems

    • Authors: Danilo Pelusi, Raffaele Mascella, Luca Tallini
      First page: 44
      Abstract: The choice of the best optimization algorithm is a hard issue, and it sometime depends on specific problem. The Gravitational Search Algorithm (GSA) is a search algorithm based on the law of gravity, which states that each particle attracts every other particle with a force called gravitational force. Some revised versions of GSA have been proposed by using intelligent techniques. This work proposes some GSA versions based on fuzzy techniques powered by evolutionary methods, such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO) and Differential Evolution (DE), to improve GSA. The designed algorithms tune a suitable parameter of GSA through a fuzzy controller whose membership functions are optimized by GA, PSO and DE. The results show that Fuzzy Gravitational Search Algorithm (FGSA) optimized by DE is optimal for unimodal functions, whereas FGSA optimized through GA is good for multimodal functions.
      PubDate: 2017-04-21
      DOI: 10.3390/a10020044
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 45: An Efficient Sixth-Order Newton-Type Method
           for Solving Nonlinear Systems

    • Authors: Xiaofeng Wang, Yang Li
      First page: 45
      Abstract: In this paper, we present a new sixth-order iterative method for solving nonlinear systems and prove a local convergence result. The new method requires solving five linear systems per iteration. An important feature of the new method is that the LU (lower upper, also called LU factorization) decomposition of the Jacobian matrix is computed only once in each iteration. The computational efficiency index of the new method is compared to that of some known methods. Numerical results are given to show that the convergence behavior of the new method is similar to the existing methods. The new method can be applied to small- and medium-sized nonlinear systems.
      PubDate: 2017-04-25
      DOI: 10.3390/a10020045
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 46: An Improved Multiobjective Particle Swarm
           Optimization Based on Culture Algorithms

    • Authors: Chunhua Jia, Hong Zhu
      First page: 46
      Abstract: In this paper, we propose a new approach to raise the performance of multiobjective particle swam optimization. The personal guide and global guide are updated using three kinds of knowledge extracted from the population based on cultural algorithms. An epsilon domination criterion has been employed to enhance the convergence and diversity of the approximate Pareto front. Moreover, a simple polynomial mutation operator has been applied to both the population and the non-dominated archive. Experiments on two series of bench test suites have shown the effectiveness of the proposed approach. A comparison with several other algorithms that are considered good representatives of particle swarm optimization solutions has also been conducted, in order to verify the competitive performance of the proposed algorithm in solve multiobjective optimization problems.
      PubDate: 2017-04-25
      DOI: 10.3390/a10020046
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 47: Trust in the Balance: Data Protection Laws
           as Tools for Privacy and Security in the Cloud

    • Authors: Darra Hofman, Luciana Duranti, Elissa How
      First page: 47
      Abstract: A popular bumper sticker states: “There is no cloud. It’s just someone else’s computer.” Despite the loss of control that comes with its use, critical records are increasingly being entrusted to the cloud, generating ever-growing concern about the privacy and security of those records. Ultimately, privacy and security constitute an attempt to balance competing needs: privacy balances the need to use information against the need to protect personal data, while security balances the need to provide access to records against the need to stop unauthorized access. The importance of these issues has led to a multitude of legal and regulatory efforts to find a balance and, ultimately, to ensure trust in both digital records and their storage in the cloud. Adding a particular challenge is the fact that distinct jurisdictions approach privacy differently and an in-depth understanding of what a jurisdiction’s laws may be, or even under what jurisdiction particular data might be, requires a Herculean effort. And yet, in order to protect privacy and enhance security, this effort is required. This article examines two legal tools for ensuring the privacy and security of records in the cloud, data protection laws, and data localization laws, through the framework of “trust” as understood in archival science. This framework of trust provides new directions for algorithmic research, identifying those areas of digital record creation and preservation most in need of novel solutions.
      PubDate: 2017-04-27
      DOI: 10.3390/a10020047
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 48: Adaptive Mutation Dynamic Search Fireworks
           Algorithm

