Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2024: 1.7
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Wu, Min-Chao | Mao, Jun-Jun | Yao, Ai-Ting | Wu, Tao
Article Type: Research Article
Abstract: Z + -numbers, which carry more information than Z-numbers, are studied in this paper. Based on existed models, two more scientific and reasonable probability models of Z + -numbers are developed. In order to utilize Z + -numbers to solve practical problems, the α -cut set of Z + -numbers and corresponding utility function are proposed. Meanwhile, according to the structure of Z + -numbers, the entropy, cross-entropy and comprehensive cross-entropy are introduced to measure the uncertainty and fuzziness of Z + -numbers information. Furthermore, a linear programming model based on proposed three kinds of entropy is designed to obtain …the weight vector of criteria in decision-making problems. Finally, we provide an example by selecting an optimal design of electricity vehicles charge station(DEVCS) combined the PROMETHEE method with Z + -numbers, and the feasibility of the proposed method are verified. Show more
Keywords: Z+-numbers, entropy, comprehensive cross-entropy, PROMETHEE method, multi-criteria decision-making
DOI: 10.3233/JIFS-190300
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 131-148, 2021
Authors: Ko, Jung Mi | Kim, Yong Chan
Article Type: Research Article
Abstract: In this paper, based on generalized residuated lattices as an extension of Zhang’s complete residuated lattices, there are two types of structures: bi-partially orders, right (left) joins, right (left) complete lattices and right (left) Alexandrov topologies. We investigate their properties and the relationship between them. Moreover, monotone maps, right (left)-embedding maps and right-join (left-join) preserving maps are investigated with various operations as extensions of Zadeh powerset operations between these structures. As the foundation of fuzzy rough sets and fuzzy contexts, there exist adjunctions and Galois connections between maps from right(left) Alexandrov topologies to right(left) Alexandrov topologies. We give their examples.
Keywords: Generalized residuated lattices, right (left) joins, right (left) meets, right (left) complete lattices, right(left) Alexandrov topologies, adjunctions, Galois connections
DOI: 10.3233/JIFS-190424
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 149-164, 2021
Authors: Liu, Hongzhe | Zhang, Qikun | Xu, Cheng | Ye, Zhao
Article Type: Research Article
Abstract: Blind Source Separation(BSS) is one of the research hotspots in the field of signal processing. In order to improve the accuracy of speech recognition in driving environment, the driver’s speech signal must be enhanced to improve its signal to noise ratio(SNR). Independent component analysis (ICA) algorithm is the most classical and efficient blind statistical signal processing technique. Compared with other improved ICA algorithms, fixed-point algorithm (FastICA) is well known for its fast convergence speed and good robustness. However, the convergence of FastICA algorithm is comparatively susceptible to the initial value selection of the original demixing matrix and the calculation of …the iterative process is relatively large. In this paper, the gradient descent method is used to reduce the effect of initial value. What’s more, the improved secant method is proposed to speed up the convergence rate and reduce the amount of computation. As the results of mixed speech separation experiment turn out, the improved algorithm is of better performance relative to the standard FastICA algorithm. Experimental results show that the proposed algorithm improves the speech quality of the target driver. It is suitable for speech separation in driving environment with low SNR. Show more
Keywords: Blind source separation, fixed-point algorithm, gradient descent, improved secant method, speech separation
DOI: 10.3233/JIFS-190469
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 165-178, 2021
Authors: Gholizadeh, Hadi | Fazlollahtabar, Hamed | Khalilzadeh, Mohammad
Article Type: Research Article
Abstract: Nowadays, Industries have been receiving much attention in Failure modelling and reliability assessment of repairable systems due to the fact that it plays a crucial role in risk and safety management of process. The primary purpose of this article is to present a methodology for discussing uncertainty in the reliability assessment if the production system. In fact, we discuss the fuzzy E-Bayesian estimation of reliability for PVC window production system. This approach is used to create the fuzzy E-Bayesian estimations of system reliability by introducing and applying a theorem called “Resolution Identity” for fuzzy sets. To be more specific, the …model parameters are assumed to be fuzzy random variables. For this purpose, the original problem is transformed into a nonlinear programming problem which is divided into four sub-problems to simplify the computations. Finally, the results obtained for the sub-problems can be used to determine the membership functions of the fuzzy E-Bayesian estimation of system reliability. To clarify the proposed model, a practical example for PVC window production system is conducted. Show more
Keywords: E-Bayesian estimation, system reliability, fuzzy real numbers
DOI: 10.3233/JIFS-190718
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 179-189, 2021
Authors: Verma, Tina
Article Type: Research Article
Abstract: In last few years, lots of researchers have proposed different methods to solve the constrained matrix games with fuzzy payoffs. In this paper, it has been shown that the mathematical programming problem of constrained matrix games with fuzzy payoffs, considered by researchers, is mathematically invalid and hence the method, proposed by researchers to obtain the complete solution (minimum expected gain of Player I, maximum expected loss of Player II and their corresponding optimal strategies) of constrained matrix games with fuzzy payoffs by solving the mathematical programming problem with fuzzy payoffs, are also invalid. Further, in the present paper, a new …method has been proposed to find the complete solution of matrix games with fuzzy payoffs. To illustrate the proposed method, some existing numerical problems of constrained matrix games with fuzzy payoffs have been solved by the proposed method. Show more
Keywords: Matrix games, fuzzy payoffs, mathematical programming problem
DOI: 10.3233/JIFS-191192
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 191-204, 2021
Authors: Zheng, Yanbin | Fan, Wenxin | Han, Mengyun
Article Type: Research Article
Abstract: The multi-agent collaborative hunting problem is a typical problem in multi-agent coordination and collaboration research. Aiming at the multi-agent hunting problem with learning ability, a collaborative hunt method based on game theory and Q-learning is proposed. Firstly, a cooperative hunting team is established and a game model of cooperative hunting is built. Secondly, through the learning of the escaper’s strategy choice, the trajectory of the escaper’s limited T-step cumulative reward is established, and the trajectory is adjusted to the hunter’s strategy set. Finally, the Nash equilibrium solution is obtained by solving the cooperative hunt game, and each hunter executes the …equilibrium strategy to complete the hunt task. C# simulation experiment shows that under the same conditions, this method can effectively solve the hunting problem of a single runaway with learning ability in the obstacle environment, and the comparative analysis of experimental data shows that the efficiency of this method is better than other methods. Show more
Keywords: Multi-agent, collaborative hunting, game theory, reinforcement learning
DOI: 10.3233/JIFS-191222
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 205-219, 2021
Authors: Wang, Xingang | Wang, Ke
Article Type: Research Article
Abstract: In many cases, complex problems cannot be accurately described by precise numerical values. Fuzzy theory provides a suitable tool for solving these problems. However, if decision makers cannot reach an agreement on the method for defining linguistic variables based on fuzzy sets, TIVFNs (triangular interval-valued fuzzy numbers) can provide more accurate modeling. Therefore, solving fuzzy MCGDM (multiple criteria group decision-making) problem with an unknown expert weight and criterion weight in TIVFNs has become an important research direction. In this paper, TIVF-VIKOR (triangular interval-valued fuzzy VIKOR) method, which is suitable for the environment of TIVFNs, is proposed to solve the problem …of fuzzy MCGDM. To achieve this goal, the TIVF-VIKOR method is innovatively adopted similarity and coefficient of variation are combined to calculate expert weight, and deviation maximization method based on divergence matrix is used to calculate criterion weight. VIKOR method is used to find the compromise solutions, which are converted into the form of binary connection number, and the optimal compromise solution is obtained after ranking. The proposed method is applied to the problem of machine fault detection, and the validity and feasibility of the method are illustrated. Compared with the TOPSIS∖ELECTRE method, the ranking results of the three methods are equivalent, and the fluctuation of the TIVF-VIKOR method is more distinct. Show more
Keywords: Triangular interval-valued fuzzy numbers, multiple criteria group decision-making, binary connection number, VIKOR method
DOI: 10.3233/JIFS-191261
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 221-233, 2021
Authors: Chen, Liuxin | Luo, Nanfang | Gou, Xiaoling
Article Type: Research Article
Abstract: In the real multi-criteria group decision making (MCGDM) problems, there will be an interactive relationship among different decision makers (DMs). To identify the overall influence, we define the Shapley value as the DM’s weight. Entropy is a measure which makes it better than similarity measures to recognize a group decision making problem. Since we propose a relative entropy to measure the difference between two systems, which improves the accuracy of the distance measure.In this paper, a MCGDM approach named as TODIM is presented under q-rung orthopair fuzzy information.The proposed TODIM approach is developed for correlative MCGDM problems, in which the …weights of the DMs are calculated in terms of Shapley values and the dominance matrices are evaluated based on relative entropy measure with q-rung orthopair fuzzy information.Furthermore, the efficacy of the proposed Gq-ROFWA operator and the novel TODIM is demonstrated through a selection problem of modern enterprises risk investment. A comparative analysis with existing methods is presented to validate the efficiency of the approach. Show more
Keywords: q-rung orthopair fuzzy, Shapley value, relative entropy, MCGDM, TODIM
DOI: 10.3233/JIFS-191374
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 235-250, 2021
Authors: Oh, Ju-Mok | Kim, Yong Chan
Article Type: Research Article
Abstract: In this paper, we introduce the notion of Galois and dual Galois connections as a topological viewpoint of concept lattices in a complete residuated lattice. Under various relations, we investigate the Galois and dual Galois connections on Alexandrov L -topologies. Moreover, their properties and examples are investigated.
