Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2024: 1.7
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Arun, Ranganathan | Balamurugan, Rangaswamy
Article Type: Research Article
Abstract: In Wireless Sensor Networks (WSN) the energy of Sensor nodes is not certainly sufficient. In order to optimize the endurance of WSN, it is essential to minimize the utilization of energy. Head of group or Cluster Head (CH) is an eminent method to develop the endurance of WSN that aggregates the WSN with higher energy. CH for intra-cluster and inter-cluster communication becomes dependent. For complete, in WSN, the Energy level of CH extends its life of cluster. While evolving cluster algorithms, the complicated job is to identify the energy utilization amount of heterogeneous WSNs. Based on Chaotic Firefly Algorithm CH …(CFACH) selection, the formulated work is named “Novel Distributed Entropy Energy-Efficient Clustering Algorithm”, in short, DEEEC for HWSNs. The formulated DEEEC Algorithm, which is a CH, has two main stages. In the first stage, the identification of temporary CHs along with its entropy value is found using the correlative measure of residual and original energy. Along with this, in the clustering algorithm, the rotating epoch and its entropy value must be predicted automatically by its sensor nodes. In the second stage, if any member in the cluster having larger residual energy, shall modify the temporary CHs in the direction of the deciding set. The target of the nodes with large energy has the probability to be CHs which is determined by the above two stages meant for CH selection. The MATLAB is required to simulate the DEEEC Algorithm. The simulated results of the formulated DEEEC Algorithm produce good results with respect to the energy and increased lifetime when it is correlated with the current traditional clustering protocols being used in the Heterogeneous WSNs. Show more
Keywords: Wireless Sensor Network (WSN), cluster head (CH), Distributed Entropy Energy-Efficient Clustering (DEEEC), distributed, heterogeneous, Chaotic Firefly Algorithm (CFA), clustering, and energy consumption
DOI: 10.3233/JIFS-189135
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8139-8147, 2020
Authors: Li, Ping | Ni, Zhiwei | Zhu, Xuhui | Song, Juan
Article Type: Research Article
Abstract: Domain adaptation (DA) aims to train a robust predictor by transferring rich knowledge from a well-labeled source domain to annotate a newly coming target domain; however, the two domains are usually drawn from very different distributions. Most current methods either learn the common features by matching inter-domain feature distributions and training the classifier separately or align inter-domain label distributions to directly obtain an adaptive classifier based on the original features despite feature distortion. Moreover, intra-domain information may be greatly degraded during the DA process; i.e. , the source data samples from different classes might grow closer. To this end, this …paper proposes a novel DA approach, referred to as inter-class distribution alienation and inter-domain distribution alignment based on manifold embedding (IDAME). Specifically, IDAME commits to adapting the classifier on the Grassmann manifold by using structural risk minimization, where inter-domain feature distributions are aligned to mitigate feature distortion, and the target pseudo labels are exploited using the distances on the Grassmann manifold. During the classifier adaptation process, we simultaneously consider the inter-class distribution alienation, the inter-domain distribution alignment, and the manifold consistency. Extensive experiments validate that IDAME can outperform several comparative state-of-the-art methods on real-world cross-domain image datasets. Show more
Keywords: Domain adaptation, structural risk minimization, maximum mean discrepancy, manifold embedding
DOI: 10.3233/JIFS-189136
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8149-8159, 2020
Authors: Khan, Anwar | Ur Rahman, Atiq | Zareei, Mahdi | Us Sama, Najm | Vargas-Rosales, Cesar | Qadir, Junaid | Mohamed, Ehab Mahmoud
Article Type: Research Article
Abstract: In underwater acoustic networks (UANs), an acoustic modem is one of the key elements that governs underwater communications. The major demerit of the existing surveys conducted on acoustic modems is that such surveys do not comprise of the novel and state-of-the-art modems. In addition, the described characteristics do not specify the full potential and capabilities of the designed modems. This, in consequence, makes it difficult to identify the parameters for improvement in future investigation. Also, it does not provide the optimal choice of a modem for various underwater applications. To overcome these challenges, this paper considers the latest acoustic modems …designed in the last five years. Further, the modems are classified in terms of their suitability for the various applications, which helps the selection of the appropriate modem for a particular application scenario. Furthermore, the specification of every modem is described in a manner so that it is completely analyzed in highlighting its promising performance parameters as well exposing its region of compromised performance. Besides, acoustic modems developed by commercial manufacturers are also described. These strategies help researchers, scientists and engineers to compare to opt for the right modem for the right application. They also provide knowledge of the margin for improvement in the characteristics of these modems. Finally, perspectives are given for future investigation to make these modems more efficient, robust, smart and effective. Show more
Keywords: Acoustic modem, underwater acoustic networks, underwater communications, acoustic modem design
DOI: 10.3233/JIFS-189137
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8161-8171, 2020
Authors: Jeon, Gwanggil
Article Type: Research Article
Abstract: Deinterlacing is the procedure of reworking interlaced video signal into a non-interlaced format. The interlaced video signal is generally used in both of analog TV and HDTV with 1080i. The deinterlacing method was designed to solve a legacy issue, therefore the interlaced signal which was requested by analog TV must be trans-formed to be displayed on HDTV. This paper introduces fuzzy concept-based deinterlacing method and shows how it can be executed on various test set. The proposed method includes weight calculation stage and deinterlacing implementation stage. In weight calculation stage, I compute correct weight values on each edge direction, which …are calculated using fuzzy concepts. In deinterlacing implementation stage, the computed weight values are used to obtain final deinterlacing pixels by multiplying them with candidate existent pixels. The presented method provides outstanding subjective and objective results in various data set. Show more
Keywords: Fuzzy concept, intelligent system, cognitive concept color image
DOI: 10.3233/JIFS-189138
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8173-8179, 2020
Authors: Saravanan, P. | Sri Ram, E. | Jangiti, Saikishor | Ponmani, E. | Ravi, Logesh | Subramaniyaswamy, V.
Article Type: Research Article
Abstract: Dysarthria is a speech disorder caused by stroke, Parkinson’s disease, neurological injury, or tumors that damage the nervous system and weaken the speech quality. Developing a unique voice command system for Dysarthric speech helps to recognize impaired speech and convert them into text or input commands. Hidden Markov Model (HMM) is one of the widely used generative model-based classifiers for Dysarthric speech recognition. But due to insufficient training data, HMM doesn’t provide optimal results on overlapping classes. We propose an ensemble Gaussian mixture model to recognize impaired speech more accurately. Our model converts the sequence of feature vectors into a …fixed dimensional representation of patterns with varying lengths. The performance efficiency of the proposed model is evaluated on the Dysarthric UA-speech benchmark dataset. The discriminatory information provided by the proposed approach yields better classification accuracy even for shallow intelligibility words compared to conventional HMM. Show more
Keywords: Dysarthric speech recognition, ensemble, hidden Markov model, classification
DOI: 10.3233/JIFS-189139
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8181-8189, 2020
Authors: Akshya, J. | Priyadarsini, P.L.K.
Article Type: Research Article
Abstract: In recent times, Unmanned Air Vehicles (UAVs) are being deployed for several tasks of terrain coverage such as surveillance, photogrammetry, smart irrigation, civil security, and disaster management. In these applications, one of the most vital issues to be addressed is, covering the area under observation with minimum traversal for the UAV. So, the problem addressed in this paper is as follows: For a given geographic area and the given parameters describing the UAV’s coverage capacity, the problem is to find an optimal route that covers the given geographic area. In this paper, an optimal path planning algorithm for the area …under observation, given as a closed curve, is proposed. The algorithm partitions the given area of interest into multiple non-uniform rectangles while considering other parameters such as the flying altitude of the UAV and obstacles that could be encountered during its flight. The problem is transformed into Traveling Salesman Problem by constructing a graph from the rectangular partitioning. Effective approximate solutions are provided to this problem, using the Minimum Spanning Tree (MST) approximation algorithm and Ant Colony Optimization (ACO). The experimental results show that ACO outperforms the MST based algorithm as it does not get stuck in local minima. Show more
Keywords: Travelling salesman problem, minimum spanning tree, area coverage, path planning, ant colony optimization, UAV
DOI: 10.3233/JIFS-189140
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8191-8203, 2020
Authors: Ragala, Ramesh | Bharadwaja Kumar, G
Article Type: Research Article
Abstract: Due to the massive memory and computational resources required to build complex machine learning models on large datasets, many researchers are employing distributed environments for training the models on large datasets. The parallel implementations of Extreme Learning Machine (ELM) with many variants have been developed using MapReduce and Spark frameworks in the recent years. However, these approaches have severe limitations in terms of Input-Output (I/O) cost, memory, etc. From the literature, it is known that the complexity of ELM is directly propositional to the computation of Moore-Penrose pseudo inverse of hidden layer matrix in ELM. Most of the ELM variants …developed on Spark framework have employed Singular Value Decomposition (SVD) to compute the Moore-Penrose pseudo inverse. But, SVD has severe memory limitations when experimenting with large datasets. In this paper, a method that uses Recursive Block LU Decomposition to compute the Moore-Penrose generalized inverse over the Spark cluster has been proposed to reduce the computational complexity. This method enhances the ELM algorithm to be efficient in handling the scalability and also having faster execution of the model. The experimental results have shown that the proposed method is efficient than the existing algorithms available in the literature. Show more
Keywords: Recursive Block LU Decomposition, Extreme Learning Machine, Apache Spark, Moore-Penrose pseudoinverse, Big Data
DOI: 10.3233/JIFS-189141
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8205-8215, 2020
Authors: Giełczyk, Agata | Choraś, Michał
Article Type: Research Article
Abstract: Biometrics, as an intelligent and secure authentication method, has recently become increasingly popular. Modern society uses fingerprints, iris and face recognition on a daily basis, even on a large scale; for example, in biometric passports. However, there are still other biometric traits that may provide sufficiently high accuracy but have not been widely implemented so far, e.g. palmprints. In this article, we propose a novel human-centred method of palmprint-based user verification. The proposed method is dedicated to the mobile devices and provides the accuracy reaching 94.5%. Moreover, the method is time-computing efficient and gives the response in less than 0.2 s. …All the experiments described in the article were performed using the benchmark PolyU database and three widely available mobile phones. Show more
Keywords: Mobile biometrics, palmprint, pattern recognition, intelligent user authentication, security, image processing
DOI: 10.3233/JIFS-189142
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8217-8224, 2020
Authors: Babu, Bandla Pavan | Indragandhi, V
Article Type: Research Article
Abstract: In an Electrical system, Power Quality (PQ) is becoming significant to all types of consumers. With the increase of power demand from end users, maintaining the quality of power within the limitations is a major problem. In this paper, harmonic analysis in a grid connected three phase induction motor is tested according to PQ international standards which are found in the International Electro technical Commission (IEC). These mentioned standards are maintained in the transmission line and fed to the induction motor through a regenerative grid simulator. With the results obtained, execution of this fuzzy control system can be investigated through …the digital simulation, which is based on MATLAB-SIMULINK package. It provides human operands to constitute a knowledge base which is used for diagnosing power quality and capable of predicting abnormal operation in Industries. Show more
Keywords: Power quality, power quality issues and fuzzy logic controller
DOI: 10.3233/JIFS-189143
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8225-8235, 2020
Authors: Devarajan, Malathi | Sasikaladevi, N.
Article Type: Research Article
Abstract: With the growing trend of Communication Technologies (ICT), buying goods through online has been increased drastically. Besides, e-payment makes online purchase easier and made our daily life more convenient. However, there exists a user privacy and data security issue in conventional e-payment systems. Thus, a hyper elliptic curve based signcryption scheme is proposed to achieve reduced computational cost. Because, most of the payment is processed on resource constraint devices like smart phone, hence an energy efficient e-payment system is in requisite. In order to ensure user authenticity, an aadhaar number (unique identity) is used to generate signcryption key. The proposed …signcryption scheme can be implemented in real-time applications like e-payment system to ensure confidentiality, privacy, authenticity and integrity. The security of the system is validated through a simulation tool – AVISPA (Automated Validation of Internet Security Protocols and Applications). Further, the resistivity against various cryptographic attacks was analyzed informally and also the computational cost is estimated and compared with other related schemes. Show more
Keywords: E-payment system, signcryption, hyper elliptic curve, security analysis, cybersecurity
DOI: 10.3233/JIFS-189144
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8237-8247, 2020
Authors: Vasudev, R. Aravind | Anitha, B. | Manikandan, G. | Karthikeyan, B. | Ravi, Logesh | Subramaniyaswamy, V.
Article Type: Research Article
Abstract: Heart diseases are one of the crucial diseases that may cause fatality in both men and women. About 12 million deaths occur across the world due to heart diseases. With the advancement in information technology, it is possible for the Healthcare industry to store enormous volume of data containing millions of patient’s medical information along with their treatment details. If utilized in an efficient manner, this information helps the doctors to diagnose the diseases in a precise manner. Data mining algorithms are employed to analyse huge data sets and to discover unseen patterns. Data mining plays an essential role in …medical diagnosis. Doctors bank on different computer models which uses data mining algorithms to prefigure different kinds of diseases in patients. So, the need is to design a methodical data mining algorithm that helps for better forecast of diseases. The main goal of this work is to create an ensemble of algorithms which results in better accuracy. The ensemble is constructed by making use of stacking ensemble technique, which comprises of two categorization algorithms namely Naïve Bayes and Artificial Neural Network. The Cleveland heart disease data set acquired from UCI machine learning repository containing 14 attributes and 303 instances is given as input to these algorithms. From our experimental analysis it is evident that the proposed ensemble scheme results in a better accuracy. Show more
Keywords: Cardio vascular disease, naïve bayes, neural network, stacking, resilient back propagation
DOI: 10.3233/JIFS-189145
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8249-8257, 2020
Authors: Sengan, Sudhakar | Arokia Jesu Prabhu, L. | Ramachandran, V. | Priya, V. | Ravi, Logesh | Subramaniyaswamy, V.