    • Authors: Xi-Guang Li, Shou-Fei Han, Liang Zhao, Chang-Qing Gong, Xiao-Jing Liu
      First page: 48
      Abstract: The Dynamic Search Fireworks Algorithm (dynFWA) is an effective algorithm for solving optimization problems. However, dynFWA easily falls into local optimal solutions prematurely and it also has a slow convergence rate. In order to improve these problems, an adaptive mutation dynamic search fireworks algorithm (AMdynFWA) is introduced in this paper. The proposed algorithm applies the Gaussian mutation or the Levy mutation for the core firework (CF) with mutation probability. Our simulation compares the proposed algorithm with the FWA-Based algorithms and other swarm intelligence algorithms. The results show that the proposed algorithm achieves better overall performance on the standard test functions.
      PubDate: 2017-04-28
      DOI: 10.3390/a10020048
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 49: Multivariate Statistical Process Control
           Using Enhanced Bottleneck Neural Network

    • Authors: Khaled Bouzenad, Messaoud Ramdani
      First page: 49
      Abstract: Monitoring process upsets and malfunctions as early as possible and then finding and removing the factors causing the respective events is of great importance for safe operation and improved productivity. Conventional process monitoring using principal component analysis (PCA) often supposes that process data follow a Gaussian distribution. However, this kind of constraint cannot be satisfied in practice because many industrial processes frequently span multiple operating states. To overcome this difficulty, PCA can be combined with nonparametric control charts for which there is no assumption need on the distribution. However, this approach still uses a constant confidence limit where a relatively high rate of false alarms are generated. Although nonlinear PCA (NLPCA) using autoassociative bottle-neck neural networks plays an important role in the monitoring of industrial processes, it is difficult to design correct monitoring statistics and confidence limits that check new performance. In this work, a new monitoring strategy using an enhanced bottleneck neural network (EBNN) with an adaptive confidence limit for non Gaussian data is proposed. The basic idea behind it is to extract internally homogeneous segments from the historical normal data sets by filling a Gaussian mixture model (GMM). Based on the assumption that process data follow a Gaussian distribution within an operating mode, a local confidence limit can be established. The EBNN is used to reconstruct input data and estimate probabilities of belonging to the various local operating regimes, as modelled by GMM. An abnormal event for an input measurement vector is detected if the squared prediction error (SPE) is too large, or above a certain threshold which is made adaptive. Moreover, the sensor validity index (SVI) is employed successfully to identify the detected faulty variable. The results demonstrate that, compared with NLPCA, the proposed approach can effectively reduce the number of false alarms, and is hence expected to better monitor many practical processes.
      PubDate: 2017-04-29
      DOI: 10.3390/a10020049
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 50: Hierarchical Parallel Evaluation of a
           Hamming Code

    • Authors: Shmuel Klein, Dana Shapira
      First page: 50
      Abstract: The Hamming code is a well-known error correction code and can correct a single error in an input vector of size n bits by adding logn parity checks. A new parallel implementation of the code is presented, using a hierarchical structure of n processors in logn layers. All the processors perform similar simple tasks, and need only a few bytes of internal memory.
      PubDate: 2017-04-30
      DOI: 10.3390/a10020050
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 51: Adaptive Vector Quantization for Lossy
           Compression of Image Sequences

    • Authors: Raffaele Pizzolante, Bruno Carpentieri, Sergio De Agostino
      First page: 51
      Abstract: In this work, we present a scheme for the lossy compression of image sequences, based on the Adaptive Vector Quantization (AVQ) algorithm. The AVQ algorithm is a lossy compression algorithm for grayscale images, which processes the input data in a single-pass, by using the properties of the vector quantization to approximate data. First, we review the key aspects of the AVQ algorithm and, subsequently, we outline the basic concepts and the design choices behind the proposed scheme. Finally, we report the experimental results, which highlight an improvement in compression performances when our scheme is compared with the AVQ algorithm.
      PubDate: 2017-05-09
      DOI: 10.3390/a10020051
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 52: Searchable Data Vault: Encrypted Queries in
           Secure Distributed Cloud Storage

