SlideShare a Scribd company logo
1 of 15
Download to read offline
International Journal of Artificial Intelligence
& Applications (IJAIA)
ISSN: 0975-900X (Online ); 0976-2191 (Print)
http://www.airccse.org/journal/ijaia/ijaia.html
Current Issue: November 2018, Volume 9,
Number 6--- Table of Contents.
http://www.airccse.org/journal/ijaia/current2018.html
Paper - 01
UTILIZING IMBALANCED DATA AND CLASSIFICATION
COST MATRIX TO PREDICT MOVIE PREFERENCES
Haifeng Wang,
Penn State University New Kensington, USA.
ABSTRACT
In this paper, we propose a movie genre recommendation system based on imbalanced survey
data and unequal classification costs for small and medium-sized enterprises (SMEs) who need a
data-based and analytical approach to stock favored movies and target marketing to young
people. The dataset maintains a detailed personal profile as predictors including demographic,
behavioral and preferences information for each user as well as imbalanced genre preferences.
These predictors do not include movies’ information such as actors or directors. The paper
applies Gentle boost, Adaboost and Bagged tree ensembles as well as SVM machine learning
algorithms to learn classification from one thousand observations and predict movie genre
preferences with adjusted classification costs. The proposed recommendation system also selects
important predictors to avoid overfitting and to shorten training time. This paper compares the
test error among the above-mentioned algorithms that are used to recommend different movie
genres. The prediction power is also indicated in a comparison of precision and recall with other
state-of-the-art recommendation systems. The proposed movie genre recommendation system
solves problems such as small dataset, imbalanced response, and unequal classification costs.
KEYWORDS
Machine learning; Classification; Recommendation system.
For More Details: http://aircconline.com/ijaia/V9N6/9618ijaia01.pdf
Volume Link: http://www.airccse.org/journal/ijaia/current2018.html
REFERENCES
[1] C. E. Briguez, M. C. D. Budán, C. A. D. Deagustini, A. G. Maguitman, M. Capobianco, and
G.R.Simari, "Argument-based mixed recommenders and their application to movie
suggestion," Expert Systems with Applications, vol. 41, no. 14, pp. 6467-6482, 2014/10/15/
2014.
[2] F. M. Harper and J. A. Konstan, "The MovieLens Datasets: History and Context," ACM
Trans.Interact. Intell. Syst., vol. 5, no. 4, pp. 1-19, 2015.
[3] S.-M. Choi, S.-K. Ko, and Y.-S. Han, "A movie recommendation algorithm based on genre
correlations," Expert Systems with Applications, vol. 39, no. 9, pp. 8079-8085, 2012/07/01/
2012.
[4] N. V. Chawla, N. Japkowicz, and A. Kotcz, "Editorial: special issue on learning from
imbalanced data sets," SIGKDD Explor. Newsl., vol. 6, no. 1, pp. 1-6, 2004.
[5] T. Fawcett and F. Provost, "Adaptive Fraud Detection," Data Mining and Knowledge
Discovery”, journal article vol. 1, no. 3, pp. 291-316, September 01 1997.
[6] M. Kubat, R. C. Holte, and S. Matwin, "Machine Learning for the Detection of Oil Spills in
Satellite Radar Images," Machine Learning, journal article vol. 30, no. 2, pp. 195-215,
February 01 1998. International Journal of Artificial Intelligence and Applications (IJAIA),
Vol.9, No.6, November 2018.
[7] P. Riddle, R. Segal, and O. Etzioni, "REPRESENTATION DESIGN AND BRUTE-FORCE
INDUCTION IN A BOEING MANUFACTURING DOMAIN," Applied Artificial
Intelligence,vol. 8, no. 1, pp. 125-147, 1994/01/01 1994.
[8] Yanminsun, A. Wong, and M. S. Kamel, Classification of imbalanced data: a review. 2011.
[9] H. Wang and H. Zhang, "Movie genre preference prediction using machine learning for
customerbased information," in 2018 IEEE 8th Annual Computing and Communication
Workshop and Conference (CCWC), 2018, pp. 110-116.
[10] V. Ganganwar, "An overview of classification algorithms for imbalanced datasets."
[11] G. Adomavicius and A. Tuzhilin, "Toward the next generation of recommender systems: a
survey of the state-of-the-art and possible extensions," IEEE Transactions on Knowledge
and Data Engineering, vol. 17, no. 6, pp. 734-749, 2005.
[12] D. H. Park, H. K. Kim, I. Y. Choi, and J. K. Kim, "A literature review and classification of
recommender systems research," Expert Systems with Applications, vol. 39, no. 11, pp.
10059-10072, 2012/09/01/ 2012.
[13] A. Said and A. Bellogín, "Coherence and inconsistencies in rating behavior: estimating the
magic barrier of recommender systems," User Modeling and User-Adapted Interaction,
journal article April 13 2018.
[14] K. Jasberg and S. Sizov, "The Magic Barrier Revisited: Accessing Natural Limitations of
Recommender Assessment," presented at the Proceedings of the Eleventh ACM
Conference on Recommender Systems, Como, Italy, 2017.
[15] A. E. Sarabadani Tafreshi, A. Sarabadani Tafreshi, and A. L. Ralescu, "Ranking Based on
Collaborative Feature Weighting Applied to the Recommendation of Research Papers," (in
en),International Journal of Artificial Intelligence & Applications, vol. 9, p. 53, 2018.
[16] P. Lops, M. De Gemmis, and G. Semeraro, "Content-based recommender systems: State of
the art and trends," in Recommender systems handbook: Springer, 2011, pp. 73-105.
[17] J. L. Herlocker, J. A. Konstan, A. Borchers, and J. Riedl, "An algorithmic framework for
performing collaborative filtering," in Proceedings of the 22nd annual international ACM
SIGIR conference on Research and development in information retrieval, 1999, pp. 230-
237: ACM.
[18] D. Godoy and A. Corbellini, " Folksonomy Based Recommender Systems: A
  State of the Art Review, International Journal of Intelligent Systems, vol. 31, no. 4,
pp. 314-346, 2016.
[19] P. De Meo, G. Quattrone, and D. Ursino, A query expansion and user profile enrichment
approach to improve the performance of recommender systems operating on a
folksonomy, User Modeling and User-Adapted Interaction, journal article vol. 20, no. 1,
pp. 41-86, February 01 2010.
[20] H. Yamaba, M. Tanoue, K. Takatsuka, N. Okazaki, and S. Tomita, On a Serendipity-
oriented Recommender System based on Folksonomy and its Evaluation, Procedia
Computer Science, vol.22, pp. 276-284, 2013/01/01/ 2013.
[21] H. Liang, Y. Xu, Y. Li, and R. Nayak, Personalized recommender system based on item
taxonomy and folksonomy, presented at the Proceedings of the 19th ACM international
conference on Information and knowledge management, Toronto, ON, Canada, 2010.
[22] R. M. Bell and Y. Koren, Lessons from the Netflix prize challenge, SIGKDD Explor.
Newsl.,vol. 9, no. 2, pp. 75-79, 2007.
[23] D. Billsus and M. J. Pazzani, Learning Collaborative Information Filters, presented at the
Proceedings of the Fifteenth International Conference on Machine Learning, 1998.
[24] B. Sarwar, G. Karypis, J. Konstan, and J. Riedl, Analysis of recommendation algorithms
for ecommerce, presented at the Proceedings of the 2nd ACM conference on Electronic
commerce,Minneapolis, Minnesota, USA, 2000.
[25] Y. L. T. Liang, J. Fan, J. Zhao, A hybrid recommendation model based on estimation of
Distribution algorithms, Journal of Computational Information Systems, vol. 10 (2), pp.
781-788,2014.
Paper - 02
REGULARIZED FUZZY NEURAL NETWORKS TO AID EFFORT
FORECASTING IN THE CONSTRUCTION AND SOFTWARE
DEVELOPMENT
Paulo Vitor de Campos Souza, Augusto Junio Guimaraes, Vanessa Souza
Araujo, Thiago Silva Rezende, Vinicius Jonathan Silva Araujo
Avenue Amazonas 5253, Belo Horizonte, Brazil
CEFET-MG 1,1,1
, *Faculty Una Betim_
a
Avenue. Governador Valadares, 640 - Centro,
b
Betim - MG, 32510-010.
ABSTRACT
Predicting the time to build software is a very complex task for software engineering managers.
There are complex factors that can directly interfere with the productivity of the development
team. Factors directly related to the complexity of the system to be developed drastically change
the time necessary for the completion of the works with the software factories. This work
proposes the use of a hybrid system based on artificial neural networks and fuzzy systems to
assist in the construction of an expert system based on rules to support in the prediction of hours
destined to the development of software according to the complexity of the elements present in
the same. The set of fuzzy rules obtained by the system helps the management and control of
software development by providing a base of interpretable estimates based on fuzzy rules. The
model was submitted to tests on a real database, and its results were promissory in the
construction of an aid mechanism in the predictability of the software construction.
KEYWORDS
Fuzzy neural networks, effort forecasting, use case point, expert systems.
For More Details: http://aircconline.com/ijaia/V9N6/9618ijaia02.pdf
Volume Link: http://www.airccse.org/journal/ijaia/current2018.html
REFERENCES
[1] S. Krusche, B. Scharlau, °A. Cajander, J. Hughes, 50 years of software engi- neering:
challenges,results, and opportunities in its education, in: Proceed- ings of the 23rd Annual
ACM Conference onInnovation and Technology in Computer Science Education, ACM,
2018, pp. 362–363.
[2] C. Ghezzi, M. Jazayeri, D. Mandrioli, Fundamentals of software engineer- ing, Prentice
Hall PTR,2002.
[3] M. Harman, The current state and future of search based software engi- neering, in: 2007
Future of Software Engineering, IEEE Computer Society, 2007, pp. 342–357.
[4] R. Silhavy, P. Silhavy, Z. Prokopova, Analysis and selection of a regression model for the
use case points method using a stepwise approach, Journal of Systems and Software 125
(2017) 1–14.
[5] P. V. de Campos Souza, L. C. B. Torres, Regularized fuzzy neural network based on or
neuron for time series forecasting, in: G. A. Barreto, R. Coelho (Eds.), Fuzzy Information
Processing, Springer International Publishing, Cham, 2018, pp. 13–23.
[6] J.-S. Jang, Anfis: adaptive-network-based fuzzy inference system, IEEE transactions on
systems,man, and cybernetics 23 (3) (1993) 665–685.
[7] T. Takagi, M. Sugeno, Derivation of fuzzy control rules from human oper- ator’s control
actions, IFAC Proceedings Volumes 16 (13) (1983) 55–60.
[8] G.-B. Huang, Q.-Y. Zhu, C.-K. Siew, Extreme learning machine: theory and applications,
Neurocomputing 70 (1-3) (2006) 489–501.
[9] G. Melnik, F. Maurer, Comparative analysis of job satisfaction in agile and non-agile
software development teams, in: International Conference on Extreme Programming and
Agile Processes in Software Engineering, Springer, 2006, pp. 32–42.
[10] K. El Emam, A. G. Koru, A replicated survey of it software project failures,IEEE software
(5) (2008) 84–90.
[11] R. S. Pressman, Engenharia de software, Vol. 6, Makron books S˜ao Paulo, 1995.
[12] C. E. Vazquez, G. S. SIMO˜ ES, R. M. Albert, An´alise de pontos de fun¸c˜ao: medi¸c˜ao,
estimativas e gerenciamento de projetos de software, EditoraE´rica, S˜ao Paulo 3.
[13] G. Karner, Resource estimation for objectory projects, Objective Systems SF AB 17.
[14] K. Iskandar, F. L. Gaol, B. Soewito, H. L. H. S. Warnars, R. Kosala, Software size
measurement of knowledge management portal with use case point, in: Computer, Control,
Informatics and its Applications (IC3INA), 2016 International Conference on, IEEE, 2016,
pp. 42–47.
[15] G. R. Finnie, G. E. Wittig, J.-M. Desharnais, A comparison of software effort estimation
techniques:using function points with neural networks, case-based reasoning and regression
models, Journal of systems and soft- ware 39 (3) (1997) 281–289.
[16] H. Park, S. Baek, An empirical validation of a neural network model for software effort
estimation,Expert Systems with Applications 35 (3) (2008) 929–937.
[17] S. Nageswaran, Test effort estimation using use case points, in: Quality Week, Vol. 6,
2001, pp. 1–6.
[18] G.-S. Liu, R.-Q. Wang, F. Yin, J.-M. Ogier, C.-L. Liu, Fast genre classi- fication of web
images using global and local features, CAAI Transactions on Intelligence Technology 3
(3) (2018) 161–168.
[19] P. Shivakumara, M. Asadzadehkaljahi, D. Tang, T. Lu, U. Pal, M. H. Anisi,
Cnn-rnn based method for license plate recognition, Caai Transactions on Intelligence
Technology 3 (3) (2018) 169–175.
[20] T. Oyama, T. Yamanaka, Influence of image classification accuracy on saliency map
estimation,arXiv preprint arXiv:1807.10657.
[21] Y. Zhou, Q. Sun, J. Liu, Robust optimisation algorithm for the measure- ment matrix in
compressed sensing, CAAI Transactions on Intelligence Technology 3 (3) (2018) 133–139.
[22] Q. Deng, S. Wu, J. Wen, Y. Xu, Multi-level image representation for large- scale image-
based instance retrieval, CAAI Transactions on Intelligence Technology 3 (1) (2018) 33–
39.
[23] G. Qi, Q. Zhang, F. Zeng, J. Wang, Z. Zhu, Multi-focus image fusion via morphological
similarity-based dictionary construction and sparse rep- resentation, CAAI Transactions on
Intelligence Technology 3 (2) (2018) 83–94.
[24] A. K. Pujitha, J. Sivaswamy, Solution to overcome the sparsity issue of an- notated data in
medical domain, CAAI Transactions on Intelligence Tech- nology 3 (3) (2018) 153–160.
[25] H. An, D. Wang, Z. Pan, M. Chen, X. Wang, Text segmentation of health examination item
based on character statistics and information measurement, CAAI Transactions on
Intelligence Technology 3 (1) (2018) 28–32.
[26] A. Lemos, W. Caminhas, F. Gomide, Multivariable gaussian evolving fuzzy modeling
system, IEEE Transactions on Fuzzy Systems 19 (1) (2011) 91– 104.
[27] V. H. M. Garcia, E. R. Trujillo, J. I. R. Molano, Knowledge management model to support
software development, in: International Conference on Data Mining and Big Data,
Springer, 2018, pp. 533– 543.
[28] F. A. Batarseh, A. J. Gonzalez, Predicting failures in agile software development through
data analytics, Software Quality Journal 26 (1) (2018) 49–66.
[29] H. Gall, C. Alexandru, A. Ciurumelea, G. Grano, C. Laaber, S. Panichella,S. Proksch, G.
Schermann, C. Vassallo, J. Zhao, Data-driven decisions and actions in todays software
development, in: The Essence of Software Engineering, Springer, 2018, pp. 137–168.
[30] R. Kumar, K. Prasad, A. S. Rao, Defect Prediction in Software Development 
Maintainence,Partridge Publishing, 2018.
[31] A. B. Nassif, L. F. Capretz, D. Ho, Estimating software effort based on use case point
model using sugeno fuzzy inference system, in: Tools with Artificial Intelligence (ICTAI),
2011 23rd IEEE International Conference on, IEEE, 2011, pp. 393–398.
[32] A. B. Nassif, D. Ho, L. F. Capretz, Towards an early software estimation using log-linear
regression and a multilayer perceptron model, Journal of Systems and Software 86 (1)
(2013) 144–160.
[33] A. B. Nassif, L. F. Capretz, D. Ho, Software effort estimation in the early stages of the
software life cycle using a cascade correlation neural net- work model, in: 2012 13th ACIS
International Conference on Software Engineering, Artificial Intelligence, Networking and
Parallel  Distributed Computing (SNPD 2012), IEEE, 2012, pp. 589–594.
[34] M. Azzeh, A. B. Nassif, A hybrid model for estimating software project effort from use
case points, Applied Soft Computing 49 (2016) 981–989.
[35] A. B. Nassif, M. Azzeh, L. F. Capretz, D. Ho, Neural network models for software
development effort estimation: a comparative study, Neural Computing and Applications
27 (8) (2016) 2369–2381.
[36] W. Pedrycz, F. Gomide, Fuzzy systems engineering: toward human-centric computing,
John Wiley  Sons, 2007.
[37] W. M. Caminhas, H. Tavares, F. A. Gomide, W. Pedrycz, Fuzzy set based neural networks:
Structure,learning and application., JACIII 3 (3) (1999) 151–157.
[38] P. V. C. Souza, Regularized fuzzy neural networks for pattern classification problems,
International Journal of Applied Engineering Research 13 (5) (2018) 2985–2991.
[39] A. L. Maas, A. Y. Hannun, A. Y. Ng, Rectifier nonlinearities improve neural network
acoustic models, in: Proc. icml, Vol. 30, 2013, p. 3.
[40] V. Nair, G. E. Hinton, Rectified linear units improve restricted boltzmann machines, in:
Proceedings of the 27th international conference on machine learning (ICML-10), 2010,
pp. 807–814.
[41] W. Pedrycz, Neurocomputations in relational systems, IEEE Transactions on Pattern
Analysis  Machine Intelligence (3) (1991) 289–297.
[42] F. R. Bach, Bolasso: model consistent lasso estimation through the boot- strap, in:
Proceedings of the 25th international conference on Machine learning, ACM, 2008, pp. 33–
40.
[43] P. V. de Campos Souza, G. R. L. Silva, L. C. B. Torres, Uninorm based regularized fuzzy
neural networks, in: 2018 IEEE Conference on Evolving and Adaptive Intelligent Systems
(EAIS), 2018, pp.1–8. doi:10.1109/ EAIS.2018.8397176.
Paper-03
NETWORK LEARNING AND TRAINING OF A CASCADED LINK-BASED
FEED FORWARD NEURAL NETWORK (CLBFFNN) IN AN
INTELLIGENT TRIMODAL BIOMETRIC SYSTEM
Benson-Emenike Mercy E1
and Ifeanyi-Reuben Nkechi J2
,
1
Abia State Polytechnic Nigeria, 2
Rhema University Nigeria.
ABSTRACT
Presently, considering the technological advancement of our modern world, we are in dire need
for a system that can learn new concepts and give decisions on its own. Hence the Artificial
Neural Network is all that is required in the contemporary situation. In this paper, CLBFFNN is
presented as a special and intelligent form of artificial neural networks that has the capability to
adapt to training and learning of new ideas and be able to give decisions in a trimodal biometric
system involving fingerprints, face and iris biometric data. It gives an overview of neural
networks.
KEYWORDS
CLBFFNN, Learning, Training, Artificial Neural Network, Trimodal, Biometric System
For More Details: http://aircconline.com/ijaia/V9N6/9618ijaia03.pdf
Volume Link: http://www.airccse.org/journal/ijaia/current2018.html
REFERENCES
[1] El-Zoghabi A. A., Yassin A. H., Hussien H. H. (2013). Survey Report on Cryptography
Based on Neural Network.International Journal of Emerging Technology and Advanced
Engineering. Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal,
Volume 3, Issue 12, December 2013), 456 -462.
[2] Jogdand R. M. and BisalapurS. S. (2011). Design of An Efficient Neural Key Generation.
International Journal of Artificial Intelligence  Applications (IJAIA), Vol.2, No.1, 60-69,
January 2011. DOI : 10.5121/ijaia.2011.2105 60 (PDF). Available from:
https://www.researchgate.net/publication/49612116_Design_of_An_Efficient_Neural_Key_
Generation
[3] Dilek S., Çakır H. and AydınM. (2015). Applications of Artificial Intelligence techniques
To Combating Cyber Crimes: A Review. International Journal of Artificial Intelligence 
Applications (IJAIA), Vol. 6, No. 1, January 2015. 21-39
[4] Bagrow, J. P., Lehmann, S., Ahn, Y-Y. (2015). Robustness and modular structure in
networks. Network Science , 3(04), 509-525. DOI: 10.1017/nws.2015.21
[5] Debashish D. and Mohammad S. U. (2013). Data Mining And Neural Network Techniques
In Stock Market Prediction:A Methodological Review. International Journal of Artificial
Intelligence  Applications (IJAIA), Vol.4, No.1, January 2013 DOI :
10.5121/ijaia.2013.4109, 117 – 127.
[6] Chiang Y., Chang L., Chang F. (2004). Comparison of static-feed-forward and dynamic-
feed-backneural networks for rainfall – runoff modelling. ELSEVIER, Journal of Hydrology
290 (2004) 297–311.
[7] Islam M. J., AhmadiM. and Sid-Ahmed M. A. (2010). An Efficient Automatic Mass
Classification Method In Digitized Mammograms Using Artificial Neural Network.
International Journal of Artificial Intelligence  Applications (IJAIA), Vol.1, No.3, July
2010, 1-13. DOI : 10.5121/ijaia.2010.1301
[8] Khaze S. R., MasdariM. and Hojjatkhah S. (2013). Application of Artificial Neural
Networks in Estimating Participation In Elections. International Journal of Information
Technology, Modelling and Computing (IJITMC) Vol.1, No.3, August 2013.DOI :
10.5121/ijitmc.2013.1303, 23-31
[9] Li Y., Wang K., and Zhang D. (2002). Step acceleration based training algorithm for feed-
forward neural networks. In IntConf Pattern Recognition (ICPR), pages 84–87.
[10] Levin E., Tishby N., and Solla S.A. (1990). A statistical approach to learning and
generalization in layered neural networks. IEEE, 78(10):1568–1574.
[11] JuangB. and Katagiri S. (1992). Discriminative learning for minimum error
classification.IEEE Trans Signal Processing, 40(12):3043–3054.
[12] Lee K. Y. and Sode-YomeA. and Park J. H. (1998). Adaptive Hopfield Neural Networks for
Economic Load Dispatch. IEEE Transactions on Power Systems, Vol. 13, No. 2, May1998
519-526
[13] Hopfield J. (1982).Neural networks and physical systems with emergent collective
computational abilities. National Academy of Science USA, 79(8):2554 –2558.
[14] Yao X. (1999). Evolving artificial neural networks. Proceedings of the IEEE, 87:1423 –
1447.
[15] Ludmila I. Kuncheva (2004).Combining Pattern Classifiers-Methods and Algorithms.
Wiley.
[16] Tang E. K., Suganthan P. N., and Yao X.(2006). An analysis of diversity measures.Machine
Learning, 65:247–271.
[17] Krenker A., Bester J. and Kos A. (2011). Introduction to the Artificial Neural Networks,
Artificial Neural Networks - Methodological Advances and Biomedical Applications, Prof.
Kenji Suzuki (Ed.), ISBN:978-953-307-243-2, InTech, Available from:
http://www.intechopen.com/books/artificial-neural-networks-methodological-advances-and-
biomedical-applications/introduction-to-the-artificial-neural-networks.
[18] Shubhangi S. A. and Madhuri A. C. (2012). Artificial Neural Network Controller for
Performance Optimization of Single Phase Inverter. International Journal of Artificial
Intelligence  Applications (IJAIA), Vol.3, No.1, January 2012. DOI :
10.5121/ijaia.2012.3105. 53-64.
[19] Vijaya, S. (2012). A study on the neural network model for finger print recognition.
International Journal of Computational Engineering Research (ijceronline.com)2 (5).
[20] Le Cun, V., Bottou, L., Bengio, Y., and Haffner, P., (2012). Handwritten digit recognition
with a back propagation network. Neural Information Processing Systems, 2: 396-404.
[21] Fausett, L. (1994). Fundamentals of neural networks. New York: Prentice Hall. ACM, New
York, 89: 151– 158.
[22] Schmidhuber J. (2015) Neural Networks. ELSEVIER 61(2015) 85-117
[23] Ritu, M. G. (2014). A review on fingerprint-based identification system.International
Journal of Advanced Research in Computer and Communication Engineering
3(3).Copyright to IJARCCE www.ijarcce.com 5849.
[24] Hazem, M. E. (2002). Face detection using neural networks and image decomposition.
Lecture Notes in Computer Science 22: 205-215.
[25] Askarunisa, A., Sankaranarayanan, K., Sundaram, R., and Sathick, M. B. (2009).Fingerprint
authentication using neural networks, MASAUM Journal of Computing, 15(2): 234.
[26] Ross, A. and Jain, A. K. (2003). Information fusion in biometrics. Pattern Recognition
Letters, 24(13): 2115-2125.
[27] Benson-Emenike, M. E. Sam-Ekeke Doris C. Trimodal Biometric Authentication System
using Cascaded Link-based Feed forward Neural Network [CLBFFNN]. International
Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868 Foundation of
Computer Science FCS, New York, USA 12 (5): 7-19 August 2017 – www.ijais.org
[28] Salim L. (2011).A comparative study of back propagation algorithms in financial prediction.
International Journal of Computer Science, Engineering and Applications (IJCSEA),1(4).
[29] Devika, C., Amita, S. and Manish, G. (2013). Recapitulation on Transformations in Neural
Network Back Propagation Algorithm.International Journal of Information and
Computation Technology 3(4): 323-328
[30] Nayak, P.K. and Narayan, D., (2013). Multimodal biometric face and fingerprint recognition
using adaptive principal component analysis and multilayer perception.International Journal
of Research in Computer and Communication Technology, 2(6).
[31] Long, B.T., and Thai, H. L., (2015). Person authentication using relevance vector machine
(RVM) for face and fingerprint.I. J. Modern education and Computer Science, 5, 8-15.
Authors
Benson-Emenike Mercy E. has a doctorate degree and Master’s degree
in Computer Science from University of Port Harcourt, Nigeria. She
obtained her Bachelor of Technology degree [B.Tech] from Federal
University of Technology, Minna, Niger state. She is a lecturer in the
Department of computer Science, Abia State Polytechnic and an adjunct
lecturer in Computer science Department, Rhema University Nigeria
and National Open University of Nigeria [NOUN]. She is a member of
Computer Professionals (Registration Council) of Nigeria (CPN) and
Nigeria Computer Society (NCS). Her publications have appeared in an international journal and
conference proceedings. Her research interests include Artificial Intelligence, Biometrics,
Operating System, and Information Technology.
Ifeanyi-Reuben Nkechi J. has a doctorate degree in Computer Science from
the University of Port-Harcourt Nigeria. She obtained her M.Sc. and B.Sc.
in Computer Science from the University of Ibadan, Nigeria and University
of Calabar, Nigeria respectively. She is a lecturer at the Department of
Computer Science, Rhema University Nigeria. She is a member of
Computer Professionals (R egistration Council) of Nigeria (CPN), Nigeria
Computer Society (NCS) and Nigeria Women in Information Technology
(NIWIIT). Her research interests include Database, Data mining, Text mining, Information
Retrieval and Natural Language Processing.

More Related Content

What's hot

International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)ijwscjournal
 
11.0005www.iiste.org call for paper. data mining tools and techniques- a revi...
11.0005www.iiste.org call for paper. data mining tools and techniques- a revi...11.0005www.iiste.org call for paper. data mining tools and techniques- a revi...
11.0005www.iiste.org call for paper. data mining tools and techniques- a revi...Alexander Decker
 
5. data mining tools and techniques a review--31-39
5. data mining tools and techniques  a review--31-395. data mining tools and techniques  a review--31-39
5. data mining tools and techniques a review--31-39Alexander Decker
 
New Research Articles 2019 May Issue International Journal of Data Mining & K...
New Research Articles 2019 May Issue International Journal of Data Mining & K...New Research Articles 2019 May Issue International Journal of Data Mining & K...
New Research Articles 2019 May Issue International Journal of Data Mining & K...IJDKP
 
DBLP-SSE: A DBLP Search Support Engine
DBLP-SSE: A DBLP Search Support EngineDBLP-SSE: A DBLP Search Support Engine
DBLP-SSE: A DBLP Search Support EngineYi Zeng
 
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...IJECEIAES
 
PatternLanguageOfData
PatternLanguageOfDataPatternLanguageOfData
PatternLanguageOfDatakimErwin
 
"Melting Pot" of the Sciences in interdisciplinary research
"Melting Pot" of the Sciences in interdisciplinary research"Melting Pot" of the Sciences in interdisciplinary research
"Melting Pot" of the Sciences in interdisciplinary researchNatalie de Vries
 
Behavioral Big Data & Healthcare Research
Behavioral Big Data & Healthcare ResearchBehavioral Big Data & Healthcare Research
Behavioral Big Data & Healthcare ResearchGalit Shmueli
 
Framework for A Personalized Intelligent Assistant to Elderly People for Acti...
Framework for A Personalized Intelligent Assistant to Elderly People for Acti...Framework for A Personalized Intelligent Assistant to Elderly People for Acti...
Framework for A Personalized Intelligent Assistant to Elderly People for Acti...CSCJournals
 
Transforming Big Data into Smart Data for Smart Energy: Deriving Value via ha...
Transforming Big Data into Smart Data for Smart Energy: Deriving Value via ha...Transforming Big Data into Smart Data for Smart Energy: Deriving Value via ha...
Transforming Big Data into Smart Data for Smart Energy: Deriving Value via ha...Amit Sheth
 
Big Data, AI, and Pharma
Big Data, AI, and PharmaBig Data, AI, and Pharma
Big Data, AI, and PharmaAmit Sheth
 
Literature Review on Social Networking in Supply chain
Literature Review on Social Networking in Supply chainLiterature Review on Social Networking in Supply chain
Literature Review on Social Networking in Supply chainSujoy Bag
 

What's hot (14)

International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)
 
11.0005www.iiste.org call for paper. data mining tools and techniques- a revi...
11.0005www.iiste.org call for paper. data mining tools and techniques- a revi...11.0005www.iiste.org call for paper. data mining tools and techniques- a revi...
11.0005www.iiste.org call for paper. data mining tools and techniques- a revi...
 
5. data mining tools and techniques a review--31-39
5. data mining tools and techniques  a review--31-395. data mining tools and techniques  a review--31-39
5. data mining tools and techniques a review--31-39
 
New Research Articles 2019 May Issue International Journal of Data Mining & K...
New Research Articles 2019 May Issue International Journal of Data Mining & K...New Research Articles 2019 May Issue International Journal of Data Mining & K...
New Research Articles 2019 May Issue International Journal of Data Mining & K...
 
DBLP-SSE: A DBLP Search Support Engine
DBLP-SSE: A DBLP Search Support EngineDBLP-SSE: A DBLP Search Support Engine
DBLP-SSE: A DBLP Search Support Engine
 
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...
 
PatternLanguageOfData
PatternLanguageOfDataPatternLanguageOfData
PatternLanguageOfData
 
"Melting Pot" of the Sciences in interdisciplinary research
"Melting Pot" of the Sciences in interdisciplinary research"Melting Pot" of the Sciences in interdisciplinary research
"Melting Pot" of the Sciences in interdisciplinary research
 
Behavioral Big Data & Healthcare Research
Behavioral Big Data & Healthcare ResearchBehavioral Big Data & Healthcare Research
Behavioral Big Data & Healthcare Research
 
Framework for A Personalized Intelligent Assistant to Elderly People for Acti...
Framework for A Personalized Intelligent Assistant to Elderly People for Acti...Framework for A Personalized Intelligent Assistant to Elderly People for Acti...
Framework for A Personalized Intelligent Assistant to Elderly People for Acti...
 
Transforming Big Data into Smart Data for Smart Energy: Deriving Value via ha...
Transforming Big Data into Smart Data for Smart Energy: Deriving Value via ha...Transforming Big Data into Smart Data for Smart Energy: Deriving Value via ha...
Transforming Big Data into Smart Data for Smart Energy: Deriving Value via ha...
 
Big Data, AI, and Pharma
Big Data, AI, and PharmaBig Data, AI, and Pharma
Big Data, AI, and Pharma
 
Literature Review on Social Networking in Supply chain
Literature Review on Social Networking in Supply chainLiterature Review on Social Networking in Supply chain
Literature Review on Social Networking in Supply chain
 
05 Bronner Richards
05 Bronner Richards05 Bronner Richards
05 Bronner Richards
 

Similar to New Research Articles - 2018 November Issue-International Journal of Artificial Intelligence & Applications (IJAIA)

International Journal of Data Mining & Knowledge Management Process - novemb...
International Journal of Data Mining & Knowledge Management Process  - novemb...International Journal of Data Mining & Knowledge Management Process  - novemb...
International Journal of Data Mining & Knowledge Management Process - novemb...IJDKP
 
Trends in Advanced Computing in 2020 - Advanced Computing: An International J...
Trends in Advanced Computing in 2020 - Advanced Computing: An International J...Trends in Advanced Computing in 2020 - Advanced Computing: An International J...
Trends in Advanced Computing in 2020 - Advanced Computing: An International J...acijjournal
 
Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 - Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 - gerogepatton
 
Ai2020 ai and or final
Ai2020 ai and or finalAi2020 ai and or final
Ai2020 ai and or finalRichard Vidgen
 
New research articles 2020 december issue- international journal of compute...
New research articles   2020 december issue- international journal of compute...New research articles   2020 december issue- international journal of compute...
New research articles 2020 december issue- international journal of compute...AIRCC Publishing Corporation
 
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...ijujournal
 
September 2022-Top 10 Cited Articles-International Journal of Embedded System...
September 2022-Top 10 Cited Articles-International Journal of Embedded System...September 2022-Top 10 Cited Articles-International Journal of Embedded System...
September 2022-Top 10 Cited Articles-International Journal of Embedded System...ijesajournal
 
FACT - A New Way to Get News
FACT - A New Way to Get NewsFACT - A New Way to Get News
FACT - A New Way to Get NewsPurdue RCODI
 
Recent Database Management Systems Research Articles - September 2020
Recent Database Management Systems Research Articles - September 2020Recent Database Management Systems Research Articles - September 2020
Recent Database Management Systems Research Articles - September 2020ijdms
 
Trends in covolutional neural network in 2020 - International Journal of Arti...
Trends in covolutional neural network in 2020 - International Journal of Arti...Trends in covolutional neural network in 2020 - International Journal of Arti...
Trends in covolutional neural network in 2020 - International Journal of Arti...gerogepatton
 
Top downloaded article in academia 2020 - International Journal of Informatio...
Top downloaded article in academia 2020 - International Journal of Informatio...Top downloaded article in academia 2020 - International Journal of Informatio...
Top downloaded article in academia 2020 - International Journal of Informatio...Zac Darcy
 
HI5030 Business Systems Analysis And Design.docx
HI5030 Business Systems Analysis And Design.docxHI5030 Business Systems Analysis And Design.docx
HI5030 Business Systems Analysis And Design.docxwrite4
 
SCCAI- A Student Career Counselling Artificial Intelligence
SCCAI- A Student Career Counselling Artificial IntelligenceSCCAI- A Student Career Counselling Artificial Intelligence
SCCAI- A Student Career Counselling Artificial Intelligencevivatechijri
 
Forecasting movie rating using k-nearest neighbor based collaborative filtering
Forecasting movie rating using k-nearest neighbor based  collaborative filteringForecasting movie rating using k-nearest neighbor based  collaborative filtering
Forecasting movie rating using k-nearest neighbor based collaborative filteringIJECEIAES
 
TOP 2 CITED PAPER 2018 IN ARTIFICIAL INTELLIGENCE - International Journal of ...
TOP 2 CITED PAPER 2018 IN ARTIFICIAL INTELLIGENCE - International Journal of ...TOP 2 CITED PAPER 2018 IN ARTIFICIAL INTELLIGENCE - International Journal of ...
TOP 2 CITED PAPER 2018 IN ARTIFICIAL INTELLIGENCE - International Journal of ...gerogepatton
 
New Research Articles 2020 November Issue International Journal of Software E...
New Research Articles 2020 November Issue International Journal of Software E...New Research Articles 2020 November Issue International Journal of Software E...
New Research Articles 2020 November Issue International Journal of Software E...ijseajournal
 
Agent-Based Computing in the Internet of Things: a Survey. Claudio Savaglio, ...
Agent-Based Computing in the Internet of Things: a Survey. Claudio Savaglio, ...Agent-Based Computing in the Internet of Things: a Survey. Claudio Savaglio, ...
Agent-Based Computing in the Internet of Things: a Survey. Claudio Savaglio, ...Universita della Calabria,
 
New Research Articles 2020 September Issue International Journal of Software ...
New Research Articles 2020 September Issue International Journal of Software ...New Research Articles 2020 September Issue International Journal of Software ...
New Research Articles 2020 September Issue International Journal of Software ...ijseajournal
 
New research articles 2020 august issue- international journal of computer ...
New research articles   2020 august issue- international journal of computer ...New research articles   2020 august issue- international journal of computer ...
New research articles 2020 august issue- international journal of computer ...AIRCC Publishing Corporation
 

Similar to New Research Articles - 2018 November Issue-International Journal of Artificial Intelligence & Applications (IJAIA) (20)

International Journal of Data Mining & Knowledge Management Process - novemb...
International Journal of Data Mining & Knowledge Management Process  - novemb...International Journal of Data Mining & Knowledge Management Process  - novemb...
International Journal of Data Mining & Knowledge Management Process - novemb...
 
Trends in Advanced Computing in 2020 - Advanced Computing: An International J...
Trends in Advanced Computing in 2020 - Advanced Computing: An International J...Trends in Advanced Computing in 2020 - Advanced Computing: An International J...
Trends in Advanced Computing in 2020 - Advanced Computing: An International J...
 
Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 - Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 -
 
Ai2020 ai and or final
Ai2020 ai and or finalAi2020 ai and or final
Ai2020 ai and or final
 
New research articles 2020 december issue- international journal of compute...
New research articles   2020 december issue- international journal of compute...New research articles   2020 december issue- international journal of compute...
New research articles 2020 december issue- international journal of compute...
 
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
 
September 2022-Top 10 Cited Articles-International Journal of Embedded System...
September 2022-Top 10 Cited Articles-International Journal of Embedded System...September 2022-Top 10 Cited Articles-International Journal of Embedded System...
September 2022-Top 10 Cited Articles-International Journal of Embedded System...
 
FACT - A New Way to Get News
FACT - A New Way to Get NewsFACT - A New Way to Get News
FACT - A New Way to Get News
 
Recent Database Management Systems Research Articles - September 2020
Recent Database Management Systems Research Articles - September 2020Recent Database Management Systems Research Articles - September 2020
Recent Database Management Systems Research Articles - September 2020
 
Trends in covolutional neural network in 2020 - International Journal of Arti...
Trends in covolutional neural network in 2020 - International Journal of Arti...Trends in covolutional neural network in 2020 - International Journal of Arti...
Trends in covolutional neural network in 2020 - International Journal of Arti...
 
Ijmet 10 02_050
Ijmet 10 02_050Ijmet 10 02_050
Ijmet 10 02_050
 
Top downloaded article in academia 2020 - International Journal of Informatio...
Top downloaded article in academia 2020 - International Journal of Informatio...Top downloaded article in academia 2020 - International Journal of Informatio...
Top downloaded article in academia 2020 - International Journal of Informatio...
 
HI5030 Business Systems Analysis And Design.docx
HI5030 Business Systems Analysis And Design.docxHI5030 Business Systems Analysis And Design.docx
HI5030 Business Systems Analysis And Design.docx
 
SCCAI- A Student Career Counselling Artificial Intelligence
SCCAI- A Student Career Counselling Artificial IntelligenceSCCAI- A Student Career Counselling Artificial Intelligence
SCCAI- A Student Career Counselling Artificial Intelligence
 
Forecasting movie rating using k-nearest neighbor based collaborative filtering
Forecasting movie rating using k-nearest neighbor based  collaborative filteringForecasting movie rating using k-nearest neighbor based  collaborative filtering
Forecasting movie rating using k-nearest neighbor based collaborative filtering
 
TOP 2 CITED PAPER 2018 IN ARTIFICIAL INTELLIGENCE - International Journal of ...
TOP 2 CITED PAPER 2018 IN ARTIFICIAL INTELLIGENCE - International Journal of ...TOP 2 CITED PAPER 2018 IN ARTIFICIAL INTELLIGENCE - International Journal of ...
TOP 2 CITED PAPER 2018 IN ARTIFICIAL INTELLIGENCE - International Journal of ...
 
New Research Articles 2020 November Issue International Journal of Software E...
New Research Articles 2020 November Issue International Journal of Software E...New Research Articles 2020 November Issue International Journal of Software E...
New Research Articles 2020 November Issue International Journal of Software E...
 
Agent-Based Computing in the Internet of Things: a Survey. Claudio Savaglio, ...
Agent-Based Computing in the Internet of Things: a Survey. Claudio Savaglio, ...Agent-Based Computing in the Internet of Things: a Survey. Claudio Savaglio, ...
Agent-Based Computing in the Internet of Things: a Survey. Claudio Savaglio, ...
 
New Research Articles 2020 September Issue International Journal of Software ...
New Research Articles 2020 September Issue International Journal of Software ...New Research Articles 2020 September Issue International Journal of Software ...
New Research Articles 2020 September Issue International Journal of Software ...
 
New research articles 2020 august issue- international journal of computer ...
New research articles   2020 august issue- international journal of computer ...New research articles   2020 august issue- international journal of computer ...
New research articles 2020 august issue- international journal of computer ...
 

More from gerogepatton

THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...gerogepatton
 
13th International Conference on Software Engineering and Applications (SEA 2...
13th International Conference on Software Engineering and Applications (SEA 2...13th International Conference on Software Engineering and Applications (SEA 2...
13th International Conference on Software Engineering and Applications (SEA 2...gerogepatton
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
 
AN IMPROVED MT5 MODEL FOR CHINESE TEXT SUMMARY GENERATION
AN IMPROVED MT5 MODEL FOR CHINESE TEXT SUMMARY GENERATIONAN IMPROVED MT5 MODEL FOR CHINESE TEXT SUMMARY GENERATION
AN IMPROVED MT5 MODEL FOR CHINESE TEXT SUMMARY GENERATIONgerogepatton
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...gerogepatton
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullyinggerogepatton
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
 
10th International Conference on Data Mining (DaMi 2024)
10th International Conference on Data Mining (DaMi 2024)10th International Conference on Data Mining (DaMi 2024)
10th International Conference on Data Mining (DaMi 2024)gerogepatton
 
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...gerogepatton
 
WAVELET SCATTERING TRANSFORM FOR ECG CARDIOVASCULAR DISEASE CLASSIFICATION
WAVELET SCATTERING TRANSFORM FOR ECG CARDIOVASCULAR DISEASE CLASSIFICATIONWAVELET SCATTERING TRANSFORM FOR ECG CARDIOVASCULAR DISEASE CLASSIFICATION
WAVELET SCATTERING TRANSFORM FOR ECG CARDIOVASCULAR DISEASE CLASSIFICATIONgerogepatton
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
 
Passive Sonar Detection and Classification Based on Demon-Lofar Analysis and ...
Passive Sonar Detection and Classification Based on Demon-Lofar Analysis and ...Passive Sonar Detection and Classification Based on Demon-Lofar Analysis and ...
Passive Sonar Detection and Classification Based on Demon-Lofar Analysis and ...gerogepatton
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...gerogepatton
 
The International Journal of Artificial Intelligence & Applications (IJAIA)
The International Journal of Artificial Intelligence & Applications (IJAIA)The International Journal of Artificial Intelligence & Applications (IJAIA)
The International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
 
Foundations of ANNs: Tolstoy’s Genius Explored using Transformer Architecture
Foundations of ANNs: Tolstoy’s Genius Explored using Transformer ArchitectureFoundations of ANNs: Tolstoy’s Genius Explored using Transformer Architecture
Foundations of ANNs: Tolstoy’s Genius Explored using Transformer Architecturegerogepatton
 
2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...gerogepatton
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
 
Website URL:https://www.airccse.org/journal/ijaia/ijaia.html Review of AI Mat...
Website URL:https://www.airccse.org/journal/ijaia/ijaia.html Review of AI Mat...Website URL:https://www.airccse.org/journal/ijaia/ijaia.html Review of AI Mat...
Website URL:https://www.airccse.org/journal/ijaia/ijaia.html Review of AI Mat...gerogepatton
 

More from gerogepatton (20)

THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
 
13th International Conference on Software Engineering and Applications (SEA 2...
13th International Conference on Software Engineering and Applications (SEA 2...13th International Conference on Software Engineering and Applications (SEA 2...
13th International Conference on Software Engineering and Applications (SEA 2...
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)
 
AN IMPROVED MT5 MODEL FOR CHINESE TEXT SUMMARY GENERATION
AN IMPROVED MT5 MODEL FOR CHINESE TEXT SUMMARY GENERATIONAN IMPROVED MT5 MODEL FOR CHINESE TEXT SUMMARY GENERATION
AN IMPROVED MT5 MODEL FOR CHINESE TEXT SUMMARY GENERATION
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)
 
10th International Conference on Data Mining (DaMi 2024)
10th International Conference on Data Mining (DaMi 2024)10th International Conference on Data Mining (DaMi 2024)
10th International Conference on Data Mining (DaMi 2024)
 
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
 
WAVELET SCATTERING TRANSFORM FOR ECG CARDIOVASCULAR DISEASE CLASSIFICATION
WAVELET SCATTERING TRANSFORM FOR ECG CARDIOVASCULAR DISEASE CLASSIFICATIONWAVELET SCATTERING TRANSFORM FOR ECG CARDIOVASCULAR DISEASE CLASSIFICATION
WAVELET SCATTERING TRANSFORM FOR ECG CARDIOVASCULAR DISEASE CLASSIFICATION
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)
 
Passive Sonar Detection and Classification Based on Demon-Lofar Analysis and ...
Passive Sonar Detection and Classification Based on Demon-Lofar Analysis and ...Passive Sonar Detection and Classification Based on Demon-Lofar Analysis and ...
Passive Sonar Detection and Classification Based on Demon-Lofar Analysis and ...
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...
 
The International Journal of Artificial Intelligence & Applications (IJAIA)
The International Journal of Artificial Intelligence & Applications (IJAIA)The International Journal of Artificial Intelligence & Applications (IJAIA)
The International Journal of Artificial Intelligence & Applications (IJAIA)
 
Foundations of ANNs: Tolstoy’s Genius Explored using Transformer Architecture
Foundations of ANNs: Tolstoy’s Genius Explored using Transformer ArchitectureFoundations of ANNs: Tolstoy’s Genius Explored using Transformer Architecture
Foundations of ANNs: Tolstoy’s Genius Explored using Transformer Architecture
 
2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)
 
Website URL:https://www.airccse.org/journal/ijaia/ijaia.html Review of AI Mat...
Website URL:https://www.airccse.org/journal/ijaia/ijaia.html Review of AI Mat...Website URL:https://www.airccse.org/journal/ijaia/ijaia.html Review of AI Mat...
Website URL:https://www.airccse.org/journal/ijaia/ijaia.html Review of AI Mat...
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

New Research Articles - 2018 November Issue-International Journal of Artificial Intelligence & Applications (IJAIA)

  • 1. International Journal of Artificial Intelligence & Applications (IJAIA) ISSN: 0975-900X (Online ); 0976-2191 (Print) http://www.airccse.org/journal/ijaia/ijaia.html Current Issue: November 2018, Volume 9, Number 6--- Table of Contents. http://www.airccse.org/journal/ijaia/current2018.html
  • 2. Paper - 01 UTILIZING IMBALANCED DATA AND CLASSIFICATION COST MATRIX TO PREDICT MOVIE PREFERENCES Haifeng Wang, Penn State University New Kensington, USA. ABSTRACT In this paper, we propose a movie genre recommendation system based on imbalanced survey data and unequal classification costs for small and medium-sized enterprises (SMEs) who need a data-based and analytical approach to stock favored movies and target marketing to young people. The dataset maintains a detailed personal profile as predictors including demographic, behavioral and preferences information for each user as well as imbalanced genre preferences. These predictors do not include movies’ information such as actors or directors. The paper applies Gentle boost, Adaboost and Bagged tree ensembles as well as SVM machine learning algorithms to learn classification from one thousand observations and predict movie genre preferences with adjusted classification costs. The proposed recommendation system also selects important predictors to avoid overfitting and to shorten training time. This paper compares the test error among the above-mentioned algorithms that are used to recommend different movie genres. The prediction power is also indicated in a comparison of precision and recall with other state-of-the-art recommendation systems. The proposed movie genre recommendation system solves problems such as small dataset, imbalanced response, and unequal classification costs. KEYWORDS Machine learning; Classification; Recommendation system. For More Details: http://aircconline.com/ijaia/V9N6/9618ijaia01.pdf Volume Link: http://www.airccse.org/journal/ijaia/current2018.html
  • 3. REFERENCES [1] C. E. Briguez, M. C. D. Budán, C. A. D. Deagustini, A. G. Maguitman, M. Capobianco, and G.R.Simari, "Argument-based mixed recommenders and their application to movie suggestion," Expert Systems with Applications, vol. 41, no. 14, pp. 6467-6482, 2014/10/15/ 2014. [2] F. M. Harper and J. A. Konstan, "The MovieLens Datasets: History and Context," ACM Trans.Interact. Intell. Syst., vol. 5, no. 4, pp. 1-19, 2015. [3] S.-M. Choi, S.-K. Ko, and Y.-S. Han, "A movie recommendation algorithm based on genre correlations," Expert Systems with Applications, vol. 39, no. 9, pp. 8079-8085, 2012/07/01/ 2012. [4] N. V. Chawla, N. Japkowicz, and A. Kotcz, "Editorial: special issue on learning from imbalanced data sets," SIGKDD Explor. Newsl., vol. 6, no. 1, pp. 1-6, 2004. [5] T. Fawcett and F. Provost, "Adaptive Fraud Detection," Data Mining and Knowledge Discovery”, journal article vol. 1, no. 3, pp. 291-316, September 01 1997. [6] M. Kubat, R. C. Holte, and S. Matwin, "Machine Learning for the Detection of Oil Spills in Satellite Radar Images," Machine Learning, journal article vol. 30, no. 2, pp. 195-215, February 01 1998. International Journal of Artificial Intelligence and Applications (IJAIA), Vol.9, No.6, November 2018. [7] P. Riddle, R. Segal, and O. Etzioni, "REPRESENTATION DESIGN AND BRUTE-FORCE INDUCTION IN A BOEING MANUFACTURING DOMAIN," Applied Artificial Intelligence,vol. 8, no. 1, pp. 125-147, 1994/01/01 1994. [8] Yanminsun, A. Wong, and M. S. Kamel, Classification of imbalanced data: a review. 2011. [9] H. Wang and H. Zhang, "Movie genre preference prediction using machine learning for customerbased information," in 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), 2018, pp. 110-116. [10] V. Ganganwar, "An overview of classification algorithms for imbalanced datasets." [11] G. Adomavicius and A. Tuzhilin, "Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions," IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 6, pp. 734-749, 2005. [12] D. H. Park, H. K. Kim, I. Y. Choi, and J. K. Kim, "A literature review and classification of recommender systems research," Expert Systems with Applications, vol. 39, no. 11, pp. 10059-10072, 2012/09/01/ 2012.
  • 4. [13] A. Said and A. Bellogín, "Coherence and inconsistencies in rating behavior: estimating the magic barrier of recommender systems," User Modeling and User-Adapted Interaction, journal article April 13 2018. [14] K. Jasberg and S. Sizov, "The Magic Barrier Revisited: Accessing Natural Limitations of Recommender Assessment," presented at the Proceedings of the Eleventh ACM Conference on Recommender Systems, Como, Italy, 2017. [15] A. E. Sarabadani Tafreshi, A. Sarabadani Tafreshi, and A. L. Ralescu, "Ranking Based on Collaborative Feature Weighting Applied to the Recommendation of Research Papers," (in en),International Journal of Artificial Intelligence & Applications, vol. 9, p. 53, 2018. [16] P. Lops, M. De Gemmis, and G. Semeraro, "Content-based recommender systems: State of the art and trends," in Recommender systems handbook: Springer, 2011, pp. 73-105. [17] J. L. Herlocker, J. A. Konstan, A. Borchers, and J. Riedl, "An algorithmic framework for performing collaborative filtering," in Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval, 1999, pp. 230- 237: ACM. [18] D. Godoy and A. Corbellini, " Folksonomy Based Recommender Systems: A State of the Art Review, International Journal of Intelligent Systems, vol. 31, no. 4, pp. 314-346, 2016. [19] P. De Meo, G. Quattrone, and D. Ursino, A query expansion and user profile enrichment approach to improve the performance of recommender systems operating on a folksonomy, User Modeling and User-Adapted Interaction, journal article vol. 20, no. 1, pp. 41-86, February 01 2010. [20] H. Yamaba, M. Tanoue, K. Takatsuka, N. Okazaki, and S. Tomita, On a Serendipity- oriented Recommender System based on Folksonomy and its Evaluation, Procedia Computer Science, vol.22, pp. 276-284, 2013/01/01/ 2013. [21] H. Liang, Y. Xu, Y. Li, and R. Nayak, Personalized recommender system based on item taxonomy and folksonomy, presented at the Proceedings of the 19th ACM international conference on Information and knowledge management, Toronto, ON, Canada, 2010. [22] R. M. Bell and Y. Koren, Lessons from the Netflix prize challenge, SIGKDD Explor. Newsl.,vol. 9, no. 2, pp. 75-79, 2007. [23] D. Billsus and M. J. Pazzani, Learning Collaborative Information Filters, presented at the Proceedings of the Fifteenth International Conference on Machine Learning, 1998. [24] B. Sarwar, G. Karypis, J. Konstan, and J. Riedl, Analysis of recommendation algorithms for ecommerce, presented at the Proceedings of the 2nd ACM conference on Electronic commerce,Minneapolis, Minnesota, USA, 2000.
  • 5. [25] Y. L. T. Liang, J. Fan, J. Zhao, A hybrid recommendation model based on estimation of Distribution algorithms, Journal of Computational Information Systems, vol. 10 (2), pp. 781-788,2014.
  • 6. Paper - 02 REGULARIZED FUZZY NEURAL NETWORKS TO AID EFFORT FORECASTING IN THE CONSTRUCTION AND SOFTWARE DEVELOPMENT Paulo Vitor de Campos Souza, Augusto Junio Guimaraes, Vanessa Souza Araujo, Thiago Silva Rezende, Vinicius Jonathan Silva Araujo Avenue Amazonas 5253, Belo Horizonte, Brazil CEFET-MG 1,1,1 , *Faculty Una Betim_ a Avenue. Governador Valadares, 640 - Centro, b Betim - MG, 32510-010. ABSTRACT Predicting the time to build software is a very complex task for software engineering managers. There are complex factors that can directly interfere with the productivity of the development team. Factors directly related to the complexity of the system to be developed drastically change the time necessary for the completion of the works with the software factories. This work proposes the use of a hybrid system based on artificial neural networks and fuzzy systems to assist in the construction of an expert system based on rules to support in the prediction of hours destined to the development of software according to the complexity of the elements present in the same. The set of fuzzy rules obtained by the system helps the management and control of software development by providing a base of interpretable estimates based on fuzzy rules. The model was submitted to tests on a real database, and its results were promissory in the construction of an aid mechanism in the predictability of the software construction. KEYWORDS Fuzzy neural networks, effort forecasting, use case point, expert systems. For More Details: http://aircconline.com/ijaia/V9N6/9618ijaia02.pdf Volume Link: http://www.airccse.org/journal/ijaia/current2018.html
  • 7. REFERENCES [1] S. Krusche, B. Scharlau, °A. Cajander, J. Hughes, 50 years of software engi- neering: challenges,results, and opportunities in its education, in: Proceed- ings of the 23rd Annual ACM Conference onInnovation and Technology in Computer Science Education, ACM, 2018, pp. 362–363. [2] C. Ghezzi, M. Jazayeri, D. Mandrioli, Fundamentals of software engineer- ing, Prentice Hall PTR,2002. [3] M. Harman, The current state and future of search based software engi- neering, in: 2007 Future of Software Engineering, IEEE Computer Society, 2007, pp. 342–357. [4] R. Silhavy, P. Silhavy, Z. Prokopova, Analysis and selection of a regression model for the use case points method using a stepwise approach, Journal of Systems and Software 125 (2017) 1–14. [5] P. V. de Campos Souza, L. C. B. Torres, Regularized fuzzy neural network based on or neuron for time series forecasting, in: G. A. Barreto, R. Coelho (Eds.), Fuzzy Information Processing, Springer International Publishing, Cham, 2018, pp. 13–23. [6] J.-S. Jang, Anfis: adaptive-network-based fuzzy inference system, IEEE transactions on systems,man, and cybernetics 23 (3) (1993) 665–685. [7] T. Takagi, M. Sugeno, Derivation of fuzzy control rules from human oper- ator’s control actions, IFAC Proceedings Volumes 16 (13) (1983) 55–60. [8] G.-B. Huang, Q.-Y. Zhu, C.-K. Siew, Extreme learning machine: theory and applications, Neurocomputing 70 (1-3) (2006) 489–501. [9] G. Melnik, F. Maurer, Comparative analysis of job satisfaction in agile and non-agile software development teams, in: International Conference on Extreme Programming and Agile Processes in Software Engineering, Springer, 2006, pp. 32–42. [10] K. El Emam, A. G. Koru, A replicated survey of it software project failures,IEEE software (5) (2008) 84–90. [11] R. S. Pressman, Engenharia de software, Vol. 6, Makron books S˜ao Paulo, 1995. [12] C. E. Vazquez, G. S. SIMO˜ ES, R. M. Albert, An´alise de pontos de fun¸c˜ao: medi¸c˜ao, estimativas e gerenciamento de projetos de software, EditoraE´rica, S˜ao Paulo 3. [13] G. Karner, Resource estimation for objectory projects, Objective Systems SF AB 17. [14] K. Iskandar, F. L. Gaol, B. Soewito, H. L. H. S. Warnars, R. Kosala, Software size measurement of knowledge management portal with use case point, in: Computer, Control,
  • 8. Informatics and its Applications (IC3INA), 2016 International Conference on, IEEE, 2016, pp. 42–47. [15] G. R. Finnie, G. E. Wittig, J.-M. Desharnais, A comparison of software effort estimation techniques:using function points with neural networks, case-based reasoning and regression models, Journal of systems and soft- ware 39 (3) (1997) 281–289. [16] H. Park, S. Baek, An empirical validation of a neural network model for software effort estimation,Expert Systems with Applications 35 (3) (2008) 929–937. [17] S. Nageswaran, Test effort estimation using use case points, in: Quality Week, Vol. 6, 2001, pp. 1–6. [18] G.-S. Liu, R.-Q. Wang, F. Yin, J.-M. Ogier, C.-L. Liu, Fast genre classi- fication of web images using global and local features, CAAI Transactions on Intelligence Technology 3 (3) (2018) 161–168. [19] P. Shivakumara, M. Asadzadehkaljahi, D. Tang, T. Lu, U. Pal, M. H. Anisi, Cnn-rnn based method for license plate recognition, Caai Transactions on Intelligence Technology 3 (3) (2018) 169–175. [20] T. Oyama, T. Yamanaka, Influence of image classification accuracy on saliency map estimation,arXiv preprint arXiv:1807.10657. [21] Y. Zhou, Q. Sun, J. Liu, Robust optimisation algorithm for the measure- ment matrix in compressed sensing, CAAI Transactions on Intelligence Technology 3 (3) (2018) 133–139. [22] Q. Deng, S. Wu, J. Wen, Y. Xu, Multi-level image representation for large- scale image- based instance retrieval, CAAI Transactions on Intelligence Technology 3 (1) (2018) 33– 39. [23] G. Qi, Q. Zhang, F. Zeng, J. Wang, Z. Zhu, Multi-focus image fusion via morphological similarity-based dictionary construction and sparse rep- resentation, CAAI Transactions on Intelligence Technology 3 (2) (2018) 83–94. [24] A. K. Pujitha, J. Sivaswamy, Solution to overcome the sparsity issue of an- notated data in medical domain, CAAI Transactions on Intelligence Tech- nology 3 (3) (2018) 153–160. [25] H. An, D. Wang, Z. Pan, M. Chen, X. Wang, Text segmentation of health examination item based on character statistics and information measurement, CAAI Transactions on Intelligence Technology 3 (1) (2018) 28–32. [26] A. Lemos, W. Caminhas, F. Gomide, Multivariable gaussian evolving fuzzy modeling system, IEEE Transactions on Fuzzy Systems 19 (1) (2011) 91– 104.
  • 9. [27] V. H. M. Garcia, E. R. Trujillo, J. I. R. Molano, Knowledge management model to support software development, in: International Conference on Data Mining and Big Data, Springer, 2018, pp. 533– 543. [28] F. A. Batarseh, A. J. Gonzalez, Predicting failures in agile software development through data analytics, Software Quality Journal 26 (1) (2018) 49–66. [29] H. Gall, C. Alexandru, A. Ciurumelea, G. Grano, C. Laaber, S. Panichella,S. Proksch, G. Schermann, C. Vassallo, J. Zhao, Data-driven decisions and actions in todays software development, in: The Essence of Software Engineering, Springer, 2018, pp. 137–168. [30] R. Kumar, K. Prasad, A. S. Rao, Defect Prediction in Software Development Maintainence,Partridge Publishing, 2018. [31] A. B. Nassif, L. F. Capretz, D. Ho, Estimating software effort based on use case point model using sugeno fuzzy inference system, in: Tools with Artificial Intelligence (ICTAI), 2011 23rd IEEE International Conference on, IEEE, 2011, pp. 393–398. [32] A. B. Nassif, D. Ho, L. F. Capretz, Towards an early software estimation using log-linear regression and a multilayer perceptron model, Journal of Systems and Software 86 (1) (2013) 144–160. [33] A. B. Nassif, L. F. Capretz, D. Ho, Software effort estimation in the early stages of the software life cycle using a cascade correlation neural net- work model, in: 2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel Distributed Computing (SNPD 2012), IEEE, 2012, pp. 589–594. [34] M. Azzeh, A. B. Nassif, A hybrid model for estimating software project effort from use case points, Applied Soft Computing 49 (2016) 981–989. [35] A. B. Nassif, M. Azzeh, L. F. Capretz, D. Ho, Neural network models for software development effort estimation: a comparative study, Neural Computing and Applications 27 (8) (2016) 2369–2381. [36] W. Pedrycz, F. Gomide, Fuzzy systems engineering: toward human-centric computing, John Wiley Sons, 2007. [37] W. M. Caminhas, H. Tavares, F. A. Gomide, W. Pedrycz, Fuzzy set based neural networks: Structure,learning and application., JACIII 3 (3) (1999) 151–157. [38] P. V. C. Souza, Regularized fuzzy neural networks for pattern classification problems, International Journal of Applied Engineering Research 13 (5) (2018) 2985–2991. [39] A. L. Maas, A. Y. Hannun, A. Y. Ng, Rectifier nonlinearities improve neural network acoustic models, in: Proc. icml, Vol. 30, 2013, p. 3.
  • 10. [40] V. Nair, G. E. Hinton, Rectified linear units improve restricted boltzmann machines, in: Proceedings of the 27th international conference on machine learning (ICML-10), 2010, pp. 807–814. [41] W. Pedrycz, Neurocomputations in relational systems, IEEE Transactions on Pattern Analysis Machine Intelligence (3) (1991) 289–297. [42] F. R. Bach, Bolasso: model consistent lasso estimation through the boot- strap, in: Proceedings of the 25th international conference on Machine learning, ACM, 2008, pp. 33– 40. [43] P. V. de Campos Souza, G. R. L. Silva, L. C. B. Torres, Uninorm based regularized fuzzy neural networks, in: 2018 IEEE Conference on Evolving and Adaptive Intelligent Systems (EAIS), 2018, pp.1–8. doi:10.1109/ EAIS.2018.8397176.
  • 11. Paper-03 NETWORK LEARNING AND TRAINING OF A CASCADED LINK-BASED FEED FORWARD NEURAL NETWORK (CLBFFNN) IN AN INTELLIGENT TRIMODAL BIOMETRIC SYSTEM Benson-Emenike Mercy E1 and Ifeanyi-Reuben Nkechi J2 , 1 Abia State Polytechnic Nigeria, 2 Rhema University Nigeria. ABSTRACT Presently, considering the technological advancement of our modern world, we are in dire need for a system that can learn new concepts and give decisions on its own. Hence the Artificial Neural Network is all that is required in the contemporary situation. In this paper, CLBFFNN is presented as a special and intelligent form of artificial neural networks that has the capability to adapt to training and learning of new ideas and be able to give decisions in a trimodal biometric system involving fingerprints, face and iris biometric data. It gives an overview of neural networks. KEYWORDS CLBFFNN, Learning, Training, Artificial Neural Network, Trimodal, Biometric System For More Details: http://aircconline.com/ijaia/V9N6/9618ijaia03.pdf Volume Link: http://www.airccse.org/journal/ijaia/current2018.html
  • 12. REFERENCES [1] El-Zoghabi A. A., Yassin A. H., Hussien H. H. (2013). Survey Report on Cryptography Based on Neural Network.International Journal of Emerging Technology and Advanced Engineering. Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 12, December 2013), 456 -462. [2] Jogdand R. M. and BisalapurS. S. (2011). Design of An Efficient Neural Key Generation. International Journal of Artificial Intelligence Applications (IJAIA), Vol.2, No.1, 60-69, January 2011. DOI : 10.5121/ijaia.2011.2105 60 (PDF). Available from: https://www.researchgate.net/publication/49612116_Design_of_An_Efficient_Neural_Key_ Generation [3] Dilek S., Çakır H. and AydınM. (2015). Applications of Artificial Intelligence techniques To Combating Cyber Crimes: A Review. International Journal of Artificial Intelligence Applications (IJAIA), Vol. 6, No. 1, January 2015. 21-39 [4] Bagrow, J. P., Lehmann, S., Ahn, Y-Y. (2015). Robustness and modular structure in networks. Network Science , 3(04), 509-525. DOI: 10.1017/nws.2015.21 [5] Debashish D. and Mohammad S. U. (2013). Data Mining And Neural Network Techniques In Stock Market Prediction:A Methodological Review. International Journal of Artificial Intelligence Applications (IJAIA), Vol.4, No.1, January 2013 DOI : 10.5121/ijaia.2013.4109, 117 – 127. [6] Chiang Y., Chang L., Chang F. (2004). Comparison of static-feed-forward and dynamic- feed-backneural networks for rainfall – runoff modelling. ELSEVIER, Journal of Hydrology 290 (2004) 297–311. [7] Islam M. J., AhmadiM. and Sid-Ahmed M. A. (2010). An Efficient Automatic Mass Classification Method In Digitized Mammograms Using Artificial Neural Network. International Journal of Artificial Intelligence Applications (IJAIA), Vol.1, No.3, July 2010, 1-13. DOI : 10.5121/ijaia.2010.1301 [8] Khaze S. R., MasdariM. and Hojjatkhah S. (2013). Application of Artificial Neural Networks in Estimating Participation In Elections. International Journal of Information Technology, Modelling and Computing (IJITMC) Vol.1, No.3, August 2013.DOI : 10.5121/ijitmc.2013.1303, 23-31 [9] Li Y., Wang K., and Zhang D. (2002). Step acceleration based training algorithm for feed- forward neural networks. In IntConf Pattern Recognition (ICPR), pages 84–87. [10] Levin E., Tishby N., and Solla S.A. (1990). A statistical approach to learning and generalization in layered neural networks. IEEE, 78(10):1568–1574.
  • 13. [11] JuangB. and Katagiri S. (1992). Discriminative learning for minimum error classification.IEEE Trans Signal Processing, 40(12):3043–3054. [12] Lee K. Y. and Sode-YomeA. and Park J. H. (1998). Adaptive Hopfield Neural Networks for Economic Load Dispatch. IEEE Transactions on Power Systems, Vol. 13, No. 2, May1998 519-526 [13] Hopfield J. (1982).Neural networks and physical systems with emergent collective computational abilities. National Academy of Science USA, 79(8):2554 –2558. [14] Yao X. (1999). Evolving artificial neural networks. Proceedings of the IEEE, 87:1423 – 1447. [15] Ludmila I. Kuncheva (2004).Combining Pattern Classifiers-Methods and Algorithms. Wiley. [16] Tang E. K., Suganthan P. N., and Yao X.(2006). An analysis of diversity measures.Machine Learning, 65:247–271. [17] Krenker A., Bester J. and Kos A. (2011). Introduction to the Artificial Neural Networks, Artificial Neural Networks - Methodological Advances and Biomedical Applications, Prof. Kenji Suzuki (Ed.), ISBN:978-953-307-243-2, InTech, Available from: http://www.intechopen.com/books/artificial-neural-networks-methodological-advances-and- biomedical-applications/introduction-to-the-artificial-neural-networks. [18] Shubhangi S. A. and Madhuri A. C. (2012). Artificial Neural Network Controller for Performance Optimization of Single Phase Inverter. International Journal of Artificial Intelligence Applications (IJAIA), Vol.3, No.1, January 2012. DOI : 10.5121/ijaia.2012.3105. 53-64. [19] Vijaya, S. (2012). A study on the neural network model for finger print recognition. International Journal of Computational Engineering Research (ijceronline.com)2 (5). [20] Le Cun, V., Bottou, L., Bengio, Y., and Haffner, P., (2012). Handwritten digit recognition with a back propagation network. Neural Information Processing Systems, 2: 396-404. [21] Fausett, L. (1994). Fundamentals of neural networks. New York: Prentice Hall. ACM, New York, 89: 151– 158. [22] Schmidhuber J. (2015) Neural Networks. ELSEVIER 61(2015) 85-117 [23] Ritu, M. G. (2014). A review on fingerprint-based identification system.International Journal of Advanced Research in Computer and Communication Engineering 3(3).Copyright to IJARCCE www.ijarcce.com 5849. [24] Hazem, M. E. (2002). Face detection using neural networks and image decomposition.
  • 14. Lecture Notes in Computer Science 22: 205-215. [25] Askarunisa, A., Sankaranarayanan, K., Sundaram, R., and Sathick, M. B. (2009).Fingerprint authentication using neural networks, MASAUM Journal of Computing, 15(2): 234. [26] Ross, A. and Jain, A. K. (2003). Information fusion in biometrics. Pattern Recognition Letters, 24(13): 2115-2125. [27] Benson-Emenike, M. E. Sam-Ekeke Doris C. Trimodal Biometric Authentication System using Cascaded Link-based Feed forward Neural Network [CLBFFNN]. International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868 Foundation of Computer Science FCS, New York, USA 12 (5): 7-19 August 2017 – www.ijais.org [28] Salim L. (2011).A comparative study of back propagation algorithms in financial prediction. International Journal of Computer Science, Engineering and Applications (IJCSEA),1(4). [29] Devika, C., Amita, S. and Manish, G. (2013). Recapitulation on Transformations in Neural Network Back Propagation Algorithm.International Journal of Information and Computation Technology 3(4): 323-328 [30] Nayak, P.K. and Narayan, D., (2013). Multimodal biometric face and fingerprint recognition using adaptive principal component analysis and multilayer perception.International Journal of Research in Computer and Communication Technology, 2(6). [31] Long, B.T., and Thai, H. L., (2015). Person authentication using relevance vector machine (RVM) for face and fingerprint.I. J. Modern education and Computer Science, 5, 8-15. Authors Benson-Emenike Mercy E. has a doctorate degree and Master’s degree in Computer Science from University of Port Harcourt, Nigeria. She obtained her Bachelor of Technology degree [B.Tech] from Federal University of Technology, Minna, Niger state. She is a lecturer in the Department of computer Science, Abia State Polytechnic and an adjunct lecturer in Computer science Department, Rhema University Nigeria and National Open University of Nigeria [NOUN]. She is a member of Computer Professionals (Registration Council) of Nigeria (CPN) and Nigeria Computer Society (NCS). Her publications have appeared in an international journal and conference proceedings. Her research interests include Artificial Intelligence, Biometrics, Operating System, and Information Technology.
  • 15. Ifeanyi-Reuben Nkechi J. has a doctorate degree in Computer Science from the University of Port-Harcourt Nigeria. She obtained her M.Sc. and B.Sc. in Computer Science from the University of Ibadan, Nigeria and University of Calabar, Nigeria respectively. She is a lecturer at the Department of Computer Science, Rhema University Nigeria. She is a member of Computer Professionals (R egistration Council) of Nigeria (CPN), Nigeria Computer Society (NCS) and Nigeria Women in Information Technology (NIWIIT). Her research interests include Database, Data mining, Text mining, Information Retrieval and Natural Language Processing.