Review:

# A Review of Recent Developments in Advanced Computational Intelligence and Intelligent Informatics

## Jianqi An^{*}, Xin Chen^{*,†}, Min Wu^{*}, and Jinhua She^{*,**}

^{*}School of Automation, China University of Geosciences

Wuhan 430074, China

^{**}School of Engneering, Tokyo University of Technology

Hachioji, Tokyo 192-0982, Japan

^{†}Corresponding author

The theory and application of advanced computational intelligence and intelligent informatics has been one of the most active fields of research over the last decades. A significant number of methods have been proposed to effectively solve problems of clustering, image processing, optimization, bio-information understanding, and modeling and control. They have been applied to many areas, including complex industrial processes and economics. This paper presents a review of the articles and papers addressing advanced computational intelligence and intelligent informatics from the Journal of Advanced Computational Intelligence and Intelligent Informatics in the past two years.

- [1] A. Christoforou and A. S. Andreou, “A multilayer fuzzy cognitive maps approach to the cloud adoption decision support problem,” Proc. of 2015 IEEE Int. Conf. on Fuzzy Systems, Istanbul, Turkey, pp. 1-8, 2015.
- [2] M. Pourghanbar, M. Kelarestaghi, and F. Eshghi, “EVEBO: A new election inspired optimization algorithm,” Proc. of 2015 IEEE Congress on Evolutionary Computation, Sendai, Japan, pp. 916-924, 2015.
- [3] M. Zamani and S. C. Kremer, “Protein secondary structure prediction using an evolutionary computation method and clustering,” Proc. of 2015 IEEE Conf. on Computational Intelligence in Bioinformatics and Computational Biology, Niagara Falls, Canada, pp. 1-6, 2015.
- [4] A. E. Ruano, S. S. Ge, T. M. Guerra, F. L. Lewis, and J. C. Principe, “Computational intelligence in control,” Proc. of the 19th IFAC World Congress, Cape Town, South Africa, pp. 8867-8878, 2014.
- [5] S. Saeedi, R. Chavarriaga, R. Leeb, and J. Millan, “Adaptive assistance for brain-computer interfaces by online prediction of command reliability,” IEEE Computational Intelligence Magazine, Vol.11, No.1, pp. 32-39, 2016.
- [6] F. Sabahi and M. R. Akbarzadeh-T, “Extended fuzzy logic: sets and systems,” IEEE Trans. on Fuzzy Systems, Vol.24, No.3, pp. 530-543, 2016.
- [7] L. P. Wang and Q. F. Zhang, “Constrained subproblems in a decomposition-based multiobjective evolutionary algorithm,” IEEE Trans. on Evolutionary Computation, Vol.20, No.3, pp. 475-480, 2016.
- [8] Y. M. Gong, Y. G. Fang, and Y. X. Guo, “Private data analytics on biomedical sensing data via distributed computation,” IEEE/ACM Trans. on Computational Biology and Bioinformatics, Vol.13, No.3, pp. 431-444, 2016.
- [9] A. P. Engelbrecht, “Computational intelligence,” John Wiley & Sons, ISBN 978-0-470-03561-0, 2007.
- [10] R. Kruse, C.Borgelt, and F. Klawonn, “Computational intelligence: A methodological introduction,” Spring, ISBN 978-1-447-15012-1, 2013.
- [11] S. Adeli and N. Hojjat, “Computational intelligence: synergies of fuzzy logic, neural networks and evolutionary computing,” John Wiley & Sons, ISBN 978-1-118-53481-6, 2013.
- [12] H. Petr, “Fuzzy Logic,” The Stanford Encyclopedia of Philosophy (Fall 2010 Edition), Edward N. Zalta (Ed.), available at: http://plato.stanford.edu/archives/fall2010/entries/logic-fuzzy/
- [13] K. Uehara and K. Hirota, “Multi-level control of fuzzy-constraint propagation via evaluations with linguistic truth values in generalized-mean-based inference,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.1, pp. 74-90, 2015.
- [14] K. Uehara and K. Hirota, “Inference with fuzzy rule interpolation at an infinite number of activating points,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.20, No.2, pp. 355-377, 2016.
- [15] L. lin and H.Lee, “Fuzzy nonlinear programmming for produciton inventory based on statistical data,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.20, No.1, pp. 5-11, 2016.