    • Authors: Geong Poh, Vishnu Baskaran, Ji-Jian Chin, Moesfa Mohamad, Kay Win Lee, Dharmadharshni Maniam, Muhammad Z’aba
      First page: 52
      Abstract: Cloud storage services allow users to efficiently outsource their documents anytime and anywhere. Such convenience, however, leads to privacy concerns. While storage providers may not read users’ documents, attackers may possibly gain access by exploiting vulnerabilities in the storage system. Documents may also be leaked by curious administrators. A simple solution is for the user to encrypt all documents before submitting them. This method, however, makes it impossible to efficiently search for documents as they are all encrypted. To resolve this problem, we propose a multi-server searchable symmetric encryption (SSE) scheme and construct a system called the searchable data vault (SDV). A unique feature of the scheme is that it allows an encrypted document to be divided into blocks and distributed to different storage servers so that no single storage provider has a complete document. By incorporating the scheme, the SDV protects the privacy of documents while allowing for efficient private queries. It utilizes a web interface and a controller that manages user credentials, query indexes and submission of encrypted documents to cloud storage services. It is also the first system that enables a user to simultaneously outsource and privately query documents from a few cloud storage services. Our preliminary performance evaluation shows that this feature introduces acceptable computation overheads when compared to submitting documents directly to a cloud storage service.
      PubDate: 2017-05-09
      DOI: 10.3390/a10020052
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 53: Application of Gradient Descent Continuous
           Actor-Critic Algorithm for Bilateral Spot Electricity Market Modeling
           Considering Renewable Power Penetration

    • Authors: Huiru Zhao, Yuwei Wang, Mingrui Zhao, Chuyu Sun, Qingkun Tan
      First page: 53
      Abstract: The bilateral spot electricity market is very complicated because all generation units and demands must strategically bid in this market. Considering renewable resource penetration, the high variability and the non-dispatchable nature of these intermittent resources make it more difficult to model and simulate the dynamic bidding process and the equilibrium in the bilateral spot electricity market, which makes developing fast and reliable market modeling approaches a matter of urgency nowadays. In this paper, a Gradient Descent Continuous Actor-Critic algorithm is proposed for hour-ahead bilateral electricity market modeling in the presence of renewable resources because this algorithm can solve electricity market modeling problems with continuous state and action spaces without causing the “curse of dimensionality” and has low time complexity. In our simulation, the proposed approach is implemented on an IEEE 30-bus test system. The adequate performance of our proposed approach—such as reaching Nash Equilibrium results after enough iterations of training are tested and verified, and some conclusions about the relationship between increasing the renewable power output and participants’ bidding strategy, locational marginal prices, and social welfare—is also evaluated. Moreover, the comparison of our proposed approach with the fuzzy Q-learning-based electricity market approach implemented in this paper confirms the superiority of our proposed approach in terms of participants’ profits, social welfare, average locational marginal prices, etc.
      PubDate: 2017-05-10
      DOI: 10.3390/a10020053
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 54: Extending the Applicability of the MMN-HSS
           Method for Solving Systems of Nonlinear Equations under Generalized
           Conditions

    • Authors: Ioannis Argyros, Janak Sharma, Deepak Kumar
      First page: 54
      Abstract: We present the semilocal convergence of a multi-step modified Newton-Hermitian and Skew-Hermitian Splitting method (MMN-HSS method) to approximate a solution of a nonlinear equation. Earlier studies show convergence under only Lipschitz conditions limiting the applicability of this method. The convergence in this study is shown under generalized Lipschitz-type conditions and restricted convergence domains. Hence, the applicability of the method is extended. Moreover, numerical examples are also provided to show that our results can be applied to solve equations in cases where earlier study cannot be applied. Furthermore, in the cases where both old and new results are applicable, the latter provides a larger domain of convergence and tighter error bounds on the distances involved.
      PubDate: 2017-05-12
      DOI: 10.3390/a10020054
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 55: Erratum: Ahmad, F., et al. A Preconditioned
           Iterative Method for Solving Systems of Nonlinear Equations Having Unknown
           Multiplicity. Algorithms 2017, 10, 17

