Skip to main content

Showing 51–100 of 100 results for author: Abraham, A

.
  1. ACO for Continuous Function Optimization: A Performance Analysis

    Authors: Varun Kumar Ojha, Ajith Abraham, Vaclav Snasel

    Abstract: The performance of the meta-heuristic algorithms often depends on their parameter settings. Appropriate tuning of the underlying parameters can drastically improve the performance of a meta-heuristic. The Ant Colony Optimization (ACO), a population based meta-heuristic algorithm inspired by the foraging behavior of the ants, is no different. Fundamentally, the ACO depends on the construction of ne… ▽ More

    Submitted 6 July, 2017; originally announced July 2017.

  2. Simultaneous Optimization of Neural Network Weights and Active Nodes using Metaheuristics

    Authors: Varun Kumar Ojha, Ajith Abraham, Vaclav Snasel

    Abstract: Optimization of neural network (NN) significantly influenced by the transfer function used in its active nodes. It has been observed that the homogeneity in the activation nodes does not provide the best solution. Therefore, the customizable transfer functions whose underlying parameters are subjected to optimization were used to provide heterogeneity to NN. For the experimental purpose, a meta-he… ▽ More

    Submitted 6 July, 2017; originally announced July 2017.

  3. Dimensionality reduction, and function approximation of poly(lactic-co-glycolic acid) micro- and nanoparticle dissolution rate

    Authors: Varun Kumar Ojha, Konrad Jackowski, Ajith Abraham, Václav Snášel

    Abstract: Prediction of poly(lactic co glycolic acid) (PLGA) micro- and nanoparticles' dissolution rates plays a significant role in pharmaceutical and medical industries. The prediction of PLGA dissolution rate is crucial for drug manufacturing. Therefore, a model that predicts the PLGA dissolution rate could be beneficial. PLGA dissolution is influenced by numerous factors (features), and counting the kno… ▽ More

    Submitted 16 May, 2017; originally announced May 2017.

    Journal ref: International Journal of Nanomedicine 2015,10

  4. Multiobjective Programming for Type-2 Hierarchical Fuzzy Inference Trees

    Authors: Varun Kumar Ojha, Vaclav Snasel, Ajith Abraham

    Abstract: This paper proposes a design of hierarchical fuzzy inference tree (HFIT). An HFIT produces an optimum treelike structure, i.e., a natural hierarchical structure that accommodates simplicity by combining several low-dimensional fuzzy inference systems (FISs). Such a natural hierarchical structure provides a high degree of approximation accuracy. The construction of HFIT takes place in two phases. F… ▽ More

    Submitted 16 May, 2017; originally announced May 2017.

    Journal ref: IEEE Transactions on Fuzzy Systems 2017

  5. Ensemble of heterogeneous flexible neural trees using multiobjective genetic programming

    Authors: Varun Kumar Ojha, Ajith Abraham, Václav Snášel

    Abstract: Machine learning algorithms are inherently multiobjective in nature, where approximation error minimization and model's complexity simplification are two conflicting objectives. We proposed a multiobjective genetic programming (MOGP) for creating a heterogeneous flexible neural tree (HFNT), tree-like flexible feedforward neural network model. The functional heterogeneity in neural tree nodes was i… ▽ More

    Submitted 16 May, 2017; originally announced May 2017.

    Journal ref: Applied Soft Computing, 2017, Volume 52 Pages 909 to 924

  6. Metaheuristic Design of Feedforward Neural Networks: A Review of Two Decades of Research

    Authors: Varun Kumar Ojha, Ajith Abraham, Václav Snášel

    Abstract: Over the past two decades, the feedforward neural network (FNN) optimization has been a key interest among the researchers and practitioners of multiple disciplines. The FNN optimization is often viewed from the various perspectives: the optimization of weights, network architecture, activation nodes, learning parameters, learning environment, etc. Researchers adopted such different viewpoints mai… ▽ More

    Submitted 16 May, 2017; originally announced May 2017.

    Journal ref: Engineering Applications of Artificial Intelligence Volume 60, April 2017, Pages 97 to 116

  7. CHAOS: A Parallelization Scheme for Training Convolutional Neural Networks on Intel Xeon Phi

    Authors: Andre Viebke, Suejb Memeti, Sabri Pllana, Ajith Abraham

    Abstract: Deep learning is an important component of big-data analytic tools and intelligent applications, such as, self-driving cars, computer vision, speech recognition, or precision medicine. However, the training process is computationally intensive, and often requires a large amount of time if performed sequentially. Modern parallel computing systems provide the capability to reduce the required traini… ▽ More

    Submitted 25 February, 2017; originally announced February 2017.