Keywords: Complete residuated lattices, Alexandrov L-topologies, Galois and dual Galois connections
DOI: 10.3233/JIFS-191548
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 251-270, 2021
Authors: Wang, Xiulan | Wu, Xiaoli
Article Type: Research Article
Abstract: This paper aims to investigate the compensation contract design problem consisting of a risk neutral firm and two risk averse workers with and without helping effort in the presence of bilateral moral hazard by Stackelberg game in the framework of principal-agent theory. Three classes of contract models are established in three modes, which reflect whether helping effort takes place between both workers and whether personal performance evaluation contract or relative performance evaluation contract is applied by the firm. By solving models, optimal efforts of the firm, optimal individual and workgroup incentive coefficients, optimal personal effort and helping effort, and the …firm’s expected profit are deduced in different modes. In addition, a numerical experiment is investigated by focusing on the impacts of effort cost coefficients of the firm and the worker, and bilateral moral hazard on optimal compensation contracts and profit of the firm in three modes, which provide some valuable management insights about optimal strategy for the firm. The main findings show that the relative performance evaluation contract works better than the personal performance evaluation contract when the two workers is cooperative, which means that helping effort takes place between the two workers. Furthermore, a higher marginal contribution can motive the worker to make more helping effort for her partner, thus achieving win-win outcome based on the relationship of cooperation. For the firm, the optimal strategy is to design the relative performance evaluation contract for both workers and motivate them to make cooperative relationship by exerting helping effort under bilateral moral hazard. Moreover, bilateral moral hazard decreases the motivations of the workers but increases the firm’s profit. This proposed work contributes to the investigation of compensation contract design by combining three critical factors, that is, multiple agents, bilateral moral hazard, and helping effort. The findings provide some theoretical guidance on how to set up optimal mechanism between the firm and multiple agents in the presence of bilateral moral hazard and how to reduce the adverse influence of bilateral moral hazard on participants’ profits. Show more
Keywords: Compensation contracts, bilateral moral hazard, multiple agents, helping effort
DOI: 10.3233/JIFS-191625
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 271-293, 2021
Authors: Zhang, Gangqiang | Li, Zhaowen | Zhang, Pengfei | Xie, Ningxin
Article Type: Research Article
Abstract: An information system as a database that stands for relationships between objects and attributes is an important mathematical model. An image information system is an information system where each of its information values is an image and its information structures embody internal features of this type of information system. Uncertainty measurement is an effective tool for evaluation. This paper explores measures of uncertainty for an information system by using the proposed information structures. The distance between two objects in an image information system is first given. After that, the fuzzy T cos -equivalence relation, induced by this system by …using Gaussian kernel method, is obtained, where Gaussian kernel is based on this distance. Next, information structures of this system are described by set vectors, dependence between information structures is studied and properties of information structures are given by using inclusion degree, and application for information structures and uncertainty measures of an image information system are investigated by the information structures. Moreover, effectiveness analysis is done to show the feasibility of the proposed measures from the angle of statistics. Finally, an application of the proposed measurement for attribute reduction is given. These results will be helpful for understanding the essence of uncertainty in an image information system. Show more
Keywords: Granular computing, image information system, distance, information structure, dependence, inclusion degree, uncertainty, measure
DOI: 10.3233/JIFS-191628
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 295-317, 2021
Authors: Ma, Rufei | Liu, Shousheng | Xu, Zeshui | Lei, Qian
Article Type: Research Article
Abstract: Intuitionistic fuzzy number (IFN) is an effective tool for dealing with the uncertain information, and it has been applied to various fields. According to IFNs, the intuitionistic fuzzy calculus has been developed, which can effectively integrate the continuous uncertain information. Series in intuitionistic fuzzy environment is a part of the intuitionistic fuzzy calculus theory, of which core idea is limit. However, the order used in the existing limit theory is not the one used in intuitionistic fuzzy calculus, causing the separation of the limit theory and intuitionistic fuzzy calculus. Thus, series in intuitionistic fuzzy environment is not closely related to …the intuitionistic fuzzy calculus. In order to solve the above problem, we construct the related theories. There are mainly the following three aspects: (1) the limit theory including the sequence limit and the function limit is studied based on the new order. (2) we re-examine the numerical series according to the new tool of researching IFNs: the basis and the coordinates. (3) we discuss the function series and put forward the uniform convergence in intuitionistic fuzzy environment. Show more
Keywords: Intuitionistic fuzzy number (IFN), intuitionistic fuzzy calculus, complementary operation, limit, series, uniform convergence
DOI: 10.3233/JIFS-191679
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 319-330, 2021
Authors: Jia, Dongyao | Zhang, Chuanwang | Lv, Dandan
Article Type: Research Article
Abstract: BP (Back Propagation) neural network has been widely applied for classification tasks including road condition evaluation, however, BP model has the problem of lower accuracy and slow convergence rate. A novel road condition evaluation method based on BA-BP (Bat-Back Propagation) algorithm is proposed for the unstructured small road condition evaluation, which filled the vacancy of specific small road scenes. Firstly, five kinds of road condition features including roughness, curvature, obstacle width to height ratio, obstacle effective area ratio, obstacle coefficient are defined and extracted. Then obstacles from region of interest (ROI) in front of the vehicle are analyzed. Finally, Bat …algorithm is used to optimize the searching of initial network weights and thresholds, which obtained a higher accuracy of 95.15% and efficient training process. Comparison experiments showed that the proposed approach improved the accuracy with 5.31%, 3.32%, 3.17% than the BP, GA-BP and FA-BP model, respectively. As for the processing time of collected road data, BA-BP network consumed less time of 2 s and 3.9 s compared with GA-BP and FA-BP. Proposed method also outperformed than most of the state-of-the-art approaches with higher accuracy and simpler hardware environments, which proved its potential of being popularized in large scale real-time systems. Show more
Keywords: Road condition evaluation, BP neural network, Bat algorithm, adjustment factor
DOI: 10.3233/JIFS-191707
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 331-348, 2021
Authors: de Jesus, Junior Costa | Bottega, Jair Augusto | Cuadros, Marco Antonio de Souza Leite | Gamarra, Daniel Fernando Tello
Article Type: Research Article
Abstract: This article describes the use of the Deep Deterministic Policy Gradient network, a deep reinforcement learning algorithm, for mobile robot navigation. The neural network structure has as inputs laser range findings, angular and linear velocities of the robot, and position and orientation of the mobile robot with respect to a goal position. The outputs of the network will be the angular and linear velocities used as control signals for the robot. The experiments demonstrated that deep reinforcement learning’s techniques that uses continuous actions, are efficient for decision-making in a mobile robot. Nevertheless, the design of the reward functions constitutes an …important issue in the performance of deep reinforcement learning algorithms. In order to show the performance of the Deep Reinforcement Learning algorithm, we have applied successfully the proposed architecture in simulated environments and in experiments with a real robot. Show more