Article Type: Research Article
Abstract: In the last decade, numerous researches have been focused on Image Super-Resolution (SR); this recreation or improvement model is vital in different research areas. Recently, deep learning algorithm finds useful to advance in the resolution of the medical output. Here, we devise a novel Deep Convolutional Network model along with the optimal learning rate of the Rectified Linear Unit (ReLU) intended for Medical Image Super-Resolution (MISR). For getting the optimal values of Deep Learning AlexNet structure, Modified Crow Search (MCS) is utilized, which is mainly depends on the behavior of crow sets. The chosen Alexnet lacks in a sort of …suitable supervision for upgrading execution of the proposed model that effectively aims to overfit. The proposed design, i.e., MISR, named Deep Optimal Convolutional AlexNet (DOCALN), derives the optimal values of learning rates of the ReLU activation function. Based on this optimal deep learning structure, the Low Resolution (LR) medical images can be applied. Experimentation results of our proposed model are compared with variants of Convolution Neural Networks (CNN) concerning different measures such as image quality assessment, SR efficiency analysis, and execution time. Show more
Keywords: Deep learning, super resolution, optimization, convolutional neural network, alexnet, deep learning
DOI: 10.3233/JIFS-189146
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8259-8272, 2020
Authors: Kirn Kumar, N. | Indra Gandhi, V.
Article Type: Research Article
Abstract: As the world is moving towards green energy generation to reduce the pollution by renewable sources such as wind, solar, geothermal and more. These sources are intermittent in nature, to coordinate and control with traditional power generating units a control technique is necessary. This paper mainly focuses on the design of fuzzy based classical controller using a PSO algorithm for optimal controller gains to control the frequency variations in island hybrid power system. The considered mathematical model comprises of a diesel generating model, wind turbine generator and a battery storage system. Fuzzy is an intelligent controller which is designed with …trial and error rules or on the basis of past experience provided by experts or by optimization methods for optimized gains using computational algorithms. To give best solution for these kinds of problems with FLCs traditional controllers are integrated with fuzzy logic. The PSO algorithm is applied to tune the classical controller gains to decrease the frequency deviation of the island power system, during the different load and wind disturbances. The Fuzzy PID classical controller shows the best performance compared with the only fuzzy and Fuzzy-PI controller configurations by illustrating the under shoot, overshoot and settling time and the proposed method is robust for various loading conditions and different wind changes. Show more
Keywords: Battery energy storage, fuzzy logic controller, load frequency control, particle swarm optimization, renewable energy sources
DOI: 10.3233/JIFS-189147
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8273-8283, 2020
Authors: Meena, V. | Gireesha, Obulaporam | Krithivasan, Kannan | Shankar Sriram, V.S.
Article Type: Research Article
Abstract: Mobile Cloud Computing (MCC)’s rapid technological advancements facilitate various computational-intensive applications on smart mobile devices. However, such applications are constrained by limited processing power, energy consumption, and storage capacity of smart mobile devices. To mitigate these issues, computational offloading is found to be the one of the promising techniques as it offloads the execution of computation-intensive applications to cloud resources. In addition, various kinds of cloud services and resourceful servers are available to offload computationally intensive tasks. However, their processing speeds, access delays, computation capability, residual memory and service charges are different which retards their usage, as it becomes time-consuming …and ambiguous for making decisions. To address the aforementioned issues, this paper presents a Fuzzy Simplified Swarm Optimization based cloud Computational Offloading (FSSOCO) algorithm to achieve optimum multisite offloading. Fuzzy logic and simplified swarm optimization are employed for the identification of high powerful nodes and task decomposition respectively. The overall performance of FSSOCO is validated using the Specjvm benchmark suite and compared with the state-of-the-art offloading techniques in terms of the weighted total cost, energy consumption, and processing time. Show more
Keywords: Computational offloading, fuzzy logic, mobile cloud computing, multisite offloading, swarm optimization
DOI: 10.3233/JIFS-189148
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8285-8297, 2020
Authors: Ni, Zhiwei | Xia, Pingfan | Zhu, Xuhui | Ding, Yufei | Ni, Liping
Article Type: Research Article
Abstract: Ensemble pruning has been widely used for enhancing classification ability employing a smaller number of classifiers. Ensemble pruning extracts a part of classifiers with good overall performance to form the final ensemble. Diversity and accuracy of classifiers are of vital importance for a successful ensemble. It is hard for the members in one ensemble to achieve both good diversity and high accuracy, simultaneously, because there is a tradeoff between them. Existing works usually search for the tradeoff in terms of diversity measures, or find it utilizing heuristic algorithms, which cannot gain the exact solution without exhaustive search. To address the …above issue, a novel ensemble pruning method based on information exchange glowworm swarm optimization and complementarity measure, abbreviated EPIECM, is proposed using the combination of information exchange glowworm swarm optimization (IEGSO) and complementarity measure (COM). Firstly, multiple generated classifiers are utilized to construct a pool of learners who perform diversely. Secondly, COM is employed to pre-prune the classifiers with poor comprehensive performance, and the pre-pruned ensemble is formed utilizing the retaining classifiers. Finally, the optimal subset of classifiers is combined from the remaining constituents after pre-pruning with IEGSO. Empirical results on 27 UCI datasets indicate that EPIECM significantly outperforms other techniques. Show more
Keywords: Ensemble pruning, glowworm swarm optimization, information exchange, complementarity measure
DOI: 10.3233/JIFS-189149
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8299-8313, 2020
Authors: Nath, Keshab | Dhanalakshmi, R | Vijayakumar, V. | Aremu, Bashiru | Hemant Kumar Reddy, K. | Xiao-Zhi, Gao
Article Type: Research Article
Abstract: Detection of densely interconnected nodes also called modules or communities in static or dynamic networks has become a key approach to comprehend the topology, functions and organizations of the networks. Over the years, numerous methods have been proposed to detect the accurate community structure in the networks. State-of-the-art approaches only focus on finding non-overlapping and overlapping communities in a network. However, many networks are known to possess a hidden or embedded structure, where communities are recursively grouped into a hierarchical structure. Here, we reinvent such sub-communities within a community, which can be redefined based on nodes similarity. We term those …derived communities as hidden or hierarchical communities. In this work, we present a method called H idden C ommunity based on N eighborhood Similarity C omputation (HCNC ) to uncover undetected groups of communities that embedded within a community. HCNC can detect hidden communities irrespective of density variation within the community. We define a new similarity measure based on the degree of a node and it’s adjacent nodes degree. We evaluate the efficiency of HCNC by comparing it with several well-known community detectors through various real-world and synthetic networks. Results show that HCNC has better performance in comparison to the candidate community detectors concerning various statistical measures. The most intriguing findings of HCNC is that it became the first research work to report the presence of hidden communities in Les Miserables, Karate and Polbooks networks. Show more
Keywords: Embedded Community, Intrinsic structure, Hidden community, Neighborhood similarity, Community Strength, Social graphs
DOI: 10.3233/JIFS-189150
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8315-8324, 2020
Authors: Viloria, Amelec | Lezama, Omar Bonerge Píneda | Varela, Noel
Article Type: Research Article
Abstract: As of late, traffic blockage, street mishaps, and ecological contamination brought about by traffic, alongside the need to associate and utilize constant applications, have become issues of worldwide intrigue. Different on-screen characters, for example, vehicle producers, the scholarly community, and government offices have begun to invest a ton of energy together towards the acknowledgment of the idea of huge scope vehicular interchanges. One of the primary methodologies in this kind of system is the advancement of remote advances and their assorted organizations, concentrating on the association with the Internet through WiFi systems, cell systems, or specially appointed vehicular systems. VANETs …are essentially intended to give data trade through Vehicle to Vehicle (V2V) and Vehicle to foundation (V2I) interchanges, permitting ceaseless network and being exceptionally utilized for short-range correspondence, with high transmission speed through which it is proposed that clients keep up an association and distinguish occasions about clog or street conditions. This exploration presents a vehicular situation that tries to acquire a sufficient presentation while executing a heterogeneous network in a few segments of the city of Bogotá, Colombia. Show more
Keywords: Coverage, heterogeneous, throughput, VANET, WIFI, DSRC
DOI: 10.3233/JIFS-189151
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8325-8332, 2020
Authors: Karthikeyan, M.P. | Venkatesan, R. | Vijayakumar, V. | Ravi, Logesh | Subramaniyaswamy, V.
Article Type: Research Article
Abstract: Due to the wide acceptance of White Blood Cells (WBCs) in disease diagnosis, detection and classification of WBC are hot topic. Existing methodologies have some drawbacks such as significant degree of error, higher accuracy, time bound and higher misclassification rate. A WBCs detection and classification called, Jenks Optimized Logistic Convolutional Neural Network (JO-LCNN) method has proposed. Initally, Eulers Principal Axis is used as a convolution model to obtain a rotation invariant form of image by differentiating the background and RBCs, then eliminating them which leaves only the WBCs. By eliminating the wanton features, inherent features are detected contributing to minimum …misclassification rate. According to above, Jenks Optimization function is used as a pooling model to obtain feature map for lower resolution. Therefore JO-LCNN is used for removing tiny objects in image and complete nuclei. Finally, Multinomial Logistic classifier is used to classify five types of classes by means of loss function and updating weight according to the loss function, therefore classifying with higher accuracy rate. Using LISC database for WBCs with different parameters as classification accuracy, false positive rate and time complexity are performed. Result shows that JO-LCNN, efficiently improves accuracy with less time, misclassification rate than the state-of-art methods. Show more
Keywords: White blood cell, Eulers Principal Axis, Jenks Optimization, pooling, Multinomial Logistic Classification
DOI: 10.3233/JIFS-189152
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8333-8343, 2020
Authors: Alamelu, M. | Pradeep Kumar, T.S. | Vijayakumar, V.
Article Type: Research Article
Abstract: Service Level Agreement (SLA) is an agreement between the service provider and consumer to provide the verifiable quality of services. Using the valuable metrics in SLA, a service consumer could easily evaluate the service provider. Though there are different types of SLA models are available between the consumer and provider, the proposed approach describes the Fuzzy rule base SLA agreement generation among multiple service providers. A negotiation system is designed in this work to collect the different sets of provider services. With their desired quality metrics, a common Fuzzy based SLA report is generated and compared against the existing consumer …requirements. From the analysis of the common agreement report, consumers can easily evaluate the best service with the desired Impact service, cost and Quality. The main advantage of this approach is that it reduces the time consumption of a consumer. Moreover, the best service provider can be selected among multiple providers with the desired QoS parameters. At the same time, the bilateral negotiation is enhanced with the approach of multilateral negotiation to improve the searching time of consumers. Show more
Keywords: Multiparty negotiation, SLA, expert advice, service level agreement, fuzzy based support system
DOI: 10.3233/JIFS-189153
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8345-8356, 2020
Authors: Stephan, Thompson | Rajappa, Ananthnarayan | Sendhil Kumar, K.S. | Gupta, Shivang | Shankar, Achyut | Vijayakumar, V.
Article Type: Research Article
Abstract: Vehicular Ad Hoc Networks (VANETs) is the most growing research area in wireless communication and has been gaining significant attention over recent years due to its role in designing intelligent transportation systems. Wireless multi-hop forwarding in VANETs is challenging since the data has to be relayed as soon as possible through the intermediate vehicles from the source to destination. This paper proposes a modified fuzzy-based greedy routing protocol (MFGR) which is an enhanced version of fuzzy logic-based greedy routing protocol (FLGR). Our proposed protocol applies fuzzy logic for the selection of the next greedy forwarder to forward the data reliably …towards the destination. Five parameters, namely distance, direction, speed, position, and trust have been used to evaluate the node’s stability using fuzzy logic. The simulation results demonstrate that the proposed MFGR scheme can achieve the best performance in terms of the highest packet delivery ratio (PDR) and minimizes the average number of hops among all protocols. Show more
Keywords: Vehicular ad hoc network (VANET), fuzzy logic, routing, mobility, trust
DOI: 10.3233/JIFS-189154
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8357-8364, 2020
Authors: Chandrasekar, Jayakumar | Madhawa, Surendar | Sangeetha, J.
Article Type: Research Article
Abstract: A robust disruption prediction system is mandatory in a Tokamak control system as the disruption can cause malfunctioning of the plasma-facing components and impair irrecoverable structural damage to the vessel. To mitigate the disruption, in this article, a data-driven based disruption predictor is developed using an ensemble technique. The ensemble algorithm classifies disruptive and non-disruptive discharges in the GOLEM Tokamak system. Ensemble classifiers combine the predictive capacity of several weak learners to produce a single predictive model and are utilized both in supervised and unsupervised learning. The resulting final model reduces the bias, minimizes variance and is unlikely to over-fit …when compared to the individual model from a single algorithm. In this paper, popular ensemble techniques such as Bagging, Boosting, Voting, and Stacking are employed on the time-series Tokamak dataset, which consists of 117 normal and 70 disruptive shots. Stacking ensemble with REPTree (Reduced Error Pruning Tree) as a base learner and Multi-response Linear Regression as meta learner produced better results in comparison to other ensembles. A comparison with the widely employed stand-alone machine learning algorithms and ensemble algorithms are illustrated. The results show the excellent performance of the Stacking model with an F1 score of 0.973. The developed predictive model would be capable of warning the human operator with feedback about the feature(s) causing the disruption. Show more
Keywords: GOLEM Tokamak, stacking, REPTree algorithm, multi-response linear regression, disruption prediction
DOI: 10.3233/JIFS-189155
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8365-8376, 2020
Authors: Bragadeesh, Srinivasan Ananthanarayanan | Umamakeswari, Arumugam
Article Type: Research Article
Abstract: Traceability and food quality are significant challenges in realizing a reliable food supply chain. The reliability of data in supply chains is one of the critical factors. Ensuring transparency, integrity, and availability is the primary requirement for establishing a proper supply chain network. Blockchain is a distributed structure of immutable records that are chained together to form blocks. It provides a guarantee of storing the data correctly and reliably. Smart contracts, which are self-executing contracts containing the terms of the agreement between the entities involved, provide utility for automation of reputation calculation with the transactions. Reputation systems allow participants to …rate each other, thus building trust through reputation. The present reputation systems have bounded scrutiny and lack granularity; hence they are not ideal for supply chains. In this work, we propose a reliable supply chain framework using blockchain and smart contracts. It uses a consortium blockchain network to trace communication between the participants and to calculate reputation scores dynamically. Rewards and penalties are assigned to the participants of the supply chain network based on the food product quality involved in the trade. The network participants have defined roles and the access permissions govern who can access the ledger. An immutable ledger stores all the transactions occurring in the network. Any change in one block will reflect in the consecutive blocks, which ensures the data is reliable and secure. The proposed system is implemented using Hyperledger Composer. The proposed framework is evaluated in terms of throughput and latency for varying asset size and batch size using the benchmarking tool Caliper. Results show that the security and reliability provided by the proposed framework justify the overheads in contrast to a trading model that does not include a blockchain network. Show more
Keywords: Blockchain, hyperledger composer, penalty, reputation, smart contracts
DOI: 10.3233/JIFS-189156
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8377-8387, 2020
Authors: Kamili, Asra | Fatima, Izat | Hassan, Muzamil | Parah, Shabir A. | Vijaya Kumar, V. | Ambati, L. S.
