ORIGINAL_ARTICLE
Increasing the Value of Collected Data and Reducing Energy Consumption using Network Coding and Mobile Sinks in Wireless Sensor Networks
The Wireless Sensor Networks (WSNs) include a number of fixed sensor nodes so that each sink moves to collect data between nodes. It is necessary to determine the optimum route and residence location of mobile sinks to reduce energy consumption and increase the value of collected data, which causes increasing the lifetime of WSNs. Using Network Coding (NC), this paper presents a Mixed Integer Linear Programming Model to determine the multicast Sink Optimal Route (SOR) of Source Sensor Nodes (SSNs) to mobile sinks in WSNs which determines the time and location of sinks to collect maximum coded data and reduce the delay in sinks movement and energy consumption. Since solving this problem is not possible in polynomial time due to the multiple parameters and the limited resources of WSNs, therefore, several heuristic, greedy and fully distributed algorithms are proposed to determine the movement of sinks and their residence location based on maximizing the Value of Collected Coded Data (VCCD) and the type of data deadline. It is demonstrated, by simulation, that the optimal model and the use of NC and proposed algorithms, causes reducing the energy consumption and increasing the VCCD and network lifetime than non-NC methods.
https://miscj.aut.ac.ir/article_3374_a9e0f8bf6e94ab38352e4751bed9b927.pdf
2019-06-01
3
14
10.22060/miscj.2019.15417.5133
Network Coding
Sink Movement Optimal Route
Reducing Energy Consumption
Increasing Collected Data
Wireless Sensor Networks
Ehsan
Kharati
ehsan.kharati@gmail.com
1
Department of Computer Engineering, Qom Branch, Islamic Azad University, Qom, Iran
AUTHOR
Mohamad
Khalily-Dermany
m.1388khalili@gmail.com
2
Young Researchers and Elite Club, Khomein Branch, Islamic Azad University, Khomein, Iran
LEAD_AUTHOR
Hamidreza
Kermajani
hr.kermajani@gmail.com
3
Department of Computer Engineering, Tuyserkan Branch, Islamic Azad University, Tuyserkan, Iran
AUTHOR
[1] P. Gjanci, C. Petrioli, S. Basagni, C. A. Phillips, L. Bölöni, and D. Turgut, “Routing finding for maximum value of information in multi-modal underwater WSNs,” IEEE Transactions on Mobile Computing, vol. 17, no. 2, pp. 404-418, 2018.
1
[2] N. Sabor, S. Sasaki, M. Abo-Zahhad, and S. M. Ahmed, “A comprehensive survey on hierarchical-based routing protocols for mobile WSNs: review, taxonomy, and future routings,” Wireless Communications and Mobile Computing, vol. 2017, 2017.
2
[3] Z. Fei, B. Li, S. Yang, C. Xing, H. Chen, and L. Hanzo, “A survey of multi-objective optimization in WSNs: Metrics, algorithms, and open problems,” IEEE Communications Surveys & Tutorials, vol. 19, no. 1, pp. 550-586, 2017.
3
[4] A. Mehrabi, and K. Kim, “Maximizing data collection throughput on a routing in energy harvesting sensor networks using a mobile sink,” IEEE Transactions on Mobile Computing, no. 3, pp. 690-704, 2016.
4
[5] F. Tashtarian, M. H. Y. Moghaddam, K. Sohraby, and S. Effati, “On maximizing the lifetime of WSNsin event-driven applications with mobile sinks,” IEEE Transactions on Vehicular Technology, vol. 64, no. 7, pp. 3177-3189, 2015.
5
[6] R. Ahlswede, N. Cai, S.-Y. Li, and R. W. Yeung, “Network information flow,” IEEE Transactions on information theory, vol. 46, no. 4, pp. 1204-1216, 2000.
6
[7] S. Basagni, A. Carosi, E. Melachrinoudis, C. Petrioli, and Z. M. Wang, "A New MILP Formulation and Distributed Protocols for WSNsLifetime Maximization." pp. 3517-3524.
7
[8] W. Cai, M. Chen, T. Hara, and L. Shu, "GA-MIP: genetic algorithm based multiple mobile agents itinerary planning in WSNs." pp. 1-8.
8
[9] M. Chen, S. Gonzalez, Y. Zhang, and V. C. Leung, "Multi-agent itinerary planning for WSNs." pp. 584-597.
9
[10] S. R. Gandham, M. Dawande, R. Prakash, and S. Venkatesan, "Energy efficient schemes for WSNswith multiple mobile base stations." pp. 377-381.
10
[11] D. Jea, A. Somasundara, and M. Srivastava, "Multiple controlled mobile elements (data mules) for data collection in sensor networks." pp. 244-257.
11
[12] J. Luo, and J.-P. Hubaux, "Joint mobility and routing for lifetime elongation in WSNs." pp. 1735-1746.
12
[13] W. Wang, V. Srinivasan, and K.-C. Chua, "Using mobile relays to prolong the lifetime of WSNs." pp. 270-283.
13
[14] W. Rehan, S. Fischer, and M. Rehan, “Anatomizing the robustness of multichannel MAC protocols for WSNs: An evaluation under MAC oriented design issues impacting QoS,” Journal of Network and Computer Applications, vol. 121, pp. 89-118, 2018/11/01/, 2018.
14
[15] P. Gjanci, C. Petrioli, S. Basagni, C. A. Phillips, L. Bölöni, and D. J. I. T. o. M. C. Turgut, “Routing finding for maximum value of information in multi-modal underwater WSNs,” vol. 17, no. 2, pp. 404-418, 2018.
15
[16] C. Lv, Q. Wang, W. Yan, and J. Li, “A sparsity feedback-based data collection algorithm for WSNs,” Computer Networks, vol. 141, pp. 145-156, 2018/08/04/, 2018.
16
[17] R. Logambigai, S. Ganaroutingy, and A. Kannan, “Energy–efficient grid–based routing algorithm using intelligent fuzzy rules for WSNs,” Computers & Electrical Engineering, vol. 68, pp. 62-75, 2018/05/01/, 2018.
17
[18] C. Li, J. Bai, J. Gu, X. Yan, and Y. Luo, “Clustering routing based on mixed integer programming for heterogeneous WSNs,” Ad Hoc Networks, vol. 72, pp. 81-90, 2018/04/01/, 2018.
18
[19] O. M. Al-Kofahi, and A. E. Kamal, "Transmissions Scheduling in Network Coding-Based Resilient WSNs," Resilient WSNs, pp. 53-65: Springer, 2015.
19
[20] M. Khalily-Dermany, and M. J. Nadjafi-Arani, “Itinerary planning for mobile sinks in network-coding-based WSNs,” Computer Communications, vol. 111, pp. 1-13, 2017/10/01/, 2017.
20
[21] C. Abreu, F. Miranda, and P. M. Mendes, “Smart context-aware QoS-based admission control for biomedical WSNs,” Journal of Network and Computer Applications, vol. 88, pp. 134-145, 2017/06/15/, 2017.
21
[22] N. Javaid, S. Hussain, A. Ahmad, M. Imran, A. Khan, and M. Guizani, “Region based cooperative routing in underwater WSNs,” Journal of Network and Computer Applications, vol. 92, pp. 31-41, 2017/08/15/, 2017.
22
[23] I. L. C. Vasconcelos, I. C. Martins, C. M. S. Figueiredo, and A. L. L. Aquino, “A data sample algorithm applied to wireless sensor network with disruptive connections,” Computer Networks, vol. 146, pp. 1-11, 2018/12/09/, 2018.
