Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2024: 1.7
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Yamuna, V. | Arun Prakash, K.
Article Type: Research Article
Abstract: The Fuzzy Incidence Coloring (FIC) of a graph is a mapping of its Fuzzy Incidence set to a color set in which adjacent Fuzzy Incidences (FIs) are colored with different colors. Using various sorts of fuzzy graph products, new graphs can be created from two existing graphs. In this paper, we determined the Fuzzy Incidence Coloring Number (FICN) of some cartesian product with two Fuzzy Incidence Paths (FIPs) ( P m ˜ × P n ˜ ) , two Fuzzy Incidence cycles ( C m ˜ …× C n ˜ ) , two Fuzzy Incidence complete graphs ( K m ˜ × K n ) ˜ , FIP and Fuzzy Incidence cycle ( P m ˜ × C n ) ˜ , FIP and Fuzzy Incidence complete graph ( P m ˜ × K n ) ˜ , Fuzzy Incidence cycle and Fuzzy Incidence complete graph ( C m ˜ × K n ) ˜ , respectively. Show more
Keywords: Fuzzy Incidence Path, Fuzzy Incidence cycle, Fuzzy Incidence complete graph, cartesian product
DOI: 10.3233/JIFS-221113
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 7753-7774, 2023
Authors: Khan, Vakeel A. | Arshad, Mohammad | Alam, Masood
Article Type: Research Article
Abstract: This article has been retracted. A retraction notice can be found at https://doi.org/10.3233/JIFS-219433 .
DOI: 10.3233/JIFS-224035
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 7775-7784, 2023
Authors: Kong, Yue | Sun, Huaijiang | Cui, Qiongjie | Pan, Jian | Li, Yanmeng
Article Type: Research Article
Abstract: Human motion style transfer is a technique that aims to apply a desired style to neutral motions, which is an essential aspect of motion generation and retargeting. With the advancement of deep learning networks, significant progress has been made in this field. However, one of the main challenges is preserving the essential features of the original motions, such as velocities and trace, during the style transfer process. To overcome this challenge, we have proposed a novel method called Residual LSTM Generative Adversarial Networks (Res-LGAN) for motion style transfer. The Res-LGAN models consist of a transfer network and a refinement network, …which work together to generate smooth and natural stylized motions while preserving key features of the original motions. Additionally, we have introduced a reconstruction loss term to ensure the stylized motions closely retain the features of the original motions. Our experiments demonstrate that the proposed Res-LGAN model outperforms existing state-of-the-art models by generating high-quality stylized motions while preserving the original motion features. To the best of our knowledge, Res-LGAN is the leading method for preserving original content features during motion style transferring. Show more
Keywords: GANs, motion style transfer, motion feature preserved
DOI: 10.3233/JIFS-224175
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 7785-7795, 2023
Authors: Rana, Shazia | Saeed, Muhammad | Qayyum, Madiha | Smarandache, Florentin
Article Type: Research Article
Abstract: This article is a preliminary draft for initiating and commencing a new pioneer dimension of expression. To deal with higher-dimensional data or information flowing in this modern era of information technology and artificial intelligence, some innovative super algebraic structures are essential to be formulated. In this paper, we have introduced such matrices that have multiple layers and clusters of layers to portray multi-dimensional data or massively dispersed information of the plithogenic universe made up of numerous subjects their attributes, and sub-attributes. For grasping that field of parallel information, events, and realities flowing from the micro to the macro level of …universes, we have constructed hypersoft and hyper-super-soft matrices in a Plithogenic Fuzzy environment. These Matrices classify the non-physical attributes by accumulating the physical subjects and further sort the physical subjects by accumulating their non-physical attributes. We presented them as Plithogenic Attributive Subjectively Whole Hyper-Super-Soft-Matrix (PASWHSS-Matrix) and Plithogenic Subjective Attributively Whole-Hyper-Super-Soft-Matrix (PSAWHSS-Matrix). Several types of views and level-layers of these matrices are described. In addition, some local aggregation operators for Plithogenic Fuzzy Hypersoft Set (PPFHS-Set) are developed. Finally, few applications of these matrices and operators are used as numerical examples of COVID-19 data structures. Show more
Keywords: Plithogenic, Hyper-Super-Soft-Matrix, matrix layers, parallel-universes, events, realities, aggregation operators, non-physical classifications, as COVID-19, data structures
DOI: 10.3233/JIFS-202792
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 7797-7820, 2023
Authors: Senthil Mahesh, P.C. | Muthumanickam, K. | Vijayalakshmi, P.
Article Type: Research Article
Abstract: Recent technological advancements have enabled users to conduct more sophisticated business transactions via Wi-Fi enabled networks. Typically, a compromised access point (CAP) can handle all traffic between a user and an Internet server, thus becoming a serious security hazard. In addition, an attacker can easily control the entire network using the CAP remotely and compromise as many victims as possible to form a botnet. This paper presents a hybrid recommendation prediction model for forecasting CAP attacks based on network traffic in a private network. This model combines various prediction techniques likethe time-series model, the kNN model and cross association algorithm …for attack prediction. This hybrid blacklisting recommendation system effectively improves the prediction rate significantly as well as the robustness against poisoning attacks. Show more
Keywords: Access point, hybrid model, prediction model, recommendation system, security
DOI: 10.3233/JIFS-212979
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 7821-7831, 2023
Authors: Mariyam, Farhana | Mehfuz, Shabana | Sadiq, Mohd.