Keywords: Deep Deterministic Policy Gradient, Deep Reinforcement Learning, Navigation for Mobile Robots
DOI: 10.3233/JIFS-191711
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 349-361, 2021
Authors: Guo, Yanju | Shen, Huan | Chen, Lei | Liu, Yu | Kang, Zhilong
Article Type: Research Article
Abstract: Whale Optimization Algorithm (WOA) is a relatively novel algorithm in the field of meta-heuristic algorithms. WOA can reveal an efficient performance compared with other well-established optimization algorithms, but there is still a problem of premature convergence and easy to fall into local optimal in complex multimodal functions, so this paper presents an improved WOA, and proposes the random hopping update strategy and random control parameter strategy to improve the exploration and exploitation ability of WOA. In this paper, 24 well-known benchmark functions are used to test the algorithm, including 10 unimodal functions and 14 multimodal functions. The experimental results show …that the convergence accuracy of the proposed algorithm is better than that of the original algorithm on 21 functions, and better than that of the other 5 algorithms on 23 functions. Show more
Keywords: Whale optimization algorithm, Meta-heuristic, Function optimization, Random hopping update, Random control parameter
DOI: 10.3233/JIFS-191747
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 363-379, 2021
Authors: Wang, Weiwei | Zhou, Haiwei | Guo, Lidan
Article Type: Research Article
Abstract: The emergency supply of transboundary water resources is a prominent problem affecting the social and economic development of basin countries. However, current water supply decisions on transboundary water resources may ignore the psychological perception of multi-stakeholders, and the evolution of emergencies increases the uncertainty of decision making. Both factors would lead to the low acceptance of water-related decisions. Utility satisfaction, perceived losses, and quantity satisfaction were selected in this paper to identify the perceived satisfaction of upstream governments, downstream governments, and the public, respectively, over multiple decision-making stages. A modeling framework combining prospect theory and the multi-stage multi-objective programming methodology …was then developed to measure the perceived satisfaction of different stakeholders in a watershed under emergency. A two-stage NSGA-II and TOPSIS based approach was adopted to find the optimal compromise solution to solve the model. The framework was applied in the Lancang–Mekong River basin to provide suggestions to decision makers. Upstream decision makers must choose a moderate proportional fairness degree when making emergency decisions to maximize the perceived satisfaction of all stakeholders. Meanwhile, the perceived loss of downstream countries with low water demand should be considered first in the formulation of emergency water supply plans. Furthermore, although water supply from upstream countries can improve perceived water quantity satisfaction of downstream publics, additional actions must still be taken to change the traditional concepts of the public. Show more
Keywords: Transboundary river basin, emergency water supply decision, government–public, perceived satisfaction, lancang–mekong river
DOI: 10.3233/JIFS-191828
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 381-401, 2021
Authors: Khan, M. Firdouse Ali | Chellamani, Ganesh Kumar | Chandramani, Premanand Venkatesh
Article Type: Research Article
Abstract: Under demand response enabled demand-side management, the home energy management (HEM) schemes schedule appliances for balancing both energy and demand within a residence. This scheme enables the user to achieve either a minimum electricity bill (EB) or maximum comfort. There is always the added burden on a HEM scheme to obtain the least possible EB with comfort. However, if a time window that contains comfortable time slots of the day for an appliance operation, is identified, and if the cost-effective schedule-pattern gets generated from these windows autonomously, then the burden can be reduced. Therefore, this paper proposes a two-level method …that can assist the HEM scheme by generating a cost-effective schedule-pattern for scheduling home appliances. The first level uses a classifier to identify the comfortable time window from past ON and OFF events. The second level uses pattern generation algorithms to generate a cost-effective schedule-pattern from the identified window. The generated cost-effective schedule-pattern is applied to a HEM scheme as input to demonstrate the proposed two-level approach. The simulation results exhibit that the proposed approach helps the HEM scheme to schedule home appliances cost-effectively with a satisfactory user-comfort between 90% and 100%. Show more
Keywords: Appliance scheduling, home energy management, Naïve Bayes classifier, pattern generation algorithm, user comfort
DOI: 10.3233/JIFS-191862
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 403-413, 2021
Authors: Amsaveni, A. | Bharathi, M.
Article Type: Research Article
Abstract: This paper presents a Fractional Fourier transform based reversible data hiding technique to secure the data transmitted over communication network. The proposed algorithm modifies the cover image to improve the robustness of data hiding technique. The cover image is transformed using Fractional Fourier Transform (FrFT) into a time-frequency domain and the optimal pixel locations for hiding the secret data are found using firefly algorithm. Firefly algorithm uses multi-objective function, which is a combination of Structural Similarity Index Measure (SSIM) and Bit Error rate (BER). The histogram shifting technique embeds secret data in the optimal pixel locations. The quality of test …images is analyzed under varying payload as well as under varying fractional order. Experimental results conclude that this scheme produces good quality stego image. It has also been found from the simulation results that the proposed algorithm is more robust and reversible against various attacks as it provides lower bit error rate and higher normalization coefficient. Show more
Keywords: Reversible data hiding, histogram shifting, fractional fourier transform, firefly algorithm, imperceptibility, robustness, reversibility
DOI: 10.3233/JIFS-191911
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 415-425, 2021
Authors: Diao, Xiaolong | Fan, Houming | Ren, Xiaoxue | Liu, Chuanying
Article Type: Research Article
Abstract: This paper presents one method and one hybrid genetic algorithm for multi-depot open vehicle routing problem with fuzzy time windows (MDOVRPFTW) without maximum time windows. For the method, the degree of customers’ willingness to accept goods (DCWAG) is firstly proposed, it’s one fuzzy vague and determines maximum time windows. Referring to methods to determine fuzzy membership function, the function between DCWAG and the starting service time is constructed. By setting an threshold for DCWAG, the starting service time that the threshold corresponds can be treated as the maximum time window, which meets the actual situation. The goal of the model …is to minimize the total cost. For the algorithm, MDOVRPFTW without maximum time windows is an extension of the NP-hard problem, the hybrid genetic algorithm was designed, which is combination of genetic algorithm and Hungarian algorithm. When the hybrid genetic algorithm applied to one pharmaceutical logistics company in Beijing City, China, one optimal scheme is determined. Then the rationality and the stability of solutions by the hybrid genetic algorithm are proved. Finally, sensitivity analyses are performed to investigate the impact of someone factor on DCWAG and some suggestions are proposed. Show more
Keywords: MDOVRPFTW, maximum time window, fuzzy membership function, the degree of customers’ willingness to accept goods, the hybrid genetic algorithm
DOI: 10.3233/JIFS-191968
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 427-438, 2021
Authors: Yang, Hui
Article Type: Research Article
Abstract: In fuzzy set theory, fuzzy convex structures are important mathematical structures. In this paper, we focus on separation axioms in fuzzy convex spaces. Concretely, we introduce S 0 , S 1 and S 2 separation axioms in fuzzy convex spaces and establish their relationships. Furthermore, we investigate their hereditary and productive properties.