    Comments: The Journal of Supercomputing, 2017

  8. Deriving reproducible biomarkers from multi-site resting-state data: An Autism-based example

    Authors: Alexandre Abraham, Michael Milham, Adriana Di Martino, R. Cameron Craddock, Dimitris Samaras, Bertrand Thirion, Gaël Varoquaux

    Abstract: Resting-state functional Magnetic Resonance Imaging (R-fMRI) holds the promise to reveal functional biomarkers of neuropsychiatric disorders. However, extracting such biomarkers is challenging for complex multi-faceted neuropatholo-gies, such as autism spectrum disorders. Large multi-site datasets increase sample sizes to compensate for this complexity, at the cost of uncontrolled heterogeneity. T… ▽ More

    Submitted 18 November, 2016; originally announced November 2016.

    Comments: in NeuroImage, Elsevier, 2016

  9. CLEAR: Cross-Layer Exploration for Architecting Resilience - Combining Hardware and Software Techniques to Tolerate Soft Errors in Processor Cores

    Authors: Eric Cheng, Shahrzad Mirkhani, Lukasz G. Szafaryn, Chen-Yong Cher, Hyungmin Cho, Kevin Skadron, Mircea R. Stan, Klas Lilja, Jacob A. Abraham, Pradip Bose, Subhasish Mitra

    Abstract: We present a first of its kind framework which overcomes a major challenge in the design of digital systems that are resilient to reliability failures: achieve desired resilience targets at minimal costs (energy, power, execution time, area) by combining resilience techniques across various layers of the system stack (circuit, logic, architecture, software, algorithm). This is also referred to as… ▽ More

    Submitted 23 June, 2016; v1 submitted 11 April, 2016; originally announced April 2016.

    Comments: Extended version of paper published in Proceedings of the 53rd Annual Design Automation Conference

    ACM Class: B.8.1

  10. arXiv:1412.3925  [pdf, other

    q-bio.NC cs.CV

    Region segmentation for sparse decompositions: better brain parcellations from rest fMRI

    Authors: Alexandre Abraham, Elvis Dohmatob, Bertrand Thirion, Dimitris Samaras, Gael Varoquaux

    Abstract: Functional Magnetic Resonance Images acquired during resting-state provide information about the functional organization of the brain through measuring correlations between brain areas. Independent components analysis is the reference approach to estimate spatial components from weakly structured data such as brain signal time courses; each of these components may be referred to as a brain network… ▽ More

    Submitted 12 December, 2014; originally announced December 2014.

    Journal ref: Sparsity Techniques in Medical Imaging, Sep 2014, Boston, United States. pp.8

  11. arXiv:1412.3919  [pdf, other

    cs.LG cs.CV stat.ML

    Machine Learning for Neuroimaging with Scikit-Learn

    Authors: Alexandre Abraham, Fabian Pedregosa, Michael Eickenberg, Philippe Gervais, Andreas Muller, Jean Kossaifi, Alexandre Gramfort, Bertrand Thirion, Gäel Varoquaux

    Abstract: Statistical machine learning methods are increasingly used for neuroimaging data analysis. Their main virtue is their ability to model high-dimensional datasets, e.g. multivariate analysis of activation images or resting-state time series. Supervised learning is typically used in decoding or encoding settings to relate brain images to behavioral or clinical observations, while unsupervised learnin… ▽ More

    Submitted 12 December, 2014; originally announced December 2014.

    Comments: Frontiers in neuroscience, Frontiers Research Foundation, 2013, pp.15

  12. arXiv:1404.5528  [pdf

    cs.DC cs.AI

    Hybrid Genetic Algorithm for Cloud Computing Applications

    Authors: Saeed Javanmardi, Mohammad Shojafar, Danilo Amendola, Nicola Cordeschi, Hongbo Liu, Ajith Abraham

    Abstract: In this paper with the aid of genetic algorithm and fuzzy theory, we present a hybrid job scheduling approach, which considers the load balancing of the system and reduces total execution time and execution cost. We try to modify the standard Genetic algorithm and to reduce the iteration of creating population with the aid of fuzzy theory. The main goal of this research is to assign the jobs to th… ▽ More

    Submitted 22 April, 2014; originally announced April 2014.

    Comments: 10 Pages, 5 figures, 1 table, IBICA2014, Accepted to publish

    ACM Class: C.2.4

  13. arXiv:1111.4545  [pdf

    cs.CR

    Grid Security and Integration with Minimal Performance Degradation

    Authors: Sugata Sanyal, Rangarajan A. Vasudevan, Ajith Abraham, Marcin Paprzycki

    Abstract: Computational grids are believed to be the ultimate framework to meet the growing computational needs of the scientific community. Here, the processing power of geographically distributed resources working under different ownerships, having their own access policy, cost structure and the likes, is logically coupled to make them perform as a unified resource. The continuous increase of availability… ▽ More

    Submitted 19 November, 2011; originally announced November 2011.