Article Type: Research Article
Abstract: Goal oriented software requirements analysis method is used for the analysis of elicited functional goals (FGs) and non-functional goals (NFGs) of a system in which goals are decomposed and refined into sub-goals until requirements from the sub-goals are identified. Based on the critical analysis, we found that most of the attention of goal-oriented methods is on the crisp and fuzzy logic during the analysis of the software goals or requirements. In these methods’ prior information about the type of membership function is required; and the selection of membership function depends on the subjective justification. As a result, it lacks objectivity …and may affect the ranking values of the goals or requirements during the analysis. Therefore, this paper presents a rough attributed goal-oriented software requirements analysis (RAGOSRA) method in which rough preference matrix has been used to capture the opinions of different stakeholders. The results of the RAGOSRA method are compared by considering the following criteria, i.e., goal types, goal links, types of data used in the analysis, stakeholder perceptions and time complexity with some fuzzy based methods. Based on the time complexity analysis, it is found that RAGOSRA method requires only 24 operations for the selection of goals for the dataset having 3 NFGs and 4 FGs of an institute examination system. On the other hand, FAGOSRA method, fuzzy TOPSIS method, and fuzzy AHP method requires 36, 166, and 240 operations respectively. Show more
Keywords: Requirements engineering, goal-oriented requirements engineering, software requirements analysis, multi-criteria decision-making method, rough-set theory, institute examination system
DOI: 10.3233/JIFS-221300
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 7833-7843, 2023
Authors: Akula, Naveen Kumar | S, Sharief Basha
Article Type: Research Article
Abstract: Group decision-making is a technique wherein professionals rank and select the most acceptable ones based on recognised criteria. The objective of the present study was to establish a strategy for solving issues with Laplacian energy and association coefficient measures of intuitionistic fuzzy graphs through group decision-making. Initially, making use of Laplacian energy, the load of each criterion is determined, and the entire criterion load vector is then computed by averaging the determined loads. The substitutes are then ranked using the association coefficient measure linked to every criterion. Finally, we used the proposed technique wherein professionals rank and select the most …acceptable based on recognised criteria with real-time application. Show more
Keywords: Association coefficient (AC), group decision making (GDM), correlation coefficient (CC), membership function (MF), non-membership function (NMF), Laplacian energy (LE), intuitionistic fuzzy graphs (IFGs), intuitionistic fuzzy preference relations (IFPRs), intuitionistic fuzzy laplacian matrix (IFLM)
DOI: 10.3233/JIFS-222510
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 7845-7854, 2023
Authors: Shanthi, P. | Amutha, S. | Anbazhagan, N. | Bragatheeswara Prabu, S.
Article Type: Research Article
Abstract: A graph G is an undirected finite connected graph. A function f : V (G ) → [0, 1] is called a fractional dominating function if, ∑u ∈N [v ] f (u ) ≥1, for all v ∈ V , where N [v ] is the closed neighborhood of v . The weight of a fractional dominating function is w (f ) = ∑v ∈V (G ) f (v ). The fractional domination number γf (G ) has the least weight of all the fractional dominating functions of G . In this paper, we analyze the effects on γf (G ) of deleting a …vertex from G . Additionally, some bounds on γf (G ) are discussed, and provide the exactness of some bounds. If we remove any leaves from any tree T , then the resulting graphs are , where |l | is the number of leaves. Some of the results are proved by the eccentricity value of a vertex e (v ). Show more
Keywords: Domination number, edge domination number, fractional domination number, fractional edge domination number AMS Subject Classification: 05C72, 05C69.
DOI: 10.3233/JIFS-222999
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 7855-7864, 2023
Authors: Gong, Zhiwei
Article Type: Research Article
Abstract: Entropy is an important tool to describe the degree of uncertainty of fuzzy sets. In this study, we first define a new entropy and distance measure in the linguistic q-Rung orthopair fuzzy (LIVqROF) environment, and verify its correctness and rationality. Secondly, in the LIVqROF environment, the new entropy formula is effectively applied to the multi-attribute decision making (MADM) with unknown attribute weights, which provides a new idea for solving the MADM problems. Finally, the feasibility and effectiveness of the proposed method are verified by a numerical example.
Keywords: Entropy measure, distance measure, linguistic interval-valued q-Rung orthopair fuzzy set, group decision making
DOI: 10.3233/JIFS-223729
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 7865-7876, 2023
Authors: Sathiyavathi, V. | Thenmozhi, R. | Sai Ramesh, L. | Sabena, S. | Selvakumar, K.