Keywords: Fuzzy convex structures, separation axioms, S0, S1, S2
DOI: 10.3233/JIFS-192076
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 439-447, 2021
Authors: Hu, Ziyu | Ma, Xuemin | Sun, Hao | Yang, Jingming | Zhao, Zhiwei
Article Type: Research Article
Abstract: When dealing with multi-objective optimization, the proportion of non-dominated solutions increase rapidly with the increase of optimization objective. Pareto-dominance-based algorithms suffer the low selection pressure towards the true Pareto front. Decomposition-based algorithms may fail to solve the problems with highly irregular Pareto front. Based on the analysis of the two selection mechanism, a dynamic reference-vector-based many-objective evolutionary algorithm(RMaEA) is proposed. Adaptive-adjusted reference vector is used to improve the distribution of the algorithm in global area, and the improved non-dominated relationship is used to improve the convergence in a certain local area. Compared with four state-of-art algorithms on DTLZ benchmark with …5-, 10- and 15-objective, the proposed algorithm obtains 13 minimum mean IGD values and 8 minimum standard deviations among 15 test problem. Show more
Keywords: Many-objective optimization, evolutionary algorithm, Gaussian mixture model, selection mechanism
DOI: 10.3233/JIFS-192124
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 449-461, 2021
Authors: Li, Juan | Shao, Yabin | Qi, Xiaoding
Article Type: Research Article
Abstract: With respect to multiple attribute group decision making problems in which the attribute weights and the expert weights take the form of real numbers and the attribute values take the form of interval-valued uncertain linguistic variable. In this paper, we introduce the idea of variable precision into the incomplete interval-valued fuzzy information system and propose the theory of variable precision rough sets over incomplete interval-valued fuzzy information systems. Then, we give the properties of rough approximation operators and study the knowledge discovery and attribute reduction in the incomplete interval-valued fuzzy information system under the condition that a certain degree of …misclassification rate is allowed to exist. Furthermore, a decision rule and decision model are given. Finally, an illustrative example is given and compared with the existing methods, the practicability and effectiveness of this method are further verified. Show more
Keywords: Interval-valued fuzzy set, incomplete information systems, variable precision interval-valued rough fuzzy set, attribute reduction, decision rules
DOI: 10.3233/JIFS-192161
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 463-475, 2021
Authors: Xu, Yanping | Ye, Tingcong | Wang, Xin | Lai, Yuping | Qiu, Jian | Zhang, Lingjun | Zhang, Xia
Article Type: Research Article
Abstract: In the field of security, the data labels are unknown or the labels are too expensive to label, so that clustering methods are used to detect the threat behavior contained in the big data. The most widely used probabilistic clustering model is Gaussian Mixture Models(GMM), which is flexible and powerful to apply prior knowledge for modelling the uncertainty of the data. Therefore, in this paper, we use GMM to build the threat behavior detection model. Commonly, Expectation Maximization (EM) and Variational Inference (VI) are used to estimate the optimal parameters of GMM. However, both EM and VI are quite sensitive …to the initial values of the parameters. Therefore, we propose to use Singular Value Decomposition (SVD) to initialize the parameters. Firstly, SVD is used to factorize the data set matrix to get the singular value matrix and singular matrices. Then we calculate the number of the components of GMM by the first two singular values in the singular value matrix and the dimension of the data. Next, other parameters of GMM, such as the mixing coefficients, the mean and the covariance, are calculated based on the number of the components. After that, the initialization values of the parameters are input into EM and VI to estimate the optimal parameters of GMM. The experiment results indicate that our proposed method performs well on the parameters initialization of GMM clustering using EM and VI for estimating parameters. Show more
Keywords: Network threat detection, gaussian mixture models, expectation maximization, variational inference, singular value decomposition, parameters initialization
DOI: 10.3233/JIFS-200066
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 477-490, 2021
Authors: Shen, Ao | Peng, Shuling | Liu, Gaofei
Article Type: Research Article
Abstract: The probabilistic linguistic term sets (PLTSs) are widely used in decision-making, due to its convenience of evaluation, and allowances of probability information. However, there are still some cases where it is not convenient to give an evaluation using the PLTS gramma. Sometimes the evaluators can only give a comparative relationship between alternatives, sometimes evaluators may have difficulty understanding all the alternatives and cannot give a complete assessment. Therefore, we propose a method to transform the comparative linguistic expressions (CLEs) into PLTSs, and the comparison objects of CLEs are alternatives evaluated by PLTSs. And the probability distribution has been adjusted to …make the transformation more in line with common sense. Then, a method to correct the deviation is proposed, allowing alternatives to be compared in the case of incomplete assessment. Combining the above two methods, we propose a decision-making method when both CLEs and incomplete assessments coexist. With the study in this paper, the limitations of PLTS-based evaluation and decision-making are reduced and the flexibility of using PLTS is improved. Show more
Keywords: Probabilistic linguistic term sets, comparative linguistic expressions, incomplete assessments, transforming, decision-making
DOI: 10.3233/JIFS-200103
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 491-506, 2021
Authors: Jiang, Jianming | Wu, Wen-Ze | Li, Qi | Zhang, Yu
Article Type: Research Article
Abstract: The hydropower plays a key role in electricity system owing to its renewability and largest share of clean electricity generation that promotes sustainable development of national economy. Developing a proper forecasting model for the quarterly hydropower generation is crucial for associated energy sectors, which could assist policymakers in adjusting corresponding schemes for facing with sustained demands. For this purpose, this paper presents a fractional nonlinear grey Bernoulli model (abbreviated as FANGBM(1,1)) coupled seasonal factor and Particular Swarm Optimization (PSO) algorithm, namely PSO algorithm-based FASNGBM(1,1) model. In the proposed method, the moving average method that eliminates the seasonal fluctuations is introduced …into FANGBM(1,1), then in which the structure parameters of FASNGBM(1,1) are determined by PSO. Based on hydropower generation of China from the first quarter of 2011 to the final quarter of 2018 (2011Q1-2018Q4), the numerical results show that the proposed model has a better performance than that of other benchmark models. Eventually, the quarterly hydropower generation of China from 2019 to 2020 are forecasted by the proposed model, according to results, the hydropower generation of China will reach 11287.14 × 108 Kwh in 2020. Show more
Keywords: Quarterly hydropower generation, seasonal fluctuation, FASNGBM(1,1), Particle Swarm Optimization (PSO)
DOI: 10.3233/JIFS-200113
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 507-519, 2021
Authors: Zhai, Junhai | Qi, Jiaxing | Zhang, Sufang
Article Type: Research Article
Abstract: The condensed nearest neighbor (CNN) is a pioneering instance selection algorithm for 1-nearest neighbor. Many variants of CNN for K -nearest neighbor have been proposed by different researchers. However, few studies were conducted on condensed fuzzy K -nearest neighbor. In this paper, we present a condensed fuzzy K -nearest neighbor (CFKNN) algorithm that starts from an initial instance set S and iteratively selects informative instances from training set T , moving them from T to S . Specifically, CFKNN consists of three steps. First, for each instance x ∈ T , it finds the K -nearest neighbors in S …and calculates the fuzzy membership degrees of the K nearest neighbors using S rather than T . Second it computes the fuzzy membership degrees of x using the fuzzy K -nearest neighbor algorithm. Finally, it calculates the information entropy of x and selects an instance according to the calculated value. Extensive experiments on 11 datasets are conducted to compare CFKNN with four state-of-the-art algorithms (CNN, edited nearest neighbor (ENN), Tomeklinks, and OneSidedSelection) regarding the number of selected instances, the testing accuracy, and the compression ratio. The experimental results show that CFKNN provides excellent performance and outperforms the other four algorithms. Show more
Keywords: K-nearest neighbor, fuzzy K-nearest neighbor, fuzzy membership degree, instance selection, information entropy
DOI: 10.3233/JIFS-200124
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 521-533, 2021
Authors: Mandal, Ashis Kumar | Sen, Rikta | Chakraborty, Basabi
Article Type: Research Article