    • Authors: Fayyaz Ahmad, Toseef Bhutta, Umar Shoaib, Malik Ullah, Ali Alshomrani, Shamshad Ahmad, Shahid Ahmad
      First page: 55
      Abstract: n/a
      PubDate: 2017-05-12
      DOI: 10.3390/a10020055
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 56: Clustering Using an Improved Krill Herd
           Algorithm

    • Authors: Qin Li, Bo Liu
      First page: 56
      Abstract: In recent years, metaheuristic algorithms have been widely used in solving clustering problems because of their good performance and application effects. krill herd algorithm (KHA) is a new effective algorithm to solve optimization problems based on the imitation of krill individual behavior, and it is proven to perform better than other swarm intelligence algorithms. However, there are some weaknesses yet. In this paper, an improved krill herd algorithm (IKHA) is studied. Modified mutation operators and updated mechanisms are applied to improve global optimization, and the proposed IKHA can overcome the weakness of KHA and performs better than KHA in optimization problems. Then, KHA and IKHA are introduced into the clustering problem. In our proposed clustering algorithm, KHA and IKHA are used to find appropriate cluster centers. Experiments were conducted on University of California Irvine (UCI) standard datasets, and the results showed that the IKHA clustering algorithm is the most effective.
      PubDate: 2017-05-17
      DOI: 10.3390/a10020056
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 57: A Prediction of Precipitation Data Based on
           Support Vector Machine and Particle Swarm Optimization (PSO-SVM)
           Algorithms

    • Authors: Jinglin Du, Yayun Liu, Yanan Yu, Weilan Yan
      First page: 57
      Abstract: Precipitation is a very important topic in weather forecasts. Weather forecasts, especially precipitation prediction, poses complex tasks because they depend on various parameters to predict the dependent variables like temperature, humidity, wind speed and direction, which are changing from time to time and weather calculation varies with the geographical location along with its atmospheric variables. To improve the prediction accuracy of precipitation, this context proposes a prediction model for rainfall forecast based on Support Vector Machine with Particle Swarm Optimization (PSO-SVM) to replace the linear threshold used in traditional precipitation. Parameter selection has a critical impact on the predictive accuracy of SVM, and PSO is proposed to find the optimal parameters for SVM. The PSO-SVM algorithm was used for the training of a model by using the historical data for precipitation prediction, which can be useful information and used by people of all walks of life in making wise and intelligent decisions. The simulations demonstrate that prediction models indicate that the performance of the proposed algorithm has much better accuracy than the direct prediction model based on a set of experimental data if other things are equal. On the other hand, simulation results demonstrate the effectiveness and advantages of the SVM-PSO model used in machine learning and further promises the scope for improvement as more and more relevant attributes can be used in predicting the dependent variables.
      PubDate: 2017-05-17
      DOI: 10.3390/a10020057
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 58: A Flexible Pattern-Matching Algorithm for
           Network Intrusion Detection Systems Using Multi-Core Processors

    • Authors: Chun-Liang Lee, Tzu-Hao Yang
      First page: 58
      Abstract: As part of network security processes, network intrusion detection systems (NIDSs) determine whether incoming packets contain malicious patterns. Pattern matching, the key NIDS component, consumes large amounts of execution time. One of several trends involving general-purpose processors (GPPs) is their use in software-based NIDSs. In this paper, we describe our proposal for an efficient and flexible pattern-matching algorithm for inspecting packet payloads using a head-body finite automaton (HBFA). The proposed algorithm takes advantage of multi-core GPP parallelism and single-instruction multiple-data operations to achieve higher throughput compared to that resulting from traditional deterministic finite automata (DFA) using the Aho-Corasick algorithm. Whereas the head-body matching (HBM) algorithm is based on pre-defined DFA depth value, our HBFA algorithm is based on head size. Experimental results using Snort and ClamAV pattern sets indicate that the proposed algorithm achieves up to 58% higher throughput compared to its HBM counterpart.
      PubDate: 2017-05-24
      DOI: 10.3390/a10020058
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 59: Contradiction Detection with
           Contradiction-Specific Word Embedding