Article Type: Research Article
Abstract: A Mobile Ad-hoc Network (MANET) is a self-constructed network consisting of spatially distributed nodes that cooperatively arrange themselves without any centralized manager or fixed based stations. In MANET, the nodes are deployed in a dynamic scenario, so, the nodes may fail as a result of energy depletion, hardware failure, communication link errors, and malicious attacks. Therefore, it is necessary to design energy-efficient fault-tolerant algorithms and protocols for MANETs. Since the development of Mobile Ad-hoc networks was originally motivated by military applications, such as battlefield surveillance and healthcare applications it is required to have a fast recovery mechanism to overcome the …fault condition. In this research work, a fault-tolerant Routing mechanism is designed and implemented to address the fault conditions such as node failure, link failure, and critical battery issues called Fault tolerant cluster based AODV with Error Reporting Routing (CAODVERR) protocol, and to improve the stability of the MANET. Also, an Error reporting mechanism has been incorporated with the Ad-hoc On-Demand Distance Vector (AODV) routing protocol. Show more
Keywords: MANET, fault-tolerant, clustering, routing, error reporting
DOI: 10.3233/JIFS-222718
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 7877-7886, 2023
Authors: Awan, Tehreem | Khan, Khan Bahadar | Mannan, Abdul
Article Type: Research Article
Abstract: COVID-19 is an epidemic, causing an enormous death toll. The mutational changing of an RNA virus is causing diagnostic complexities. RT-PCR and Rapid Tests are used for the diagnosis, but unfortunately, these methods are ineffective in diagnosing all strains of COVID-19. There is an utmost need to develop a diagnostic procedure for timely identification. In the proposed work, we come up with a lightweight algorithm based on deep learning to develop a rapid detection system for COVID-19 with thorax chest x-ray (CXR) images. This research aims to develop a fine-tuned convolutional neural network (CNN) model using improved EfficientNetB5. Design is …based on compound scaling and trained on the best possible feature extraction algorithm. The low convergence rate of the proposed work can be easily deployed into limited computational resources. It will be helpful for the rapid triaging of victims. 2-fold cross-validation further improves the performance. The algorithm proposed is trained, validated, and testing is performed in the form of internal and external validation on a self-collected and compiled a real-time dataset of CXR. The training dataset is relatively extensive compared to the existing ones. The performance of the proposed technique is measured, validated, and compared with other state-of-the-art pre-trained models. The proposed methodology gives remarkable accuracy (99.5%) and recall (99.5%) for biclassification. The external validation using two different test dataset also give exceptional predictions. The visual depiction of predictions is represented by Grad-CAM maps, presenting the extracted features of the predicted results. Show more
Keywords: COVID-19, Chest X-rays, Deep learning, EfficientNets
DOI: 10.3233/JIFS-223704
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 7887-7907, 2023
Authors: Suresh Kumar, M. | Sathish Kumar, G.A.
Article Type: Research Article
Abstract: This paper aims to formulate an enhanced ant colony optimization algorithm that helps find a suitable data route that improves energy efficiency and reduces the time consumption for the delivery of packets. Energy equations have been framed to analyze energy used at the transmitting, receiving, and relay nodes. The network is segmented into smaller virtual segments for easier analysis of the proposed algorithm. Each segment is assumed to have nodes with a cluster head. The sink gathers information from different cluster heads as it moves from one segment to another. The nodes not in close connection with the network used …the overhearing mechanism to share the information with the sink. The simulation has been done using Cisco Packet Tracer software. The proposed algorithm has been applied to different types of wireless networks to determine their efficiency. The wireless networks considered for this purpose are Bluetooth, Wi-Max, and Wi-Fi. Packet delivery ratio, end-to-end delay, collision, and lifetime are evaluated for the different types of wireless networks. The obtained results are analyzed, and graphs are plotted. Show more
Keywords: Ant colony optimization, energy efficient, mobile sink, wireless sensor networks, packet delivery ratio, WiFi, WiMax, energy
DOI: 10.3233/JIFS-221856
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 7909-7917, 2023
Authors: Qi, Ju
Article Type: Research Article
Abstract: In the big data and “Internet+” era, the research related cybersecurity risk has attracted much attention. However, Premium pricing for cybersecurity insurance remains in its early days. In this paper, we established a premium pricing method for cybersecurity risks. Firstly, the losses during the cyber infection is modeled by an interacting Markov SIS (Susceptible-Infected-Susceptible) epidemic model. we also proposed a premium simulation method called the Gillespie algorithm, which can be used for simulation of a continuous-time stochastic process. At last, as an example, we calculated the premiums by using premium principles and simulation in a simple network respectively. The numerical …case studies demonstrate the premium pricing model performs well, and the premiums based on simulations are rather conservative, and recommended using in practice by comparing the results of premiums. Show more
Keywords: SIS epidemic model, cybersecurity insurance, premium pricing, renewal reward process, gillespie simulation algorithm
DOI: 10.3233/JIFS-222308
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 7919-7933, 2023
Authors: Hu, Limei
Article Type: Research Article
