Search results

1 – 6 of 6
Article
Publication date: 18 January 2022

Gomathi V., Kalaiselvi S. and Thamarai Selvi D

This work aims to develop a novel fuzzy associator rule-based fuzzified deep convolutional neural network (FDCNN) architecture for the classification of smartphone sensor-based…

Abstract

Purpose

This work aims to develop a novel fuzzy associator rule-based fuzzified deep convolutional neural network (FDCNN) architecture for the classification of smartphone sensor-based human activity recognition. This work mainly focuses on fusing the λmax method for weight initialization, as a data normalization technique, to achieve high accuracy of classification.

Design/methodology/approach

The major contributions of this work are modeled as FDCNN architecture, which is initially fused with a fuzzy logic based data aggregator. This work significantly focuses on normalizing the University of California, Irvine data set’s statistical parameters before feeding that to convolutional neural network layers. This FDCNN model with λmax method is instrumental in ensuring the faster convergence with improved performance accuracy in sensor based human activity recognition. Impact analysis is carried out to validate the appropriateness of the results with hyper-parameter tuning on the proposed FDCNN model with λmax method.

Findings

The effectiveness of the proposed FDCNN model with λmax method was outperformed than state-of-the-art models and attained with overall accuracy of 97.89% with overall F1 score as 0.9795.

Practical implications

The proposed fuzzy associate rule layer (FAL) layer is responsible for feature association based on fuzzy rules and regulates the uncertainty in the sensor data because of signal inferences and noises. Also, the normalized data is subjectively grouped based on the FAL kernel structure weights assigned with the λmax method.

Social implications

Contributed a novel FDCNN architecture that can support those who are keen in advancing human activity recognition (HAR) recognition.

Originality/value

A novel FDCNN architecture is implemented with appropriate FAL kernel structures.

Article
Publication date: 23 November 2012

Bailing Zhang, Yungang Zhang and Wenjin Lu

The task of internet intrusion detection is to detect anomalous network connections caused by intrusive activities. There have been many intrusion detection schemes proposed, most…

2241

Abstract

Purpose

The task of internet intrusion detection is to detect anomalous network connections caused by intrusive activities. There have been many intrusion detection schemes proposed, most of which apply both normal and intrusion data to construct classifiers. However, normal data and intrusion data are often seriously imbalanced because intrusive connection data are usually difficult to collect. Internet intrusion detection can be considered as a novelty detection problem, which is the identification of new or unknown data, to which a learning system has not been exposed during training. This paper aims to address this issue.

Design/methodology/approach

In this paper, a novelty detection‐based intrusion detection system is proposed by combining the self‐organizing map (SOM) and the kernel auto‐associator (KAA) model proposed earlier by the first author. The KAA model is a generalization of auto‐associative networks by training to recall the inputs through kernel subspace. For anomaly detection, the SOM organizes the prototypes of samples while the KAA provides data description for the normal connection patterns. The hybrid SOM/KAA model can also be applied to classify different types of attacks.

Findings

Using the KDD CUP, 1999 dataset, the performance of the proposed scheme in separating normal connection patterns from intrusive connection patterns was compared with some state‐of‐art novelty detection methods, showing marked improvements in terms of the high intrusion detection accuracy and low false positives. Simulations on the classification of attack categories also demonstrate favorable results of the accuracy, which are comparable to the entries from the KDD CUP, 1999 data mining competition.

Originality/value

The hybrid model of SOM and the KAA model can achieve significant results for intrusion detection.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 5 no. 4
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 5 April 2013

David Sanders and Alexander Gegov

This paper aims to review seven artificial intelligence tools that are useful in assembly automation: knowledge‐based systems, fuzzy logic, automatic knowledge acquisition, neural…

1583

Abstract

Purpose

This paper aims to review seven artificial intelligence tools that are useful in assembly automation: knowledge‐based systems, fuzzy logic, automatic knowledge acquisition, neural networks, genetic algorithms, case‐based reasoning and ambient‐intelligence.

Design/methodology/approach

Each artificial intelligence tool is outlined, together with some examples of their use in assembly automation.

Findings

Artificial intelligence has produced a number of useful and powerful tools. This paper reviews some of those tools. Applications of these tools in assembly automation have become more widespread due to the power and affordability of present‐day computers.

Research limitations/implications

Many new assembly automation applications may emerge and greater use may be made of hybrid tools that combine the strengths of two or more of the tools reviewed in the paper. The tools and methods reviewed in this paper have minimal computation complexity and can be implemented on small assembly lines, single robots or systems with low‐capability microcontrollers.

Practical implications

It may take another decade for engineers to recognize the benefits given the current lack of familiarity and the technical barriers associated with using these tools and it may take a long time for direct digital manufacturing to be considered commonplace… but it is expanding. The appropriate deployment of the new AI tools will contribute to the creation of more competitive assembly automation systems.

Social implications

Other technological developments in AI that will impact on assembly automation include data mining, multi‐agent systems and distributed self‐organising systems.

Originality/value

The novel approaches proposed use ambient intelligence and the mixing of different AI tools in an effort to use the best of each technology. The concepts are generically applicable across all industrial assembly processes and this research is intended to prove that the concepts work in manufacturing.

Article
Publication date: 8 December 2022

Jonathan S. Greipel, Regina M. Frank, Meike Huber, Ansgar Steland and Robert H. Schmitt

To ensure product quality within a manufacturing process, inspection processes are indispensable. One task of inspection planning is the selection of inspection characteristics…

Abstract

Purpose

To ensure product quality within a manufacturing process, inspection processes are indispensable. One task of inspection planning is the selection of inspection characteristics. For optimization of costs and benefits, key characteristics can be defined by which the product quality can be checked with sufficient accuracy. The manual selection of key characteristics requires substantial planning effort and becomes uneconomic if many product variants prevail. This paper, therefore, aims to show a method for the efficient determination of key characteristics.

Design/methodology/approach

The authors present a novel Algorithm for the Selection of Key Characteristics (ASKC) based on an auto-encoder and a risk analysis. Given historical measurement data and tolerances, the algorithm clusters characteristics with redundant information and selects key characteristics based on a risk assessment. The authors compare ASKC with the algorithm Principal Feature Analysis (PFA) using artificial and historical measurement data.

Findings

The authors find that ASKC delivers superior results than PFA. Findings show that the algorithms enable the cost-efficient selection of key characteristics while maintaining the informative value of the inspection concerning the quality.

Originality/value

This paper fills an identified gap for simplified inspection planning with the method for the efficient selection of key features via ASKC.

Details

International Journal of Quality & Reliability Management, vol. 40 no. 7
Type: Research Article
ISSN: 0265-671X

Keywords

Article
Publication date: 7 March 2016

Hamed Fazlollahtabar, Iraj Mahdavi and Nezam Mahdavi-Amiri

The purpose of this paper is to propose a Meta modeling based on regression, neural network, and clustering to analyze the job satisfaction factors and improvement policy making…

Abstract

Purpose

The purpose of this paper is to propose a Meta modeling based on regression, neural network, and clustering to analyze the job satisfaction factors and improvement policy making.

Design/methodology/approach

Since any job satisfaction evaluation supposes to improve the status by prescribing specific strategies to be performed in the organization, proposing applicable strategies is decisively important. Task demand, social structure and leader-member exchange (LMX) are general applications easily conceptualized while proposing job satisfaction improvement strategies.

Findings

On the basis of these empirical findings, the authors first aim to identify relationships between LMX, task demand, social structure and individual factors, organizational factors, job properties, which are easier to be employed in strategy formulation for job satisfaction, and then determine the sub-factors and subsequently cluster them. The effectiveness of the proposed model is verified by a case study.

Originality/value

Here, a Meta modeling based on regression, neural network, and clustering is proposed to analyze the job satisfaction factors and improvement policy making.

Details

Benchmarking: An International Journal, vol. 23 no. 2
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 17 January 2020

Wei Feng, Yuqin Wu and Yexian Fan

The purpose of this paper is to solve the shortage of the existing methods for the prediction of network security situations (NSS). Because the conventional methods for the…

Abstract

Purpose

The purpose of this paper is to solve the shortage of the existing methods for the prediction of network security situations (NSS). Because the conventional methods for the prediction of NSS, such as support vector machine, particle swarm optimization, etc., lack accuracy, robustness and efficiency, in this study, the authors propose a new method for the prediction of NSS based on recurrent neural network (RNN) with gated recurrent unit.

Design/methodology/approach

This method extracts internal and external information features from the original time-series network data for the first time. Then, the extracted features are applied to the deep RNN model for training and validation. After iteration and optimization, the accuracy of predictions of NSS will be obtained by the well-trained model, and the model is robust for the unstable network data.

Findings

Experiments on bench marked data set show that the proposed method obtains more accurate and robust prediction results than conventional models. Although the deep RNN models need more time consumption for training, they guarantee the accuracy and robustness of prediction in return for validation.

Originality/value

In the prediction of NSS time-series data, the proposed internal and external information features are well described the original data, and the employment of deep RNN model will outperform the state-of-the-arts models.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 13 no. 1
Type: Research Article
ISSN: 1756-378X

Keywords

1 – 6 of 6