Article Type: Research Article
Abstract: Embedding information in medical images is considered as one of the significant methods for safeguarding the integrity and authenticity of medical images besides providing security to electronic patient records (EPR). The conventional embedding methods deteriorate the perceptual quality of medical images making them unsuitable for proper diagnosis. To preserve the perceptual quality of medical images reversible embedding is used. The reversible embedding schemes, however, have less embedding capacity. In this work, a reversible scheme based on histogram bin shifting and RGB plane concatenation has been proposed which offers high embedding capacity as well. We have exploited the fact that medical …images, unlike general images, consist of a large number of peaks and zero points that can be employed for reversibly embedding the data. Reversibility ensures that original image restoration takes place after the extraction of embedded data, which is of great importance in medical images for proper diagnosis and treatment. We have used various subjective and objective image quality metrics for analyzing the scheme. The proposed scheme has been shown to provide a Peak Signal to Noise Ratio (PSNR) value of above 56 dB for an embedding capacity of 0.58 bits per pixel (bpp). The results obtained show that the performance of scheme presented is far better in comparison to the state-of-the-art. Show more
Keywords: Medical images, security, authentication, reversibility, electronic patient record
DOI: 10.3233/JIFS-189157
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8389-8398, 2020
Authors: Chernyi, Sergei G. | Vyngra, Aleksei V. | Novak, Bogdan P.
Article Type: Research Article
Abstract: In order to implement and demonstrate all the processes associated with the real stability trial system on vessels, a ship’s model was made. The developed model consists of electrical and hardware parts. It is concluded that the model is applicable for the study of issues of automatic control of the ship’s list, simulating various loading options. Scalable loading studies of various types and sizes of cargo were carried out. The results of the study showed the correct operation of the model according to a specified algorithm. To work with the microcontroller and to code, the mathematical modeling environment Matlab/Simulink was …used. The results of the study showed that the created control system is able to secure the vessel during various types of loading operations, speed up the loading process, thus reducing the time spent at the port stay and save port costs. Show more
Keywords: Stability, electrical and hardware parts, automatic control, specified algorithm, microcontroller, code, Simulink
DOI: 10.3233/JIFS-189158
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8399-8408, 2020
Authors: Jha, Sudan | Prashar, Deepak | Elngar, Ahmed A.
Article Type: Research Article
Abstract: In today’s era, cloud computing has played a major role in providing various services and capabilities to a number of researchers around the globe. One of the major problems we face in cloud is to identify the various constraints related with the delay in the Task accomplishment as well as the enhanced approach to execute the task with high throughput. Many studies have shown that it is almost difficult to create an ideal solution but it seems feasible to provide a sub-optimal solution utilizing heuristic algorithms. In this paper, compared to previously used particle swarm optimization (PSO), heuristic approaches, and …improved PSO algorithm for efficient task scheduling, we propose “Modified Filtering Algorithm” for task scheduling on cloud setting. Comparing all these three algorithms, we strive to build an optimum schedule to reduce the completion period of execution of activities. Show more
Keywords: Cloud environment, modified filtering algorithm (MFA), heuristic algorithms, PSO, task scheduling, quantum time
DOI: 10.3233/JIFS-189159
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8409-8417, 2020
Authors: Venkatesh, Veeramuthu | Anishin Raj, M. M. | Mohamed Sajith, K. | Anushiadevi, R. | Suriya Praba, T.
Article Type: Research Article
Abstract: Cancer is a prevalent disease which comes in several forms. The need of the hour in cancer research is to be able to diagnose cancer in its early stages. The furthermost common forms of cancer among women us breast cancer. In recent times, there has been a drastic increase in the number of breast cancer cases among women. As a wide range of medical data is available in electronic form and with easy access to Machine Learning(ML) techniques disease progression risk evaluation has been made easier. These ML tools can aid in giving us complex insights from the massive amounts …of available data. Some of the techniques used for developing predictive models for perfect decision making in cancer research are Artificial Neural Networks (ANNs), Bayesian Networks (BNs), Support Vector Machines (SVMs), and Decision Trees (DTs). Although it is acceptable that ML is used to predict cancer progression, we need some level of validation. In this paper, we have come up with a review of several ML methods in modelling cancer progression. We discuss several predictive models based on supervised ML techniques and the inputs given by users, along with the data available. The results that were obtained from Logistic Regression show us that this method gave a significantly higher accuracy than most other classifiers. The best accuracy is 98.2%, however, the best precision and recall is 100 and 98.60% correspondingly. Show more
Keywords: Machine learning, cancer susceptibility, predictive models, feature selection techniques, breast cancer
DOI: 10.3233/JIFS-189160
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8419-8426, 2020
Authors: Espinosa-Leal, Leonardo | Chapman, Anthony | Westerlund, Magnus
Article Type: Research Article
Abstract: Industry has always been in the pursuit of becoming more economically efficient and the current focus has been to reduce human labour using modern technologies. Even with cutting edge technologies, which range from packaging robots to AI for fault detection, there is still some ambiguity on the aims of some new systems, namely, whether they are automated or autonomous. In this paper, we indicate the distinctions between automated and autonomous systems as well as review the current literature and identify the core challenges for creating learning mechanisms of autonomous agents. We discuss using different types of extended realities, such as …digital twins, how to train reinforcement learning agents to learn specific tasks through generalisation. Once generalisation is achieved, we discuss how these can be used to develop self-learning agents. We then introduce self-play scenarios and how they can be used to teach self-learning agents through a supportive environment that focuses on how the agents can adapt to different environments. We introduce an initial prototype of our ideas by solving a multi-armed bandit problem using two ε -greedy algorithms. Further, we discuss future applications in the industrial management realm and propose a modular architecture for improving the decision-making process via autonomous agents. Show more
Keywords: Autonomous systems, reinforcement learning, self-play, digital twin, industry 4.0
DOI: 10.3233/JIFS-189161
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8427-8439, 2020
Authors: Sekar, K. R. | Thaventhiran, C. | Sathiamoorthy, G.
Article Type: Research Article
Abstract: Vitiligo is a problem due to the destruction of melanocytes which is present in 1% of people all over the world. The origin of this disease is unknown and difficult to cure. Absence of melanin in the body causes lesions which will ooze out all over the body. Phototherapy and surgical therapy are the two types of treatment available in the existing world. The Cytotoxic CD8 + T lymphocytes act as a major factor for the abovesaid disease. The main objective of this work is to treat patients with different methods according to the severity of vitiligo, which can be identified with …the help of out ranking based on hesitant fuzzy relation. Multi-criteria and multi-objective hesitant fuzzy are applied in this work to find out the ranking through which the severity of the disease is detected. This method helps in identifying the vitiligo lesions, which can be treated effectively in a short period of time. During the application of vitiligo treatment, FQA-TOPSIS (Fuzzy Quantified Attribute-TOPSIS) hesitant fuzzy relation methodology is deployed with three decision maker’s support using linguistic and intuitionistic values. The decision maker’s fuzzy values will be normalized and aggregated in this work with improved methodologies. The two objectives are deployed with their own fuzzy values and are implemented in the decision maker’s values. In the article fuzzy weightage has been calculated in two ways. One is every linguistic like low, medium, high and very high has got its significant intuitionistic values that all will be available with the scale of 1 to 10. The same has given as triplets. In our research work the above said has applied with the objective based weightage. So the accuracy has been increased through the work. The outcome of this methodology is to find out the coefficient closeness of the alternatives and to out rank the decision alternatives. The difference between the Final +ve Ideal Solution (FPIS) and Final -ve Ideal Solution (FNIS) is determined and FQA-TOPSIS Hesitant Fuzzy is ranked in the result. Show more
Keywords: FQA-TOPSIS, hesitant fuzzy, cytotoxic, vitiligo, melanocytes, final positive ideal solution and final -ve ideal solution
DOI: 10.3233/JIFS-189162
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8441-8451, 2020
Authors: Palanisamy, R. | Mohana Sundram, K. | Selvakumar, K. | Boopathi, C.S. | Selvabharathi, D. | Vijayakumar, V.
Article Type: Research Article
Abstract: An Artificial Neural Network (ANN) based Space Vector Pulse Width Modulation (SVPWM) for five level cascaded H-bridge inverter (CHBI) fed grid connected photovoltaic (PV) system. The multilevel inverter topologies are offers better performance compare conventional two level inverter like reduced total harmonic distortion, less electromagnetic interferences and voltage stresses across switches are low. The ANN based SVPWM generates the switching pulses for cascaded H-bridge inverter; it improves the accuracy in reference vectors tuning and identification, which leads to improve the inverter output voltage, better utilization of dc-link voltage and controlled output current. The ANN control makes the implementation of SVPWM …becomes simple and minimizes the intricacy in tracking reference vector and calculation of switching time; it is suitable for any type of non-linear systems. This proposed system is energized using PV system and it is boosted using dc-dc boost converter, and the output of CHBI is synchronized with grid connected system using coupled inductor. The simulation and experimental results of ANN based SVPWM for CHBI is verified using simulink-matlab and DSP processor. Show more
Keywords: Artificial Neural Network (ANN), space vector pulse width modulation (SVPWM), cascaded H-bridge inverter (CHBI), photovoltaic (PV) system, DSP processor, multilevel inverter (MLI).
DOI: 10.3233/JIFS-189163
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8453-8462, 2020
Authors: Srinivasan, Palanivel | Doraipandian, Manivannan
Article Type: Research Article
Abstract: Rare event detections are performed using spatial domain and frequency domain-based procedures. Omnipresent surveillance camera footages are increasing exponentially due course the time. Monitoring all the events manually is an insignificant and more time-consuming process. Therefore, an automated rare event detection contrivance is required to make this process manageable. In this work, a Context-Free Grammar (CFG) is developed for detecting rare events from a video stream and Artificial Neural Network (ANN) is used to train CFG. A set of dedicated algorithms are used to perform frame split process, edge detection, background subtraction and convert the processed data into CFG. The …developed CFG is converted into nodes and edges to form a graph. The graph is given to the input layer of an ANN to classify normal and rare event classes. Graph derived from CFG using input video stream is used to train ANN Further the performance of developed Artificial Neural Network Based Context-Free Grammar – Rare Event Detection (ACFG-RED) is compared with other existing techniques and performance metrics such as accuracy, precision, sensitivity, recall, average processing time and average processing power are used for performance estimation and analyzed. Better performance metrics values have been observed for the ANN-CFG model compared with other techniques. The developed model will provide a better solution in detecting rare events using video streams. Show more
Keywords: Artificial Neural Network, Context-free grammar, Rare event detection, streaming video monitoring
DOI: 10.3233/JIFS-189164
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8463-8475, 2020
Authors: Revathy, P. | Mukesh, Rajeswari
Article Type: Research Article
Abstract: Like many open-source technologies such as UNIX or TCP/IP, Hadoop was not created with Security in mind. Hadoop however evolved from the other tools over time and got widely adopted across large enterprises. Some of Hadoop’s architectural features present Hadoop its unique security issues. Given this security vulnerability and potential invasion of confidentiality due to malicious attackers or internal customers, organizations face challenges in implementing a strong security framework for Hadoop. Furthermore, given the method in which data is placed in Hadoop Cluster adds to the only growing list of these potential security vulnerabilities. Data privacy is compromised when these …critical and data-sensitive blocks are accessed either by unauthorized users or for that matter even misuse by authorized users. In this paper, we intend to address the strategy of data block placement across the allotted DataNodes. Prescriptive analytics algorithms are used to determine the Sensitivity Index of the Data and thereby decide on data placement allocation to provide impenetrable access to an unauthorized user. This data block placement strategy aims to adaptively distribute the data across the cluster using innovative ML techniques to make the data infrastructure extra secured. Show more
Keywords: Big data, Hadoop security, data placement strategy for sensitive data, sensitivity in Hadoop, prescriptive analytics
DOI: 10.3233/JIFS-189165
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8477-8486, 2020
Authors: Devarajan, Malathi | Sasikaladevi, N.