Abstract: The traditional failure mode and effect analysis (FMEA), as an effective risk analysis technique, has several limitations in the uncertainty modeling and the weights determination of the risk indicators. This paper aims to propose a hybrid risk prioritization method simultaneously considering the characteristics of the reliability associated with the FMEA team members’ evaluation information and their psychological behavior to enhance the performance of the traditional FMEA model. The hybrid risk prioritization method is developed based on the generalized TODIM method and the weighted entropy measure with the linguistic Z-numbers (LZNs). First, the LZNs are adopted to depict the FMEA team …members’ cognition information and the reliability of these information. Second, a weighted entropy measure based on the fuzzy entropy and the LZNs is developed to obtain the risk indicators’ weights. Finally, the generalized TODIM method with the LZNs is constructed to obtain the risk priority orders of failure modes, which can effectively simulate the FMEA team members’ psychological character. The applicability and effectiveness of the proposed risk prioritization method is validated through an illustrative example of an integrated steel plant. The results of sensitivity analysis and comparative analysis indicate that the proposed hybrid risk prioritization method is effective and valid, and can get more accurate and practical risk ranking results to help enterprises formulate accurate risk prevention and control plans. Show more
Keywords: INDEX TERMS: Failure mode and effect analysis, risk prioritization, Linguistic Z-numbers, fuzzy entropy, the generalized TODIM method
DOI: 10.3233/JIFS-223132
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 7935-7955, 2023
Authors: Parida, Subhashree | Acharya, Milu | Patnaik, Srikanta
Article Type: Research Article
Abstract: In the present era, the most delicate environmental issue is global warming, and because of this, countries across the globe are trying to manage the most hazardous emissions by making certain investments in projects to promote green industrial practices. The proposed study creates sustainable deteriorating inventory models in both crisp and fuzzy environments, with both cloudy and intuitionistic fuzzy considerations, where the demand is taken to be time-dependent. In the current study, the emission of CO2 from transportation is controlled by the optimum investments in green technology (GT). This work develops the previous research that has worked on a …sustainable inventory system with controllable greenhouse facilities through green investment. The present research includes an optimum GT investment in an inventory system with two warehouses to restrict carbon emissions due to the transportation of goods from owned to rented warehouses and then to customers. To have control over the total cost, this work considers two warehouses to manage the stock-out conditions and represents models with shortages for crisp, cloudy fuzzy (CF), and intuitionistic fuzzy (IF) environments. A multiple prepayment option for the purchasing cost involving an installment is provided to the retailers. In the present research, we develop non-linear crisp and fuzzy deteriorating inventory models and suggest an algorithm for the solution process. Model problems are illustrated through numerical examples and validated through sensitivity analysis. A comparative inquiry is conducted for the optimum results obtained in all three cases. Show more
Keywords: Carbon emissions, green technology, disposal cost, cloudy fuzzy, intuitionistic fuzzy, ranking method
DOI: 10.3233/JIFS-223385
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 7957-7976, 2023
Authors: Khan, Izaz Ullah | Shah, Jehanzeb Ali | Bilal, Muhammad | Faiza, | Khan, Muhammad Saqib | Shah, Sajid | Akgül, Ali
Article Type: Research Article
Abstract: This article has been retracted. A retraction notice can be found at https://doi.org/10.3233/JIFS-219433 .
DOI: 10.3233/JIFS-220781
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 7977-7993, 2023
Authors: Sarfaraz, Amir Homayoun | Yazdi, Amir Karbassi | Hanne, Thomas | Hosseini, Raheleh Sadat
Article Type: Research Article
Abstract: Technology transfer plays an essential role in developing an organization’s capabilities to perform better in the market. Several protocols are defined for technology transfer. One of the main techniques in technology transfer is licensing, which significantly impacts profit and income. This study intends to develop a decision framework that integrates both a Fuzzy Inference System (FIS) and a two steps Fuzzy Quality Function Deployment (F-QFD) to assist an organization in selecting a licensor. To illustrate the decision framework’s performance, it has been implemented in an Iranian lubricant producer to select the best licensor among the 13 targeted companies. A complete …product portfolio, brand image enhancement, increasing the market share of the high-value products, and improving the technical knowledge of manufacturing products were identified as the most important expectations of the licensees. A sensitivity analysis for the recommended framework has been conducted. For doing so, 27 rules of the FIS were categorized into four group and then changed. The results are compared using the Pearson correlation coefficient. Inference rules detect unconventional changes, while logical changes are appropriately considered. Show more
Keywords: Technology transfer, licensing, fuzzy inference system, fuzzy quality function deployment, fuzzy QFD
DOI: 10.3233/JIFS-222232
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 7995-8014, 2023
Authors: Monika, | Singh, Pardeep | Chand, Satish
Article Type: Research Article