Abstract: The fundamental aim of feature selection is to reduce the dimensionality of data by removing irrelevant and redundant features. As finding out the best subset of features from all possible subsets is computationally expensive, especially for high dimensional data sets, meta-heuristic algorithms are often used as a promising method for addressing the task. In this paper, a variant of recent meta-heuristic approach Owl Search Optimization algorithm (OSA) has been proposed for solving the feature selection problem within a wrapper-based framework. Several strategies are incorporated with an aim to strengthen BOSA (binary version of OSA) in searching the global best solution. …The meta-parameter of BOSA is initialized dynamically and then adjusted using a self-adaptive mechanism during the search process. Besides, elitism and mutation operations are combined with BOSA to control the exploitation and exploration better. This improved BOSA is named in this paper as Modified Binary Owl Search Algorithm (MBOSA). Decision Tree (DT) classifier is used for wrapper based fitness function, and the final classification performance of the selected feature subset is evaluated by Support Vector Machine (SVM) classifier. Simulation experiments are conducted on twenty well-known benchmark datasets from UCI for the evaluation of the proposed algorithm, and the results are reported based on classification accuracy, the number of selected features, and execution time. In addition, BOSA along with three common meta-heuristic algorithms Binary Bat Algorithm (BBA), Binary Particle Swarm Optimization (BPSO), and Binary Genetic Algorithm (BGA) are used for comparison. Simulation results show that the proposed approach outperforms similar methods by reducing the number of features significantly while maintaining a comparable level of classification accuracy. Show more
Keywords: Feature subset selection, binary owl search algorithm, meta-heuristic, optimization, self adaptive mechanism
DOI: 10.3233/JIFS-200258
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 535-550, 2021
Authors: Lu, Liqiong | Wu, Dong | Tang, Ziwei | Yi, Yaohua | Huang, Faliang
Article Type: Research Article
Abstract: This paper focuses on script identification in natural scene images. Traditional CNNs (Convolution Neural Networks) cannot solve this problem perfectly for two reasons: one is the arbitrary aspect ratios of scene images which bring much difficulty to traditional CNNs with a fixed size image as the input. And the other is that some scripts with minor differences are easily confused because they share a subset of characters with the same shapes. We propose a novel approach combing Score CNN, Attention CNN and patches. Attention CNN is utilized to determine whether a patch is a discriminative patch and calculate the contribution …weight of the discriminative patch to script identification of the whole image. Score CNN uses a discriminative patch as input and predict the score of each script type. Firstly patches with the same size are extracted from the scene images. Secondly these patches are used as inputs to Score CNN and Attention CNN to train two patch-level classifiers. Finally, the results of multiple discriminative patches extracted from the same image via the above two classifiers are fused to obtain the script type of this image. Using patches with the same size as inputs to CNN can avoid the problems caused by arbitrary aspect ratios of scene images. The trained classifiers can mine discriminative patches to accurately identify some confusing scripts. The experimental results show the good performance of our approach on four public datasets. Show more
Keywords: Script identification, score CNN, attention CNN, discriminative patches, scene images
DOI: 10.3233/JIFS-200260
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 551-563, 2021
Authors: Zhang, Di | Li, Pi-Yu | An, Shuang
Article Type: Research Article
Abstract: In this paper, we propose a new hybrid model called N -soft rough sets, which can be seen as a combination of rough sets and N -soft sets. Moreover, approximation operators and some useful properties with respect to N -soft rough approximation space are introduced. Furthermore, we propose decision making procedures for N -soft rough sets, the approximation sets are utilized to handle problems involving multi-criteria decision-making(MCDM), aiming at electing the optional objects and the possible optional objects based on their attribute set. The algorithm addresses some limitations of the extended rough sets models in dealing with inconsistent decision problems. …Finally, an application of N -soft rough sets in multi-criteria decision making is illustrated with a real life example. Show more
Keywords: Rough sets, N-soft sets, N-soft rough sets, Decision making analysis
DOI: 10.3233/JIFS-200338
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 565-573, 2021
Authors: Manickavasagam, B. | Amutha, B. | Revathi, M. | Karthick, N. | Sree Kumar, K. | Priyanka, K.
Article Type: Research Article
Abstract: Wireless Sensor Node (WSN) helps to track inpatient and remote patient (home/working) health information. Mishandling of the electronic system, patient behaviour and environmental changes which are all lead to incorrect data generation while using WSN for medical purposes. It leads to a false alarm being raised, network resource wastage, a false node priority level and low reliability. We have introduced the Mutual Trust Model (MTM) for Wireless Body Area Network (WBAN) with the help of Fog-Node (FN) to address these issues and to ensure the trustworthiness of the information acquired. In this, First-Hand Trust Method calculates the confidence value of …the individual sensor node. Then, with neighbor node support, the Stigmercy Trust Method (STM) is implemented to reinforce the trust source node. Ultimately, the individual patient’s confidence value for the MTM model is determined. With the assistance of the wireless-mininet network emulator and the RYU controller, the network environment model implement, and the results have been obtained. MTM predicts the confidence level of the collected data significantly and produces an accuracy of 92.3 percentage to prevent the emergency band from being used dispensable. Show more
Keywords: Trust analysis, WBAN, data reliability, direct and indirect trust method, and relative trust approach
DOI: 10.3233/JIFS-200363
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 575-589, 2021
Authors: Shiri Daryani, Zahra | Tohidi, Ghasem | Daneshian, Behrouz | Razavyan, Shabnam | Hosseinzadeh Lotfi, Farhad
Article Type: Research Article
Abstract: Inputs and outputs of Decision Making Units (DMUs) are estimated by the Inverse Data Envelopment Analysis (InvDEA) models, while their relative efficiency scores remain unchanged. But, in some cases, cost/price information of the inputs and outputs are available. This paper employs the input and output cost/price information, including the generalized InvDEA concept in two-stage structures. To this end, it proposes a four-stage method to deal with the InvDEA concept, for estimating the inputs and outputs of the DMUs with a two-stage network structure method, while the allocative efficiency scores of all the units remain stable. Eventually, an empirical example is …rendered to illustrate the competence of the method which is presented. Show more
Keywords: Inverse DEA, network DEA, two-stage network, cost efficiency, input/output estimation
DOI: 10.3233/JIFS-200386
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 591-603, 2021
Authors: Xu, Lei | Liu, Yi | Liu, Haobin
Article Type: Research Article
Abstract: For the sake of better handle the imprecise and uncertain information in decision making problems(DMPs), linguistic interval-valued intuitionistic fuzzy numbers(LIVIFNs) based aggregation operators (AOS) are proposed by combining extended Copulas (ECs), extended Co-copulas (ECCs), power average operator and linguistic interval-valued intuitionistic fuzzy information (LIVIFI). First of all, ECs and ECCs, some specifics of ECs and ECCs, score and accuracy functions of LIVIFNs are gained. Then, based on ECs and ECCs, several aggregation operators are proposed to aggregate LIVIFI, which can offer decision makers (DMs) desirable generality and flexibility. In addition, the desired properties of proposed AOS are discussed. Last but …not least, a MAGDM approach is constructed based on proposed AOs; Consequently, the effectiveness of the proposed approach is verified by a numerical example, and then the advantages are showed by comparing with other approaches. Show more
Keywords: linguistic interval-valued intuitionistic fuzzy set (LIVIFS), Extended Copulas, Extended Co-copulas, PA operator, multi-attribute group decision making(MAGDM)
DOI: 10.3233/JIFS-200387
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 605-624, 2021
Authors: Mahmood, Tahir | Ur Rehman, Ubaid | Ali, Zeeshan | Mahmood, Tariq
Article Type: Research Article
Abstract: Fuzzy set (FS) theory is one of the most important tool to deasl with complicated and difficult information in real-world. Now FS has many extensions and hesitant fuzzy set (HFS) is one of them. Further generalization of FS is complex fuzzy set (CFS), which contains only the membership grade, whose range is unit disc instead of [0, 1]. The aim of this paper is to present the idea of complex hesitant fuzzy set (CHFS) and to introduce its basic properties. Basically, CHFS is the combination of CFS and HFS to deal with two dimension information in a single set. Further, …the vector similarity measures (VSMs) such as Jaccard similarity measures (JSMs), Dice similarity measures (DSMs) and Cosine similarity measures (CSMs) for CHFSs are discussed. The special cases of the proposed measures are also discussed. Then, the notion of complex hesitant fuzzy hybrid vector similarity measures are utilized in the environment of pattern recognition and medical diagnosis. Further, based on these distance measures, a decision-making method has been presented for finding the best alternative under the set of the feasible one. Illustrative examples from the field of pattern recognition as well as medical diagnosis have been taken to validate the approach. Finally, the comparison between proposed approaches with existing approaches are also discussed to find the reliability and proficiency of the elaborated measures for complex hesitant fuzzy elements. Show more
Keywords: Complex fuzzy set, complex hesitant fuzzy sets, similarity measures, hybrid vector similarity measures
DOI: 10.3233/JIFS-200418
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 625-646, 2021
Authors: El_Tokhy, Mohamed S.
Article Type: Research Article
Abstract: Development of a robust triple multimodal biometric approach for human authentication using fingerprint, iris and voice biometric is the main objective of this manuscript. Accordingly, three essential algorithms for biometric authentication are presented. The extracted features from these multimodals are combined via feature fusion center (FFC) and feature scores. These features are trained through artificial neural network (ANN) and support vector machine (SVM) classifiers. The first algorithm depends on boundary energy method (BEM) extracted features from fingerprint, normalized combinational features from iris and dimensionality reduction methods (DRM) from voice using sum/average FFC. The second proposed algorithm uses extracted features from …zoning method of fingerprint, SIFT of iris and higher order statistics (HOS) of voice signals. The third proposed algorithm consists of extracted features from zoning method for fingerprint, SIFT from iris and DRM from voice signals. Classification accuracy of implemented algorithms is estimated. Comparison between proposed algorithms is introduced in terms of equal error rate (EER) and ROC curves. The experimental results confirm superiority of second proposed algorithm which achieves a classification rate of 100% using SVM classifier and sum FFC. From computational point of view, the first algorithm consumes the lowest time using SVM classifier. On other hand, the lowest EER is achieved by first proposed algorithm for extracted features from Karhunen-Loeve transform (KLT) method of DRM. Additionally, the lowest ROC curves are accomplished respectively for extracted features from multidimensional scaling (MDS), generated ARMA synthesis and Isomap features. Their accuracy is improved with SVM. Also, the sum FFC introduces efficient results compared to average FFC. These algorithms have the advantages of robustness and the strength of selecting unimodal, double and triple biometric authentication. The obtained results accomplish a remarkable accuracy for authentication and security within multi practical applications. Show more
Keywords: Recognition system, digital signal and image processing, authentication systems
DOI: 10.3233/JIFS-200425
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 647-672, 2021
Authors: Wang, Degang | Song, Wenyan | Pedrycz, Witold | Cai, Lili
Article Type: Research Article
Abstract: In this paper, an integrated model combining interval deep belief network (IDBN) and neural network with nonlinear weights, called IDBN-NN, is proposed for interval-valued data modeling. Firstly, the IDBN with variable learning rate is designed to initialize parameters of each sub-model. Based on a modified contrastive divergence algorithm the least square method is adopted to identify the coefficients of nonlinear weights in the output layer. Then, to improve the modeling accuracy, the Fuzzy C-Means (FCM) method and the Particle Swarm Optimization (PSO) algorithm are applied to tune the weights of sub-models. Though each sub-model can capture the nonlinear feature of …the original system, by intersecting cut sets the synthesizing modeling scheme can further improve the performance of the proposed model. Some numerical examples show that the IDBN-NN with nonlinear output structure can achieve higher accuracy than some interval-valued data modeling methods. Show more
Keywords: Interval data, neural network, integrated model, fuzzy clustering
DOI: 10.3233/JIFS-200500
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 673-683, 2021
Authors: Wang, Huiru | Zhou, Zhijian
Article Type: Research Article
Abstract: In Rough margin-based ν -Twin Support Vector Machine (Rν -TSVM) algorithm, the rough theory is introduced. Rν -TSVM gives different penalties to the corresponding misclassified samples according to their positions, so it avoids the overfitting problem to some extent. While the input data is a tensor, Rν -TSVM cannot handle it directly and may not utilize the data information effectively. Therefore, we propose a novel classifier based on tensor data, termed as Rough margin-based ν -Twin Support Tensor Machine (Rν -TSTM). Similar to Rν -TSVM, Rν -TSTM constructs rough lower margin, rough upper margin and rough boundary in tensor space. …Rν -TSTM not only retains the superiority of Rν -TSVM, but also has its unique advantages. Firstly, the data topology is retained more efficiently by the direct use of tensor representation. Secondly, it has better classification performance compared to other classification algorithms. Thirdly, it can avoid overfitting problem to a great extent. Lastly, it is more suitable for high dimensional and small sample size problem. To solve the corresponding optimization problem in Rν -TSTM, we adopt the alternating iteration method in which the parameters corresponding to the hyperplanes are estimated by solving a series of Rν -TSVM optimization problem. The efficiency and superiority of the proposed method are demonstrated by computational experiments. Show more
Keywords: Classification problem, ν-Twin support vector machine, rough margin, tensor learning
DOI: 10.3233/JIFS-200573
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 685-702, 2021
Authors: Ali, Aqib | Mashwani, Wali Khan | Tahir, Muhammad H. | Belhaouari, Samir Brahim | Alrabaiah, Hussam | Naeem, Samreen | Nasir, Jamal Abdul | Jamal, Farrukh | Chesneau, Christophe
Article Type: Research Article
Abstract: The purpose of this study is the statistical analysis and discrimination of maize seed using a machine vision (MV) approach. The foundation of the digital image dataset holds six maize seed varieties named as Kargal K-9803, Gujjar Khan, Desi White, Pioner 30Y87, Syngenta ST-6142, and Pioner 31R88. The digital image dataset acquired via a digital imaging laboratory. For preprocessing, we crop the image into a size of 600×600 pixels, and convert it into a gray level image format. After that, line and edge detection are performed by using a Prewitt filter, and five non-overlapping areas of interest (AOIs) size of …(200×200), and (250×250) are drawn. A total of 56 statistical features, containing texture features, histogram features, and spectral features, is extracted from each AOI. The 11 optimized statistical features have been selected by deploying “Correlation-based Feature Selection” (CFS) with the Greedy algorithm. For the discrimination analysis, four MV classifiers named as “Support Vector Machine” (SVM), “Logistic” (Lg), “Bagging” (B), and “LogitBoost” (LB) have been deployed on optimized statistical features dataset. After analysis, the SVM classifier has shown a promising accuracy of 99.93% on AOIs size (250×250). The obtained accuracy by SVM classifier on six maize seed varieties, namely Kargal K-9803, Gujjar Khan, Desi White, Pioner 30Y87, Syngenta ST-6142, and Pioner 31R88, were 99.9%, 99.8%, 100%, 100%, 99.9%, and 99.8%, respectively. Show more
Keywords: Maize seeds, statistical features, discrimination, machine vision, support vector machine
DOI: 10.3233/JIFS-200635
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 703-714, 2021
Authors: Gou, Hongyuan | Zhang, Xianyong
Article Type: Research Article
Abstract: The multi-granulation rough sets serve as important hierarchical models for intelligent systems. However, their mainstream optimistic and pessimistic models are respectively too loose and strict, and this defect becomes especially serious in hierarchical processing on an attribute-expansion sequence. Aiming at the attribute-addition chain, compromised multi-granulation rough set models are proposed to systematically complement and balance the optimistic and pessimistic models. According to the knowledge refinement and measure order induced by the attribute-enlargement sequence, the basic measurement positioning and corresponding pointer labeling based on equilibrium statistics are used, and thus we construct four types of compromised models at three levels of …knowledge, approximation, and accuracy. At the knowledge level, the median positioning of ordered granulations derives Compromised-Model 1; at the approximation level, the average positioning of approximation cardinalities is performed, and thus the separation and integration of dual approximations respectively generate Compromised-Models 2 and 3; at the accuracy level, the average positioning of applied accuracies yields Compromised-Model 4. Compromised-Models 1–4 adopt distinctive cognitive levels and statistical perspectives to improve and perfect the multi-granulation rough sets, and their properties and effectiveness are finally verified by information systems and data experiments. Show more
Keywords: Multi-granulation rough set, statistical compromised modeling, attribute-addition chain, granular computing, tri-level analysis
DOI: 10.3233/JIFS-200708
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 715-732, 2021
Authors: Gui, Wangyang | Zhang, Xu | Wang, Ai
Article Type: Research Article
Abstract: The construction of high-speed rails is regarded as a major opportunity for urban development by local governments in China, so various grand development plans are actively formulated to promote urban economic development. In this paper, the development of station space is evaluated empirically based on the calculated node and place values of 24 high-speed rail stations along the Beijing-Shanghai line and Bertolini’s “node-place” model. The results show that: (1) The 24 stations along the Beijing-Shanghai line have different development scale, which mostly act as sub-centers of the city, where the real estate industry, modern service industry and cultural industry are …dominated in station space planning. Moreover, local governments are optimistic about the accelerant effect of high-speed rail stations whose functional configuration along the line is relatively repeated, because all 24 stations are basically set with business centers. (2) The size of cities along the Beijing-Shanghai line is related to the node value, the higher the urban function level, the greater the node value, with great differences among cities. The node value of big cities is far higher than that of small and medium-sized cities, hence there are node-oriented station areas in big cities and place-oriented ones in middle-sized and small cities. However, there is no direct relationship between the urban function level of stations along the line and the value of urban places. In some small and medium-sized cities, the planning and development intensity and scale of station areas even exceed that of big cities. (3) Only Wuxi station and Nanjing station are in a balanced development state in the space planning of railway stations along the Beijing-Shanghai line. Therefore, the risk of long-term development of station area should be considered in the planning, and reasonable measures should be formulated to promote the sustainable development of station area, so as to form the overall development of Station City. Show more
Keywords: High speed railway, station area, Beijing-Shanghai line, node-place model
DOI: 10.3233/JIFS-200712
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 733-743, 2021
Authors: Chellamani, Ganesh Kumar | Firdouse Ali Khan, M. | Chandramani, Premanand Venkatesh
Article Type: Research Article
Abstract: Day-ahead electricity tariff prediction is advantageous for both consumers and utilities. This article discusses the home energy management (HEM) scheme consisting of an electricity tariff predictor and appliance scheduler. The random forest (RF) technique predicts a short-term electricity tariff for the next 24 hours using the past three months of electricity tariff information. This predictor provides the tariff information to schedule the appliances at the most preferred time slot of a consumer with minimum electricity tariff, aiming high consumer comfort and low electricity bill for consumers. The proposed approach allows a user to be aware of their demand and their …comfort. The proposed approach makes use of present-day (D) tariff and immediate previous 30 days (D-1, D-2, ... , D-30) of tariff information for training achieves minimum error values for next day electricity tariff prediction. The simulation results demonstrate the benefits of the RF approach for tariff prediction by comparing it with the support vector machine (SVM) and decision tree (DT) predicted tariffs against the actual tariff, provided by the utility day-ahead. The outcomes indicate that the RF produces the best results compared to SVM and DT predictions for performance metrics and end-user comfort. Show more
Keywords: Day-ahead tariff, decision tree, home energy management, random forest, support vector machine
DOI: 10.3233/JIFS-200722
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 745-757, 2021
Authors: Oner, Tahsin | Katican, Tugce | Saeid, Arsham Borumand
Article Type: Research Article
Abstract: The aim of this study is to introduce fuzzy filters of Sheffer stroke Hilbert algebra. After defining fuzzy filters of Sheffer stroke Hilbert algebra, it is shown that a quotient structure of this algebra is described by its fuzzy filter. In addition to this, the level filter of a Sheffer stroke Hilbert algebra is determined by its fuzzy filter. Some fuzzy filters of a Sheffer stroke Hilbert algebra are defined by a homomorphism. Normal and maximal fuzzy filters of a Sheffer stroke Hilbert algebra and the relation between them are presented. By giving the Cartesian product of fuzzy filters of …a Sheffer stroke Hilbert algebra, various properties are examined. Show more
Keywords: (Sheffer stroke) Hilbert algebra, (normal) fuzzy filter
DOI: 10.3233/JIFS-200760
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 759-772, 2021
Authors: Liu, Shuai | Xu, Ying | Guo, Lingming | Shao, Meng | Yue, Guodong | An, Dong
Article Type: Research Article
Abstract: Tens of thousands of work-related injuries and deaths are reported in the construction industry each year, and a high percentage of them are due to construction workers not wearing safety equipment. In order to address this safety issue, it is particularly necessary to automatically identify people and detect the safety characteristics of personnel at the same time in the prefabricated building. Therefore, this paper proposes a depth feature detection algorithm based on the Extended-YOLOv3 model. On the basis of the YOLOv3 network, a security feature recognition network and a feature transmission network are added to achieve the purpose of detecting …security features while identifying personnel. Firstly, a security feature recognition network is added side by side on the basis of the YOLOv3 network to analyze the wearing characteristics of construction workers. Secondly, the S-SPP module is added to the object detection and feature recognition network to broaden the features of the deep network and help the network extract more useful features from the high-resolution input image. Finally, a special feature transmission network is designed to transfer features between the construction worker detection network and the security feature recognition network, so that the two networks can obtain feature information from the other network respectively. Compared with YOLOv3 algorithm, Extended-YOLOv3 in this paper adds security feature recognition and feature transmission functions, and adds S-SPP module to the object detection and feature recognition network. The experimental results show that the Extended-YOLOv3 algorithm is 1.3% better than the YOLOV3 algorithm in AP index. Show more
Keywords: YOLOv3, target detection, depth feature extraction, S-SPP module, deep learning
DOI: 10.3233/JIFS-200778
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 773-786, 2021
Authors: Saravanan, G. | Yuvaraj, N.
Article Type: Research Article
Abstract: Mobile Cloud Computing (MCC) addresses the drawbacks of Mobile Users (MU) where the in-depth evaluation of mobile applications is transferred to a centralized cloud via a wireless medium to reduce load, therefore optimizing resources. In this paper, we consider the resource (i.e., bandwidth and memory) allocation problem to support mobile applications in a MCC environment. In such an environment, Mobile Cloud Service Providers (MCSPs) form a coalition to create a resource pool to share their resources with the Mobile Cloud Users. To enhance the welfare of the MCSPs, a method for optimal resource allocation to the mobile users called, Poisson …Linear Deep Resource Allocation (PL-DRA) is designed. For resource allocation between mobile users, we formulate and solve optimization models to acquire an optimal number of application instances while meeting the requirements of mobile users. For optimal application instances, the Poisson Distributed Queuing model is designed. The distributed resource management is designed as a multithreaded model where parallel computation is provided. Next, a Linear Gradient Deep Resource Allocation (LG-DRA) model is designed based on the constraints, bandwidth, and memory to allocate mobile user instances. This model combines the advantage of both decision making (i.e. Linear Programming) and perception ability (i.e. Deep Resource Allocation). Besides, a Stochastic Gradient Learning is utilized to address mobile user scalability. The simulation results show that the Poisson queuing strategy based on the improved Deep Learning algorithm has better performance in response time, response overhead, and energy consumption than other algorithms. Show more
Keywords: Mobile cloud computing, mobile cloud service providers, mobile cloud users, poisson linear, stochastic, deep neural resource allocation
DOI: 10.3233/JIFS-200799
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 787-797, 2021
Authors: Xu, Xiaoyun | Wu, Jingzheng | Yang, Mutian | Luo, Tianyue | Meng, Qianru | Li, Weiheng | Wu, Yanjun
Article Type: Research Article
Abstract: As the scale of software systems continues expanding, software architecture is receiving more and more attention as the blueprint for the complex software system. An outstanding architecture requires a lot of professional experience and expertise. In current practice, architects try to find solutions manually, which is time-consuming and error-prone because of the knowledge barrier between newcomers and experienced architects. The problem can be solved by easing the process of apply experience from prominent architects. To this end, this paper proposes a novel graph-embedding-based method, AI-CTO, to automatically suggest software stack solutions according to the knowledge and experience of prominent architects. …Firstly, AI-CTO converts existing industry experience to knowledge, i.e., knowledge graph. Secondly, the knowledge graph is embedded in a low-dimensional vector space. Then, the entity vectors are used to predict valuable software stack solutions by an SVM model. We evaluate AI-CTO with two case studies and compare its solutions with the software stacks of large companies. The experiment results show that AI-CTO can find effective and correct stack solutions and it outperforms other baseline methods. Show more
Keywords: Knowledge graph, graph embedding, software architecture
DOI: 10.3233/JIFS-200899
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 799-812, 2021
Authors: Kazemi, Sajad | Mavi, Reza Kiani | Emrouznejad, Ali | Kiani Mavi, Neda
Article Type: Research Article
Abstract: Data Envelopment Analysis (DEA) is the most popular mathematical approach to assess efficiency of decision-making units (DMUs). In complex organizations, DMUs face a heterogeneous condition regarding environmental factors which affect their efficiencies. When there are a large number of objects, non-homogeneity of DMUs significantly influences their efficiency scores that leads to unfair ranking of DMUs. The aim of this study is to deal with non-homogeneous DMUs by implementing a clustering technique for further efficiency analysis. This paper proposes a common set of weights (CSW) model with ideal point method to develop an identical weight vector for all DMUs. This study …proposes a framework to measuring efficiency of complex organizations, such as banks, that have several operational styles or various objectives. The proposed framework helps managers and decision makers (1) to identify environmental components influencing the efficiency of DMUs, (2) to use a fuzzy equivalence relation approach proposed here to cluster the DMUs to homogenized groups, (3) to produce a common set of weights (CSWs) for all DMUs with the model developed here that considers fuzzy data within each cluster, and finally (4) to calculate the efficiency score and overall ranking of DMUs within each cluster. Show more
Keywords: Data envelopment analysis, fuzzy DEA, non-homogeneous, clustering, common set of weights (CSW)
DOI: 10.3233/JIFS-200962
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 813-832, 2021
Authors: Khan, Y. A. | Chu, Y. M. | Abbas, S. Z.