- [16] H. Sakaniwa, F. Dong, and K. Hirota, “Fuzzy set representation of kansei texture and its visualization for online shopping,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.2, pp. 284-292, 2015.
- [17] T. Sano, Y. Endo, S. I. Nakazawa, and D. Hijikata, “On estimation of tangential force in railways brake systems by fuzzy inference,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.5, pp. 639-644, 2015.
- [18] L. F. Chen, Z. T. Liu, M. Wu, F. Y. Dong, and K. Hirota, “Multi-robot behavior adaptation to humans Intention in human-robot interaction using information-driven fuzzy friend-Q learning,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.2, pp. 173-184, 2015.
- [19] Y. Hatakeyama, H. Kataoka, N. Nakajima, T. Watabe, and Y. Okuhara, “Fuzzified evaluation of cardiotocography data for real medical data,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.20, No.1, pp. 33-40, 2016.
- [20] Y. Takahashi, T. Ishii, C. Todoroki, Y. Maeda, and T. Nakamura, “Fuzzy control for a kite-based tethered flying robot,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.3, pp. 349-358, 2015.
- [21] R. G. Baldovino and E. P. Dadios, “A hybrid fuzzy logic-PLC-based controller for earthquake simulator system,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.20, No.1, pp. 100-105, 2016.
- [22] H. J. Yu, Y. He, Z. L. Zhao, and M. Wu, “Research on fuzzy PID pitch-controlled system based on SVM,” J. of Advanced Computational Intelligence and Intelligence Informatics (JACIII), Vol.20, No.2, pp. 332-341, 2016.
- [23] T. Watanabe and Y. Saito, “Camera modeling for 3D sensing using fuzzy modeling concept based on stereo vision,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.1, pp. 158-164, 2015.
- [24] Wikipedia Website, https://en.wikipedia.org/wiki/Cluster [Accessed Apr. 20, 2016]
- [25] X. N. Wang, “The research of the distributed resource-aware K-means clustering algorithm,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.3, pp. 343-348, 2015.
- [26] K. Naohiko and E. Yasunori, “On objective-based rough hard and fuzzy c-means clustering,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.1, pp. 29-35, 2015.
- [27] Y. Kanzawa, “A maximizing model of Bezdek-like spherical fuzzy c-means,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.5, pp. 662-669, 2015.
- [28] Y. Kanzawa, “A maximizing model of spherical Bezdek-type fuzzy multi-medoids clustering,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.6, pp. 738-746, 2015.
- [29] Y. Kanzawa, “Bezdek-type fuzzified co-clustering algorithm,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.6, pp. 852-860, 2015.
- [30] Y. Kanzawa, “Sequential cluster dxtraction using power-regularized possibilistic c-means,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.1, pp. 67-73, 2015.
- [31] Y. Hamasuna and Y. Endo, “On cluster extraction from relational data using L1-regularized possibilistic assignment prototype algorithm,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.1, pp. 23-28, 2015.
- [32] K. Honda, T. Nakano, C. H. Oh, S. Ubukata, and A. Notsu, “Partially exclusive item partition in MMMs-induced fuzzy co-clustering and its effects in collaborative filtering,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.6, pp. 810-817, 2015.
- [33] Y. Takama and T. Tonegawa, “Interactive document clustering system based on coordinated multiple views,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.20, No.1, pp. 139-145, 2016.
- [34] K. A. Sidarto and A. Kania, “Finding all solutions of systems of nonlinear equations using spriral dynamics inspired optimization with clustering,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.5, pp. 697-707, 2015.
- [35] R. C. Gonzalez and R. E. Woods, “Digital Image Processing,” Prentice Hall, pp. 1-3, ISBN 978-0-13-168728-8, 2008.
- [36] Y. Uozumi, K. Nagamune, N. Nakano, N. Nagai, and D. Araki, “Fully automated determination of femoral coordinate system in CT image based on epicondyles,” J. of Advanced Computational Intelligence and Intelligence Informatics (JACIII), Vol.19, No.3, pp. 372-380, 2015.
- [37] Y. Hara and T. Kawano, “Run-length encoding graphic rules applied to DNA-coded images and animation editable by polymerase chain reactions,” J. of Advanced Computational Intelligence and Intelligence Informatics (JACIII), Vol.19, No.1, pp. 5-10, 2015.
- [38] K. Tanaka, Y. Chokushi, and M. Ando, “Mining visual phrases for visual robot localization,” J. of Advanced Computational Intelligence and Intelligence Informatics (JACIII), Vol.20, No.1, pp. 57-65, 2016.
- [39] J. Lu, F. Y. Dong, and K. Hirota, “Location detection of informative bright region in tunnel scenes using lighting and traffic lane cues,” J. of Advanced Computational Intelligence and Intelligence Informatics (JACIII), Vol.19, No.2, pp. 255-263, 2015.
- [40] X. M. Wang, W. Wei, F. Liu, L. S. Wei, and Z. H. Liu, “Online estimation of image jacobian matrix with time-delay compensation,” J. of Advanced Computational Intelligence and Intelligence Informatics (JACIII), Vol.20, No.2, pp. 238-245, 2015.
- [41] J. Q. Zhao, K. Ge, and K. Y. Xu, “A heuristic algorithm based on leadership strategy: leader of dolphin herd algorithm,” J. of Advanced Computational Intelligence and Intelligence Informatics (JACIII), Vol.19, No.4, pp. 491-499, 2015.
- [42] T. Yoshida and T. Yoshikawa, “Analysis of pareto solutions based on non-correspondence in spread between objective space and design variable space,” J. of Advanced Computational Intelligence and Intelligence Informatics (JACIII), Vol.19, No.5, pp. 681-687, 2015.
- [43] Z. F. Zhu, J. Peng, Z. F. Zhou, X. Y. Zhang, and Z. W. Huang, “PSO-SVR-based resource demand prediction in cloud computing,” J. of Advanced Computational Intelligence and Intelligence Informatics (JACIII), Vol.20, No.2, pp. 324-331, 2016.
- [44] C. H. Xu, L. Wang, X. F. Lin, Z. Li, and X. Yu, “Intelligent optimization of cell voltage for energy saving in the process of electrolytic aluminum,” J. of Advanced Computational Intelligence and Intelligence Informatics (JACIII), Vol.20, No.2, pp. 231-237, 2016.
- [45] W. Z. Dai and K. Xia, “Approach to hybrid flow-shop scheduling problem based on self-guided genetic algorithm,” J. of Advanced Computational Intelligence and Intelligence Informatics (JACIII), Vol.19, No.3, pp. 365-371, 2015.
- [46] N. Harnpornchai, K. Autchariyapanitkul, J. Sirisrisakulchai, and S. Sriboonchitta, “Optimal outpatient appointment system with uncertain parameters using adaptive-penalty genetic algorithm,” J. of Advanced Computational Intelligence and Intelligence Informatics (JACIII), Vol.19, No.5, pp. 585-592, 2015.
- [47] J. A. G. Sanchez, K. Ohnishi, A. Shibata, F. Y. Dong, and K. Hirota, “Deep level emotion understanding using customized knowledge for human-robot communication,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.1, pp. 91-99, 2015.
- [48] F. Yan, A. M. Iliyasu, Z. T. Liu, A. S. Salama, and F. Y. Dong, “Bloch sphere-based representation for quantum emotion space,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.1, pp. 134-142, 2015.
- [49] S. B. Zhang, G. Y. Liu, and X. W. Lai, “Classification of evoked emotions using an artificial neural network based on signal, short-term physiological signals,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.1, pp. 118-126, 2015.
- [50] J. Zhang, S. L. Xu, and F. Deng, “Design and implementation of intelligent event-driven human-computer interface on vehicles,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.2, pp. 247-254, 2015.
- [51] D. Kitakoshi, R. Hanada, K. Iwata, and M. Suzuki, “Cognitive training system for dementia prevention using memory game based on the concept of human-agent interaction,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.6, pp. 727-739, 2015.
- [52] H. Takase, H. Kawanaka, and S. J. Tsuruoka, “Supporting system for quiz in large class-automatic keyword extraction and browsing interface,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.1, pp. 152-157, 2015.
- [53] K. A. Abuhasel, A. M. Iliyasu, and C. Fatichah, “A hybrid particle swarm optimization and neural network with fuzzy membership function technique for epileptic seizure classification,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.3, pp. 447-455, 2015.
- [54] T. Y. Li, F. Y. Dong, and K. Hirota, “Fuzzy association rule mining based myocardial ischemia diagnosis on ECG signal,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.2, pp. 217-224, 2015.
- [55] Y. Hatakeyama, H. Kataoka, N. Nakajima, T. Watabe, and Y. Okuhara “Fuzzified Evaluation of Cardiotocography Data for Real Medical Data,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.20, No.1, pp. 33-39, 2015.
- [56] Y. Y. Zhang, W. H. Cao, and M. Wu, “Subspace modeling method for burn-through point,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.20, No.2, pp. 279-286, 2016.
- [57] D. F. Xiao, J. Q. An, M. Wu, and Y. He, “Research on carbon-monoxide utilization ratio in the blast furnace based on kolmogorov entropy,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.20, No.2, pp. 310-316, 2016.
- [58] J. Q. An, K. Peng, W. H. Cao, and Min Wu, “Modeling of high temperature gas flow 3D distribution in BF throat based on the computational fluid dynamics,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.2, pp. 269-276, 2015.
- [59] Z. Y. Nie, C. J. Fu, R. J. Liu, D. S. Guo, and Y. J. Ma, “Asymmetric Prandtl-Ishlinskii hysteresis model for giant magnetostrictive actuator,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.20, No.2, pp. 223-230, 2016.
- [60] K. J. Yano, H. B. Hashimoto, and T. Terano, “Proposing a transit oriented development model through sensitivity analysis of the residents utility function,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.20, No.2, pp. 302-309, 2016.
- [61] K. Xu and S. C. Liu, “Speed-sensorless vector control based on ANN MRAS for induction motor drives,” J. of Advanced Computational Intelligence and Intelligence Informatics (JACIII), Vol.19, No.1, pp. 127-133, 2015.
- [62] Z. Zheng and Z. H. Peng, “Distributed cooperation based priority coverage control strategy for mobile sensors,” J. of Advanced Computational Intelligence and Intelligence Informatics (JACIII), Vol.19, No.2, pp. 191-196, 2015.
- [63] D. Y. Li, Q. T. Shen, Z. T. Liu, and F. Liu, “Hybrid modulation strategy for two-stage matrix converter and its application in vector control,” J. of Advanced Computational Intelligence and Intelligence Informatics (JACIII), Vol.20, No.1, pp. 171-180, 2016.
- [64] W. H. Cao, X. M. Hu, M. Wu, and W. Yin, “A self-tuning PID control system based on control performance assessment,” J. of Advanced Computational Intelligence and Intelligence Informatics (JACIII), Vol.20, No.2, pp. 271-278, 2016.
- [65] T. T. Liu, N. Qiu, and W. T. Gu, “A stock trading strategy based on time-varying quantile theory,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.3, pp. 417-422, 2015.
- [66] J. P. Dan, W. B. Guo, W. R. Shi, B. Fang, and T. P. Zhang, “PSO based deterministic ESN models for stock price forecasting,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.2, pp. 312-318, 2015.
- [67] B. Xu, Q. Q. He, J. Qian, and J. P. Dong, “Difference between Chinese and US stock markets: determinants, mechanisms, and impact,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.5, pp. 593-600, 2015.
- [68] J. Sirisrisakulchai, K. Autchariyapanitkul, N. Harnpornchai, and S. Sriboonchitta, “Portfolio optimization of financial returns using fuzzy approach with NSGA-II algorithm,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.5, pp. 619-623, 2015.
- [69] X. R. Yang, J. Chen, and C. He, “Asymmetric quantitative model of coexceedances and its applications to the study of contagion mechanism of the financial crisis,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.3, pp. 423-429, 2015.
- [70] B. Xu, Q. Q. He, and X. Hu, “Coordination of monetary and exchange rate policy in china: market interest rate approach,” J. of Advanced Computational Intelligence and Intelligent Informatics (JACIII), Vol.19, No.3, pp. 456-464, 2015.