Abstract: Pedestrians are the most critical and vulnerable moving objects on roads and public areas. Learning pedestrian movement in these areas can be helpful for their safety. To improve pedestrian safety and enable driver assistance in autonomous driver assistance systems, recognition of the pedestrian direction of motion plays an important role. Pedestrian movement direction recognition in real world monitoring and ADAS systems are challenging due to the unavailability of large annotated data. Even if labeled data is available, partial occlusion, body pose, illumination and the untrimmed nature of videos poses another problem. In this paper, we propose a framework that considers …the origin and end point of the pedestrian trajectory named origin-end-point incremental clustering (OEIC). The proposed framework searches for strong spatial linkage by finding neighboring lines for every OE (origin-end) lines around the circular area of the end points. It adopts entropy and Q measure for parameter selection of radius and minimum lines for clustering. To obtain origin and end point coordinates, we perform pedestrian detection using the deep learning technique YOLOv5, followed by tracking the detected pedestrian across the frame using our proposed pedestrian tracking algorithm. We test our framework on the publicly available pedestrian movement direction recognition dataset and compare it with DBSCAN and Trajectory clustering model for its efficacy. The results show that the OEIC framework provides efficient clusters with optimal radius and minlines. Show more
Keywords: Unsupervised learning, line clustering method, origin-end point, pedestrian direction of motion, YOLOv5
DOI: 10.3233/JIFS-223283
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8015-8027, 2023
Authors: Zhang, Mingyue | Zhou, Zhiheng | Tao, Xiyuan | Zhang, Na | Deng, Ming
Article Type: Research Article
Abstract: The modern world contains a significant number of applications based on computer vision, in which human-computer interaction plays a crucial role, pose estimation of the hand is a crucial approach in the field of human-computer interaction. However, previous approaches suffer from the inability to accurately measure position in real-world scenes, difficulty in obtaining targets of different sizes, the structure of complex network, and the lack of applications. In recent years, deep learning techniques have produced state-of-the-art outcomes but there are still challenges that need to be overcome to fully exploit this technology. In this research, a fish skeleton CNN (FS-HandNet) …is proposed for hand posture estimation from a monocular RGB image. To obtain hand pose information, a fish skeleton network structure is used for the first time. Particularly, bidirectional pyramid structures (BiPS) can effectively reduce the loss of feature information during downsampling and can be used to extract features from targets of different sizes. It is more effective at solving problems of different sizes. Then a distribution-aware coordinate representation is employed to adjust the position information of the hand, and finally, a convex hull algorithm and hand pose information are applied to recognize multiple gestures. Extensive studies on three publicly available hand position benchmarks demonstrate that our method performs nearly as well as the state-of-the-art in hand pose estimation. Additionally, we have implemented hand pose estimation for the application of gesture recognition. Show more
Keywords: Hand pose estimation, FS-HandNet, distribution-aware coordinate representation, convex hull algorithm, the application of gesture recognition
DOI: 10.3233/JIFS-224271
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8029-8042, 2023
Authors: Guo, Xiaobin | Liu, Kun
Article Type: Research Article
Abstract: This paper discusses a new approximate solution of a class of fully fuzzy linear systems A ˜ x ˜ = b ˜ in which the coefficient matrix A ˜ is a positive fuzzy matrix. The original fuzzy linear systems is extended into simple crisp linear equation using the obtained approximate multiplication of positive fuzzy number and near zero fuzzy number. Two cases are analysed: (a) the unknown vector x ˜ is a near zero fuzzy vector with positive mean value; …(b) the unknown vector x ˜ is a near zero fuzzy vector with negative mean value. Two computing models are established and respective expression of the solution to fully fuzzy linear system are derived, and the sufficient condition for the existence of strong fuzzy solution are analyzed correspondingly. Some numerical examples are given to illustrated our proposed method. Show more
Keywords: Fuzzy numbers, matrix computation, fuzzy linear systems, fuzzy approximate solutions
DOI: 10.3233/JIFS-222421
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8043-8052, 2023
Authors: Ma, Hua | Tang, Yuqi | Zhang, Xuxiang | Zhu, Haibin | Huang, Peiji | Zhang, Hongyu
Article Type: Research Article
Abstract: An e-learning system should recommend learners appropriate learning resources according to their actual needs and cognitive status for improving their learning performance. To overcome the deficiencies of existing approaches (e.g., poor interpretability, limited efficiency and accuracy of recommendation), we propose a new recommendation approach to learning resources via knowledge graphs and learning style clustering. In this approach, the knowledge graphs of an online learning environment are constructed based on a generic ontology model, and the graph embedding algorithm and graph matching process are applied to optimize the efficiency of graph computation for identifying similar learning resources. By introducing learning style …theory, learners are clustered based on their learning styles. Based on the clustering results, the learners’ degrees of interest in similar learning resources are measured, and the recommendation results are obtained according to the degrees of interest. Finally, the experiments demonstrate that the proposed approach significantly enhances the computational efficiency and the quality of learning resource recommendation compared with the existing approaches in large-scale graph data scenarios. Show more
Keywords: Knowledge graphs, learning resource recommendation, learning style clustering, personalized learning
DOI: 10.3233/JIFS-222627
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8053-8069, 2023
Authors: Alnssyan, Badr | Hussein, Ekramy A. | Alizadeh, Morad | Afify, Ahmed Z. | Abdellatif, Ashraf D.