Article Type: Research Article
Abstract: This paper investigates governments’ performance in the country. We achieved this objective differently. We employed an inverse method of assessment, with the utilization of factor copula modeling technique, to study the dependence relationship of exchange rates returns as auxiliary variables, the performance of political and army government tenures in the country in the last two decades are evaluated. Through factor analysis, common factors for the exchange rate are obtained. The analysis shows that conditioned on the common factors, the dependence amongst the elected currencies are strongly asymmetric in most of the tenures except the term of Pakistan Muslim League-Nawaz, and …condition on common factor Clayton copula demonstrating hypothesis is more suitable. However, we perceive high left tail reliance among foreign currency returns during Pakistan Muslim League-Nawaz tenure, and the condition on common factor Gumbel copula molding assumption is more appropriate. We are signifying the foulest government performance in the country among all occupancies under consideration. Show more
Keywords: Factor analysis, asymmetric, clayton copula, exchange rate, gumbel copula
DOI: 10.3233/JIFS-200996
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 833-847, 2021
Authors: Saleem, Nasir | Khattak, Muhammad Irfan | Al-Hasan, Mu’ath | Jan, Atif
Article Type: Research Article
Abstract: Speech enhancement is a very important problem in various speech processing applications. Recently, supervised speech enhancement using deep learning approaches to estimate a time-frequency mask have proved remarkable performance gain. In this paper, we have proposed time-frequency masking-based supervised speech enhancement method for improving intelligibility and quality of the noisy speech. We believe that a large performance gain can be achieved if deep neural networks (DNNs) are layer-wise pre-trained by stacking Gaussian-Bernoulli Restricted Boltzmann Machine (GB-RBM). The proposed DNN is called as Gaussian-Bernoulli Deep Belief Network (GB-DBN) and are optimized by minimizing errors between the estimated and pre-defined masks. Non-linear …Mel-Scale weighted mean square error (LMW-MSE ) loss function is used as training criterion. We have examined the performance of the proposed pre-training scheme using different DNNs which are established on three time-frequency masks comprised of the ideal amplitude mask (IAM), ideal ratio mask (IRM), and phase sensitive mask (PSM). The results in different noisy conditions demonstrated that when DNNs are pre-trained by the proposed scheme provided a persistent performance gain in terms of the perceived speech intelligibility and quality. Also, the proposed pre-training scheme is effective and robust in noisy training data. Show more
Keywords: Supervised speech enhancement, deep learning, deep belief networks, restricted boltzmann machine, intelligibility, quality
DOI: 10.3233/JIFS-201014
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 849-864, 2021
Authors: Gong, Zengtai | Wang, Junhu
Article Type: Research Article
Abstract: Up to now, there have been a lot of research results about multi-attribute decision making problems by fuzzy graph theory. However, there are few investigations about multi-attribute decision making problems under the background of indecisiveness. The main reason is that the difference of cognition and the complexity of thinking by decision makers, for the same question have different opinions. In this paper, we proposed a hesitant fuzzy hypergraph model based on hesitant fuzzy sets and fuzzy hypergraphs. At the same time, some basic graph operations of hesitant fuzzy hypergraphs are investigated and several equivalence relationship between hesitant fuzzy hypergraphs, hesitant …fuzzy formal concept analysis and hesitant fuzzy information systems are discussed. Since granular computing can deal with multi-attribute decision-making problems well, we considered the hesitant fuzzy hypergraph model of granular computing, and established an algorithm of multi-attribute decision-making problem based on hesitant fuzzy hypergraph model. Finally an example is given to illustrate the effectiveness of the algorithm. Show more
Keywords: Hesitant fuzzy sets, hesitant fuzzy graph, hesitant fuzzy hypergraph, granular computing, graph decision
DOI: 10.3233/JIFS-201016
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 865-875, 2021
Authors: Hourali, Samira | Zahedi, Morteza | Fateh, Mansour
Article Type: Research Article
Abstract: Coreference resolution is critical for improving the performance of all text-based systems including information extraction, document summarization, machine translation, and question-answering. Most of coreference resolution solutions rely on using knowledge resources like lexical knowledge, syntactic knowledge, world knowledge and semantic knowledge. This paper presents a new knowledge-based coreference resolution model using neural network architecture. It uses XLNet embeddings as input and does not rely on any syntactic or dependency parsers. For more efficient span representation and mention detection, we used entity-level information. Mentions were extracted from the text with an unhand engineered mention detector, and the features were extracted from …a deep neural network. We also propose a nonlinear multi-criteria ranking model to rank the candidate antecedents. This model simultaneously determines the total score of alternatives and the weight of the features in order to speed up the process of ranking alternatives. Compared to the state-of-the-art models, the simulation results showed significant improvements on the English CoNLL-2012 shared task (+6.4 F1). Moreover, we achieved 96.1% F1 score on the n2c2 medical dataset. Show more
Keywords: Natural language processing, coreference resolution, knowledge management, entity level information, neural network, multi-criteria ranking model
DOI: 10.3233/JIFS-201050
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 877-892, 2021
Authors: Mannar Mannan, J. | Sindhanai Selvan, K. | Mohemmed Yousuf, R.
Article Type: Research Article
Abstract: Massive digital documents on Internet leading to use e-learning, and it becomes an emerging field of research due to the massive growth of internet users. E-learning requires suitable document ranking method to avoid navigating to the next Search Engine Result Page (SERP) frequently. The existing document ranking methods are lacking to rank the documents independently based on the conceptual contents. This paper proposes a novel method for ranking the documents independently based on the different classification of term it contains. In this approach, the terms are classified into five categories such as (1) direct query term, (2) expanded terms, (3) …semantically related term, (4) supporting terms and (5) stop words. The query has been expanded using domain ontology to acquire more semantic terms for better understanding of user query. The semantic weight has been applied independently over different categories of terms in a document for ranking. The document with the highest augmented value in each category of terms has been ranked first. Remaining documents are ranked in the same way and are arranged in the descending order. The WordNet tool is utilized as a knowledge base and Wu and Palmer semantic distance method have applied for measuring semantic distance between the query and document terms for ranking the terms. The experiments show that the performance of the proposed document ranking method for e-learning retrieved better document compared with existing document ranking methods. Show more
Keywords: Ontology, semantic ranking, classification, information retrieval
DOI: 10.3233/JIFS-201070
Citation: Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 893-905, 2021
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl