Computational Intelligence - February 2015 - 51

distinguish between xl = 40 °C and
x m = 50 °C, where each will have different secondary membership values.
In [6], we presented a CWW framework employing LGT2 (whose high
level architecture is shown in Figure 5c)
where the proposed architecture can
accomplish a human-like reasoning via
words integrating memory for learning
and experience folding. Figure 6a shows
the system in operation in the University
of Essex intelligent apartment (iSpace)
where the proposed system was used to
provide a meal recipe recommendation
system. This system engages in a spoken
dialogue with the user to understand
how busy they are, how tired they are
and what appetite they have. The system
then ends up suggesting recipes that suit
the user. Once, the user approves a recipe, the ingredients are passed to a
humanoid (NAO) robot (as shown in
Figure 6b) that engage in a dialogue
with the user in case the user is missing
some ingredients where the robot can
suggest substitutes that can fit the given
recipe. The system can be helpful for disabled people and it can also be used to
enhance the user comfort. The system
has been tested with a large number of
users and with various recipes, which
validates the use of CWW as a powerful
technology to allow more natural
human-computer interfaces in AIEs.
6. Conclusions and Future Work

This paper presented research results
from the Scaleup project demonstrating

Guest Editorial

the role that type-2 FLSs (which are
capable of handling and modelling high
uncertainty levels) can play in the
efforts to realize AIEs. We showed an
interval type-2 FLS which can automatically detect, summarize and easily
search through visual context information in AmI spaces occupied by multiple users. In addition, we presented
interval type-2 fuzzy based systems for
blending real and virtual realities allowing the collaboration of people distributed over dispersed geographical locations. Furthermore, we presented how
type-2 FLSs can enable developing natural CWW communication with
humans which can allow computers to
disappear in the users' spaces.
For our current and future work, we
are investigating employing type-2 FLSs
for wireless communication management in densely populated smart cities
where the growth trends in wireless
communications suggest that the data
requirements in near future will exceed
the limits of available wireless spectra
[10]. Conventional approaches involve
installing more Base Stations (BSs) or
offload some of the traffic onto unlicensed WiFi bands which is not scalable
and risky [10]. We are working on new
type-2 fuzzy logic based systems for
tethering over TV white-space (TVWS)
with cellular based access mechanisms.
The proposed type-2 fuzzy logic based
system can operate on the possible
hotspot-slave configuration shown in
Figure 6c to provide a scalable and cost-

effective approach in dense wireless
areas. This will be achieved by having
users' devices acting as hotspots that
tether/relay the data to and from their
corresponding slaves over TVWS. The
system can iteratively cluster the nodes
into hostspots and slaves and allocate
resources in order to optimize the network transmission power.
References

[1] E. Aarts, H. Harwig, and M. Schuurmans, "Ambient
intelligence," in The Invisible Future, J. Denning, Ed. New
York: McGraw Hill, 2001, pp. 235-250.
[2] H. Hagras, "Embedding computational intelligence
pervasive spaces," IEEE Pervasive Computing, vol. 6, no. 3,
pp. 85-89, July/Sept. 2007.
[3] J. Mendel, "Type-2 fuzzy sets and systems: An overview," IEEE Comput. Intell. Mag., vol. 2, no. 1, pp. 20-30,
Feb. 2007.
[4] H. Hagras, "Type-2 FLCs: A new generation of fuzzy
controllers," IEEE Comput. Intell. Mag., vol. 2, no. 1, pp.
30-43, Feb. 2007.
[5] D. Anderson, R. H. Luke, J. M. Keller, M. Skubic,
M. Rantz, and M. Aud, "Modeling human activity from
voxel person using fuzzy logic," IEEE Trans. Fuzzy Syst.,
vol. 17, no. 1, pp. 39-49, Feb. 2009.
[6] B. Yao, H. Hagras, M. Alhaddad, and D. Alghazzawi, "A type-2 fuzzy logic based system for linguistic
summarization of video monitoring in indoor intelligent
environments," in Proc. IEEE Int. Conf. Fuzzy Systems,
Beijing, China, July 2014, pp. 1-8.
[7] K. Almohammadi, B. Yao, and H. Hagras, "An interval type-2 fuzzy logic based system with user engagement feedback for customized knowledge delivery within
intelligent E-learning platforms," in Proc. IEEE Int. Conf.
Fuzzy Systems, Beijing, China, July 2014, pp. 1-8.
[8] A. Bilgin, H. Hagras, A. Malibari, M. Alhaddad, and
D. Alghazzawi, "Towards a linear general type-2 fuzzy
logic based approach for computing with words," Int. J.
Soft Comput., vol. 17, no. 12, pp. 2203-2222, Dec. 2013.
[9] A. Bilgin, H. Hagras, A. Malibari, M. Alhaddad, and
D. Alghazzawi, "A general type-2 fuzzy logic approach
for adaptive modeling of perceptions for computing with
words," in Proc. UK Workshop Computational Intelligence,
Edinburgh, U.K., Sept. 2012, pp. 1-8.
[10] H. Tabrizi, G. Farhadi, and J. Cioffi, "Tethering over
TV white-space: Dynamic hotspot selection and resource
allocation," in Proc. 2013 IEEE Int. Conf. Vehicular Technology, Las Vegas, NV, Sept. 2013, pp. 1-6.

(continued from page 18)

opportunity to thank all the authors for
their submissions. We are also indebted
to a small army of referees who have

put in the hard work and the long
hours to review each paper in a timely
and professional way. We would like to

thank the Editor in Chief Prof. H. Ishibuchi for providing us valuable and
enormous assistance.

FEBRUARY 2015 | IEEE CompUtAtIonAl IntEllIgEnCE mAgAzInE

51



Table of Contents for the Digital Edition of Computational Intelligence - February 2015

Computational Intelligence - February 2015 - Cover1
Computational Intelligence - February 2015 - Cover2
Computational Intelligence - February 2015 - 1
Computational Intelligence - February 2015 - 2
Computational Intelligence - February 2015 - 3
Computational Intelligence - February 2015 - 4
Computational Intelligence - February 2015 - 5
Computational Intelligence - February 2015 - 6
Computational Intelligence - February 2015 - 7
Computational Intelligence - February 2015 - 8
Computational Intelligence - February 2015 - 9
Computational Intelligence - February 2015 - 10
Computational Intelligence - February 2015 - 11
Computational Intelligence - February 2015 - 12
Computational Intelligence - February 2015 - 13
Computational Intelligence - February 2015 - 14
Computational Intelligence - February 2015 - 15
Computational Intelligence - February 2015 - 16
Computational Intelligence - February 2015 - 17
Computational Intelligence - February 2015 - 18
Computational Intelligence - February 2015 - 19
Computational Intelligence - February 2015 - 20
Computational Intelligence - February 2015 - 21
Computational Intelligence - February 2015 - 22
Computational Intelligence - February 2015 - 23
Computational Intelligence - February 2015 - 24
Computational Intelligence - February 2015 - 25
Computational Intelligence - February 2015 - 26
Computational Intelligence - February 2015 - 27
Computational Intelligence - February 2015 - 28
Computational Intelligence - February 2015 - 29
Computational Intelligence - February 2015 - 30
Computational Intelligence - February 2015 - 31
Computational Intelligence - February 2015 - 32
Computational Intelligence - February 2015 - 33
Computational Intelligence - February 2015 - 34
Computational Intelligence - February 2015 - 35
Computational Intelligence - February 2015 - 36
Computational Intelligence - February 2015 - 37
Computational Intelligence - February 2015 - 38
Computational Intelligence - February 2015 - 39
Computational Intelligence - February 2015 - 40
Computational Intelligence - February 2015 - 41
Computational Intelligence - February 2015 - 42
Computational Intelligence - February 2015 - 43
Computational Intelligence - February 2015 - 44
Computational Intelligence - February 2015 - 45
Computational Intelligence - February 2015 - 46
Computational Intelligence - February 2015 - 47
Computational Intelligence - February 2015 - 48
Computational Intelligence - February 2015 - 49
Computational Intelligence - February 2015 - 50
Computational Intelligence - February 2015 - 51
Computational Intelligence - February 2015 - 52
Computational Intelligence - February 2015 - 53
Computational Intelligence - February 2015 - 54
Computational Intelligence - February 2015 - 55
Computational Intelligence - February 2015 - 56
Computational Intelligence - February 2015 - 57
Computational Intelligence - February 2015 - 58
Computational Intelligence - February 2015 - 59
Computational Intelligence - February 2015 - 60
Computational Intelligence - February 2015 - 61
Computational Intelligence - February 2015 - 62
Computational Intelligence - February 2015 - 63
Computational Intelligence - February 2015 - 64
Computational Intelligence - February 2015 - Cover3
Computational Intelligence - February 2015 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com