    Comments: 8 Pages, 1 Figure

    Journal ref: Journal of Digital Information Management, Vol. 2, Issue 2, September, 2004

  14. CompChall: Addressing Password Guessing Attacks

    Authors: Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal

    Abstract: Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online and offline. While offline dictionary attacks are possible only if the adversary is able to collect data for a successful protocol execution by eavesdrop** on the communication channel and can be successfully countered… ▽ More

    Submitted 16 November, 2011; originally announced November 2011.

    Comments: 6 Pages, 1 Figure; International Conference on Information Technology: Coding and Computing, 2005. ITCC 2005

  15. arXiv:1111.3010  [pdf

    cs.CR

    A Multi-Factor Security Protocol for Wireless Payment - Secure Web Authentication using Mobile Devices

    Authors: Ayu Tiwari, Sudip Sanyal, Ajith Abraham, Svein Johan Knapskog, Sugata Sanyal

    Abstract: Previous Web access authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. This paper proposes a new protocol using multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce extra security level with the traditional Logi… ▽ More

    Submitted 13 November, 2011; originally announced November 2011.

    Comments: 8 Pages, 3 Figures; IADIS International Conference on Applied Computing Proceedings of the IADIS International Conference on Applied Computing, Salamanca, Spain, 18-20 February 2007

  16. arXiv:1003.5509  [pdf

    cs.CR

    An LSB Data Hiding Technique Using Prime Numbers

    Authors: Sandipan Dey, Ajith Abraham, Sugata Sanyal

    Abstract: In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al. First we mathematically model and generalize our approach. Then we propose our novel technique, based on decomposition of a number (pixel-value) in sum of prime numbers. The particular representation generates a different set of (virtual) bit-planes a… ▽ More

    Submitted 29 March, 2010; originally announced March 2010.

    Comments: 6 Pages, 7 Figures, Third International Symposium on Information Assurance and Security, August 29-31, 2007, Manchester, United Kingdom, IEEE Computer Society press, USA, ISBN 0-7695-2876-7, pp. 101-106, 2007.

  17. arXiv:1003.4036  [pdf, other

    cs.GR

    A Very Simple Approach for 3-D to 2-D Map**

    Authors: Sandipan Dey, Ajith Abraham, Sugata Sanyal

    Abstract: Many times we need to plot 3-D functions e.g., in many scientificc experiments. To plot this 3-D functions on 2-D screen it requires some kind of map**. Though OpenGL, DirectX etc 3-D rendering libraries have made this job very simple, still these libraries come with many complex pre- operations that are simply not intended, also to integrate these libraries with any kind of system is often a t… ▽ More

    Submitted 21 March, 2010; originally announced March 2010.

    Comments: 7 Pages, 5 Figures,

    Journal ref: International Journal on Image Processing and Communications , Poland, Editor-in-Chief: R. S. Choras; Volume 11, No. 2, pp. 75 - 82, 2007.

  18. An LSB Data Hiding Technique Using Natural Numbers

    Authors: Sandipan Dey, Ajith Abraham, Sugata Sanyal

    Abstract: In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al,based on decomposition of a number (pixel-value) in sum of natural numbers. This particular representation again generates a different set of (virtual) bit-planes altogether, suitable for embedding purposes. We get more bit-planes than that we get usin… ▽ More

    Submitted 20 March, 2010; originally announced March 2010.

    Comments: 6 Pages, 5 Figures, IEEE Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007, Nov 26-28, 2007, Kaohsiung City, Taiwan, IEEE Computer Society press, USA, ISBN 0-7695-2994-1, pp. 473-476, 2007.

  19. arXiv:1003.3672  [pdf, other

    cs.CR

    Data Hiding Techniques Using Prime and Natural Numbers

    Authors: Sandipan Dey, Ajith Abraham, Bijoy Bandyopadhyay, Sugata Sanyal

    Abstract: In this paper, a few novel data hiding techniques are proposed. These techniques are improvements over the classical LSB data hiding technique and the Fibonacci LSB data-hiding technique proposed by Battisti et al. \cite{r1}. The classical LSB technique is the simplest, but using this technique it is possible to embed only in first few bit-planes, since image quality becomes drastically distorted… ▽ More

    Submitted 18 March, 2010; originally announced March 2010.

    Comments: 45 Pages, 14 Figures, 5 Tables

    Journal ref: Journal of Digital Information Management, ISSN 0972-7272, Volume 6, No 3, pp. 463-485, 2008.

  20. arXiv:1002.4530  [pdf

    cs.CR

    A Novel Scheme for Secured Data Transfer Over Computer Networks

    Authors: Rangarajan Athi Vasudevan, Ajith Abraham, Sugata Sanyal

    Abstract: This paper presents a novel encryption-less algorithm to enhance security in transmission of data in networks. The algorithm uses an intuitively simple idea of a "jigsaw puzzle" to break the transformed data into multiple parts where these parts form the pieces of the puzzle. Then these parts are packaged into packets and sent to the receiver. A secure and efficient mechanism is provided to conv… ▽ More

    Submitted 24 February, 2010; originally announced February 2010.

    Comments: 18 Pages, 6 figures, published in Journal of Universal Computer Science, 2005

  21. arXiv:0712.0744  [pdf

    cs.MA cs.AI q-bio.PE q-bio.QM

    Computational Chemotaxis in Ants and Bacteria over Dynamic Environments

    Authors: Vitorino Ramos, C. M. Fernandes, A. C. Rosa, A. Abraham

    Abstract: Chemotaxis can be defined as an innate behavioural response by an organism to a directional stimulus, in which bacteria, and other single-cell or multicellular organisms direct their movements according to certain chemicals in their environment. This is important for bacteria to find food (e.g., glucose) by swimming towards the highest concentration of food molecules, or to flee from poisons. Ba… ▽ More

    Submitted 5 December, 2007; originally announced December 2007.

    Comments: 8 pages, 6 figures, in CEC 07 - IEEE Congress on Evolutionary Computation, ISBN 1-4244-1340-0, pp. 1009-1017, Sep. 2007

    ACM Class: I.2; I.2.11; G.1.6

  22. Swarms on Continuous Data

    Authors: Vitorino Ramos, Ajith Abraham

    Abstract: While being it extremely important, many Exploratory Data Analysis (EDA) systems have the inhability to perform classification and visualization in a continuous basis or to self-organize new data-items into the older ones (evenmore into new labels if necessary), which can be crucial in KDD - Knowledge Discovery, Retrieval and Data Mining Systems (interactive and online forms of Web Applications… ▽ More

    Submitted 17 December, 2004; originally announced December 2004.

    Comments: 6 pages, 3 figures, at http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_45.html

    ACM Class: I.5; I.5.3; I.4; I.2.11

    Journal ref: CEC 03 - Congress on Evolutionary Computation, IEEE Press, ISBN 0780378040, pp.1370-1375, Canberra, Australia, 8-12 Dec. 2003

  23. Web Usage Mining Using Artificial Ant Colony Clustering and Genetic Programming

    Authors: Ajith Abraham, Vitorino Ramos

    Abstract: The rapid e-commerce growth has made both business community and customers face a new situation. Due to intense competition on one hand and the customer's option to choose from several alternatives business community has realized the necessity of intelligent marketing strategies and relationship management. Web usage mining attempts to discover useful knowledge from the secondary data obtained f… ▽ More

    Submitted 17 December, 2004; originally announced December 2004.

    Comments: 8 pages, 11 figures, at http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_48.html

    ACM Class: I.5; I.5.3; I.4; I.2.11

    Journal ref: CEC 03 - Congress on Evolutionary Computation, IEEE Press, ISBN 0780378040, pp.1384-1391, Canberra, Australia, 8-12 Dec. 2003

  24. arXiv:cs/0412068  [pdf

    cs.CR cs.AI

    ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System

    Authors: Vitorino Ramos, Ajith Abraham

    Abstract: Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems against threats to confidentiality, integrity, and availability. There are two types of intruders: the external intruders who are unauthorized users of the machines they attack, and internal intruders, who have permission to… ▽ More

    Submitted 17 December, 2004; originally announced December 2004.

    Comments: 13 pages, 3 figures, Swarm Intelligence and Patterns (SIP)- special track at WSTST 2005, Muroran, JAPAN

    ACM Class: H.3.3; I.2.11; I.5

  25. arXiv:cs/0405061  [pdf

    cs.CR

    Jigsaw-based Security in Data Transfer in Computer Networks

    Authors: Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal, Dharma P. Agrawal

    Abstract: In this paper, we present a novel encryption-less algorithm to enhance security in transmission of data in networks. The algorithm uses an intuitively simple idea of a 'jigsaw puzzle' to break the transformed data into multiple parts where these parts form the pieces of the puzzle. Then these parts are packaged into packets and sent to the receiver. A secure and efficient mechanism is provided t… ▽ More

    Submitted 17 May, 2004; originally announced May 2004.

    ACM Class: E.3

    Journal ref: IEEE International Conference on Information Technology: Coding and Computing (ITCC'04), USA, IEEE Computer Society, Volume 1, pp. 2-6, 2004

  26. arXiv:cs/0405052  [pdf

    cs.AI

    Decision Support Systems Using Intelligent Paradigms

    Authors: Cong Tran, Ajith Abraham, Lakhmi Jain

    Abstract: Decision-making is a process of choosing among alternative courses of action for solving complicated problems where multi-criteria objectives are involved. The past few years have witnessed a growing recognition of Soft Computing (SC) technologies that underlie the conception, design and utilization of intelligent systems. In this paper, we present different SC paradigms involving an artificial… ▽ More

    Submitted 15 May, 2004; originally announced May 2004.

    ACM Class: I.2.0

    Journal ref: International Journal of American Romanian Academy of Arts and Sciences, 2004 (forth coming)

  27. arXiv:cs/0405051  [pdf

    cs.AI

    Short Term Load Forecasting Models in Czech Republic Using Soft Computing Paradigms

    Authors: Muhammad Riaz Khan, Ajith Abraham

    Abstract: This paper presents a comparative study of six soft computing models namely multilayer perceptron networks, Elman recurrent neural network, radial basis function network, Hopfield model, fuzzy inference system and hybrid fuzzy neural network for the hourly electricity demand forecast of Czech Republic. The soft computing models were trained and tested using the actual hourly load data for seven… ▽ More

    Submitted 15 May, 2004; originally announced May 2004.

    ACM Class: I.2.0

    Journal ref: International Journal of Knowledge-Based Intelligent Engineering Systems, IOS Press Netherlands, Volume 7, Number 4, pp. 172-179, 2003

  28. arXiv:cs/0405050  [pdf

    cs.AI

    Traffic Accident Analysis Using Decision Trees and Neural Networks

    Authors: Miao M. Chong, Ajith Abraham, Marcin Paprzycki

    Abstract: The costs of fatalities and injuries due to traffic accident have a great impact on society. This paper presents our research to model the severity of injury resulting from traffic accidents using artificial neural networks and decision trees. We have applied them to an actual data set obtained from the National Automotive Sampling System (NASS) General Estimates System (GES). Experiment results… ▽ More

    Submitted 15 May, 2004; originally announced May 2004.

    ACM Class: I.2.0

    Journal ref: IADIS International Conference on Applied Computing, Portugal, IADIS Press, Pedro Isaias et al. (Eds.), ISBN: 9729894736, Volume 2, pp. 39-42, 2004

  29. arXiv:cs/0405049  [pdf

    cs.AI

    Export Behaviour Modeling Using EvoNF Approach

    Authors: Ron Edwards, Ajith Abraham, Sonja Petrovic-Lazarevic

    Abstract: The academic literature suggests that the extent of exporting by multinational corporation subsidiaries (MCS) depends on their product manufactured, resources, tax protection, customers and markets, involvement strategy, financial independence and suppliers' relationship with a multinational corporation (MNC). The aim of this paper is to model the complex export pattern behaviour using a Takagi-… ▽ More

    Submitted 15 May, 2004; originally announced May 2004.

    ACM Class: I.2.0

    Journal ref: The International Conference on Computational Science 2003 (ICCS 2003), Springer Verlag, Lecture Notes in Computer Science Volume 2660, Sloot P.M.A. et al (Eds.), pp. 169-178, 2003

  30. arXiv:cs/0405046  [pdf

    cs.CR

    Soft Computing Models for Network Intrusion Detection Systems

    Authors: Ajith Abraham, Ravi Jain

    Abstract: Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems against threats to confidentiality, integrity, and availability. There are two types of intruders: external intruders, who are unauthorized users of the machines they attack, and internal intruders, who have permission to acc… ▽ More

    Submitted 13 May, 2004; originally announced May 2004.

    ACM Class: K.6.5

    Journal ref: Soft Computing in Knowledge Discovery: Methods and Applications, Saman Halgamuge and Lipo Wang (Eds.), Studies in Fuzziness and Soft Computing, Springer Verlag Germany, Chapter 16, 20 pages, 2004

  31. Optimization of Evolutionary Neural Networks Using Hybrid Learning Algorithms

    Authors: Ajith Abraham

    Abstract: Evolutionary artificial neural networks (EANNs) refer to a special class of artificial neural networks (ANNs) in which evolution is another fundamental form of adaptation in addition to learning. Evolutionary algorithms are used to adapt the connection weights, network architecture and learning algorithms according to the problem environment. Even though evolutionary algorithms are well known as… ▽ More

    Submitted 6 May, 2004; originally announced May 2004.

    ACM Class: 1.2.0

    Journal ref: IEEE International Joint Conference on Neural Networks (IJCNN'02), 2002 IEEE World Congress on Computational Intelligence, Hawaii, ISBN 0780372786, IEEE Press, Volume 3, pp. 2797-2802, 2002

  32. EvoNF: A Framework for Optimization of Fuzzy Inference Systems Using Neural Network Learning and Evolutionary Computation

    Authors: Ajith Abraham

    Abstract: Several adaptation techniques have been investigated to optimize fuzzy inference systems. Neural network learning algorithms have been used to determine the parameters of fuzzy inference system. Such models are often called as integrated neuro-fuzzy models. In an integrated neuro-fuzzy model there is no guarantee that the neural network learning algorithm converges and the tuning of fuzzy infere… ▽ More

    Submitted 6 May, 2004; originally announced May 2004.

    ACM Class: 1.2.0

    Journal ref: The 17th IEEE International Symposium on Intelligent Control, ISIC'02, IEEE Press, ISBN 0780376218, pp 327-332, 2002

  33. arXiv:cs/0405031  [pdf

    cs.AI

    Adaptation of Mamdani Fuzzy Inference System Using Neuro - Genetic Approach for Tactical Air Combat Decision Support System

    Authors: Cong Tran, Lakhmi Jain, Ajith Abraham

    Abstract: Normally a decision support system is build to solve problem where multi-criteria decisions are involved. The knowledge base is the vital part of the decision support containing the information or data that is used in decision-making process. This is the field where engineers and scientists have applied several intelligent techniques and heuristics to obtain optimal decisions from imprecise info… ▽ More

    Submitted 6 May, 2004; originally announced May 2004.

    ACM Class: 1.2.0

    Journal ref: 15th Australian Joint Conference on Artificial Intelligence (AI'02) Australia, LNAI 2557, Springer Verlag, Germany, pp. 672-679, 2002

  34. arXiv:cs/0405030  [pdf

    cs.AI

    Business Intelligence from Web Usage Mining

    Authors: Ajith Abraham

    Abstract: The rapid e-commerce growth has made both business community and customers face a new situation. Due to intense competition on one hand and the customer's option to choose from several alternatives business community has realized the necessity of intelligent marketing strategies and relationship management. Web usage mining attempts to discover useful knowledge from the secondary data obtained f… ▽ More

    Submitted 6 May, 2004; originally announced May 2004.

    ACM Class: 1.2.0

    Journal ref: Journal of Information & Knowledge Management (JIKM), World Scientific Publishing Co., Singapore, Vol. 2, No. 4, pp. 375-390, 2003

  35. Analysis of Hybrid Soft and Hard Computing Techniques for Forex Monitoring Systems

    Authors: Ajith Abraham

    Abstract: In a universe with a single currency, there would be no foreign exchange market, no foreign exchange rates, and no foreign exchange. Over the past twenty-five years, the way the market has performed those tasks has changed enormously. The need for intelligent monitoring systems has become a necessity to keep track of the complex forex market. The vast currency market is a foreign concept to the… ▽ More

    Submitted 6 May, 2004; originally announced May 2004.

    ACM Class: 1.2.0

    Journal ref: IEEE International Conference on Fuzzy Systems (IEEE FUZZ'02), 2002 IEEE World Congress on Computational Intelligence, Hawaii, ISBN 0780372808, IEEE Press pp. 1616 -1622, 2002

  36. A Concurrent Fuzzy-Neural Network Approach for Decision Support Systems

    Authors: Cong Tran, Ajith Abraham, Lakhmi Jain

    Abstract: Decision-making is a process of choosing among alternative courses of action for solving complicated problems where multi-criteria objectives are involved. The past few years have witnessed a growing recognition of Soft Computing technologies that underlie the conception, design and utilization of intelligent systems. Several works have been done where engineers and scientists have applied intel… ▽ More

    Submitted 6 May, 2004; originally announced May 2004.

    ACM Class: I.2.0

    Journal ref: The IEEE International Conference on Fuzzy Systems, FUZZ-IEEE'03, IEEE Press, ISBN 0780378113, pp. 1092-1097, 2003

  37. arXiv:cs/0405025  [pdf

    cs.AI

    The Largest Compatible Subset Problem for Phylogenetic Data

    Authors: Andy Auyeung, Ajith Abraham

    Abstract: The phylogenetic tree construction is to infer the evolutionary relationship between species from the experimental data. However, the experimental data are often imperfect and conflicting each others. Therefore, it is important to extract the motif from the imperfect data. The largest compatible subset problem is that, given a set of experimental data, we want to discard the minimum such that th… ▽ More

    Submitted 6 May, 2004; originally announced May 2004.

    ACM Class: I.2.0

    Journal ref: Genetic and Evolutionary Computation 2004 Conference (GECCO-2004), Bird-of-a-feather Workshop On Application of Hybrid Evolutionary Algorithms to Complex Optimization Problems, Springer Verlag Germany, 2004 (forth coming)

  38. arXiv:cs/0405024  [pdf

    cs.AI

    Meta-Learning Evolutionary Artificial Neural Networks

    Authors: Ajith Abraham

    Abstract: In this paper, we present MLEANN (Meta-Learning Evolutionary Artificial Neural Network), an automatic computational framework for the adaptive optimization of artificial neural networks wherein the neural network architecture, activation function, connection weights; learning algorithm and its parameters are adapted according to the problem. We explored the performance of MLEANN and conventional… ▽ More

    Submitted 6 May, 2004; originally announced May 2004.

    ACM Class: I.2.0

    Journal ref: Neurocomputing Journal, Elsevier Science, Netherlands, Vol. 56c, pp. 1-38, 2004

  39. arXiv:cs/0405019  [pdf

    cs.AI

    Hybrid Fuzzy-Linear Programming Approach for Multi Criteria Decision Making Problems

    Authors: Sonja Petrovic-Lazarevic, Ajith Abraham

    Abstract: The purpose of this paper is to point to the usefulness of applying a linear mathematical formulation of fuzzy multiple criteria objective decision methods in organising business activities. In this respect fuzzy parameters of linear programming are modelled by preference-based membership functions. This paper begins with an introduction and some related research followed by some fundamentals of… ▽ More

    Submitted 4 May, 2004; originally announced May 2004.

    ACM Class: I.2.0

    Journal ref: International Journal of Neural, Parallel & Scientific Computations, USA, Volume 11, Issues (1&2), pp. 53-68, 2003

  40. arXiv:cs/0405018  [pdf

    cs.AI

    Modeling Chaotic Behavior of Stock Indices Using Intelligent Paradigms

    Authors: Ajith Abraham, Ninan Sajith Philip, P. Saratchandran

    Abstract: The use of intelligent systems for stock market predictions has been widely established. In this paper, we investigate how the seemingly chaotic behavior of stock markets could be well represented using several connectionist paradigms and soft computing techniques. To demonstrate the different techniques, we considered Nasdaq-100 index of Nasdaq Stock MarketS and the S&P CNX NIFTY stock index. W… ▽ More

    Submitted 4 May, 2004; originally announced May 2004.

    ACM Class: I.2.0

    Journal ref: International Journal of Neural, Parallel & Scientific Computations, USA, Volume 11, Issue (1&2), pp. 143-160, 2003

  41. arXiv:cs/0405017  [pdf

    cs.AI

    Data Mining Approach for Analyzing Call Center Performance

    Authors: Marcin Paprzycki, Ajith Abraham, Ruiyuan Guo

    Abstract: The aim of our research was to apply well-known data mining techniques (such as linear neural networks, multi-layered perceptrons, probabilistic neural networks, classification and regression trees, support vector machines and finally a hybrid decision tree neural network approach) to the problem of predicting the quality of service in call centers; based on the performance data actually collect… ▽ More

    Submitted 4 May, 2004; originally announced May 2004.

    ACM Class: I.2.0

    Journal ref: The 17th International Conference on Industrial & Engineering Applications of Artificial Intelligence and Expert Systems, Canada, Springer Verlag, Germany, 2004 (forth coming)

  42. arXiv:cs/0405016  [pdf

    cs.AI

    Intrusion Detection Systems Using Adaptive Regression Splines

    Authors: Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham, Vitorino Ramos

    Abstract: Past few years have witnessed a growing recognition of intelligent techniques for the construction of efficient and reliable intrusion detection systems. Due to increasing incidents of cyber attacks, building effective intrusion detection systems (IDS) are essential for protecting information systems security, and yet it remains an elusive goal and a great challenge. In this paper, we report a p… ▽ More

    Submitted 4 May, 2004; originally announced May 2004.

    ACM Class: C.2.0

    Journal ref: 6th International Conference on Enterprise Information Systems, ICEIS'04, Portugal, I. Seruca, J. Filipe, S. Hammoudi and J. Cordeiro (Eds.), ISBN 972-8865-00-7, Vol. 3, pp. 26-33, 2004

  43. arXiv:cs/0405014  [pdf

    cs.AI

    Estimating Genome Reversal Distance by Genetic Algorithm

    Authors: Andy AuYeung, Ajith Abraham

    Abstract: Sorting by reversals is an important problem in inferring the evolutionary relationship between two genomes. The problem of sorting unsigned permutation has been proven to be NP-hard. The best guaranteed error bounded is the 3/2- approximation algorithm. However, the problem of sorting signed permutation can be solved easily. Fast algorithms have been developed both for finding the sorting seque… ▽ More

    Submitted 4 May, 2004; originally announced May 2004.

    ACM Class: I.2.0

    Journal ref: 2003 IEEE Congress on Evolutionary Computation (CEC2003), Australia, IEEE Press, ISBN 0780378040, pp. 1157-1161, 2003

  44. arXiv:cs/0405013  [pdf

    cs.AI

    DCT Based Texture Classification Using Soft Computing Approach

    Authors: Golam Sorwar, Ajith Abraham

    Abstract: Classification of texture pattern is one of the most important problems in pattern recognition. In this paper, we present a classification method based on the Discrete Cosine Transform (DCT) coefficients of texture image. As DCT works on gray level image, the color scheme of each image is transformed into gray levels. For classifying the images using DCT we used two popular soft computing techni… ▽ More

    Submitted 4 May, 2004; originally announced May 2004.