Article Type: Research Article
Abstract: We propose a new wider family called the weighted Lindley-G family. We derive some mathematical properties and special sub-models of the new family. We address the estimation of the model parameters by eight approaches of estimation. The estimation approaches are ranked and compared by using detailed simulations to develop a guideline for choosing the best approach for estimating the distribution parameters. The potentiality of the new family is illustrated via two applications to real-life data. It is shown that the proposed WLi-G family is more flexible as compared to some of the most cited families in the distribution theory literature …such as the exponentiated-G, beta-G, transmuted-G, and alpha-power-G families under the same baseline model. Show more
Keywords: Rényi entropy, exponential distribution, data analysis, Anderson–Darling estimation, maximum likelihood
DOI: 10.3233/JIFS-222758
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8071-8089, 2023
Authors: Duan, Chen | Liu, Yongli
Article Type: Research Article
Abstract: In fuzzy clustering algorithms, the possibilistic fuzzy clustering algorithm has been widely used in many fields. However, the traditional Euclidean distance cannot measure the similarity between samples well in high-dimensional data. Moreover, if there is an overlap between clusters or a strong correlation between features, clustering accuracy will be easily affected. To overcome the above problems, a collaborative possibilistic fuzzy clustering algorithm based on information bottleneck is proposed in this paper. This algorithm retains the advantages of the original algorithm, on the one hand, using mutual information loss as the similarity measure instead of Euclidean distance, which is conducive to …reducing subjective errors caused by arbitrary choices of similarity measures and improving the clustering accuracy; on the other hand, the collaborative idea is introduced into the possibilistic fuzzy clustering based on information bottleneck, which can form an accurate and complete representation of the data organization structure based on make full use of the correlation between different feature subsets for collaborative clustering. To examine the clustering performance of this algorithm, five algorithms were selected for comparison experiments on several datasets. Experimental results show that the proposed algorithm outperforms the comparison algorithms in terms of clustering accuracy and collaborative validity. Show more
Keywords: Possibilistic fuzzy clustering, collaborative clustering, information bottleneck, similarity measure
DOI: 10.3233/JIFS-223854
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8091-8102, 2023
Authors: Fu, Xingyu | Chen, Yingyue | Yan, Jingru | Chen, Yumin | Xu, Feng
Article Type: Research Article
Abstract: The random forest is a combined classification method belonging to ensemble learning. The random forest is also an important machine learning algorithm. The random forest is universally applicable to most data sets. However, the random forest is difficult to deal with uncertain data, resulting in poor classification results. To overcome these shortcomings, a broad granular random forest algorithm is proposed by studying the theory of granular computing and the idea of breadth. First, we granulate the breadth of the relationship between the features of the data sets samples and then form a broad granular vector. In addition, the operation rules …of the granular vector are defined, and the granular decision tree model is proposed. Finally, the multiple granular decision tree voting method is adopted to obtain the result of the granular random forest. Some experiments are carried out on several UCI data sets, and the results show that the classification performance of the broad granular random forest algorithm is better than that of the traditional random forest algorithm. Show more
Keywords: Granular computing, Broad granular vector, Granular decision tree, Granular random forest, Classification
DOI: 10.3233/JIFS-223960
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8103-8117, 2023
Authors: Sun, Qiong | Jiang, Jingjing | Wang, Zhongsheng | Liao, Bin
Article Type: Research Article
Abstract: By using the interactive big data between enterprises and stakeholders in social media, this paper investigates the views of different stakeholders on the disclosure of enterprise digital transformation. In view of the social media platform brings together different stakeholders, this paper uses the organizational hypocrisy theory to explore the stakeholders’ Reflection on the hypocritical speech, decision-making and action strategies adopted in the disclosure of enterprise digital transformation. Through data mining and computer-aided emotion analysis, the posts of sina Weibo’s top 500 Chinese enterprises from December 31, 2020 to December 31, 2021 and the reactions of stakeholders are retrieved and analyzed. …It is found that stakeholders have different reactions to the hypocrisy strategies of enterprises. Although stakeholders pay more attention to information related to actions, and the disclosure of such actions will cause positive and negative reactions, the inconsistency of speech and decision-making will produce positive reactions and reduce negative impressions. Overall, research shows that the use of organizational hypocrisy strategies in social media can enable enterprises to manage the views and legitimacy of stakeholders. Show more
Keywords: Organizational hypocrisy, digital transformation, stakeholder, emotional analysis
DOI: 10.3233/JIFS-224092
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8119-8132, 2023
Authors: Geng, Xiaonan | Liu, Peng
Article Type: Research Article
Abstract: This article has been retracted. A retraction notice can be found at https://doi.org/10.3233/JIFS-219433 .