23
[24] A. Abuarqoub, M. Hammoudeh, B. Adebisi, S. Jabbar, A. Bounceur, and H. Al-Bashar, “Dynamic clustering and management of mobile WSNs,” Computer Networks, vol. 117, pp. 62-75, 2017/04/22/, 2017.
24
[25] Z. Fei, B. Li, S. Yang, C. Xing, H. Chen, L. J. I. C. S. Hanzo, and Tutorials, “A survey of multi-objective optimization in WSNs: Metrics, algorithms, and open problems,” vol. 19, no. 1, pp. 550-586, 2017.
25
[26] F. Tashtarian, M. H. Y. Moghaddam, K. Sohraby, and S. J. I. T. o. V. T. Effati, “On maximizing the lifetime of WSNsin event-driven applications with mobile sinks,” vol. 64, no. 7, pp. 3177-3189, 2015.
26
[27] M. Koç, and I. J. I. J. o. D. S. N. Korpeoglu, “Controlled sink mobility algorithms for WSNs,” vol. 10, no. 4, pp. 167508, 2014.
27
[28] M. K. Dermany, and S. Sharifian, “Effect of various topology control mechanisms on maximum information flow in WSNs,” SmartCR, vol. 5, no. 1, pp. 10-18, 2015.
28
[29] T. Ho, B. Leong, R. Koetter, M. Médard, M. Effros, and D. R. Karger, “Byzantine modification detection in multicast networks with random network coding,” IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2798-2803, 2008.
29
[30] M. Khalily-Dermany, and M. Nadjafi-Arani, “Itinerary planning for mobile sinks in network-coding-based WSNs,” Computer Communications, vol. 111, pp. 1-13, 2017.
30
[31] T. Ho, and D. Lun, Network coding: an introduction: Cambridge University Press, 2008.
31
[32] M. Khalily-Dermany, M. Shamsi, and M. J. Nadjafi-Arani, “A convex optimization model for topology control in network-coding-based-wireless-sensor networks,” Ad Hoc Networks, vol. 59, pp. 1-11, 2017.
32
[33] G. A. Shah, and O. B. Akan, “Timing-based mobile sensor localization in wireless sensor and actor networks,” Mobile Networks and Applications, vol. 15, no. 5, pp. 664-679, 2010.
33
[34] B. Khodabakhshi, and M. Khalily, “An energy efficient NCmodel for WSNs,” Procedia Computer Science, vol. 98, pp. 157-162, 2016.
34
[35] X. Wang, M. Chen, T. Kwon, and H.-C. Chao, “Multiple mobile agents' itinerary planning in WSNs: survey and evaluation,” IET communications, vol. 5, no. 12, pp. 1769-1776, 2011.
35
[36] H. Kaushal, and G. Kaddoum, “Underwater optical wireless communication,” IEEE access, vol. 4, pp. 1518-1547, 2016.
36
[37] C. Petrioli, R. Petroccia, J. R. Potter, and D. Spaccini, “The SUNSET framework for simulation, emulation and at-sea testing of underwater WSNs,” Ad Hoc Networks, vol. 34, pp. 224-238, 2015.
37
[38] A. Darehshoorzadeh, N. T. Javan, and M. Dehghan, "LBAODV: a new load balancing multirouting routing algorithm for mobile ad hoc networks." pp. 344-349.
38
[39] F. Bai, K. S. Munasinghe, and A. Jamalipour, “A novel information acquisition technique for mobile-assisted WSNs,” IEEE Transactions on Vehicular Technology, vol. 61, no. 4, pp. 1752-1761, 2012.
39
[40] W. Liang, J. Luo, and X. Xu, "Prolonging network lifetime via a controlled mobile sink in WSNs." pp. 1-6.
40
[41] C. Konstantopoulos, G. E. Pantziou, D. Gavalas, A. Mpitziopoulos, and B. Mamalis, “A Rendezvous-Based Approach Enabling Energy-Efficient Sensory Data Collection with Mobile Sinks,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 5, pp. 809-817, 2012.
41
[42] C. Gkantsidis, J. Miller, and P. Rodriguez, "Comprehensive view of a live NCP2P system." pp. 177-188.
42
[43] M. K. Dermany, M. Sabaei, and M. Shamsi, “Topology control in network–coding–based–multicast WSNs,” International Journal of Sensor Networks, vol. 17, no. 2, pp. 93-104, 2015.
43
[44] B. Behdani, Y. S. Yun, J. Cole Smith, and Y. Xia, “Decomposition algorithms for maximizing the lifetime of WSNswith mobile sinks,” Computers & Operations Research, vol. 39, no. 5, pp. 1054-1061, 2012/05/01/, 2012.
44
[45] J. A. Khan, H. K. Qureshi, and A. Iqbal, “Energy management in WSNs: A survey,” Computers & Electrical Engineering, vol. 41, pp. 159-176, 2015/01/01/, 2015.
45
ORIGINAL_ARTICLE
A Hybridized Metaheuristic Algorithm to Solve the Robust Resource Constrained Multi-Project Scheduling Problem
In this paper, the multi-project scheduling problem is studied. The duration of the activities is subjected to the considerable uncertainty and the robust optimization approach is considered to deal with the uncertainty. The maximum total tardiness of the projects is defined as the objective function which should be minimized. In order to allocate the constrained resources to the multi-projects, two models are proposed. In the first model, the projects are scheduled separately while in the second model, the multi-project approach is applied and the resource sharing policy is used. It is demonstrated that how the tardiness of the projects will be decreased when the multi-project approach is applied. Also, the Adaptive Bee Genetic Algorithm (ABGA) is designed as a hybrid metaheuristic algorithm and proposed in this paper to solve the first stage model of the Robust Resource Constrained Multi-Project Scheduling Problem (RRCMPSp ). The results of ABGA is compared with the results of scenario-relaxation algorithm as an exact algorithm for the small size problems. Also, the performance of ABGA is studied compared to the Genetic Algorithm (GA) and Artificial Bee Colony (ABC) as two basic algorithms for the large size problems. The results show the effectiveness of the proposed algorithm in solving the RRCMPSp .
https://miscj.aut.ac.ir/article_3380_34cc532d8f685a3594dec16e355a67ed.pdf
2019-06-01
15
32
10.22060/miscj.2019.15033.5121
Resource Constrained Multi-Project Scheduling Problem
Robust Optimization
Maximum Total Tardiness
ABGA
Elham
Nabipoor Afruzi
enabipoorafruzi@mail.kntu.ac.ir
1
Industrial Engineering Faculty, K.N.Toosi University of Technology, Tehran, Iran
AUTHOR
Abdollah
Aghaie
aaghaie@kntu.ac.ir
2
Industrial Engineering Faculty, K. N. Toosi University of Technology, Tehran, Iran
LEAD_AUTHOR
1. Lova, A., and Tormos, P., “Analysis of scheduling schemes and heuristic rules performance in resource-constrained multiproject scheduling”, Annals of Operations Research, Vol. 102, pp. 263–286, 2001.
1
2. Blismass, N., Sher, WD., Thorpe, A., and Baldwin, AN., “Factors influencing delivery within construction clients’ multi-project environments”, Engineering, Construction and Architectural Management, Vol. 11, No. 2, pp. 113–125, 2004a.