    ACM Class: I.2.0

    Journal ref: Malaysian Journal of Computer Science, 2004 (forth coming)

  45. arXiv:cs/0405012  [pdf

    cs.AI

    Is Neural Network a Reliable Forecaster on Earth? A MARS Query!

    Authors: Ajith Abraham, Dan Steinberg

    Abstract: Long-term rainfall prediction is a challenging task especially in the modern world where we are facing the major environmental problem of global warming. In general, climate and rainfall are highly non-linear phenomena in nature exhibiting what is known as the butterfly effect. While some regions of the world are noticing a systematic decrease in annual rainfall, others notice increases in flood… ▽ More

    Submitted 4 May, 2004; originally announced May 2004.

    ACM Class: I.2.0

    Journal ref: Bio-Inspired Applications of Connectionism, Lecture Notes in Computer Science. Volume. 2085, Springer Verlag Germany, Jose Mira and Alberto Prieto (Eds.), ISBN 3540422374, Spain, pp.679-686, 2001

  46. arXiv:cs/0405011  [pdf

    cs.AI

    Neuro Fuzzy Systems: Sate-of-the-Art Modeling Techniques

    Authors: Ajith Abraham

    Abstract: Fusion of Artificial Neural Networks (ANN) and Fuzzy Inference Systems (FIS) have attracted the growing interest of researchers in various scientific and engineering areas due to the growing need of adaptive intelligent systems to solve the real world problems. ANN learns from scratch by adjusting the interconnections between layers. FIS is a popular computing framework based on the concept of f… ▽ More

    Submitted 4 May, 2004; originally announced May 2004.

    ACM Class: I.2.0

    Journal ref: Connectionist Models of Neurons, Learning Processes, and Artificial Intelligence, Lecture Notes in Computer Science. Volume. 2084, Springer Verlag Germany, Jose Mira and Alberto Prieto (Eds.), ISBN 3540422358, Spain, pp. 269-276, 2001

  47. arXiv:cs/0405010  [pdf

    cs.AI

    A Neuro-Fuzzy Approach for Modelling Electricity Demand in Victoria

    Authors: Ajith Abraham, Baikunth Nath

    Abstract: Neuro-fuzzy systems have attracted growing interest of researchers in various scientific and engineering areas due to the increasing need of intelligent systems. This paper evaluates the use of two popular soft computing techniques and conventional statistical approach based on Box--Jenkins autoregressive integrated moving average (ARIMA) model to predict electricity demand in the State of Victo… ▽ More

    Submitted 4 May, 2004; originally announced May 2004.

    ACM Class: I.2.0

    Journal ref: Applied Soft Computing Journal, Elsevier Science, Volume 1&2, pp. 127-138, 2001

  48. arXiv:cs/0405009  [pdf

    cs.AI

    Intelligent Systems: Architectures and Perspectives

    Authors: Ajith Abraham

    Abstract: The integration of different learning and adaptation techniques to overcome individual limitations and to achieve synergetic effects through the hybridization or fusion of these techniques has, in recent years, contributed to a large number of new intelligent system designs. Computational intelligence is an innovative framework for constructing intelligent hybrid architectures involving Neural N… ▽ More

    Submitted 4 May, 2004; originally announced May 2004.

    ACM Class: I.2.0

    Journal ref: Recent Advances in Intelligent Paradigms and Applications, Abraham A., Jain L. and Kacprzyk J. (Eds.), Studies in Fuzziness and Soft Computing, Springer Verlag Germany, ISBN 3790815381, Chapter 1, pp. 1-35, 2002

  49. arXiv:cs/0405008  [pdf

    cs.AI

    A Comparative Study of Fuzzy Classification Methods on Breast Cancer Data

    Authors: Ravi Jain, Ajith Abraham

    Abstract: In this paper, we examine the performance of four fuzzy rule generation methods on Wisconsin breast cancer data. The first method generates fuzzy if then rules using the mean and the standard deviation of attribute values. The second approach generates fuzzy if then rules using the histogram of attributes values. The third procedure generates fuzzy if then rules with certainty of each attribute… ▽ More

    Submitted 4 May, 2004; originally announced May 2004.

    ACM Class: I.2.1

    Journal ref: Australiasian Physical And Engineering Sciences in Medicine, Australia, 2004 (forth coming)

  50. arXiv:cs/0403001  [pdf

    cs.AI cs.IR

    Evolving a Stigmergic Self-Organized Data-Mining

    Authors: Vitorino Ramos, Ajith Abraham

    Abstract: Self-organizing complex systems typically are comprised of a large number of frequently similar components or events. Through their process, a pattern at the global-level of a system emerges solely from numerous interactions among the lower-level components of the system. Moreover, the rules specifying interactions among the system's components are executed using only local information, without… ▽ More

    Submitted 28 February, 2004; originally announced March 2004.

    Comments: 10 pages, 3 figures, submitted to Intelligent Systems, Design and Applications 2004

    ACM Class: I.2.11