    • Authors: Luyang Li, Bing Qin, Ting Liu
      First page: 59
      Abstract: Contradiction detection is a task to recognize contradiction relations between a pair of sentences. Despite the effectiveness of traditional context-based word embedding learning algorithms in many natural language processing tasks, such algorithms are not powerful enough for contradiction detection. Contrasting words such as “overfull” and “empty” are mostly mapped into close vectors in such embedding space. To solve this problem, we develop a tailored neural network to learn contradiction-specific word embedding (CWE). The method can separate antonyms in the opposite ends of a spectrum. CWE is learned from a training corpus which is automatically generated from the paraphrase database, and is naturally applied as features to carry out contradiction detection in SemEval 2014 benchmark dataset. Experimental results show that CWE outperforms traditional context-based word embedding in contradiction detection. The proposed model for contradiction detection performs comparably with the top-performing system in accuracy of three-category classification and enhances the accuracy from 75.97% to 82.08% in the contradiction category.
      PubDate: 2017-05-24
      DOI: 10.3390/a10020059
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 60: Correction: A No Reference Image Quality
           Assessment Metric Based on Visual Perception. Algorithms 2016, 9, 87

    • Authors: Yan Fu, Shengchun Wang
      First page: 60
      Abstract: We would like to make the following change to our article [1]. [...]
      PubDate: 2017-05-26
      DOI: 10.3390/a10020060
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 61: Design and Implementation of a Multi-Modal
           Biometric System for Company Access Control

    • Authors: Elisabetta Stefani, Carlo Ferrari
      First page: 61
      Abstract: This paper is about the design, implementation, and deployment of a multi-modal biometric system to grant access to a company structure and to internal zones in the company itself. Face and iris have been chosen as biometric traits. Face is feasible for non-intrusive checking with a minimum cooperation from the subject, while iris supports very accurate recognition procedure at a higher grade of invasivity. The recognition of the face trait is based on the Local Binary Patterns histograms, and the Daughman’s method is implemented for the analysis of the iris data. The recognition process may require either the acquisition of the user’s face only or the serial acquisition of both the user’s face and iris, depending on the confidence level of the decision with respect to the set of security levels and requirements, stated in a formal way in the Service Level Agreement at a negotiation phase. The quality of the decision depends on the setting of proper different thresholds in the decision modules for the two biometric traits. Any time the quality of the decision is not good enough, the system activates proper rules, which ask for new acquisitions (and decisions), possibly with different threshold values, resulting in a system not with a fixed and predefined behaviour, but one which complies with the actual acquisition context. Rules are formalized as deduction rules and grouped together to represent “response behaviors” according to the previous analysis. Therefore, there are different possible working flows, since the actual response of the recognition process depends on the output of the decision making modules that compose the system. Finally, the deployment phase is described, together with the results from the testing, based on the AT&T Face Database and the UBIRIS database.
      PubDate: 2017-05-27
      DOI: 10.3390/a10020061
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 62: Influence Factors Analysis on the Modal
           Characteristics of Irregularly-Shaped Bridges Based on a Free-Interface
           Mode Synthesis Algorithm