Article Type: Research Article
Abstract: With ever growing popularity, wireless communication system also vulnerable to various security attacks. To provide high level security, many cryptographic solutions have been proposed. One such solution is signcryption, where authenticity and confidentiality provided by single logical step. Therefore, signcryption scheme helps to reduce computational cost, but it is not feasible for resource constraint environments. Because, most of the existing approaches were based on El-Gamal, bilinear pairing, Rivest-Shamir-Adleman (RSA), and Elliptic curve Cryptography (ECC). They consume more energy due to their increased key size. Hence, the new signcryption approach is proposed based on Hyper Elliptic Curve Cryptosystem (HECC) whose key …size is much lesser than ECC. It significantly reduces the cost of computation and communication overhead by half the amount of ECC which suits well for resource constraint environments. Further, the proposed scheme attains necessary security features along with forward secrecy and public verifiability. On the other hand, the security of the approach is validated through an automated protocol validation tool – AVISPA. Show more
Keywords: Hyper elliptic curve, signcryption, mutual authentication, security analysis, AVISPA
DOI: 10.3233/JIFS-189166
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8487-8498, 2020
Authors: Varela, Noel | Pineda Lezama, Omar Bonerge | Neira, Harold
Article Type: Research Article
Abstract: The principle assaults on a Wireless Sensor Network (WSN) essentially influence the uprightness and accessibility of the data gathered, for example, Deni-al of Service, Blackhole, Wormhole, and assault on the data being transmitted. Privacy is not an important security objective because the data caught by the sensors are typically not delicate or mystery from individuals. A remote sensor organizes applied to shrewd metering frameworks might be adequately powerful as far as robotization and adjustment of the information that is gathered, however, if the system doesn’t have satisfactory security, both the client and the organization offering the support might be influenced …by assaults on the respectability and accessibility of the data transmitted. This research proposes the use of MESH encryption techniques and Star topology to find the best combination that meets the requirements of a Smart Metering System. Show more
Keywords: Security, encryption, topology, WSN, smart metering networks, cryptographic techniques
DOI: 10.3233/JIFS-189167
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8499-8506, 2020
Authors: Varghese, Lijo Jacob | Sira Jacob, Suma | Banumathi, S. | Ravi, Logesh | Vairavasundaram, Subramaniyaswamy | Jacob Raglend, I.
Article Type: Research Article
Abstract: This work aims to improve the operation of multi-level inverter with reduced switching losses, thereby propose a new structure for an MLI with a reduced component count. A 27-level asymmetric Multi Level Inverter (MLI) with a minimal number of static switches is considered as a test system. The proposed MLI is developed with three input DC sources and thirteen power electronic switches. The hardware prototype is developed for 40 V and 3.5 A output. The control logic is developed in dsPIC30F410 controller. The main objective of this work is to effectively bring down the Total Harmonic Distortion (THD) of the resulting …output voltage by analyzing the harmonic spectrum of the proposed MLI configuration with various low frequencies switching techniques and optimizing their switching angles and to choose an appropriate switching state using fuzzy logic controller (FLC). The proposed FLC covers wide range of operating conditions i.e. 10 switching states and variables 9*9 rules to predict the suitable switching angel. The performance metrics of the proposed structure of 27-level MLI has been evaluated upon simulation results and experimental results based on hardware prototype. The comparative study also carried out with the recent MLI topologies. Show more
Keywords: Asymmetric multilevel inverter, fuzzy logic, total harmonic distortion, pulse width modulation, reduced number of switches, optimum switching angles.
DOI: 10.3233/JIFS-189168
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8507-8519, 2020
Authors: Nagarajan, Manikandan | Sasikumar, A. | Muralidharan, D. | Rajappa, Muthaiah
Article Type: Research Article
Abstract: Approximate computing is a rapidly growing technique to speed up applications with less computational effort while maintaining the accuracy of error-resilient applications such as machine learning and deep learning. Inheritance properties of the machine and deep learning process give freedom for the designer to simplify the circuitry to speed up the computation process at the expense of accuracy of computational results. Fundamental blocks of any computation are adders. In order to optimize it for better performance, 2-bit multi-bit approximate adders (MAPX) are proposed in this work which breaks the lengthy carry chain. In contrast with other approximate larger width adders, …instead of using accurate adders for the most significant part, here proposed 2-bit MAPX-1 and MAPX-2 adders are arranged in various ways to compose most and least significant parts. Designed 8-bit and 16-bit adders are evaluated for their performance and error characteristics. Proposed 2-bit MAPX-2 shows better error characteristics whose MED is 0.250 while occupying less area and MAPX-1 consumes less power and delay at the cost of accuracy. Among the extended adders, MAPX 8-bit adder design1 outperforms the best performing APX based 8-bit adder design1. The error performance of it is improved by 14%, 42.1% and 50.4% compared to the existing well-performing APX 8-bit Design1, Design2 and Design3 respectively. Similarly, proposed MAPX 16-bit Design1 exhibits overwhelming performance compared to best performing APX 16-bit Design1, and its error performance is improved by 24.3%, 34.9% and 50.3% compared to APX 16-bit Design1, Design2 and Design3 respectively. In order to evaluate the proposed adder for a real application, extended MAPX 16-bit Design1 is fit in the convolution layer of Low Weights Digit Detector (LWDD) convolutional neural network-based digit classification system. Our modified system accelerates the computation process by 1.25 factors while exhibiting the accuracy of 91% and it best fits error-tolerant real applications. All the adders are synthesized and implemented in the Intel Cyclone IV EP4CE22F17C6N FPGA. Show more
Keywords: Approximate adders, multi-bit adders, CNN accelerator, digit classification, deep learning
DOI: 10.3233/JIFS-189169
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8521-8528, 2020
Authors: Martinaa, M. | Santhi, B. | Raghunathan, A.
Article Type: Research Article
Abstract: Wireless Sensor Networks (WSNs) is created, stemming from their applications in distinct areas. Huge sensor nodes are deployed in geographically isolated regions in WSN. As a result of uninterrupted transmission, the energy level of the nodes gets rapidly depleted. Sensor node batteries cannot be replaced or recharged often and maintaining the energy level is a crucial issue. Thus energy efficiency is the significant factor to be consider in WSN. This paper focuses to implement an efficient clustering and routing protocols for maximized network lifetime. Clustering has been confirmed as a successful approach in network organization. The fundamental responsibilities of the …clustering mechanism include improved energy efficiency and extended network lifespan. In this work, energy efficiency is improved to maximize lifespan of the WSN by proposing a novel method known as the Populated Cluster aware Routing Protocol (PCRP). The proposed method comprises three different steps: cluster formation, cluster head selection, and multi-hop data transmission. All sensor nodes are joined to a Cluster Head in a single hop in the cluster formation phase. Node distance is calculated and from which cluster head is selected. Then, cluster head aggregates the data from sensor nodes and transfer to the Base Station (BS). The shortest pathway is estimated by the Energy Route Request Adhoc On-demand Distance Vector (ERRAODV) algorithm. The proposed method considers the residual energy involved to attain high energy efficiency and network stability. The experimental analysis is demonstrated to validate the proposed method with existing, which improves the network lifespan. Vital parameters are validated using Network Simulator (NS2). Show more
Keywords: Energy consumption, clustering, routing protocol, network lifetime, wireless sensor networks
DOI: 10.3233/JIFS-189170
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8529-8542, 2020
Authors: Nourbakhsh, Azamossadat | Moin, Mohammad-Shahram | Sharifi, Arash
Article Type: Research Article
Abstract: Face is the most important and most popular biometric used in many identification and verification systems. In these systems, for reducing recognition error rate, the quality of input images need to be as high as possible. Face Image Compliancy verification (FICV) is one of the most essential methods for this purpose. In this research, a brain functionality inspired model is presented for FICV using Haxby model, which is a face visual perception consistent model containing three bilateral areas for three different functionalities. As a result, contribution of this work is presenting a new model, based on human brain functionality, improving …the compliancy verification of face images in FICV context. Perceptual understanding of an image is the motivation of most of the quality assessment methods, i.e., the human quality perception is considered as a gold standard and a perfect reference for recognition and quality assessment. The model presented in this work aims to make the operational process of face image quality assessment system closer to the performance of a human expert. Three basic modules have been introduced. Face structural information, for initial information encoding, is simulated by an extended Viola-Jones model. Face image quality assessment is presented by International Civil Aviation Organization (ICAO), in ICAO (ISO / IEC19794 -11) requirements’ compliancy assessment document. Like Haxby model, perception is performed through two distinct functional and neurological pathways, using Hierarchical Maximum pooling (HMAX) and Convolutional Deep Belief Networks (CDBN). Information storing and fetching for training are similar to their corresponding modules in brain. For simulating the brain decision making, the final results of two separate paths are integrated by weighting sum operator. Nine ISO / ICAO requirements were used for testing the model. The simulation results, using AR and PUT databases, shows improvements in six requirements using the proposed method, in comparison with the FICV benchmark. Show more
Keywords: Haxby model, ICAO, facial images quality verification, HMAX model, CDBN
DOI: 10.3233/JIFS-189171
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8543-8555, 2020
Authors: Jagdish, Mukta | Viloria, Amelec | Vargas, Jesus | Pineda Lezama, Omar Bonerge | Ovallos-Gazabon, David
Article Type: Research Article
Abstract: Cloud-based computation is known as the source architecture of the upcoming generation of IT enterprise. In context to up-coming trade solutions, the Information Technology sections are established under logical, personnel, and physical control, it transfers application software and large database to appropriate data centers, where security and management of database with services are not trustworthy fully. So this process may face many challenges towards society and organizations and that not been well understood over a while duration. This becomes one of the major challenges days today. So in this research, it focuses on security-based data storage using cloud, which plays …one of the important aspects bases on qualities of services. To assure user data correctness in the cloud system, a flexible and effective distributed technique with two different salient features was examined by utilizing the token called homomorphic with erasure-coded data for distributed verification, based on this technique it achieved error data localization and integration of storage correctness. Also, it identifies server misbehaving, efficient, and security-based dynamic operations on data blocking such as data append, delete, and update methods. Performance analysis and security show the proposed method is more effective resilient and efficient against Byzantine failure, even server colluding attacks and malicious data modification attacks. Show more
Keywords: Cloud security, architecture design, data storage, homomorphic token, dynamic operation
DOI: 10.3233/JIFS-189172
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8557-8564, 2020
Authors: Quadir, Md Abdul | Christy Jackson, J. | Prassanna, J. | Sathyarajasekaran, K. | Kumar, K. | Sabireen, H. | Ubarhande, Shivam | Vijaya Kumar, V.
Article Type: Research Article
Abstract: Domain name system (DNS) plays a critical part in the functioning of the Internet. But since DNS queries are sent using UDP, it is vulnerable to Distributed Denial of Service (DDoS) attacks. The attacker can take advantage of this and spoof the source IP address and direct the response towards the victim network. And since the network does not keep track of the number of requests going out and responses coming in, the attacker can flood the network with these unwanted DNS responses. Along with DNS, other protocols are also exploited to perform DDoS. Usage of Network Time Protocol (NTP) …is to synchronize clocks on systems. Its monlist command replies with 600 entries of previous traffic records. This response is enormous compared to the request. This functionality is used by the attacker in DDoS. Since these attacks can cause colossal congestion, it is crucial to prevent or mitigate these types of attacks. It is obligatory to discover a way to drop the spoofed packets while entering the network to mitigate this type of attack. Intelligent cybersecurity systems are designed for the detection of these attacks. An Intelligent system has AI and ML algorithms to achieve its function. This paper discusses such intelligent method to detect the attack server from legitimate traffic. This method uses an algorithm that gets activated by excess traffic in the network. The excess traffic is determined by the speed or rate of the requests and responses and their ratio. The algorithm extracts the IP addresses of servers and detects which server is sending more packets than requested or which are not requested. This server can be later blocked using a firewall or Access Control List (ACL). Show more
Keywords: Amplification attacks, DRDoS, domain name system, network time protocol
DOI: 10.3233/JIFS-189173
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8565-8572, 2020
Authors: Sengan, Sudhakar | Priya, V. | Syed Musthafa, A. | Ravi, Logesh | Palani, Saravanan | Subramaniyaswamy, V.
Article Type: Research Article
Abstract: Breast cancer should be diagnosed as early as possible. A new approach of the diagnosis using deep learning for breast cancer and the particular process using segmentation strategies presented in this article. Medical imagery is an essential tool used for both diagnosis and treatment in many fields of medical applications. But, it takes specially trained medical specialists to read medical images and make diagnoses or treatment decisions. New practices of interpreting medical images are labour exhaustive, time-wasting, expensive, and prone to error. Using a computer-aided program which can render diagnosis and treatment decisions automatically would be more beneficial. A new …computer-based detection method for the classification between compassionate and malignant mass tumours in mammography images of the breast proposed. (a) We planned to determine how to use the challenging definition, which produces severe examples that boost the segmentation of mammograms. (b) Employing well designing multi-instance learning through deep learning, we validated employing inadequately labelled data of breast cancer diagnosis using a mammogram. (c) The study is going through the Deep Lung method incorporating deep multi-dimensional automated identification and classification of the lung nodule. (d) By combining a probabilistic graphic model in deep learning, it authorizes how weakly labelled data can be used to improve the existing breast cancer identification method. This automated system involves manually defining the Region Of Interest (ROI), with the region and threshold values based on the next region. The High-Resolution Multi-View Deep Convolutional Neural Network (HRMP-DCNN) mainly developed for the extraction of function. The findings collected through the subsequent in available public databases like mammography screening information database and DDSM Curated Breast Imaging Subset. Ultimately, we’ll show the VGG that’s thousands of times quicker, and it is more reliable than earlier programmed anatomy segmentation. Show more
Keywords: Deep convolutional neural network, computer-based automated detection, breast cancer screening, deep learning, machine learning, mammography, fuzzy logic.
DOI: 10.3233/JIFS-189174
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8573-8586, 2020
Authors: Agrawal, Deepika | Pandey, Sudhakar | Gupta, Punit | Kumar Goyal, Mayank
Article Type: Research Article
Abstract: Wireless Sensor Networks is a complex network with millions of small-scale sensor nodes, working together to detect certain physical phenomena. Sensor nodes are operated by battery therefore the major concern is energy efficiency. Clustering is an effective technique to decrease the energy depletion in the network. However, choosing the optimum Cluster Heads is an NP-Hard problem. This paper proposes an unequal clustering technique that selects probationary Cluster Heads through fuzzy logic and the optimization of this probationary Cluster Heads is done through Harmony Search Algorithm (HSA). The proposed algorithm exhibits the dynamic capability of fuzzy logic and high search efficiency …of HSA that extends the network lifespan. The findings are simulated against traditional clustering protocols and compared. The findings obtained show that the protocol proposed is performing superior in terms of network lifespan prolongation and other metrics. Show more
Keywords: Optimal cluster heads, optimization, harmony search algorithm, wireless sensor networks, unequal clustering
DOI: 10.3233/JIFS-189175
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8587-8597, 2020
Authors: Abdulhay, Enas | Alafeef, Maha | Hadoush, Hikmat | Arunkumar, N.
Article Type: Research Article
Abstract: Autism is a developmental disorder that influences social communication skills. It is currently diagnosed only by behavioral assessment. The assessment is susceptible to the experience of the examiner as well as to the descriptive scaling standard. This paper presents a computer aided approach to discrimination between neuro-typical and autistic children. A new method- based on the computing of the elliptic area of the Continuous Wavelet Transform complex plot of resting state EEG- is presented. First, the complex values of CWT, as a function of both time and frequency, are calculated for every EEG channel. Second, the CWT complex plot is …obtained by plotting the real parts of the resulted CWT values versus the related imaginary components. Third, the 95% confidence value of the elliptic area of the complex plot is computed for every channel for both autistic and healthy subjects; and the obtained values are considered as the first set of features. Fourth, three additional features are computed for every channel: the average CWT, the maximum EEG amplitude, and the maximum real part of CWT. The classification of those features is realized through artificial neural network (ANN). The obtained accuracy, sensitivity and specificity values are: 95.9%, 96.7%, and 95.1% respectively. Show more
Keywords: Autism, EEG, CWT, Elliptic area, classification
DOI: 10.3233/JIFS-189176
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8599-8607, 2020
Authors: Patel, Chintan | Joshi, Dhara | Doshi, Nishant | Veeramuthu, A. | Jhaveri, Rutvij
Article Type: Research Article
Abstract: With the agile development of the Internet era, starting from the message transmission to money transactions, everything is online now. Remote user authentication (RUA) is a mechanism in which a remote server verifies the user’s correctness over the shared or public channel. In this paper, we analyze an RUA scheme proposed by Chen for the multi-server environment and prove that their scheme is not secured. We also find numerous vulnerabilities such as password guessing attack, replay attack, Registration Center (RC) spoofing attack, session key verification attack, and perfect forward secrecy attack for Chen’s scheme. After performing the cryptanalysis of Chen’s …scheme, we propose a biometric-based RUA scheme for the same multi-server environment. We prove that the proposed authentication scheme achieves higher security than Chen’s scheme with the use of informal security analysis as well as formal security analysis. The formal security analysis of the proposed scheme is done using a widely adopted random oracle method. Show more
Keywords: Multi-server, smart card, biometrics, three factor authentication
DOI: 10.3233/JIFS-189177
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8609-8620, 2020
Article Type: Other
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8621-8621, 2020
Authors: Lin, Tang
Article Type: Research Article
Abstract: Although much less fatal than the Ebola and previous SARS virus epidemics, the current coronavirus outbreak (COVID-19) has spread to more people in more countries in a much shorter time frame. With the rapid development of the Internet of things, it has played an important role to track/monitor transmission movements throughout the population. The technology infrastructure between mobile devices, wearable devices and sensors, smart home device makes it possible to readily deploy solutions to monitor and collect data and perform analysis to ensure policy make intelligent, rapid decisions. This research combines AOL and Support Vector Machine to form the Internet …of things cycle through smart home. The parameters of Support Vector Machine model are optimized by ALO algorithm, which shortens the learning time and improves the performance of classifier. Then, the algorithm of ALO is used to optimize the Support Vector Machine intrusion detection method and agent technology, and the intrusion detection model is established. Experimental results show that the combination of these two can effectively reduce the false alarm rate of network intrusion. Show more
Keywords: Support vector machine, intrusion detection, internet of things security, smart home
DOI: 10.3233/JIFS-189258
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8623-8632, 2020
Authors: Hongwei, Zhu, | Xuesong, Wang,
Article Type: Research Article
Abstract: With the continuous progress of social science and technology, the development of the Internet of things is growing. With the development of Internet of things, security problems emerge in endlessly. During the period of COVID-19, the Internet of Things have been widely used to fight virus outbreak. However, the most serious security problem of the Internet of things is network intrusion. This paper proposes a balanced quadratic support vector machine information security analysis method for Internet of things. Compared with the traditional support vector machine Internet of things security analysis method, this method has a higher accuracy, and can shorten …the detection time, with efficient and powerful characteristics. The method proposed in this paper has certain reference value to the Internet of things network intrusion problem. It provides better security for the Internet of things during the protection period of covid-19. Show more
Keywords: SVM, Balanced binary decision, internet of things security, intrusion detection, COVID-19
DOI: 10.3233/JIFS-189259
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8633-8642, 2020
Authors: Weining, Sun | Cheli, Zhao
Article Type: Research Article
Abstract: During COVID-19 pandemic, researchers have used innovative technologies for fast tracking the development to end this pandemic. Virtual Reality (VR) has offered an imperative role for fighting this pandemic, through audiovisual-based virtual communication. Virtual reality modeling language (VRML), as an international standard of virtual reality, has developed rapidly. VRML expanded the function of script node by introducing Java and script programs written in java script language. This paper presents a VRML method. Libraries and platoons are virtualized to meet the normal use of users. In principle, any text editing system can be used for VRML programming, but some editing systems …have few related functions and are not suitable for large-scale VRML Scene Design. The VRML algorithm proposed in this paper can be applied to large buildings. The VRML algorithm proposed in this paper is compared with the traditional algorithm. The VRML algorithm proposed in this paper is superior to the traditional algorithm in the aspects of realism, interactivity, design rationality and execution speed. The practicability of the VRML algorithm is proved. It provides help for people who are inconvenient to go out during the protection period of covid-19. Show more
Keywords: Virtual reality modeling language virtual library, virtual volleyball hall, 3D, Internet, system
DOI: 10.3233/JIFS-189260
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8643-8653, 2020
Authors: Zhaoguo, Liu | Tingting, Liang | Wenzhan, Wang
Article Type: Research Article
Abstract: Under the influence of novel corona virus pneumonia epidemic, the protection of traditional villages is put forward higher request. The spread of the epidemic among villages will make the situation of epidemic prevention and control more difficult. As an important part of culture, traditional villages have high historical value. In this paper, the traditional village protection method, a new geographical data algorithm IData storage method. Compared with the traditional ArcGIS method, it improves the efficiency and accuracy of topographic map entry. IData’s data factory can use the symbolic technology of skeleton lines to represent all the figures in the national …standard mode, and any complex figure can only be represented by one element. Idate can quickly load data and render symbols in a drawing. With the powerful data processing engine of IData data factory, we can check out the errors that other software can’t find and process the data automatically. Records of the loss of traditional villages can be recorded quickly. The establishment and protection of traditional villages have had a beneficial impact. Show more
Keywords: Traditional village protection, big data, COVID-19, ArcGIS
DOI: 10.3233/JIFS-189261
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8655-8664, 2020
Authors: Tingting, Liang | Zhaoguo, Liu | Wenzhan, Wang
Article Type: Research Article
Abstract: The Covid-19 first occurs in Wuhan, China in December 2019. After that, the virus has spread all over the world and at the time of writing this paper the total number of confirmed cases are above 11 million with over 600,000 deaths. The pattern recognition of complex environment can be used to determine if a COVID-19 breath pattern can be established with accuracy. The traditional decorative pattern detection method has a high degree of recognition in simple scene. However, the efficiency of decorative pattern detection in complex scenes is low and the recognition accuracy is not high. Firstly, the evaluation …index of target detection method is designed. Through this paper, it is found that the success rate of some targets is naturally better than other targets, and easy to distinguish from the background. In order to improve the recognition success rate of the object in the complex environment and determine the position and attitude of the object, the pattern as the artificial identification in the environment is proposed. The interior art decoration pattern is selected as the experimental pattern and the pattern classification evaluation index is designed. The experimental results show that the method proposed in this paper can optimize the pattern subsets which are confused with each other and easy to distinguish from the background. It has a certain reference value for decorative pattern recognition in complex environment for COVID-19 epidemic. Show more
Keywords: Neural network, pattern classification, decorative pattern detection, complex environment, COVID-19
DOI: 10.3233/JIFS-189262
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8665-8673, 2020
Authors: Jihong, Yang | Lu, Yun
Article Type: Research Article
Abstract: Under the influence of novel corona virus pneumonia epidemic prevention and control, higher requirements for behavior recognition in complex environment are put forward. The accuracy of traditional methods for sports training is not high, so a method is needed to improve the local action recognition to assist sports training. In the process of behavior recognition, if only the track is regarded as an independent individual, the information of its neighbor will be ignored. Therefore, we use KNN algorithm to get the nearest neighbor trajectory. In order to calculate the rich neighborhood information around the track, this paper calculates the complex …relationship between the center track and the neighborhood track from four different angles, including absolute motion, relative motion, distance relationship and direction relationship. Then, from the four different perspectives of variance, discrete coefficient, skewness and kurtosis, this paper proposes a large interval nearest neighbor coding method. This method makes the four eigenvalues complement each other and improves the ability of describing complex and changeable behaviors. The experimental results show that the coding method proposed in this paper can be used for behavior recognition according to different transformation matrix. Show more
Keywords: Behavior recognition, track space-time feature, feature matching, fuzzy set
DOI: 10.3233/JIFS-189263
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8675-8684, 2020
Authors: Gang, Li | Fang, Wang | Sishi, Quan
Article Type: Research Article
Abstract: COVID-19’s significant impact on economic and social life has rightfully garnered the attention of citizens and policymakers alike. In response to the pandemic, governments have issued strict guidelines and restrictions to shut down some cities and many rural villages in China. With no cure or vaccine on the horizon, governments are working to mitigate the damage of the lockdowns on rural cultural village. Over the past two decades, rural village has been negatively impacted by terrorism, lack of funding and loss of population. COVID-19 has had similar effect, but in an incredibly short period of time. During the control period …of COVID-19, traditional data are widely used in village protection and renewal. Collect and sort out the original data of Huizhou culture to prepare for the subsequent calculation. After the data is ready, the data is processed as the basis of mining its potential application value. In this paper, the key words of Huizhou cultural resources are summarized. The data analysis platform is established. This paper analyzes people’s preference for Huizhou cultural resources. To better realize the more effective and far-reaching development and exploitation of Huizhou cultural resources. Show more
Keywords: Big data, Huizhou traditional village cultural resources, cultural heritage, mining applications, COVID-19
DOI: 10.3233/JIFS-189264
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8685-8693, 2020
Authors: Yingzhi, Xu | Lu, Yun
Article Type: Research Article
Abstract: Under the influence of novel coronavirus pneumonia, the traditional manual oil painting creation has put forward higher requirements. The disadvantages of traditional hand drawing are very obvious: tedious, inconvenient to modify and save, slow speed of painting, which can no longer meet the requirements of social development. In this paper, the fitness of oil painting function is discussed. Through the analysis of the experimental results, it is found that this method has important reference value for optimizing algorithm and improving traditional hand drawing during COVID-19.