2
3. Aritua, B., Smith, N.J., and Bower, D., “Construction client multi-projects – A complex adaptive systems perspective”, International Journal of Project Management, Vol. 27, pp. 72–79 (2009).
3
4. Zheng, Z., Shumin, L., Ze, G., and Yueni, Z., “Resource constraint multi project scheduling with priority and uncertain activity durations”, International Journal of Computational intelligence systems, Vol. 6, No. 3, pp. 530-547, 2013.
4
5. Singh, A., “Resource Constrained Multi-Project Scheduling with Priority Rules & Analytic Hierarchy Process”, Procedia Engineering, Vol. 69, pp. 725 – 734, 2014.
5
6. Wei-xin, W., Xu, W., Xian-long, G., and Lei, D., “Multi-objective optimization model for multi-project scheduling on critical chain”, Advances in Engineering Software, Vol. 68, pp. 33–39, 2014.
6
7. Wauters, T., Kinable, J., Smet, P., Vancroonenburg, W., Berghe, G., and Verstichel, J., “The Multi-Mode Resource-Constrained Multi-Project Scheduling Problem”, Journal of Scheduling, The MISTA 2013 challenge, 2013.
7
8. Besikci, U., Bilge, U., and Ulusoy, G., “Multi-mode resource constrained multi-project scheduling and resource portfolio problem”, European Journal of Operational Research, Vol. 240, pp. 22–31, 2015.
8
9. Zheng, Z., Shumin, L., Ze, G., Yueni, Z., and Zhang, X., “A critical chains-based distributed multi-project scheduling approach”, Neurocomputing, Vol. 143, pp. 282–293, 2014.
9
10. Klerides, E., and Hadjiconstantinou, E., “A decomposition-based stochastic programming approach for the project scheduling problem under time/cost trade-off settings and uncertain durations”, Computers and Operations Research, Vol. 37, No. 12, pp. 2131–2140, 2010.
10
11. Bertsimas, D., and Sim, M., “The price of robustness”, Operations Research, Vol. 52, No. 1, pp. 35-53, 2004.
11
12. Bruni, M.E., Puglia Pugliese, L., Di Beraldi, P., and Guerriero, F., “An adjustable robust optimization model for the resource-constrained project scheduling problem with uncertain activity durations”, Omega, Vol. 71, pp. 66-84, 2017.
12
13. Herroelen, W., and Leus, R., “Project scheduling under uncertainty: Survey and research potentials”, European Journal of Operational Research, Vol. 165, pp. 289–306, 2005.
13
14. Klerides, E. and Hadjiconstantinou, E. “A decomposition-based stochastic programming approach for the project scheduling problem under time/cost trade-off settings and uncertain durations”, Computers and Operations Research, 37(12), pp. 2131–2140 (2010).
14
15. Chiang, A.J., and Jeang, A., “Stochastic project management via computer simulation and optimisation method”, International Journal of Systems Science: Operations & Logistics, Vol. 2, No. 4, pp. 211–230, 2015.
15
16. Xiong, J., Chen, Y. W., Yang, K. W., Zhao, Q. S., and Xing, L. N., “A hybrid multi objective genetic algorithm for robust resource constrained project scheduling with stochastic durations”, Mathematical Problems in Engineering, 24 pages, 2012.
16
17. Duc Long, L., and Ohsato, A., “Fuzzy critical chain method for project scheduling under resource constraints and uncertainty”, International Journal of Project Management, Vol. 26, pp. 688–698, 2008.
17
18. Knyazeva, M., Bozhenyuk, B., and Rozenberg, I., “Resource-constrained project scheduling approach under fuzzy conditions”, Procedia Computer Science, Vol. 77, pp. 56-64, 2015.
18
19. Dixit, V., Srivastava, R.K., and Chaudhuri, A., “Procurement scheduling for complex projects with fuzzy activity durations and lead times”, Computers & Industrial Engineering, Vol. 76, pp. 401–414, 2014.
19
20. Masmoudi, M., and Haït, A., “Project scheduling under uncertainty using fuzzy modelling and solving techniques”, Engineering Applications of Artificial Intelligence, Vol. 26, No. 1, pp. 135–149, 2013.
20
21. Artigues, C., Leus, R., and Nobibon, F. T., “Robust optimization for resource-constrained project scheduling with uncertain activity durations”, Flexible Services and Manufacturing Journal, Vol. 25, pp. 175–205, 2013.
21
22. Yamashita, D.S., Armentano, V. A., and Laguna, M., “Robust optimization models for project scheduling with resource availability cost”, Journal of scheduling, Vol. 10, pp. 67–76, 2007.
22
23. Chakrabortty, R.K., Sarker, R.A., and Essam, D.L., “Resource constrained project scheduling with uncertain activity durations”, Computers & Industrial Engineering, http://dx.doi.org/10.1016/j.cie.2016.12.040, 2017.
23
24. Bruni, M. E. Di Puglia Pugliese, L. Beraldi, P., and Guerriero, F. A., “computational study of exact approaches for the adjustable robust resource constrained project scheduling problem”. Computers & Operations Research, Vol. 99, pp. 178-190, 2008.
24
25.Balas, E., “Project scheduling with resource constraints”, In E.M.L. Beale, (Ed.), Applications of Mathematical Programming Techniques, pp. 187-200, The English Universities Press Ltd, 1971.
25
26. Assavapokee, T., Realff, M.J., Ammons, J.C. and Hong, I-H. “Scenario relaxation algorithm for finite scenario-based min–max regret and min–max relative regret robust optimization”, Computers & Operations Research, Vol. 35, pp. 2093 – 2102, 2008.
26
27. Patterson, J. H., “Project Scheduling: The Effects of Problem Structure on Heuristic Performance”, Naval Research Logistic, Vol. 23, No. 1, pp. 95-123, 1976.
27
28. Blazewicz, J. Lenstra, J. K., and Rinnooy Kan, A. H. G., “Scheduling subject to resource constraints: classification and complexity”. Discrete Applied Mathematics, Vol. 5, No. 1, pp. 11 – 24, 1983.
28
29. Goncalves, J. F., Mendes, J. J. M., and Resende, M. G. C., “A genetic algorithm for the resource constrained multi-project scheduling problem”. European Journal of operational Research, 189, pp. 1171-1190, 2008.
29
30. Kim-Fung, M., Tang, K., and Kwong, S. "Genetic algorithms: concepts and applications [in engineering design”. IEEE transactions on Industrial Electronics, Vol. 43, No. 5, pp. 519-534, 1996.
30
31. Dervis, K., “An idea based on honey bee swarm for numerical optimization”. Technical report-tr06, Erciyes university, engineering faculty, computer engineering department, Vol. 200, 2005.
31
32. Demeulemeester, E., Vanhoucke, M. and Herroelen, W. “A random network generator for activity-on-the-node networks”. Journal of Scheduling, 6, pp. 13-34, 2003.
32
33. Nabipoor Afruzi, E. Aghaie, A., and Najafi, A. A., “Robust Optimization for the Resource Constrained Multi-Project Scheduling Problem with Uncertain Activity Durations”. Scientia Iranica,
33
Articles in Press, Accepted Manuscript, Available Online from 05 August 2018.
34
34. Srinivas, M., and Patnaik, L. M. “Adaptive Probabilities of Crossover Genetic in Mutation and Algorithms”. IEEE Transactions on Systems, Man and Cybernetics, Vol. 24, No. 4, pp. 656-667, 1994.
35
35. Eiben, A. E. Marchiori, E., and Valko, V. A., “Evolutionary Algorithms with on-the-fly Population Size Adjustment”. In X. Yao et al., editors, Parallel Problem Solving from Nature PPSN VIII, LNCS 3242, pp. 41–50, 2004.
36
ORIGINAL_ARTICLE
Intrusion detection system using an ant colony gene selection method based on information gain ratio using fuzzy rough sets
With the development of network-based technologies, intrusion detection plays an important role in modern computer systems. Intrusion Detection System (IDS) is used to achieve higher security, and detect abnormal activities in computers or networks. The efficiency of intrusion detection systems mainly depends on the dimensions of data features. So, in the implementation of the IDS, by applying the feature selection phase irrelevant and redundant features are eliminated, and as a result, the speed and accuracy of the intrusion detection system increases. Applying appropriate search strategy and evaluation measure are significantly effective to feature selection. In this paper, we propose a feature selection method which uses a combination of filter and wrapper feature selection method. This method applies a modified ant colony algorithm as a search strategy on filter phase and fuzzy rough sets to calculate the information gain ratio and acquire the evaluation measure in the ant colony algorithm. Then, on the wrapper phase the minimal subsets of features with first order and second order accuracies are selected. To confirm the efficiency of our proposed method, we compared this method with three other methods and with a method which is based on artificial neural networks. Finally, we compared the proposed method with an ant colony optimization based method. Considering the results, the proposed method, on average, has a higher accuracy than the other methods and also selects a subset of features which have a minimum length.
https://miscj.aut.ac.ir/article_3429_ad416bfc135f91971cf5732b7d033172.pdf
2019-06-01
33
44
10.22060/miscj.2019.14535.5110
IDS
feature selection method
fuzzy rough sets
Ant colony optimization
mohammad masoud
javidi
javidi@uk.ac.ir
1
Department of Computer Science ,Shahid Bahonar University,Kerman,Iran
LEAD_AUTHOR
Sedighe
Mansouri
s.mansoury89@gmail.com
2
Computer Science Department, Shahid Bahonar University of Kerman, Kerman, Iran
AUTHOR
[1] U. Ravale, N. Marathe, P. Padiya, "Feature Selection Based Hybrid Anomaly Intrusion Detection System Using K Means and RBF Kernel Function. ", In proceedings of the International Conference on Advanced Computing Technologies and Applications (ICACTA), pp. 428-435, 2015.
1
[2] A. A. Aburomman, M. B. I. Reaz, "A Novel Weighted Support Vector Machines Multiclass Classifier Based on Differential Evolution for Intrusion Detection Systems", Information Sciences, vol. 414, pp. 225-246, 2017.
2
[3] A. Sharma, I. Manzoor, N. Kumar, "A Feature Reduced Intrusion Detection System Using ANN Classifier", Expert Systems with Applications, vol. 88, pp. 249-257, 2017.
3
[4] Y. Zhu, J. Liang, J. Chen, Z. Ming, "An improved NSGA-III algorithm for feature selection used in intrusion detection", Knowledge-Based Systems, vol. 116, pp. 74-85, 2017.
4
[5] S. N. Ghazavi, T. W. Liao, "Medical data mining by fuzzy modeling with selected features", Artificial Intelligence in Medicine, vol. 43, pp. 195-206, 2008.
5
[6] T.N. Lal, O. Chapelle, J. Weston, A. Elisseeff, Embedded methods, in: I. Guyon, S. Gunn, M. Nikravesh, L.A. Zadeh (Eds.), Feature Extraction: Foundations and Applications. Studies in Fuzziness and Soft Computing, vol. 207, Springer, Berlin, Heidelberg, pp. 137–165, 2006.
6
[7] Ch. Khammassi, S. Krichen. "A GA-LR Wrapper Approach for Feature Selection in Network Intrusion Detection.", Computers & Security, 2017.
7
[8] Y. Y. Chung, N. Wahid, "A hybrid network intrusion detection system using simplified swarm optimization (sso)", Applied Soft Computing, vol. 12, pp. 3014–3022, 2012.
8
[9] E. De la Hoz, A. Ortiz, J. Ortega, A. Martínez-Álvarez, "Feature selection by multi-objective optimisation: Application to network anomaly detection by hierarchical self-organising maps.", Knowledge-Based Systems, vol. 71, pp. 322–338, 2014.
9
[10] S. H. Kang, K. J. Kim, "A feature selection approach to find optimal feature subsets for the network intrusion detection system", Cluster Computing, pp. 1–9, 2016. P. Maji, P. Garai, “On fuzzy-rough attribute selection: Criteria of Max-Dependency, Max-Relevance, MinRedundancy, and Max-Significance.”, applied soft computing, vol. 13, pp. 3968-3980, 2013. [12] Z. Pawlak, A. Skowron, “Rudiments of rough sets”, Information sciences, vol.177, pp. 3-27, 2007.
10
[13] G.A. Montazer, S. ArabYarmohammadi, "Detection of phishing attacks in Iranian e-banking using a fuzzy–rough hybrid system", Applied Soft Computing, vol. 35, pp. 482–492, 2015.
11
[14] M. Podsiadło & H. Rybiński, "Rough sets in economy and finance", Transactions on Rough Sets XVII, pp. 109-173, 2014.
12
[15] C.H. Xie, Y.J. Liu, J.Y. Chang, "Medical image segmentation using rough set and local polynomial regression", Multimedia Tools and Applications, vol. 74, pp. 1885–1914, 2015.
13
[16] V. Prasad, T.S. Rao, M.S. Babu, "Thyroid disease diagnosis via hybrid architecture composing rough data sets theory and machine learning algorithms", Soft Computing, vol. 20, pp. 1179–1189, 2016.
14
[17] M.P. Francisco, J.V. Berna-Martinez, A.F. Oliva, M.A.A. Ortega, "Algorithm for the detection of outliers based on the theory of rough sets", Decision Support Systems, vol. 75, pp. 63–75, 2015.
15
[18] J. Dai, Q. Xu, "Attribute selection based on information gain ratio in fuzzy rough set theory with application to tumor classification", Applied Soft Computing, vol. 13, pp. 1184-1199, 2012.
16
[19] F. Amiri, M. Rezaei, C. Lucus. A. Shakeri, N. Yazdani, "Mutual information-based feature selection for intrusion detection systems", Network and computer applications, vol. 34, pp. 1184-
17
1199, 2011.
18
[20] İ. Özçelik, R. R. Brooks, "Deceiving entropy based DoS detection", computers & security, vol. 48, pp. 234-245, 2015.
19
[21] Sh. Aljawarneh, M. Aldwairi, M. B. Yassein, "Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model", Computational Science, 2017.
20
[22] M. Dorigo, L. M. Gambardella, "A cooperative learning approach to the traveling salesman problem", IEEE Transactions on Evolutionary Computation, vol. 1, pp. 53-66, 1997.
21
[23] A. Shenfield, D. Day, A. Ayesh, "Intelligent intrusion detection systems using artificial neural networks.", the Korean Institute of Communications and Information Sciences, vol. 4, pp. 95-99, 2018.
22
[24] M. Hosseinzadeh, P. Kabiri. "Feature selection for intrusion detection system using ant colony optimization", International Journal of Network Security, vol. 18, pp. 420-432, 2016.
23
ORIGINAL_ARTICLE
Histogram Based Shape and Textural Characteristics for Facial Emotion Recognition
Emotion recognition has many applications in relation between human and machine. A facial emotion recognition framework for 6 basic emotions of happiness, sadness, disgust, surprise, anger and fear is proposed in this paper. The proposed framework utilizes the histogram estimate of shape and textural characteristics of face image. Instead of direct processing on the original gray levels of face image which may have not significant information about facial expression, the processing is done on transformed images containing informative features. The shape features are extracted by morphological operators by reconstruction and the texture ones are acquired by computing the gray-level co-occurrence matrix (GLCM), and applying Gabor filters. The use of whole face image may provide non-informative and redundant information. So, the proposed emotion recognition method just uses the most important components of face such as eyes, nose and mouth. After textural and shape feature extraction, the histogram function is applied to the shape and texture features containing emotional states of face. The simple and powerful nearest neighbor classifier is used for classification of fused histogram features. The experiments show the good performance of the proposed framework compared to some state-of-the-art facial expression methods such as local linear embedding (LLE), Isomap, Morphmap and local directional pattern (LDP).
https://miscj.aut.ac.ir/article_3430_e350d47da19025079c7f398bb8f845c0.pdf
2019-06-01
45
56
10.22060/miscj.2019.15854.5144
facial emotion recognition
Gabor
morphology
GLCM
histogram
Maryam
Imani
maryam.imani@modares.ac.ir
1
Department of Electrical Engineering (Communication), Tarbiat Modares University
LEAD_AUTHOR
[1] U. Thonse, R. V. Behere, S. K. Praharaj, P. S. V. N. Sharma, Facial emotion recognition, socio-occupational functioning and expressed emotions in schizophrenia versus bipolar disorder, Psychiatry Research, Available online 27 March 2018.
1
[2] D. K. Jain, P. Shamsolmoali, P. Sehdev, Extended deep neural network for facial emotion recognition, Pattern Recognition Letters, 120 (2019) 69-74.
2
[3] M. Z. Uddin, M. M. Hassan, A. Almogren, M. Zuair, G. Fortino, J. Torresen, A facial expression recognition system using robust face features from depth videos and deep learning, Computers & Electrical Engineering, 63 (2017) 114-125.
3
[4] D. Torres-Boza, M. C. Oveneke, F. Wang, D. Jiang, W. Verhelst, H. Sahli, Hierarchical sparse coding framework for speech emotion recognition, Speech Communication, 99 (2018) 80-89.
4
[5] A. Uribe, A. Gómez, M. Bastidas, O. L. Quintero, D. Campo, "A novel emotion recognition technique from voiced-speech," 2017 IEEE 3rd Colombian Conference on Automatic Control (CCAC), Cartagena (2017) 1-4.
5
[6] K. N. Minhad, S. H. M. Ali, M. B. I. Reaz, Happy-anger emotions classifications from electrocardiogram signal for automobile driving safety and awareness, Journal of Transport & Health, 7 (Part A) (2017) 75-89.
6
[7] S. Vaid, P. Singh, "De-noising of EEG signal for emotion recognition," 2015 International Conference on Signal Processing, Computing and Control (ISPCC), Waknaghat (2015) 159-162.
7
[8] M. Z. Uddin, M. M. Hassan, A. Almogren, A. Alamri, M. Alrubaian, G. Fortino, "Facial Expression Recognition Utilizing Local Direction-Based Robust Features and Deep Belief Network," IEEE Access, 5 (2017) 4525-4536.
8
[9] G. Caridakis, K. Karpouzis, S. Kollias, User and context adaptive neural networks for emotion recognition, Neurocomputing 71 (2008) 2553– 2562.
9
[10] X. Huang, J. Kortelainen, G. Zhao, X. Li, A. Moilanen, T. Seppänen, M. Pietikäinen, Multi-modal emotion analysis from facial expressions and electroencephalogram, Computer Vision and Image Understanding, 147 (2016) 114-124.
10
[11] M. A. Nicolaou, H. Gunes, M. Pantic, Output-associative RVM regression for dimensional and continuous emotion prediction, Image and Vision Computing, 30 (3) (2012) 186-196.
11
[12] M. Song, M. You, N., C. Li, Chen, A robust multimodal approach for emotion recognition. Neurocomputing, 71 (2008) 1913-1920.
12
[13] P. Ekman, W.V. Friesen, Facial action coding system: A technique for the measurement of facial movement, palo alto. Consulting Psychologists Press, CA (1988); P.C. Ellsworth, C.A. Smith, From appraisal to emotion: Differences among unpleasant feelings, Motivation and Emotion 12 (1978) 271–302.
13
[14] Z. Li, J.i. Imai, M. Kaneko, Facial-component-based bag of words and phog descriptor for facial expression recognition, IEEE International Conference on Systems, Man and Cybernetics (SMC 2009) (2009) 1353–1358.
14
[15] M. Turk, A. Pentland, Face recognition using eigen faces, IEEE Conference on Computer Vision and Pattern Recognition, Maui, HI, USA (1991).
15
[16] T. Ahonen, A. Hadid, M. Pietikainen, Face description with local binary patterns: Application to face recognition, IEEE Transactions on Pattern Analysis and Machine Intelligence, 28 (2006) 2037–2041.
16
[17] J.B. Tenenbaum, V. de Silva, J.C. Langford, A global geometric framework for nonlinear dimensionality reduction, Science, 290 (5500) (2000) 2319–2323.
17
[18] S.T. Roweis, L.K. Saul, Nonlinear dimensionality reduction by locally linear embedding’, Science, 290 (5500) (2000) 2323–2326.
18
[19] R. Kapoor, R. Gupta, Morphological mapping for non-linear dimensionality reduction, IET Computer Vision, 9 (2) (2015) 226-233.
19
[20] T. Jabid, M. H. Kabir, O. Chae, Robust facial expression recognition based on local directional pattern, ETRI journal, 32 (5) (2010) 784–794.
20
[21] Y. Yoshitomi, T. Asada, R. Kato, M. Tabuse, Facial expression recognition using facial expression intensity characteristics of thermal image, J. Robot. Netw. Artif. Life, 2 (1) (2015) 5–8.
21
[22] S. Wang, B. Pan, H. Chen, Q. Ji, Thermal Augmented Expression Recognition, IEEE Transactions on Cybernetics, 48 (7) (2018) 2203-2214.
22
[23] M. Liu, S. Shan, R. Wang, X. Chen, Learning Expressionlets via Universal Manifold Model for Dynamic Facial Expression Recognition, IEEE Transactions on Image Processing, 25 (12) (2016) 5920-5932.
23
[24] Q. Mao, Q. Rao, Y. Yu, M. Dong, Hierarchical Bayesian Theme Models for Multipose Facial Expression Recognition, IEEE Transactions on Multimedia, 19 (4) (2017) 861-873.
24
[25] A. Majumder, L. Behera, V. K. Subramanian, Automatic Facial Expression Recognition System Using Deep Network-Based Data Fusion, IEEE Transactions on Cybernetics, 48 (1) (2018) 103-114.
25
[26] M. Z. Uddin, W. Khaksar, J. Torresen, Facial Expression Recognition Using Salient Features and Convolutional Neural Network, IEEE Access, 5 (2017) 26146-26161.
26
[27] D. K. Jain, Z. Zhang, K. Huang, Multi angle optimal pattern-based deep learning for automatic facial expression recognition, Pattern Recognition Letters, In Press.
27
[28] S. Wu, J. Xu, S. Zhu, H. Guo, A Deep Residual convolutional neural network for facial keypoint detection with missing labels, Signal Processing,Volume 144, 2018, Pages 384-391.
28
[29] L. Chen, M. Wu, M. Zhou, Z. Liu, J. She and K. Hirota, Dynamic Emotion Understanding in Human-Robot Interaction Based on Two-Layer Fuzzy SVR-TS Model, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2019, In Press.
29
[30] G. Acampora, A. Vitiello, Interoperable neuro-fuzzy services for emotion-aware ambient intelligence, Neurocomputing, 122 (2013) 3-12.
30
[31] M. Imani, G. A. Montazer, GLCM features and fuzzy nearest neighbor classifier for emotion recognition from face, 2017 7th International Conference on Computer and Knowledge Engineering (ICCKE), Mashhad (2017) 8-13.
31
[32] M. S. Bartlett, G. Littlewort, I. Fasel, and J. R. Movellan, Real time face detection and facial expression recognition: Development and applications to human computer interaction, Computer Vision and Pattern Recognition Workshop (CVPRW ’03), 5 (2003) 53.
32
[33] E. Sariyanidi, H. Gunes, A. Cavallaro, Learning Bases of Activity for Facial Expression Recognition, IEEE Transactions on Image Processing, 26 (4) (2017) 1965-1978.
33
[34] M. Imani, H. Ghassemian, GLCM, Gabor, and Morphology Profiles Fusion for Hyperspectral Image Classification, IEEE proceedings of the 24th Iranian Conference on Electrical Engineering (ICEE 2016), Shiraz, Iran (2016) 460-465.
34
[35] S. Gupta, R. K. Singh, Mathematical morphology based face segmentation and facial feature extraction for facial expression recognition, 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), Noida (2015) 691-695.
35
[36] M. Imani, H. Ghassemian, Edge Patch Image-Based Morphological Profiles for Classification of Multispectral and Hyperspectral Data, IET Image Processing, 11 (3) (2017) 164-172.
36
[37] M. Imani, G. A. Montazer, Face Recognition Using Morphological Profile and Feature Space Discriminant Analysis, IEEE proceedings of the 25th Iranian Conference on Electrical Engineering (ICEE 2017), Tehran, Iran (2017) 1729-1734.
37
[38] R. A. Marklein, M. W. Klinker, K. A. Drake, H. G. Polikowsky, E. C. Lessey-Morillon, S. R. Bauer, Morphological profiling using machine learning reveals emergent subpopulations of interferon-γ–stimulated mesenchymal stromal cells that predict immunosuppression, Cytotherapy, 21 (1) (2019) 17-31.
38
[39] P. Viola, M. Jones, Rapid object detection using a boosted cascade of simple features, Computer Vision and Pattern Recognition, (2001) 511-518.
39
[40] M. J. Lyons, S. Akemastu, M. Kamachi, J. Gyoba, Coding Facial Expressions with Gabor Wavelets, 3rd IEEE International Conference on Automatic Face and Gesture Recognition (1998) 200-205.
40
[41] F. Mirzapour, H. Ghassemian, Using GLCM and Gabor filters for classification of PAN images, 21st Iranian Conference on Electrical Engineering (ICEE 2013), Mashhad, Iran (2013).
41
ORIGINAL_ARTICLE
A Novel Version of GSA and its Application in the K-of-N Lifetime Problem in Two-Tiered WSN
For the past decades, we have witnessed an extraordinary advancement in the field of Wireless Sensor Networks (WSNs) in both academic and industrial settings. Moreover, the network lifetime is regarded as one of the most critical issues in this field, and quite a large number of researchers are increasingly exploring this topic of interest. In this study, the linear-scaling method is initially implemented onto the Gravitational Search Algorithm (GSA) for the mass calculation. This is due to the fact that the exploitation and exploration abilities of the algorithm can be fully controlled using this approach. The results obtained from the simulation revealed that this novel GSA achieves the same level of performance as that of conventional GSA and significantly outperforms the state-of-the-art metaheuristic search algorithms. Additionally, this improved GSA can be readily utilized to solve the K-of-N lifetime problem in two-tiered WSN architecture. In our proposed method, the novel GSA was employed in order to find the optimum location of the base station to enhance network lifetime. Furthermore, the simulation results indicated that despite the simplicity in implementation, our proposed method has a higher level of performance compared to other approaches used to address K-of-N lifetime problem in two-tiered WSN architecture.
https://miscj.aut.ac.ir/article_3431_71f331f269442839886c07dae51ba8cd.pdf
2019-06-01
57
66
10.22060/miscj.2019.15273.5129
Gravitational Search Algorithm (GSA)
Exploration and Exploitation
Wireless Sensor Network (WSN)
Network Lifetime
energy consumption
Linear Scaling
Sepehr
Ebrahimi
sepehr_ebrahimi@math.uk.ac.ir
1
Department of Computer Science, Shahid Bahonar University of Kerman, Kerman, Iran
AUTHOR
mohammad masoud
javidi
javidi@uk.ac.ir
2
Department of Computer Science ,Shahid Bahonar University,Kerman,Iran
LEAD_AUTHOR
[1] M.R.K. Aziz, K. Anwar, T. Matsumoto, Monitoring spot configuration of RSS-based factor graph geolocation technique in outdoor WSN environment, in: IEICE General Conference, 2015.
1
[2] M. Amiribesheli, A. Benmansour, A. Bouchachia, A review of smart homes in healthcare, Journal of Ambient Intelligence and Humanized Computing, 6(4) (2015) 495-517.
2
[3] A.B. Noel, A. Abdaoui, T. Elfouly, M.H. Ahmed, A. Badawy, M.S. Shehata, Structural health monitoring using wireless sensor networks: A comprehensive survey, IEEE Communications Surveys & Tutorials, 19(3) (2017) 1403-1423.
3
[4] A. Jothimani, A.S. Edward, K.M. Gowthem, R. Karthikeyan, Implementation of smart sensor interface network for water quality monitoring in industry using iot, Indian Journal of Science and Technology, 10(6) (2017).
4
[5] B. Prabhu, M. Pradeep, E. Gajendran, Military Applications of Wireless Sensor Network System, (2017).
5
[6] T.R. Sheltami, S. Khan, E.M. Shakshuki, M.K. Menshawi, Continuous objects detection and tracking in wireless sensor networks, Journal of Ambient Intelligence and Humanized Computing, 7(4) (2016) 489-508.
6
[7] T.R. Sheltami, A. Bala, E.M. Shakshuki, Wireless sensor networks for leak detection in pipelines: a survey, Journal of Ambient Intelligence and Humanized Computing, 7(3) (2016) 347-356.
7
[8] O. Ojuroye, R. Torah, S. Beeby, A. Wilde, Smart textiles for smart home control and enriching future wireless sensor network data, in: Sensors for Everyday Life, Springer, 2017, pp. 159-183.
8
[9] H.Y. Shwe, P.H.J. Chong, WSN-based energy-efficient data communication protocol for smart green building environment, in: Telecommunications Energy Conference (INTELEC), 2015 IEEE International, IEEE, 2015, pp. 1-5.
9
[10] W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, Energy-efficient communication protocol for wireless microsensor networks, in: System sciences, 2000. Proceedings of the 33rd annual Hawaii international conference on, IEEE, 2000, pp. 10 pp. vol. 12.
10
[11] S.D. Muruganathan, D.C. Ma, R.I. Bhasin, A.O. Fapojuwo, A centralized energy-efficient routing protocol for wireless sensor networks, IEEE Communications Magazine, 43(3) (2005) S8-13.
11
[12] D. Niculescu, B. Nath, Ad hoc positioning system (APS) using AOA, in: INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, Ieee, 2003, pp. 1734-1743.
12
[13] C. Sharma, V. Pattanik, Survey Paper of Energy Efficient Data Aggregation Protocol in Wireless Sensor Network, International Journal of Computer Applications, 150(8) (2016).
13
[14] K. Vijayan, A. Raaza, A novel cluster arrangement energy efficient routing protocol for wireless sensor networks, Indian Journal of science and Technology, 9(2) (2016).
14
[15] G. Kannan, T.S.R. Raja, Energy efficient distributed cluster head scheduling scheme for two tiered wireless sensor network, Egyptian Informatics Journal, 16(2) (2015) 167-174.
15
[16] J. Pan, L. Cai, Y.T. Hou, Y. Shi, S.X. Shen, Optimal base-station locations in two-tiered wireless sensor networks, IEEE Transactions on Mobile Computing, 4(5) (2005) 458-473.
16
[17] T. Shankar, S. Shanmugavel, A. Rajesh, Hybrid HSA and PSO algorithm for energy efficient cluster head selection in wireless sensor networks, Swarm and Evolutionary Computation, 30 (2016) 1-10.
17
[18] X. Yuan, M. Elhoseny, H.K. El-Minir, A.M. Riad, A genetic algorithm-based, dynamic clustering method towards improved WSN longevity, Journal of Network and Systems Management, 25(1) (2017) 21-46.
18
[19] T.-P. Hong, G.-N. Shiu, Solving the K-of-N Lifetime Problem by PSO, International Journal of Engineering, Science and Technology, 1(1) (2009) 136-147.
19
[20] M. Zain-Ul-Abidin, H. Maqsood, U. Qasim, Z.A. Khan, N. Javaid, Improved genetic algorithm based energy efficient routing in two-tiered wireless sensor networks, in: Network-Based Information Systems (NBiS), 2016 19th International Conference on, IEEE, 2016, pp. 382-386.
20
[21] E. Rashedi, H. Nezamabadi-Pour, S. Saryazdi, GSA: a gravitational search algorithm, Information sciences, 179(13) (2009) 2232-2248.
21
[22] E. Rashedi, H. Nezamabadi-Pour, S. Saryazdi, BGSA: binary gravitational search algorithm, Natural Computing, 9(3) (2010) 727-745.
22
[23] S. Mirjalili, S.Z.M. Hashim, H.M. Sardroudi, Training feedforward neural networks using hybrid particle swarm optimization and gravitational search algorithm, Applied Mathematics and Computation, 218(22) (2012) 11125-11137.
23
[24] C. Purcaru, R.-E. Precup, D. Iercan, L.-O. Fedorovici, R.-C. David, F. Dragan, Optimal robot path planning using gravitational search algorithm, Int. J. Artif. Intell, 10 (2013) 1-20.
24
[25] J.R. Parvin, C. Vasanthanayaki, Gravitational search algorithm based mobile aggregator sink nodes for energy efficient wireless sensor networks, in: Circuits, Power and Computing Technologies (ICCPCT), 2013 International Conference on, IEEE, 2013, pp. 1052-1058.
25
[26] M.K. Rafsanjani, M.B. Dowlatshahi, Using gravitational search algorithm for finding near-optimal base station location in two-tiered WSNs, International Journal of Machine Learning and Computing, 2(4) (2012) 377.
26
[27] W. Zhao, Adaptive image enhancement based on gravitational search algorithm, Procedia Engineering, 15 (2011) 3288-3292.
27
[28] B. González, F. Valdez, P. Melin, G. Prado-Arechiga, Fuzzy logic in the gravitational search algorithm for the optimization of modular neural networks in pattern recognition, Expert Systems with Applications, 42(14) (2015) 5839-5847.
28
[29] M. Behrang, E. Assareh, M. Ghalambaz, M. Assari, A. Noghrehabadi, Forecasting future oil demand in Iran using GSA (Gravitational Search Algorithm), Energy, 36(9) (2011) 5649-5654.
29
[30] X. Li, K. Tang, M.N. Omidvar, Z. Yang, K. Qin, H. China, Benchmark functions for the CEC 2013 special session and competition on large-scale global optimization, gene, 7(33) (2013) 8.
30
[31] X. Li, A. Engelbrecht, M.G. Epitropakis, Benchmark functions for CEC’2013 special session and competition on niching methods for multimodal function optimization, RMIT University, Evolutionary Computation and Machine Learning Group, Australia, Tech. Rep, (2013).
31
[32] J. Liang, B. Qu, P. Suganthan, A.G. Hernández-Díaz, Problem definitions and evaluation criteria for the CEC 2013 special session on real-parameter optimization, Computational Intelligence Laboratory, Zhengzhou University, Zhengzhou, China and Nanyang Technological University, Singapore, Technical Report, 201212 (2013) 3-18.
32
[33] J. Zhang, A.C. Sanderson, JADE: adaptive differential evolution with optional external archive, IEEE Transactions on evolutionary computation, 13(5) (2009) 945-958.
33
[34] M.M. Noel, A new gradient based particle swarm optimization algorithm for accurate computation of global minimum, Applied Soft Computing, 12(1) (2012) 353-359.
34
[35] S. Sarafrazi, H. Nezamabadi-Pour, S. Saryazdi, Disruption: a new operator in gravitational search algorithm, Scientia Iranica, 18(3) (2011) 539-548.
35
[36] M. Shams, E. Rashedi, A. Hakimi, Clustered-gravitational search algorithm and its application in parameter optimization of a low noise amplifier, Applied Mathematics and Computation, 258 (2015) 436-453.
36
[37] N. Cressie, H. Whitford, How to use the two sample t‐test, Biometrical Journal, 28(2) (1986) 131-148.
37
ORIGINAL_ARTICLE
A Combined Learning Approach for Credit Scoring Using Adaptive Hierarchical Mixture of Experts: Iranian Banking Industry
Traditional methods for granting credit to loan applicants are based on personal judgment. Nevertheless, the current financial crisis alongside the efforts of banks and financial institutes for decreasing the percentage of overdue loans emphasis the importance of Credit Scoring (CS) models. This paper provides a credit scoring model by means of Modular Neural Network (MNN) established upon combined hybrid-ensemble learning. The proposed model is composed of four powerful neural networks that construct collectively the Adaptive Hierarchical Mixture of Experts (AHME). Training process is a hybrid way for learning the modular model and adaption to the CS model based on the modulation of learning rules specific to each module and particular HME online learning algorithm. Binary Particle Swarm Optimization (BPSO), using Taguchi reasoning scheme for tuning the governing parameters, is also applied for reducing dimensionality and decomposing the problem among the various modules. The proposed model’s performance is compared with that of Multi-Layer Perceptron (MLP) and Laterally Connected Neural Network (LCNN) models. The aforementioned models are evaluated using the data obtained from one of the Iranian banks. Results demonstrate that the AHME outperforms other methods in terms of prediction accuracy as well as the Area Under the ROC Curve (AUC) and the Mean Squared Error (MSE) rate.
https://miscj.aut.ac.ir/article_3451_6fc087bef3dace233d0afbe7ec0da062.pdf
2019-06-01
67
80
10.22060/miscj.2019.13906.5085
Credit Scoring
Hybrid-Ensemble Learning
Adaptive Hierarchical Mixture of Experts (AHME)
Binary Particle Swarm Optimization (BPSO)
Iranian Banking Industry
Danial
Dadmohammadi
dd.iebs@gmail.com
1
Department of Industrial Engineering and Management Systems, Amirkabir University of Technology, Tehran, Iran
AUTHOR
Abbas
Ahmadi
abbas.ahmadi@aut.ac.ir
2
Department of Industrial Engineering and Management Systems, Amirkabir University of Technology, Tehran, Iran,
LEAD_AUTHOR
Ahmadi, A., Fakhri, K., & Kamel, M. S. 2010. “Flocking Based Approach for Data Clustering.” Natural Computing 9(3): 767–91.
1
Ahmadi, A., Fakhri, K., & Kamel, M. S. 2012. “Model Order Selection for Multiple Cooperative Swarms Clustering Using Stability Analysis.” Information Sciences 182(1): 169–83.
2
Akkoç, S. 2012. “An Empirical Comparison of Conventional Techniques, Neural Networks and the Three Stage Hybrid Adaptive Neuro Fuzzy Inference System (ANFIS) Model for Credit Scoring Analysis: The Case of Turkish Credit Card Data.” European Journal of Operational Research 222(1): 168–78.
3
Alaraj, M., Abbod, M., & Hunaiti, Z. 2014. “Evaluating Consumer Loans Using Neural Networks Ensembles.” International Conference on Machine Learning, Electrical and Mechanical Engineering (ICMLEME), http://dx.doi.org/10.15242/IIE.E0114084.
4
Ayouche, S., Aboulaich, R., & Ellaia, R. 2017. “Partnership Credit Scoring Classification Probem: A Neural Network Approach.” International Journal of Applied Engineering Research, 12(5): 693–704.
5
Babaoglu, İ., Findik, O., & Ülker, E. 2010. “A Comparison of Feature Selection Models Utilizing Binary Particle Swarm Optimization and Genetic Algorithm in Determining Coronary Artery Disease Using Support Vector Machine.” Expert Systems with Applications 37(4): 3177–83.
6
Behesti, Z., Shamsuddin, S., M., & Hasan, S. 2015. “Memetic binary particle swarm optimization for discrete optimization problems.” Information Sciences Journal, 299: 58–84.
7
Chuang, L.,Y., Hsiao, C., J., & Yang, C., H. 2011. “An Improved Binary Particle Swarm Optimization with Complementary Distribution Strategy for Feature Selection.” In International Conference on Machine Learning and Computing, 244–48.
8
Hamada, M., & Hasan, M. 2018. “Artificial Neural Networks and Particle Swarm Optimization Algorithms for Preference Prediction in Multi-Criteria Recommender Systems.” Informatics Journal, 5(2):25.
9
Jordan, M., I., & Jacobs, R., A. 1994. “Hierarchical Mixtures of Experts and the EM Algorithm.” Neural computation 6(2): 181–214.
10
Kambal, E., Osman, I., Taha, M., Mohammed, N., & Mohammed, S. 2013. “Credit Scoring Using Data Mining Techniques with Particular Reference to Sudanese Banks.” Inernational Confrance on Computer, Electrrical and Electronics Engineering (ICCEEE), 378 - 383.
11
Karray, F., O., & De Silva, C. 2004. Soft Computing and Intelligent Systems Design: Theory, Tools, and Applications. Pearson/Addison Wesley. https://books.google.com/books?id=mqYw-Xig0IsC.
12
Kiruthika & Dilsha, M. 2015. “A Neural Network Approach for Microfinance Credit Scoring.” Journal of Statistics and Management Systems, 18:1-2, 121-138.
13
Kothari, R., & Agyepong, K. 1996. “On Lateral Connections in Feed-Forward Neural Networks.” In Neural Networks, 1996., IEEE International Conference on, IEEE, 13–18.
14
Limsombunchai, V., Gan, C., & Lee, M. 2005. “An Analysis of Credit Scoring for Agricultural Loans in Thailand.” American Journal of Applied Sciences 2(8): 1198.
15
Netjinda, N., Achalakul, T., & Sirinaovakul, B. 2015. “Particle Swarm Optimization Inspired by Starling Flock Behavior.” Applied Soft Computing 35: 411–22.
16
Ong, C., S., Huang, J., J., & Tzeng, G., H. 2005. “Building Credit Scoring Models Using Genetic Programming.” Expert Systems with Applications 29(1): 41–47.
17
Rafiee Vahid, P., & Ahmadi, A. 2016. “Modelling Corporate Customers Credit Risk Considering the Ensemble Approaches in Multiclass Classification : Evidence from Iranian Corporate Credits.” To appear in The Journal of Credit Risk.
18
Shayeghi, H., Shayanfar, H., A., & Azimi, G. 2010. “A Hrbrid Particle Swarm Optimization Back Prppagation Algorithm for Short Term Load Forcasting.” International Journal on Technical and Physical Problems of Engineering(IJTPE), 4(2): 12–22.
19
Tang, Q., Liu, B., H., Chen, Y., Q., & Ding, J., J. 2007. “Application of LVQ Neural Network Combined with the Genetic Algorithm in Acoustic Seafloor Classification.” Chinese Journal of Geophysics 50(1): 291–98.
20
Tran, K., & Duong, T. 2017. “The Application of Radial Basis Function (RBF) Neural Network for Mechanical Fault Diagnosis of Gearbox.” Future Technologies Conference (FTC), 145-149.
21
Unler, A., & Alper, M. 2010. “A Discrete Particle Swarm Optimization Method for Feature Selection in Binary Classification Problems.” European Journal of Operational Research 206(3): 528–39.
22
Valdovinos, R., M., & Sanchez, J., S. 2006. “Ensembles of Multilayer Perceptron and Modular Neural Networks for Fast and Accurate Learning.” In Artificial Intelligence, 2006. MICAI’06.
23
Vieira, S., M., Mendonça, L., F., Farinha, G., J., & Sousa, J., M., C. 2013. “Modified Binary PSO for Feature Selection Using SVM Applied to Mortality Prediction of Septic Patients.” Applied Soft Computing Journal 13(8): 3494–3504.
24
Wang, H., Geng, Q., & Qiao, Z. 2017. “Parameter Tuning of Particle Swarm Optimization by Using Taguchi Method and Its Application to Motor Design.” 4th IEEE International Conference on Information Science and Technology, Shenzhen, 722-726.
25
Wang, P. 2016. “Credit Scoring Model: A Combination of Genetic Programming and Deep Learning.” IOP Conference Series: Materials Science and Engineering, V(269), https://doi.org/10.1088/1757-899X/269/1/012056.
26
Waterhouse, S., R., & Robinson, A., J. 1994. “Classification Using Hierarchical Mixtures of Experts.” In Neural Networks for Signal Processing [1994] IV. Proceedings of the 1994 IEEE Workshop, IEEE, 177–86.
27
Xue, B., Zhang, M., & Browne, W., N. 2014. “Particle Swarm Optimisation for Feature Selection in Classification: Novel Initialisation and Updating Mechanisms.” Management Science and Engineering, 7(3), 81-85.
28
Yarushev, S., & Averkin, A. 2017. “Time series analysis based on the biologically inspired modular approach.” Procedia Computer Science Journal, V(120): 843–853.
29