    • Authors: Hanbing Liu, Mengsu Zhang, Xianqiang Wang, Shuai Tian, Yubo Jiao
      First page: 62
      Abstract: In order to relieve traffic congestion, irregularly-shaped bridges have been widely used in urban overpasses. However, the analysis on modal characteristics of irregularly-shaped bridges is not exhaustive, and the effect of design parameters on modal characteristics will be deeply investigated in future studies. In this paper, a novel strategy based on a free-interface mode synthesis algorithm is proposed to evaluate the parameters’ effect on the modal characteristics of irregularly-shaped bridges. First, a complicated, irregularly-shaped bridge is divided into several substructures based on its properties. Then, the modal characteristics of the overall structure can be obtained, only by a few low-order modal parameters of each substructure, using a free-interface mode synthesis method. A numerical model of a typical irregularly-shaped bridge is employed to verify the effectiveness of the proposed strategy. Simulation results reveal that the free-interface mode synthesis method possesses favorable calculation accuracy for analyzing the modal characteristics of irregularly-shaped bridges. The effect of design parameters such as ramp curve radius, diaphragm beam stiffness, cross-section feature, and bearing conditions on the modal characteristics of an irregularly-shaped bridge is evaluated in detail. Analysis results can provide references for further research into and the design of irregularly-shaped bridges.
      PubDate: 2017-05-28
      DOI: 10.3390/a10020062
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 63: Development of Filtered Bispectrum for EEG
           Signal Feature Extraction in Automatic Emotion Recognition Using
           Artificial Neural Networks

    • Authors: Prima Purnamasari, Anak Ratna, Benyamin Kusumoputro
      First page: 63
      Abstract: The development of automatic emotion detection systems has recently gained significant attention due to the growing possibility of their implementation in several applications, including affective computing and various fields within biomedical engineering. Use of the electroencephalograph (EEG) signal is preferred over facial expression, as people cannot control the EEG signal generated by their brain; the EEG ensures a stronger reliability in the psychological signal. However, because of its uniqueness between individuals and its vulnerability to noise, use of EEG signals can be rather complicated. In this paper, we propose a methodology to conduct EEG-based emotion recognition by using a filtered bispectrum as the feature extraction subsystem and an artificial neural network (ANN) as the classifier. The bispectrum is theoretically superior to the power spectrum because it can identify phase coupling between the nonlinear process components of the EEG signal. In the feature extraction process, to extract the information contained in the bispectrum matrices, a 3D pyramid filter is used for sampling and quantifying the bispectrum value. Experiment results show that the mean percentage of the bispectrum value from 5 × 5 non-overlapped 3D pyramid filters produces the highest recognition rate. We found that reducing the number of EEG channels down to only eight in the frontal area of the brain does not significantly affect the recognition rate, and the number of data samples used in the training process is then increased to improve the recognition rate of the system. We have also utilized a probabilistic neural network (PNN) as another classifier and compared its recognition rate with that of the back-propagation neural network (BPNN), and the results show that the PNN produces a comparable recognition rate and lower computational costs. Our research shows that the extracted bispectrum values of an EEG signal using 3D filtering as a feature extraction method is suitable for use in an EEG-based emotion recognition system.
      PubDate: 2017-05-30
      DOI: 10.3390/a10020063
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 64: Expanding the Applicability of Some High
           Order Househölder-Like Methods

    • Authors: Sergio Amat, Ioannis Argyros, Miguel Hernández-Verón, Natalia Romero
      First page: 64
      Abstract: This paper is devoted to the semilocal convergence of a Househölder-like method for nonlinear equations. The method includes many of the studied third order iterative methods. In the present study, we use our new idea of restricted convergence domains leading to smaller γ -parameters, which in turn lead to the following advantages over earlier works (and under the same computational cost): larger convergence domain; tighter error bounds on the distances involved, and at least as precise information on the location of the solution.
      PubDate: 2017-05-31
      DOI: 10.3390/a10020064
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 65: Seismic Signal Compression Using
           Nonparametric Bayesian Dictionary Learning via Clustering

    • Authors: Xin Tian, Song Li
      First page: 65
      Abstract: We introduce a seismic signal compression method based on nonparametric Bayesian dictionary learning method via clustering. The seismic data is compressed patch by patch, and the dictionary is learned online. Clustering is introduced for dictionary learning. A set of dictionaries could be generated, and each dictionary is used for one cluster’s sparse coding. In this way, the signals in one cluster could be well represented by their corresponding dictionaries. A nonparametric Bayesian dictionary learning method is used to learn the dictionaries, which naturally infers an appropriate dictionary size for each cluster. A uniform quantizer and an adaptive arithmetic coding algorithm are adopted to code the sparse coefficients. With comparisons to other state-of-the art approaches, the effectiveness of the proposed method could be validated in the experiments.
      PubDate: 2017-06-07
      DOI: 10.3390/a10020065
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 66: A New Approach to Image-Based Estimation of
           Food Volume

    • Authors: Hamid Hassannejad, Guido Matrella, Paolo Ciampolini, Ilaria Munari, Monica Mordonini, Stefano Cagnoni
      First page: 66
      Abstract: A balanced diet is the key to a healthy lifestyle and is crucial for preventing or dealing with many chronic diseases such as diabetes and obesity. Therefore, monitoring diet can be an effective way of improving people’s health. However, manual reporting of food intake has been shown to be inaccurate and often impractical. This paper presents a new approach to food intake quantity estimation using image-based modeling. The modeling method consists of three steps: firstly, a short video of the food is taken by the user’s smartphone. From such a video, six frames are selected based on the pictures’ viewpoints as determined by the smartphone’s orientation sensors. Secondly, the user marks one of the frames to seed an interactive segmentation algorithm. Segmentation is based on a Gaussian Mixture Model alongside the graph-cut algorithm. Finally, a customized image-based modeling algorithm generates a point-cloud to model the food. At the same time, a stochastic object-detection method locates a checkerboard used as size/ground reference. The modeling algorithm is optimized such that the use of six input images still results in an acceptable computation cost. In our evaluation procedure, we achieved an average accuracy of 92 % on a test set that includes images of different kinds of pasta and bread, with an average processing time of about 23 s.
      PubDate: 2017-06-10
      DOI: 10.3390/a10020066
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 67: Research on Misalignment Fault Isolation of
           Wind Turbines Based on the Mixed-Domain Features

    • Authors: Yancai Xiao, Yujia Wang, Huan Mu, Na Kang
      First page: 67
      Abstract: The misalignment of the drive system of the DFIG (Doubly Fed Induction Generator) wind turbine is one of the important factors that cause damage to the gears, bearings of the high-speed gearbox and the generator bearings. How to use the limited information to accurately determine the type of failure has become a difficult study for the scholars. In this paper, the time-domain indexes and frequency-domain indexes are extracted by using the vibration signals of various misaligned simulation conditions of the wind turbine drive system, and the time-frequency domain features—energy entropy are also extracted by the IEMD (Improved Empirical Mode Decomposition). A mixed-domain feature set is constructed by them. Then, SVM (Support Vector Machine) is used as the classifier, the mixed-domain features are used as the inputs of SVM, and PSO (Particle Swarm Optimization) is used to optimize the parameters of SVM. The fault types of misalignment are classified successfully. Compared with other methods, the accuracy of the given fault isolation model is improved.
      PubDate: 2017-06-10
      DOI: 10.3390/a10020067
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 68: An Easily Understandable Grey Wolf
           Optimizer and Its Application to Fuzzy Controller Tuning

    • Authors: Radu-Emil Precup, Radu-Codrut David, Alexandra-Iulia Szedlak-Stinean, Emil M. Petriu, Florin Dragan
      First page: 68
      Abstract: This paper proposes an easily understandable Grey Wolf Optimizer (GWO) applied to the optimal tuning of the parameters of Takagi-Sugeno proportional-integral fuzzy controllers (T-S PI-FCs). GWO is employed for solving optimization problems focused on the minimization of discrete-time objective functions defined as the weighted sum of the absolute value of the control error and of the squared output sensitivity function, and the vector variable consists of the tuning parameters of the T-S PI-FCs. Since the sensitivity functions are introduced with respect to the parametric variations of the process, solving these optimization problems is important as it leads to fuzzy control systems with a reduced process parametric sensitivity obtained by a GWO-based fuzzy controller tuning approach. GWO algorithms applied with this regard are formulated in easily understandable terms for both vector and scalar operations, and discussions on stability, convergence, and parameter settings are offered. The controlled processes referred to in the course of this paper belong to a family of nonlinear servo systems, which are modeled by second order dynamics plus a saturation and dead zone static nonlinearity. Experimental results concerning the angular position control of a laboratory servo system are included for validating the proposed method.
      PubDate: 2017-06-10
      DOI: 10.3390/a10020068
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 69: Cross-Language Plagiarism Detection System
           Using Latent Semantic Analysis and Learning Vector Quantization

    • Authors: Anak Agung Putri Ratna, Prima Dewi Purnamasari, Boma Anantasatya Adhi, F. Astha Ekadiyanto, Muhammad Salman, Mardiyah Mardiyah, Darien Jonathan Winata
      First page: 69
      Abstract: Computerized cross-language plagiarism detection has recently become essential. With the scarcity of scientific publications in Bahasa Indonesia, many Indonesian authors frequently consult publications in English in order to boost the quantity of scientific publications in Bahasa Indonesia (which is currently rising). Due to the syntax disparity between Bahasa Indonesia and English, most of the existing methods for automated cross-language plagiarism detection do not provide satisfactory results. This paper analyses the probability of developing Latent Semantic Analysis (LSA) for a computerized cross-language plagiarism detector for two languages with different syntax. To improve performance, various alterations in LSA are suggested. By using a linear vector quantization (LVQ) classifier in the LSA and taking into account the Frobenius norm, output has reached up to 65.98% in accuracy. The results of the experiments showed that the best accuracy achieved is 87% with a document size of 6 words, and the document definition size must be kept below 10 words in order to maintain high accuracy. Additionally, based on experimental results, this paper suggests utilizing the frequency occurrence method as opposed to the binary method for the term–document matrix construction.
      PubDate: 2017-06-13
      DOI: 10.3390/a10020069
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 70: An Improved Brain-Inspired Emotional
           Learning Algorithm for Fast Classification

    • Authors: Ying Mei, Guanzheng Tan, Zhentao Liu
      First page: 70
      Abstract: Classification is an important task of machine intelligence in the field of information. The artificial neural network (ANN) is widely used for classification. However, the traditional ANN shows slow training speed, and it is hard to meet the real-time requirement for large-scale applications. In this paper, an improved brain-inspired emotional learning (BEL) algorithm is proposed for fast classification. The BEL algorithm was put forward to mimic the high speed of the emotional learning mechanism in mammalian brain, which has the superior features of fast learning and low computational complexity. To improve the accuracy of BEL in classification, the genetic algorithm (GA) is adopted for optimally tuning the weights and biases of amygdala and orbitofrontal cortex in the BEL neural network. The combinational algorithm named as GA-BEL has been tested on eight University of California at Irvine (UCI) datasets and two well-known databases (Japanese Female Facial Expression, Cohn–Kanade). The comparisons of experiments indicate that the proposed GA-BEL is more accurate than the original BEL algorithm, and it is much faster than the traditional algorithm.
      PubDate: 2017-06-14
      DOI: 10.3390/a10020070
      Issue No: Vol. 10, No. 2 (2017)
       
  • Algorithms, Vol. 10, Pages 71: Bayesian and Classical Estimation of
           Stress-Strength Reliability for Inverse Weibull Lifetime Models

    • Authors: Qixuan Bi, Wenhao Gui
      First page: 71
      Abstract: In this paper, we consider the problem of estimating stress-strength reliability for inverse Weibull lifetime models having the same shape parameters but different scale parameters. We obtain the maximum likelihood estimator and its asymptotic distribution. Since the classical estimator doesn’t hold explicit forms, we propose an approximate maximum likelihood estimator. The asymptotic confidence interval and two bootstrap intervals are obtained. Using the Gibbs sampling technique, Bayesian estimator and the corresponding credible interval are obtained. The Metropolis-Hastings algorithm is used to generate random variates. Monte Carlo simulations are conducted to compare the proposed methods. Analysis of a real dataset is performed.
      PubDate: 2017-06-21
      DOI: 10.3390/a10020071
      Issue No: Vol. 10, No. 2 (2017)
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
Home (Search)
Subjects A-Z
Publishers A-Z
Customise
APIs
Your IP address: 54.90.119.59
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-