Keywords: Genetic algorithm, aesthetic criteria, COVID-19, genetic operator, fitness function
DOI: 10.3233/JIFS-189265
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8695-8702, 2020
Authors: Yongjun, Tang
Article Type: Research Article
Abstract: During the period of COVID-19 protection, Internet of Things (IoT) has been widely used to fight the outbreak of pandemic. However, the security is a major issue of IoT. In this research, a new algorithm knn-bp is proposed by combining BP neural network and KNN. Knn-bp algorithm first predicts the collected sensor data. After the forecast is completed, the results are filtered. Compared with the data screened by traditional BP neural network, k-nearest-neighbor algorithm has good data stability in adjusting and supplementing outliers, and improves the accuracy of prediction model. This method has the advantages of high efficiency and small …mean square error. The application of this method has certain reference value. Knn-bp algorithm greatly improves the accuracy and efficiency of the Internet of things. Internet of things network security is guaranteed. It plays an indelible role in the protection of COVID-19. Show more
Keywords: Artificial neural network, security design, internet of things, KNN, COVID-19
DOI: 10.3233/JIFS-189266
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8703-8711, 2020
Authors: Yuan, Luo | Xiaofei, Zhao | Yiyu, Qiu
Article Type: Research Article
Abstract: At present, the evaluation of normal teaching order and teaching quality has been seriously interfered by the impact of COVID-19. In order to ensure the quality of art classroom teaching, this article uses BP neural network technology to build a model for art teaching quality evaluation during the epidemic. Based on the introduction of the BP neural network model and the problems of art teaching quality evaluation, the article focuses on the art teaching quality evaluation indicators and the BP neural network algorithm and process. In addition, the article also uses an empirical method to verify the effect of the …BP network model training method, and obtains the expected effect. Finally, it discusses the problem of information processing in art teaching evaluation. Show more
Keywords: Art teaching quality evaluation, BP neural network, COVID-19
DOI: 10.3233/JIFS-189267
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8713-8721, 2020
Authors: Qiuling, Zheng | Ke, Yang | Qiang, Xu | Chenglong, Zhang | Liguang, Wang
Article Type: Research Article
Abstract: Under the influence of novel corona virus pneumonia, the staff are controlled. Therefore, it is a difficult problem to measure the parameters of wood structure building on site. The measurement error of traditional wood structure parameters in complex environment is large, so an efficient and accurate measurement and recognition method is needed. In this paper, a method combining random decrement method and ITD method is proposed to measure the frequency, damping ratio and other structural dynamic parameters of ancient building timber structure under crowd random load excitation. In this paper, the frequency and damping ratio of the typical ancient building …timber structure are predicted by using the artificial neural network model trained by the known data. The experimental results show that the population density has a great influence on the measurement of the dynamic parameters of the wooden structure of ancient buildings. Using this method, combined with the long-term monitoring data of temperature and humidity, the influence of various environmental factors on the dynamic characteristics of the structure can be analyzed. This provides data support for structural damage identification and health monitoring. Show more
Keywords: Artificial neural network (ANN), ITD method, population distribution density, dynamic characteristics, COVID-19
DOI: 10.3233/JIFS-189268
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8723-8729, 2020
Authors: Xi, Zhang
Article Type: Research Article
Abstract: The transmission routes of novel coronavirus pneumonia include direct transmission, aerosol transmission and contact transmission. Therefore, the novel coronavirus pneumonia has been spread very quickly. This has a certain impact on the development of graphic design. Graphic design plays an important role in product design. However, the traditional aided design method is too complex, and it is difficult for designers to design works that meet their own needs. In the design of 3D virtual vision graphics, the distance calculation of time series is not accurate. This kind of error will bring some errors to the design of complex curved surface …products. In order to measure the similarity of time series effectively, the calculation principle of Euclidean distance and dynamic bending distance is analyzed. Combined with the advantages of these two methods, a new distance calculation method based on morphological fitting is proposed. In this paper, through the research of ordered point sequence, the 3D virtual design method is used to improve the design effect, which has reference value for the design of works that meet the requirements of designers during the popularity of COVID-19. Show more
Keywords: 3D virtual graphic design, time series, distance calculation, shape fitting, COVID-19
DOI: 10.3233/JIFS-189269
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8731-8738, 2020
Authors: Guanggen, Li | Matthews, Andrew
Article Type: Research Article
Abstract: The popularity of covid-19 has led to the introduction of the policy of controlling the flow of personnel, which has a certain impact on the color recognition of the design objects of hand decorative elements. In the past, the research on convolution neural network design and color recognition is still in the traditional method, and the field of computer vision is not really combined with the traditional decorative fabric. This paper proposes a solution based on deep learning. Color learning and main color recognition can be processed as a whole. By introducing convolution neural network, the scheme can learn color …features directly from the image itself, and the process of artificial design features is omitted. While simplifying the process of model building and training, the potential information association can be obtained, so as to obtain better recognition effect. In addition, due to the deep depth of the network, this paper uses the initial optimization module to avoid the performance degradation and over fitting in the training process. This method has an important reference value for the color design of modern hand decoration, and can promote the development of hand decoration during the popularity of covid-19. Show more
Keywords: CNN architecture, inception module, AVG pool, softmax, COVID-19
DOI: 10.3233/JIFS-189270
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8739-8746, 2020
Authors: Guochen, Wan | Feihong, Shan
Article Type: Research Article
Abstract: During covid-19, basketball training was stopped. Instead, the basketball video analysis is used. In this paper, literature, theoretical analysis, numerical simulation, experimental research and other research methods are used. The ant colony algorithm model of deep learning optimization for basketball technical and tactical decision-making is established to solve the optimization problem of actual technical and tactical decision-making. In this paper, video image correlation algorithm is used. In the video of players’ free throw basket, there are many independent frames. The real frame set of free throw basket includes the whole process of jumping, arm lifting, squatting and stretching. The shooting …frame set and shooting information of the ball are obtained. In this paper, a shot frame detection algorithm is proposed by analyzing multiple samples of multi shot video. The mathematical model of the shooting frame is established, which can locate the shooting frame quickly and accurately and determine the penalty frame set. Further obtain the basketball release status information for preparation. The reliability and robustness of the algorithm are verified by experiments on several samples. It provides a new method for basketball training during covid-19. Show more
Keywords: Deep learning theory, video analysis, basketball training assistant, ant colony algorithm model
DOI: 10.3233/JIFS-189271
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8747-8755, 2020
Authors: Xiaozhou, Yang | Fan, Bai | Jones, Paul
Article Type: Research Article
Abstract: Based on the impact of epidemic prevention and control, the floating population supervision department classifies and controls the floating population by industry. There are many personnel management and control points. When the computer-aided management system is used, the outdoor environment is complex and the data interference is large. Therefore, the recognition accuracy of outdoor scenery is required to be higher. In this paper, a convolutional neural network with adaptive weights is proposed. In this method, the feature fusion strategy is combined with the network, and the optimal feature weight is obtained by training the network. In addition, this paper uses …multiple two classifiers instead of multiple classifiers to achieve accurate target classification. Experiments show that the method proposed in this paper has excellent performance in the detection of similar objects. The strategy of replacing multi classification network with multi classification network improves the accuracy and recall of target detection in known environment. Show more
Keywords: Adaptive weight, convolution neural network, fusion strategy, outdoor environment recognition
DOI: 10.3233/JIFS-189272
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8757-8766, 2020
Authors: Kai, Cui
Article Type: Research Article
Abstract: Under the influence of COVID-19, an efficient Ad-hoc network routing algorithm is required in the process of epidemic prevention and control. Artificial neural network has become an effective method to solve large-scale optimization problems. It has been proved that the appropriate neural network can get the exact solution of the problem in real time. Based on the continuous Hopfield neural network (CHNN), this paper focuses on the study of the best algorithm path for QoS routing in Ad-hoc networks. In this paper, a new Hopfield neural network model is proposed to solve the minimum cost problem in Ad-hoc networks with …time delay. In the improved version of the path algorithm, the relationship between the parameters of the energy function is provided, and it is proved that the feasible solution of the network belongs to the category of progressive stability by properly selecting the parameters. The calculation example shows that the solution is not affected by the initial value, and the global optimal solution can always be obtained. The algorithm is very effective in the prevention and control in COVID-19 epidemic. Show more
Keywords: Ad-hoc Network, Routing Algorithm, Neural Network, COVID-19
DOI: 10.3233/JIFS-189273
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8767-8774, 2020
Authors: Bo, Yang | Chunli, Wang
Article Type: Research Article
Abstract: Under the influence of the COVID-19, the analysis of physical health data is helpful to grasp the physical condition in time and promote the level of prevention and control of the epidemic. Especially for novel corona virus asymptomatic infections, the initial analysis of physical health data can help to detect the possibility of virus infection to some extent. The digital information system of traditional hospitals and other medical institutions is not perfect. For a large number of health data generated by smart medical technology, there is a lack of an effective storage, management, query and analysis platform. Especially, it lacks …the ability of mining valuable information from big data. Aiming at the above problems, the idea of combining Struts 2 and Hadoop in the system architecture of the platform is proposed in this paper. Data mining association algorithm is adopted and improved based on MapReduce. A service platform for college students’ physical health is designed to solve the storage, processing and mining of health big data. The experiment result shows that the system can effectively complete the processing and analysis of the big data of College students’ physical health, which has a certain reference value for college students’ physical health monitoring during the COVID-19 epidemic. Show more
Keywords: Physical health data, parallel processing, health monitoring, multi calculation big data, COVID-19
DOI: 10.3233/JIFS-189274
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8775-8782, 2020
Authors: Yong, Chang | Lu, Yun
Article Type: Research Article
Abstract: Under the influence of COVID-19, the efficiency of e-commerce distribution in public health emergencies has become the key to ensuring people’s normal lives. With the development of e-commerce, the location of distribution center is becoming more and more important, which is related to the healthy and long-term development of e-commerce. However, the traditional location efficiency is low, which cannot play an immediate role in the development of e-commerce. This paper combines weiszfeld algorithm, improves particle swarm optimization algorithm, improves the operation efficiency and location accuracy, and finally gets a relatively satisfactory result. Results data analysis shows that the improvement and …integration of the algorithm is reasonable and effective. This method has important reference value for e-commerce location. Show more
Keywords: E-commerce, center location, particle swarm optimization, Weiszfeld algorithm, COVID-19
DOI: 10.3233/JIFS-189275
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8783-8793, 2020
Authors: Huang, Gongxiang | Qu, Huimin
Article Type: Research Article
Abstract: The influence of COVID-19 causes a certain impact on data visualization and data fusion on the visual performance of illustration. Based on the development of illustration, this paper discusses the relationship between illustration, text information and media. This paper studies the feasibility of the combination of illustration and information visualization. In this paper, the interactive image segmentation and gridding methods are proposed. Then, the background theory and significance of flow field design are described, and the flow field generation method based on heat source diffusion is proposed. In this paper, the shadow of the topology of the convective field through …the interaction input of the flow field design is analyzed, and then compared with the related work. In the visualization of flow field, based on the weighted distance field formed by the diffusion of heat source, a visualization method of stratified flow field line is proposed. Finally, the visualization method of stratified flow field is explained and its effect is demonstrated. Experimental data show that the information visualization method proposed in this paper can improve the efficiency and accuracy of illustration information extraction. Show more
Keywords: Illustration, media, information visualization, weighted distance field, COVID-19
DOI: 10.3233/JIFS-189276
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8795-8803, 2020
Authors: He, Zhihui | Li, Xiaofeng
Article Type: Research Article
Abstract: During the COVID-19 epidemic period, it is essential to strengthen physical exercise and improve the health of the whole people. In this paper, based on genetic algorithm, a fuzzy control system is proposed to dynamically adjust the exercise ability of the bodybuilders under the comprehensive consideration of parameters. Through experiments and data processing, the system obtains bioelectric information related to heart rate, heart rate variability and muscle fatigue of the fitness people in the three states of not fatigue, moderate fatigue and extreme fatigue, establishes fuzzy membership function, and thus establishes personalized fitness information feedback control strategy to maintain moderate …fitness intensity. By narrowing the gap between the predicted RPE value based on objective information and the measured RPE, the method provides a unified subjective and objective exercise intensity for the bodybuilders, effectively expands the time of aerobic exercise, and enhances the effect of aerobic exercise. In addition, in order to expand the scope of application of the exercise intensity control model, the service-oriented transformation is carried out to enable it to provide fitness content combinations of interest to fitness practitioners and instructors. Show more
Keywords: Fitness service technology, genetic algorithm, COVID-19
DOI: 10.3233/JIFS-189277
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8805-8812, 2020
Authors: Guo, Chen
Article Type: Research Article
Abstract: In rural construction, affected by covid-19, it leads to the collection and demand survey of basic information data of relevant interest groups. The specific situation of the transformation of ancient villages is also gradually increasing. However, due to the complexity of rural space, the dispersion of settlement space and the diversity of information demand of rural planning work, the data coverage is large, information acquisition is difficult, the use effect of data collection is not ideal, and there is no planning feedback mechanism. However, during the epidemic period, the staff could not carry out a series of reconstruction of ancient …villages. At present, the data of village planning and construction and architectural design are complex, the needs of relevant interest groups are diversified, and regional planning is difficult. In this paper, the big data function is applied to the reconstruction of ancient villages in the epidemic period of covid-19. Show more
Keywords: Reconstruction of ancient villages, big data, regional co-ordination, rural architecture design, COVID-19
DOI: 10.3233/JIFS-189278
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8813-8821, 2020
Authors: Li, Jiafeng | Hu, Hui | Li, Xiang | Jin, Qian | Huang, Tianhao
Article Type: Research Article
Abstract: Under the influence of COVID-19, the economic benefits of shale gas development are greatly affected. With the large-scale development and utilization of shale gas in China, it is increasingly important to assess the economic impact of shale gas development. Therefore, this paper proposes a method for predicting the production of shale gas reservoirs, and uses back propagation (BP) neural network to nonlinearly fit reservoir reconstruction data to obtain shale gas well production forecasting models. Experiments show that compared with the traditional BP neural network, the proposed method can effectively improve the accuracy and stability of the prediction. There is a …nonlinear correlation between reservoir reconstruction data and gas well production, which does not apply to traditional linear prediction methods Show more
Keywords: Back propagation neural network, shale gas exploitation, economic benefit, COVID-19
DOI: 10.3233/JIFS-189279
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8823-8830, 2020
Authors: Wang, Bin | Zhou, Qingyuan
Article Type: Research Article
Abstract: The global economy appears the trend of anti-globalization under the influence of COVID-19. Based on the input-output table of lead database from 2006 to 2020, this paper divides the factors that affect the development of financial industry in China, the United States and Russia into six aspects: price, intermediate input, household consumption, government consumption, export and import. ADGA-BP neural network model is proposed in this paper, which is based on six aspects of price, intermediate input, consumer, government consumption, export and import. The intermediate input is decomposed from the perspective of industrial structure to study the interrelationship between financial industry …and other industries in the three countries. The results show that the intermediate input is the main factor in the development of financial industry in the three countries, but the source industries of the intermediate input are not the same; the two factors of household consumption and price are closely related to the development of financial industry in the three countries, and they all play a role in promoting China, while the relationship between household consumption and the United States and between price and Russia is reverse; Government consumption only has a significant impact on Russia; from the perspective of mutual influence, the mutual investment between the financial industry of China and the United States is relatively large, while the relationship between the Russian financial industry and the two countries is relatively weak. It shows that under the background of covid-19, the development of financial industry is affected. Show more
Keywords: Adaptive genetic algorithm, BP neural network, COVID-19, financial industry
DOI: 10.3233/JIFS-189280
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8831-8838, 2020
Authors: Li, Yongkang
Article Type: Research Article
Abstract: In post COVID-19 era, labor education plays an indispensable part in China’s digital economy, while the digital economy will redefine the labor education at the same time. From the Marxist theory, latest data and survey results, we portray the logic relationships, mutual impacts between digital economy and labor education. Our research indicates that free development of all human beings is the common value shared by the digital economy and labor education. Labor education can cultivate the abilities of competition and cooperation, form the proper digital economy values meanwhile, which is essential to hedge the negative impacts of digital economy on …labor and employment. Labor education comprehensively promotes the digital labor abilities of all laborers in the path with Chinese characteristics. The boom in digital economy and the refocusing on labor education will enable China to cope with the rising risks and challenges in a more diversified and flexible way among this highly uncertain world. Show more
Keywords: Digital economy, labor education, COVID-19, neural network
DOI: 10.3233/JIFS-189281
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8839-8845, 2020
Authors: Fengwei, Ai, | Nan, Wang,
Article Type: Research Article
Abstract: At present, the normal teaching is seriously disturbed by the epidemic situation. In order to ensure the smooth progress of teaching, online teaching is a necessary way. Based on the current situation, this paper discusses the integration of urban and rural planning and human geography teaching in university courses. Based on the full analysis of the advantages of the original curriculum, this paper adjusts the curriculum of urban and rural planning and human geography. The new system focuses on the characteristics of “broad foundation and clear main line”, and follows the three main lines of “art, design and geography” to …optimize the design. A questionnaire survey was conducted among 200 online students in our school and the data were processed by multidimensional BP neural network analysis. The experimental results show that the method proposed in this paper can improve the efficiency of online teaching. Show more
Keywords: Epidemic situation, urban and rural planning and human geography, teaching integration, Information method of online education
DOI: 10.3233/JIFS-189282
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8847-8855, 2020
Authors: Dafei, Wu, | Qinghong, Pan,
Article Type: Research Article
Abstract: In order to strengthen the management and control of personnel flow and the timeliness of information dissemination during the COVID-19 epidemic, it is necessary to improve the reliability of authority and content management. The extensive application of authority information management can closely connect the professional system with the production activities of enterprises. At present, the traditional authority management level is complex, and the management of complex data is chaotic. This paper is based on ASP.NET. This paper proposes a data authority management method. The main function of this method is to establish a standard three-tier structure of rights management level …by using the open-source string template engine technology, tag analysis, SEO search engine optimization technology and information collection technology. This method provides a general process oriented and automatic management platform for users through the hierarchical management mechanism. This technology can meet people’s rights and content requirements for creating, publishing and updating websites without understanding the technology itself. The experimental results show that the rapid management mechanism based on authority management can accurately handle and manage authority and data which can improve the accuracy and timeliness of personnel flow control under the impact of the COVID-19 epidemic. Show more
Keywords: ASP.NET, permission management system, COVID-19 epidemic, string template, hierarchical management mechanism
DOI: 10.3233/JIFS-189283
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8857-8866, 2020
Authors: Wang, Yile | Zeng, Dashuai
Article Type: Research Article
Abstract: Based on big data, this paper studies the influence of new type of filling pneumonia on the development of sports industry. When selecting the typical economic indicators that reflect the development trend of sports industry, it is found that the data is huge according to the big industrial data, but the information that can be reflected is poor and complex. Therefore, it is necessary to process these big economic data in order to obtain the impact of new coronary pneumonia on the development of sports industry. This paper studies the feature selection algorithm of big data samples, so as to …select typical economic indicators from many economic indicators of sports industry to reflect the development trend of sports industry. A deep learning algorithm based on feature selection of big data is proposed. Firstly, a feature selection framework for big data is constructed, and then data fusion and deep learning are carried out. Experiments show that the algorithm can solve the contradiction between large data and poor information. This method has a certain forward-looking, and has a certain reference value for the information discrimination of the development trend of sports industry. Show more
Keywords: Sports industry, big data, industrial development, deep learning algorithm
DOI: 10.3233/JIFS-189284
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8867-8875, 2020
Authors: Jing, Jing
Article Type: Research Article
Abstract: The novel corona virus pneumonia has brought pressure on economic development. Large and medium-sized companies will also play a key role in the recovery of growth after the outbreak. Therefore, it is particularly important to pay attention to the impact of the epidemic on large and medium-sized companies and on the investment and financing of companies. Firstly, the structure of the network model of data analysis is designed in this paper, including the design of the network level, the selection of the number of neurons in each level, the determination of the initial weight and other related parameters. According to …the design of network structure, the evaluation model of investment and financing of listed companies is established. Python is used to preprocess the data and train the sample data. By comparing the data processed by two training methods, the optimal network classification model is selected. The experimental results show that the proposed method can improve the effectiveness of investment and financing decisions of listed companies. Show more
Keywords: COVID-19 epidemic situation, big data, investment decision, Relu function
DOI: 10.3233/JIFS-189285
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8877-8886, 2020
Authors: Yang, Shuang
Article Type: Research Article
Abstract: Under the influence of the COVID-19 epidemic situation, many countries have taken many measures to control the flow of people. The inability of people to gather makes art color measurement a problem. Color matching and coordination and color space conversion have always been the research focus of art color measurement. This paper studies a method of fuzzy intelligent reasoning in art color measurement. Based on case-based reasoning and rule-based reasoning, this method is an important self-learning and self-maintenance method in the field of artificial intelligence and expert system. On the basis of expounding the basic characteristics of color and color …space, this paper designs the process principle of case-based reasoning and the process of rule-based reasoning. In this paper, case and rule knowledge representation method, case retrieval technology and rule conflict resolution strategy are established. Based on the above strategy, the color case base is established. In addition, the rule table is established by combining color-brewer with rule reasoning and referring to color-brewer. The rule table has a certain reference value for the application of intelligent reasoning method in the field of art color measurement under the influence of COVID-19 epidemic. Show more
Keywords: Color-brewer, COVID-19 epidemic, rule-based reasoning, self-learning, color measurement
DOI: 10.3233/JIFS-189286
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8887-8895, 2020
Authors: Zhao, Gaoli | Song, Junping
Article Type: Research Article
Abstract: To build a network security system combining active defense and passive defense during covid-19, we need to break the original Castle type passive defense concept and build a reliable, controllable, flexible and active network environment to find defense points. The key is that the system should be able to actively predict and control our defenses. Any scheme cannot achieve absolute safety, only to minimize the probability of safety accidents, through various measures to assess and predict the possible points of safety accidents, and actively prevent the occurrence of accidents. In the management and construction of network security, we should realize …that network security management is a comprehensive system engineering. We should start from the three aspects of strategy, management and technology, and build a more effective and reliable network security system on the basis of traditional passive defense and active defense technology, which can better maintain big data security during covid-19. Show more
Keywords: Network security model, active defense technology, active passive defense, network security system
DOI: 10.3233/JIFS-189287
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8897-8905, 2020
Authors: Wang, Zhenpeng
Article Type: Research Article
Abstract: In the era of big data transformation, with the emergence of COVID-19, tourism has been given more social responsibilities. Tourism construction in the Yellow River Basin is an indispensable part of tourism construction in China. This paper analyzes the existing eco-tourism resources in Kaifeng City and Shandong Province, as well as the necessity and construction conditions of developing tourism. In this paper, principal component analysis is used to analyze the resource conditions, regional conditions and environmental conditions of the Yellow River tourism resources. The comprehensive evaluation model and index system of tourism resources are constructed. Big data transformation has been …realized. The purpose of this paper is to clarify the current situation and potential of tourism in the Yellow River Basin, and to provide reference for the development of tourism in the Yellow River Basin during COVID-19. Show more
Keywords: PCA, tourist resources, yellow river basin, comprehensive evaluation
DOI: 10.3233/JIFS-189288
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8907-8915, 2020
Authors: Zheng, Bing | Zhang, Xiaoying | Yun, Dawei
Article Type: Research Article
Abstract: By comparing several cloud computing of big data network center during COVID-19, this paper proposes a new topology model, which realizes two functions of cloud computing big data center caching and big data real-time distribution. In addition, cloud computing network requires higher performance than traditional application big data center, which makes the consideration of network platform construction performance different from the traditional understanding. During COVID-19, we deeply understood the underlying attributes of cloud, combined with the topology model, we can realize the decoupling of cloud computing big data system, change the situation of direct connection between upstream and downstream, and …have more reliable and efficient transmission of message and command big data. Show more
Keywords: Measurement and control system, cloud computing, central cache, real time big data distribution
DOI: 10.3233/JIFS-189289
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8917-8925, 2020
Authors: Zheng, Bing | Yun, Dawei | Liang, Yan
Article Type: Research Article
Abstract: Under the impact of COVID-19, research on behavior recognition are highly needed. In this paper, we combine the algorithm of self-adaptive coder and recurrent neural network to realize the research of behavior pattern recognition. At present, most of the research of human behavior recognition is focused on the video data, which is based on the video number. At the same time, due to the complexity of video image data, it is easy to violate personal privacy. With the rapid development of Internet of things technology, it has attracted the attention of a large number of experts and scholars. Researchers have …tried to use many machine learning methods, such as random forest, support vector machine and other shallow learning methods, which perform well in the laboratory environment, but there is still a long way to go from practical application. In this paper, a recursive neural network algorithm based on long and short term memory (LSTM) is proposed to realize the recognition of behavior patterns, so as to improve the accuracy of human activity behavior recognition. Show more
Keywords: Recurrent neural network, behavior recognition, time series analysis, automatic coder
DOI: 10.3233/JIFS-189290
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8927-8935, 2020
Authors: Yan, Hao
Article Type: Research Article
Abstract: Under the influence of epidemic situation, the treatment of pollutants is stricter. After the epidemic, how to treat the river pollutants by microorganisms has become a difficult problem. In this paper, the microbial treatment technology of water pollution was studied, and the water quality model was used to simulate the process of microbial degradation of river pollutants. The dynamic equation is used to describe the relationship among microbial proliferation, removal of organic pollutants, change of dissolved oxygen concentration, different forms of nitrogen and different forms of phosphorus, so as to realize the mathematical expression of water quality change in the …process of microbial treatment of river pollutants. Finally, the numerical simulation model of microbial treatment of river pollution is obtained through experimental analysis, which provides an accurate reference model for the prevention and control of river pollution after the outbreak. Show more
Keywords: Water pollution, microbial treatment, water quality model, microbial degradation, river pollution
DOI: 10.3233/JIFS-189291
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8937-8942, 2020
Authors: Niu, Meng
Article Type: Research Article
Abstract: The COVID-19 epidemic has brought a huge impact to the clothing industry. Because of the inconveniences caused by countermeasures, clothing consumers can’t go to physical stores to try on, so it is urgent to develop a virtual clothing trial system. In addition, online fitting and online shopping gradually become the trend of clothing consumption. Based on virtual reality technology, this paper proposes a virtual clothing fitting system, and studies the color saturation in the process. In this paper, a method of parametric drawing of garment characteristic curve is proposed, and the shape of garment is designed by using control vertices. …Based on this, this paper presents four forms of sutured parabola space and their control point solving algorithm. According to the principle of scale method, a three-dimensional coordinate transformation model of feature points is established. The model can calculate the coordinates of each characteristic value point of clothing according to the body shape information provided by customers and the empirical formula of different clothing styles, and then reverse calculate the curve control point. Furthermore, Bezier surface generation method is used to fit the control points. After the surface patches are spliced, the 3D rigid clothing model can be obtained. Experiments show that the method of personalized clothing modeling in this paper is efficient and accurate, which can be further extended to the observation system with larger degree of freedom. Show more
Keywords: Virtual fitting, color saturation, stitching parabola, Bezier surface generation, garment modeling.
DOI: 10.3233/JIFS-189292
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8943-8951, 2020
Authors: Wang, Jin
Article Type: Research Article
Abstract: Facing COVID-19 epidemic, many countries have recently strengthened epidemic prevention and control measures. The reliability of safety management is of great significance to personnel management and control during the COVID-19 epidemic period. The focus of security management of early warning is to monitor and identify the moving target. The current optical flow method is vulnerable to the influence of light changes and background movement, and it is not very accurate for moving target detection in dynamic complex background. In this paper, aiming at the traditional Lucas Kanade optical flow method, the inter frame difference method, mean shift clustering algorithm and …morphological processing are combined to optimize and improve on the original basis, so that the moving target detection effect in both simple and complex environments is significantly improved. At the same time, the improved algorithm also reduces the execution time to a certain extent, and has a certain resistance to noise interference such as light changes. This has a certain ability test value for personnel control during the epidemic. Show more
Keywords: Lucas Kanade optical flow method, COVID-19, mean shift algorithm, security management, moving target
DOI: 10.3233/JIFS-189293
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8953-8960, 2020
Authors: Ding, Shijie | Zhang, Zhiwei | Xie, Jun
Article Type: Research Article
Abstract: With the spread of the COVID-19 epidemic, the government has put forward higher requirements for network security and reliability through the flow of network managers and the release of information. Traditional intrusion detection technology and firewall technology cannot effectively defend against DDoS attacks. This paper analyzes the principles and defects of intrusion detection system and firewall. In this paper, the architecture design of intrusion prevention system which integrates audit and network defense functions is proposed. The system optimizes the detection and analysis component of detecting attack behavior according to the special requirements of attack defense task, and adds the module …of attack behavior characteristic analysis and defense strategy generation. The policy execution component uses a special defense engine to execute defense policies, providing the system with deep defense capabilities. Experiments show that the validity and reliability of the key modules in the proposed defense model meet the technical requirements. It has a certain reference value to improve the reliability of network management system under the influence of COVID-19 epidemic situation. Show more
Keywords: Intrusion detection, firewall, COVID-19, DDoS attack, defense strategy generation
DOI: 10.3233/JIFS-189294
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8961-8969, 2020
Authors: Wan, Xiaoming
Article Type: Research Article
Abstract: Because of the global spread of COVID-19 in 2020, the analysis of activities and travel behavior of urban residents is the key for the prevention and control of epidemic situation. Based on this, the research on track data mining and semantic location perception is conducted. The analysis of travel behavior characteristics of urban residents is helpful to carry out epidemic prevention activities scientifically. However, the traditional manual survey and statistical analysis cannot meet the needs of the rapid development of urbanization. On the other hand, with the application and development of information technology such as communication, location and storage, a …large number of mobile trajectory data of urban residents can be collected and stored. These trajectory data contain rich spatiotemporal semantic information. Through mining and analysis, a lot of valuable travel information can be get and then the daily behavior of individual users and the spatial distribution characteristics of group users’ movement can be found. The results can effectively serve the current epidemic prevention work and can be applied to the infection tracking in the process of epidemic prevention. Show more
Keywords: Track data mining, semantic location awareness, COVID-19, prevention and control system
DOI: 10.3233/JIFS-189295
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8971-8980, 2020
Authors: Liu, Xiaohua
Article Type: Research Article
Abstract: In the face of the current epidemic situation, news reports are facing the problem of higher accuracy. The speed and accuracy of public emergency news depends on the accuracy of web page links and tags clustering. An improved web page clustering method based on the combination of topic clustering and structure clustering is proposed in this paper. The algorithm takes the result of web page structure clustering as the weight factor. Combined with the web content clustering by K-means algorithm, the basic content that meets the conditions is selected. Through the improved translator of clustering algorithm, it is translated into …Chinese and compared with the target content to analyze the similarity. It realized the translation aim of new crown virus epidemic related news report of Japanese Linguistics based on page link mining. Show more
Keywords: Web community, link structure, page link mining, minimum description length
DOI: 10.3233/JIFS-189296
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8981-8988, 2020
Authors: Yan, Hongru | Chai, Huaqi | Dai, Yang
Article Type: Research Article
Abstract: According to the previous management of early warning and risk control methods, the efficiency of management prediction is low, the effect is not good, and the disadvantages are very obvious. This paper mainly studies the C4.5 algorithm, Apriori algorithm and K-means algorithm. On the basis of association rules, the data from the above three algorithms are fused. On the fusion results of the processed data, it builds and optimizes the early warning model. The fusion data used in this model can be regarded as the basic data and the association rules are used for data mining. The experimental results show …that data fusion can solve the problems of management early warning and risk control. This method is applied to enterprises Management has reference value. Show more
Keywords: C4.5 algorithm, association rules, early warning model, association analysis, K-means algorithm
DOI: 10.3233/JIFS-189297
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8989-8996, 2020
Authors: Li, Linghan | Feng, Yan | Li, Lei
Article Type: Research Article
Abstract: As the COVID-19 epidemic continues to spread, the government has managed to prevent people from gathering. The audit work can only be carried out through the network, which puts forward higher requirements for the accuracy and effectiveness of the audit work. Under the background of the continuous development of big data and other information technologies, big data audit has gained important technical support and played an increasingly important role. Units at all levels gradually attach importance to the enterprise management mode based on the financial sharing service mode. This paper analyzes the related problems of big data audit under the …financial sharing service mode, involving big data flow, big data preprocessing, big data audit process and other issues, in order to provide useful reference for the implementation of big data audit by using the financial sharing service mode under the influence of COVID-19. Show more
Keywords: Big data, COVID-19, audit, financial sharing service model
DOI: 10.3233/JIFS-189298
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8997-9005, 2020
Authors: Li, Jiwei
Article Type: Research Article
Abstract: Under the influence of novel corona virus pneumonia epidemic prevention and control, it has put forward higher requirements for data storage and processing for personnel management system. The distributed asynchronous data aided computer information interaction system can solve the problem of multi node concurrent data processing. The traditional computer information interaction system has poor real-time performance, low precision and asynchronous data processing ability. The invocation features of message queuing asynchronous caching mode are combined with the standardization of Web services and cross language with cross platform access features in this paper. Through the combination of the two technologies, a flexible …and universal asynchronous interaction architecture of distributed system is established. Based on Web service technology and system to system access, the call and response of tasks between modules are carried out in the system, which makes the interaction between the whole system have the characteristics of message driven. The test result shows that the system proposed in this paper has good real-time performance and strong data processing ability. It is suitable for the data interaction of distributed personal management system under the influence of novel corona virus pneumonia epidemic prevention and control. Show more
Keywords: Web service, distributed asynchronous data, epidemic prevention and control, personal management system
DOI: 10.3233/JIFS-189299
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 9007-9014, 2020
Authors: Wang, Lilin
Article Type: Research Article
Abstract: The light steel structure is always the common material of the movable plank house, and the new bud light steel system is the light steel system used for a long time after the earthquake. This paper discusses the mechanical system of the light steel structure of Huoshenshan hospital, which was built in ten days. In the process of building, the geometric form of roof stress has changed. In the actual structural design, the designer seldom takes the calculation of construction load into account, which is quite different from the actual construction process. So it is very important to simulate and …monitor the whole process of structure installation. In this paper, the finite element software MIDAS / Gen is used for simulation analysis to ensure that the simulation analysis results are consistent with the construction process, the model material and the actual size are completely consistent, and the stress simulated by the software can meet the needs of the actual stress through the actual measurement. Show more
Keywords: New bud light steel system, light steel frame, geometric evolution, prefabricated house
DOI: 10.3233/JIFS-189300
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 9015-9026, 2020
Authors: Chen, Xi
Article Type: Research Article
Abstract: During the COVID-19 pandemic, the maintenance of the wind turbine is unable to be processed due to the problem of personnel. This paper presents two neural network models: BP neural network and LSTM neural network combined with Particle Swarm Optimization (PSO) algorithm to realize obstacle maintenance detection for wind turbine. Aiming at the problem of gradient vanishing existing in the traditional regression neural network, a fault diagnosis model of wind turbine rolling bearing is proposed by using long-term and short-term memory neural network. Through the analysis of an example, it is verified that the diagnosis results of this method are …consistent with the actual fault diagnosis results of wind turbine rolling bearing and the diagnosis accuracy is high. The results show that the proposed method can effectively diagnose the rolling bearing of wind turbine, and the long-term and short-term memory neural network still has good fault diagnosis performance when the difference of fault characteristics is not obvious, which shows the feasibility and effectiveness of the method. Show more
Keywords: Wind turbine, fault diagnosis, particle swarm optimization algorithm, BP neural network
DOI: 10.3233/JIFS-189301
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 9027-9035, 2020
Authors: Shi, Junyan | Jiang, Han
Article Type: Research Article
Abstract: Under the influence of COVID-19, detection and identification of moving targets are very important for personnel management. A lot of research work has improved the accuracy and robustness of the moving target tracking method, but the recognition accuracy of the traditional target tracking method in complex scenes (lighting changes, background interference, posture changes and other factors) is not satisfactory. In this paper, in view of the limitations of single feature representation of target objects, the method of fusion of HSV color features and edge direction features is used to identify and detect moving targets. In each frame of the tracking …process, the weight of each feature is adjusted adaptively according to the proposed fusion strategy, and the position of the target is located by using the method of double template matching. Experiments show that the proposed tracking algorithm based on multi feature fusion can meet the requirements of moving target recognition in complex scenes. The method proposed in this paper has a certain reference value for personnel management under the influence of COVID-19. Show more
Keywords: Moving targets, detection and identification, HSV color feature, edge direction
DOI: 10.3233/JIFS-189302
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 9037-9044, 2020
Authors: Hu, Yun | Li, Ning | Luo, Chenyang
Article Type: Research Article
Abstract: During the COVID-19 epidemic, college students could not return to the school, which had a great impact on the talent training of colleges and universities. Based on the statistical learning theory, this paper puts forward an evaluation model for the cultivation of innovative talents in universities after the epidemic. In this paper, the evaluation index system of the quality of innovative and entrepreneurial personnel training in Universities, which is composed of four first-class indexes: environment, teaching links, teachers and students, is constructed. At the same time, this paper uses the fuzzy comprehensive evaluation method for empirical research. Firstly, the factor …set of the evaluation object and the grade domain of the comprehensive evaluation are determined. Then, AHP is used to determine the weight of evaluation indexes and expert scoring method is used to determine the single factor fuzzy comprehensive evaluation matrix of each level. According to the evaluation matrix, the fuzzy relation between evaluation object and evaluation set is calculated. Finally, according to the principle of maximum membership degree, the evaluation grade corresponding to the maximum value in the fuzzy relation set is calculated as the evaluation result of the final evaluation object. The empirical results show that this method can improve the accuracy of the evaluation model of innovation and entrepreneurship talent training, and has a certain reference value for the talent training in Universities. Show more
Keywords: Fuzzy set, statistical learning theory, single factor fuzzy comprehensive evaluation matrix, talent training
DOI: 10.3233/JIFS-189303
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 9045-9051, 2020
Authors: Wang, Wensheng | Yu, Han | Gao, Qing | Hu, Muhan
Article Type: Research Article
Abstract: This paper uses statistical learning theory and big data analysis to study the energy consumption structure of China from qualitative and quantitative aspects during COVID-19. According to the domestic and foreign scholars’ research on the optimization of energy consumption structure, the carbon emission factor is considered in the optimization of energy consumption structure. Taking the minimum energy consumption cost and carbon dioxide emission as the objective function, the carbon dioxide emission is taken as the objective function, and the total energy consumption and various energy consumption proportions as the constraint conditions, the multi-objective planning method is used to evaluate the …energy consumption structure of China. The optimization model of source consumption structure is analyzed, and the medium and long-term energy transformation path and optimization model under low-carbon constraints are studied. Combined with the experimental algorithms related to big data, it is concluded that China’s economic development mainly depends on a large amount of energy consumption during the COVID-19 period. On this basis, some suggestions are put forward to realize the sustainable development of China’s economy and energy. Show more
Keywords: Statistical learning theory, low carbon constraint, transformation path, optimization model
DOI: 10.3233/JIFS-189304
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 9053-9061, 2020
Authors: Liu, Haichao | Jin, Xiangjie | Zhang, Fagui
Article Type: Research Article
Abstract: With the continuous spread of COVID-19 epidemic, the strict control of personnel makes it a problem to optimize the design of vehicle parameters after field measurement. The energy absorption characteristics and deformation mode of the front structure of the vehicle determine the acceleration or force response of the vehicle body during the impact, which plays an important role in occupant protection. The traditional multi-objective optimization method is to transform multi-objective problems into single objective optimization problems through weighted combination, objective planning, efficiency coefficient and other methods. This method requires a strong prior knowledge. The purpose of this paper is to …combine the experimental design with the Multi-objective Particle Swarm Optimization (MPSO) method to achieve the optimization of the crash worthiness of automobile structure. This method can effectively overcome the defect of low precision caused by the conventional response surface method in the whole design space. In this paper, the multi-objective particle swarm optimization method is applied to the research of Crash worthiness optimization of automobile structure, which expands the application field of the multi-objective particle swarm optimization method, and also has a very big role in the optimization of other complex systems. It can be seen from the experiment that the speed of multi-objective particle swarm optimization is much faster than that of other methods. Only 100 iterations can get the relative better results. The case study on the front structure of a car shows that the method has a good result. It is of great significance to apply the method to the optimization design of the crash worthiness of the car structure to improve the crash safety of the car under the influence of COVID-19 epidemic. Show more
Keywords: Energy absorption, COVID-19, multi-objective optimization, particle swarm optimization, crash safety
DOI: 10.3233/JIFS-189305
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 9063-9071, 2020
Authors: Shan, Xianming | Liu, Huixin | Liu, Yefeng
Article Type: Research Article
Abstract: Due to the strict personnel control measures in COVID-19 epidemic, the control system cannot be maintained and managed manually. This puts forward higher requirements for the accuracy of its fault-tolerant performance. The control system plays an increasingly important role in the rapid development of industrial production. When the sensor in the system fails, the system will become unstable. Therefore, it is necessary to accurately and quickly diagnose the faults of the system sensors and maintain the system in time. This paper takes the control system as the object to carry out the fault diagnosis and fault-tolerant control research of its …sensors. A network model of wavelet neural network is proposed, and an improved genetic algorithm is used to optimize the weights and thresholds of the neural network model to avoid the deficiencies of traditional neural network algorithms. For the depth sensor of a certain system, an online fault diagnosis scheme based on RBF (Radial Basis Function) neural network and genetic algorithm optimized neural network was designed. The disturbance fault, “stuck” fault, drift fault and oscillation fault of the depth sensor are simulated. Simulation experiments show that both online fault diagnosis schemes can accurately identify sensor faults and the genetic algorithm optimized neural network is superior to RBF neural network in both recognition accuracy and training time under the influence of COVID-19. Show more
Keywords: Fault diagnosis, COVID-19, fault-tolerant control, neural network, genetic algorithm optimization
DOI: 10.3233/JIFS-189306
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 9073-9083, 2020
Authors: Liu, Qi | Huang, Zhenzhen
Article Type: Research Article
Abstract: Since December 2019, the outbreak of novel coronavirus pneumonia has brought great challenges to global public health, which is the most serious epidemic over the past hundred years. The urban rail transit is an important part of public transport in large cities with characteristic of intensive passengers and confined space, which is easy to become viral infection intermediary. In order to prevent and control the situation of the epidemic, the police’s public security department for urban rail transit and the urban rail transit operation company have established a three-layer filter network, which is composed of safety inspection, patrol and temporary …interrogation, and intelligent police service, and this network implements the deep learning technology to identify key persons, prohibited luggage, and the body temperature of passengers. For the problem of uncertainty in total passenger flow and its density, this paper proposes a method for re-establishing the passenger flow model to focus on data monitoring, and resetting the threshold value of alarm to control the passenger density. In view of the difficulty of passenger identification caused by mask during the epidemic, this paper proposes a systematic schema of timely adjusting face recognition algorithm, modifying the alarm threshold, using iris recognition system, carrying out information collision comparison, deep mining and intelligent judging, which discover the high-risk groups of epidemic prevention and control in time. China’s police’s public security department for urban rail transit aims at prevention of virus input, infection, riot, fake new, scientific prevention and control, and has made precise policy implementation to hold urban rail transit’s covid-19 intelligent prevention and control work, finally won the battle and effectively guaranteed the people’s life safety and health. Show more
Keywords: COVID-19, epidemic prevention and control, urban rail transit, intelligent police, big data, deep learning
DOI: 10.3233/JIFS-189307
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 9085-9090, 2020
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl