Forthcoming articles

International Journal of Intelligent Engineering Informatics

International Journal of Intelligent Engineering Informatics (IJIEI)

These articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Register for our alerting service, which notifies you by email when new issues are published online.

Open AccessArticles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.
We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Intelligent Engineering Informatics (6 papers in press)

Regular Issues

  • Human Face Gender Identification using Thepades Sorted N-ary Block Truncation Coding and Machine Learning Classifiers   Order a copy of this article
    by Sudeep Thepade, Deepa Abin, R.I.K. DAS, TANUJA SARODE 
    Abstract: Human face gender identification is increasingly gaining popularity because of exponential popularity and interest in ubiquitous and pervasive computing. The computing embedded in the environment is pervasive computing, where the environment can be made to feel the person is present there and according to the person whether male or female the environment may induce certain decisions with help of ubiquitous computing devices to make environment suited to the person. The challenge of detecting a face is male or female is very trivial due to similarity of features of faces. The paper presents use of Thepades Sorted N-ary Block Truncation Coding (TSBTC N-ary) for extraction of features for the faces and further deploys various machine learning classifiers to identify the face as male or female. Here TSnBTC is explored for six different combinations (from two-ary to seven-ary). Fourteen machine learning classifiers are explored with each of these feature extraction generation methods for face gender identification giving 96 variations of the proposed method, all these are tested using Faces94 dataset. Classification accuracy is used as performance measure. Overall Random Forest has given best performance and TSBTC-7ary outperformed other feature extraction variations.
    Keywords: Gender Identification; Machine learning Classifier; Thepade’s Sorted BTC N-ary; TSBTC N-ary.

  • A Hybrid Framework for Ranking Reviewers Based on Interval Type-2 Fuzzy AHP and VIKOR   Order a copy of this article
    by Hossein Abbasimehr, Esmaeil Nourani, Mostafa Shabani 
    Abstract: Online reviews are crucial resources both for users and business enterprises. However, the quality of online reviews varies greatly. To address the problem of low-quality reviews, we focus on the problem of reviewer credibility and propose a new framework. The proposed framework incorporates three main parts including identification of source credibility factors, preprocessing, and ranking via interval type-2 fuzzy analytical hierarchy process (IT2FAHP) and VIKOR method. A major distinction of the proposed framework is utilizing multiple factors obtained from different sources, which leads to considerably improved reviewers ranking. This is in contrast to the other approaches which consider limited factors for credibility computing. Furthermore, we propose a new method for defuzzification of interval type-2 fuzzy sets that yields more reasonable results when compared with the existing methods. The last but not least is that it can be employed by companies to filter customers reviews based on their credibility rank. The framework is evaluated using real data crawled from Epinions. The results indicated that the proposed framework effectively ranks the reviewers based on their credibility.
    Keywords: Online Reviews; Reviewer credibility; Interval type-2 fuzzy set; AHP; VIKOR.

  • Attention-based word-level contextual feature extraction and cross-modality fusion for sentiment analysis and emotion classification   Order a copy of this article
    by Mahesh G. Huddar, Sanjeev S. Sannakki, Vijay S. Rajpurohit 
    Abstract: Multimodal affective computing has become a popular research area, due to the availability of a large amount of multimodal content. Feature alignment between the modalities and multimodal fusion are the most important issues in multimodal affective computing. To address these issues, the proposed model extracts the features at word-level and forced alignment is used to understand the time-dependent interaction among the modalities. The contextual information among the words of an utterance and between the nearby utterances is extracted using bidirectional long short term memory (LSTM). Weighted pooling based attention model is used to select the important features within the modalities and importance of each modality. Information from multiple modalities is fused using a cross-modality fusion technique. The performance of the proposed model was tested on two standard datasets such as IEMOCAP and CMU-MOSI. By incorporating the word-level features, feature alignment, and cross-modality fusion, the proposed architecture outperforms the baselines in terms of classification accuracy.
    Keywords: affective computing; attention model; contextual fusion; cross-modality fusion; feature alignment; computer vision; deep learning; bidirectional recurrent neural network; sentiment analysis.

  • A knowledge-based diagnosis algorithm for broken rotor bar fault classification using FFT, principal component analysis and support vector machines   Order a copy of this article
    by Hayri Arabaci, Mohamed Ali Mohamed 
    Abstract: Despite their ruggedness and reliability, induction motors experience faults due to stresses and manufacturing errors. Early detection of these faults is important in preventing further damages and minimising down-time. In this study, a machine learning algorithm is proposed for detection and classification of broken rotor bar (BRB) faults according to their severity. Removal of high frequency components then amplification was performed on the measured single-phase current. Features were then extracted using FFT and principal component analysis (PCA). Support vector machines (SVM) was used for classification. Two classification schemes were analysed; one classifying in one step and another in two steps. Experiments were performed to evaluate the algorithms by analysing their recognition rates. Six different SVM kernels were studied. Recognition rates as high as 97.9% were achieved. False negative rate as low as 0% was also realised. Furthermore, it was found out that using more principle components does not yield significant improvements.
    Keywords: squirrel cage induction motor; IM; SVM; support vector machines; PCA; principal component analysis; BRB; broken rotor bar; fault diagnosis; machine learning.

  • Solving the e-commerce logistics problem using anti-predatory NIA   Order a copy of this article
    by Rohit Kumar Sachan, Tarun Kumar, Dharmender Singh Kushwaha 
    Abstract: E-commerce is expanding their roots in every business. Fast, efficient, reliable, timely delivery of goods and optimal transportation cost are the major challenges in e-commerce. To overcome these challenges, e-commerce companies are using a well-planned arrangement of warehouses and distribution centres (logistics network). This logistics network also reduces the operational cost and capital investment of an e-commerce company. This study proposes a novel solution to deal with e-commerce logistics problem (ECLP) using anti-predatory NIA (APNIA). The proposed approach is useful for identifying cities where warehouses and distribution centres can be established; and allocating the distribution centres to warehouse in order to reduce total cost of goods transportation. The proposed approach is also useful for predicting the number of warehouses to be established for optimal logistics network. The experimental evaluation reveals that the proposed method achieves 2.30% lower gap value and 20% more consistent optimal results as compared to the genetic algorithm.
    Keywords: APNIA; anti-predatory NIA; distribution centre; e-commerce; establishment cost; genetic algorithm; goods; HLP; hub location problem; logistics; meta-heuristic; spoke; transportation cost; warehouse.

Special Issue on: ICCSDET-2018 Advances and Applications in Intelligent Control Systems

  • A privacy preservation model for big data in map-reduced framework based on k-anonymisation and swarm-based algorithms   Order a copy of this article
    by Suman Madan, Puneet Goswami 
    Abstract: In recent years, two mainstream technologies have become the centre of IT world, big data and cloud computing. Both these fields are fundamentally different but used together generally. The big-data deals with huge scales of data however cloud-computing is majorly about the infrastructure. Together these fields are beneficial for enterprises varying from the government sector to social sites, from academic to medical sectors, etc. Thus, it becomes important to safeguard the datasets so that the end-users of data may not access the information delivered by the users. This paper presents a hybrid k-anonymisation model for the map-reduce framework which guarantees the preservation of privacy in the cloud database using the combination of swarm-based algorithms. The proposed model focuses on deriving fitness function which will give high value of privacy and low information loss. The simulation and comparison with other algorithms shows better privacy and utility when working with proposed model.
    Keywords: big data publishing; cloud computing; k-anonymisation; privacy; swarm-based algorithm; PSO; particle swarm optimisation; dragonfly; fitness function; MapReduce.