DOI: 10.3233/JIFS-224316
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8133-8145, 2023
Authors: Gong, Zengtai | Wang, Fangdi
Article Type: Research Article
Abstract: Complex fuzzy set, as an extension of classical fuzzy sets, could describe the fuzzy characters of things more detail and comprehensively and is very useful in dealing with vagueness and uncertainty of problems that include the periodic or recurring phenomena. Note that a complex fuzzy set is different from the fuzzy complex set introduced and discussed by many scholars, since the membership degree of a complex fuzzy set is a complex number with length less than or equal to 1 while a fuzzy complex set is a real number with membership degree less than or equal to 1, and the …universe is the complex plane. As the mathematical theoretical basis of fuzzy mathematics, fuzzy set and its mapping, corresponding fuzzy complex set and its mapping have been investigated in depth because they integrate and cross the methods and results of classical real analysis and complex analysis. However, there is no comprehensive investigation on complex fuzzy set and its corresponding mathematical theory, even include decomposition theorems, extension principles and the basic operations of the complex fuzzy set. As is well known, the cut set of fuzzy sets is the bridge between fuzzy sets and classical sets, which plays a significant role in fuzzy sets and fuzzy systems. In this paper, the concept of (r , θ)-cut sets of complex fuzzy sets is proposed and their properties are discussed. Meanwhile, the decomposition theorems and the extension principles of complex fuzzy set based on (r , θ)-cut sets are deduced and corresponding properties are investigated. All these conclusions not only deeply enrich the fundamental theory of complex fuzzy set, but also provide a powerful tool to investigate complex fuzzy set. Finally, an example application of signal detection demonstrates the utility of the (r , θ)-cut sets of complex fuzzy sets in practice. Show more
Keywords: Complex fuzzy set, (r, θ)-cut sets, decomposition theorems, extension principles
DOI: 10.3233/JIFS-221639
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8147-8162, 2023
Authors: Wang, Wenpu | Lin, Wei | Gao, Fengxiang | Chang, Shuli
Article Type: Research Article
Abstract: Business English teaching quality evaluation Business English is a new type of composite specialty, which is a discipline innovation made by China’s higher education to adapt to the new market demand and international standards since the reform and opening up. Over the past 20 years, it has cultivated a number of compound talents for the cause of China’s reform and opening up. However, the backwardness of business English theoretical research has greatly restricted the development of business English. At present, Business English has been officially approved as a new major for undergraduate enrollment by the Ministry of Education of the …People’s Republic of China. Its subject nature, specialty structure, training objectives, and specialty compound characteristics need to be qualitatively studied theoretically. The business English teaching quality evaluation is viewed as the multiple attribute decision making (MADM) issue. In this paper, we connect the geometric Heronian mean (GHM) operator and power geometric (PG) with 2-tuple linguistic neutrosophic numbers (2TLNNs) to propose the generalized 2-tuple linguistic neutrosophic power geometric HM (G2TLNPGHM) operator. Then, the G2TLNGHM operator is applied to deal with the MADM problems under 2TLNNs. Finally, an example for business English teaching quality evaluation is used to show the proposed methods. Some comparative analysis and parameter influence analysis are fully given. The results show that the built algorithms method is useful for business English teaching quality evaluation. Show more
Keywords: Multiple attribute decision making (MADM), 2-tuple linguistic neutrosophic numbers set (2TLNNSs), G2TLNPGHM operator, business English teaching quality
DOI: 10.3233/JIFS-223850
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8163-8175, 2023
Authors: Singh, Pardeep | Singh, Nitin Kumar | Monika, | Chand, Satish
Article Type: Research Article
Abstract: One major issue plaguing online social media is hate speech, a complex phenomenon whose identification and target categorization have been studied by the natural language processing community. In recent years, notable studies have been made towards hate speech detection using various mechanisms varying from traditional machine learning to complex deep neural network models. However, these studies mainly focus on high-resource English language. The multilingual societies such as the Indian subcontinent: English, Hindi and Hindi-English code-mixed languages are widespread and convenient for the users. The research works studying hate speech detection in these languages are still very limited. To fill this …gap, we propose an mBERT-GRU framework comprising of multilingual BERT embedding and bidirectional GRU layers to learn the cumulative features for hate speech detection and its target categorization. We evaluated our work on three datasets HASOC-2019, HS and HEOT to prove the competitive performance. Our results show that the proposed framework outperformed monolingual and state-of-the-art methods on English, Hindi and Hindi-English code-mixed datasets with Macro-F1 measure values of 0.87, 0.83 and 0.77, respectively. Show more
Keywords: Deep learning, GRU, hate speech detection, multilingual BERT, social media, text analysis
DOI: 10.3233/JIFS-222057
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8177-8192, 2023
Authors: Chughtai, Iqra Toheed | Naseer, Asma | Tamoor, Maria | Asif, Saara | Jabbar, Mamoona | Shahid, Rabia
Article Type: Research Article
Abstract: In the past few years, due to the increased usage of internet, smartphones, sensors and digital cameras, more than a million images are generated and uploaded daily on social media platforms. The massive generation of such multimedia contents has resulted in an exponential growth in the stored and shared data. Certain ever-growing image repositories, consisting of medical images, satellites images, surveillance footages, military reconnaissance, fingerprints and scientific data etc., has increased the motivation for developing robust and efficient search methods for image retrieval as per user requirements. Hence, it is need of the hour to search and retrieve relevant images …efficiently and with good accuracy. The current research focuses on Content-based Image Retrieval (CBIR) and explores well-known transfer learning-based classifiers such as VGG16, VGG19, EfficientNetB0, ResNet50 and their variants. These deep transfer leaners are trained on three benchmark image datasets i.e., CIFAR-10, CIFAR-100 and CINIC-10 containing 10, 100, and 10 classes respectively. In total 16 customized models are evaluated on these benchmark datasets and 96% accuracy is achieved for CIFAR-10 while 83% accuracy is achieved for CIFAR-100. Show more
Keywords: CBIR, transfer learning, CNN, VGG-16, VGG-19, ResNet-50, EfficientNet, deep learning
DOI: 10.3233/JIFS-223449
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8193-8218, 2023
Authors: Arokiaraj, S. | Viswanathan, N.
Article Type: Research Article
Abstract: Human Activity Recognition (HAR) has reached its new dimension with the support of Internet of Things (IoT) and Artificial Intelligence (AI). To observe human activities, motion sensors like accelerometer or gyroscope can be integrated with microcontrollers to collect all the inputs and send to the cloud with the help of IoT transceivers. These inputs give the characteristics such as, angular velocity of movements, acceleration and apply them for an effective HAR. But reaching high recognition rate with less complicated computational overhead still represents a problem in the research. To solve this aforementioned issue, this work proposes a novel ensembling of …Capsule Networks (CN) and modified Gated Recurrent Units (MGRU) with Extreme Learning Machine (ELM) for an effective HAR classification based on data collected using IoT systems called Ensemble Capsule Gated (ECG)-Networks (NETS). The proposed system uses Capsule networks for spatio-feature extraction and modified (Gated Recurrent Unit) GRU for temporal feature extraction. The powerful feed forward training networks are then employed to train these features for human activity recognition. The proposed model is validated on real time IoT data and WISDM datasets. Experimental results demonstrates that proposed model achieves better results comparatively higher than existing (Deep Learning) DL models. Show more
Keywords: Artificial intelligence, capsule networks, human activity recognition, internet of things, gated recurrent units and spatio-feature extraction
DOI: 10.3233/JIFS-221551
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8219-8229, 2023
Authors: Srinivasa Rao, Illapu Sankara | Rajalakshmi, N.R.
Article Type: Research Article
Abstract: Since the IPv6 Wireless Personal Area Network (6LoWPAN) can be utilized for information dissemination, this network gains significant attention in recent years. Proxy mobile IPv6 (PMIPv6) is standard for mobility control based on network at entire IP wireless applications. But, group-based body area networks cannot respond effectively. A new improved group flexibility system decrease the number of control messages contain router requests as well as advertising messages when compared to the group-based PMIPv6 protocol, in order to minimize delay and signaling costs. The IEEE 802.15.4 standard for low-power personal area networks (6LoWPAN) complies through IPv6-compliant MAC and physical layers. If …the default parameters, excessive collisions, packet loss, and great latency occur arbitrarily in high traffic by default MAC parameters while using a great number of 6LoWPAN nodes. The implemented Whale optimization algorithm is based on artificial neural network optimization, genetic algorithm or particle swarm optimization to choose and authenticate MAC parameters. This manuscript proposes a novel intelligent method for choosing optimally configured MAC 6LoWPAN layer set parameters. Results of simulations based on the metrics such as Average delay time (ADT), Average signaling cost, Delivery ratio, Energy consumption, Latency, Network Life time (Nlt), Packet Overhead (PO), Packet loss. The performance of the proposed method provides 19.08%, 25.87%, 31.98%, 26.98%, 31.98%, 26.98% and 23.89% lower Latency, 12.67%, 25.98%, 31.98%, 26.98%, 27.98%, 31.97% and 27.85% lower Packet Overhead and 19.78%, 27.96%, 37.98%, 18.09%, 28.97%, 27.98% and 56.04% higher Delivery ratio compared with the existing methods such as 6LoWPAN-NUM-OHCA-FFA, 6LoWPAN-GTCCF-PSO, 6LoWPAN- DODAG-ACO, 6LoWPAN- MAC-GA-PSO, 6LoWPAN-NCG-DTC-NGIPSA and 6LoWPAN-TDMA-GTS-SHJA algorithms respectively. Show more
Keywords: Artificial neural networks, genetic algorithm, low power personal areas network (6LoWPAN), medium access control protocols (MAC Proxy mobile IPv6 (PMIPv6), particle swarm optimization and Whale optimization algorithm (WOA)
DOI: 10.3233/JIFS-222956
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8231-8255, 2023
Authors: Liu, Zhichao
Article Type: Research Article
Abstract: In the 75th session of the United Nations General Assembly, the Chinese government first proposed the goal of carbon neutrality and carbon peaking. Since then, China’s economy and society have undergone a comprehensive green and sustainable development upgrade and transformation. The development of green finance can provide financial support for achieving dual carbon goals and mitigate the impact of climate change. More importantly, it can contribute to the national economy’s and society’s sustainable development. We innovatively draw on the quality function deployment theory in marketing to logically formulate the research idea of this paper. On this basis, we also apply …the G1-entropy method from fuzzy mathematical theory for quantitative research. We innovatively address the actual national conditions in China and fully integrate green elements in constructing the index system from green finance and sustainability perspectives. Finally, we calculate index weights through G1-entropy quantification to assess the development quality of China’s green financial system and qualitatively propose countermeasures for the quality of China’s green financial development with respect to key index factors. Specifically, we sort out this paper in the following three aspects: (1) we innovatively combined the quality function deployment theory and built the quantitative analysis process architecture in this paper, which enhanced the readability of this paper (2) we realized the use of quantitative research for qualitative analysis and proposed the G1-entropy value method, which made up for the defects of the subjective and objective methods in the traditional assessment methods (3) we realized the organic combination of quantitative and qualitative analysis and proposed relevant countermeasure suggestions based on the quantitative index calculation results, which provided relevant countermeasure suggestions for promoting the sustainable and high-quality development of green finance in China. Our study will provide a set of perfect assessment methods for the quality improvement path and sustainable development strategy formulation after the construction of China’s future green financial system. It can also provide a reference assessment idea for the high-quality and sustainable development of China’s green finance, which will further help China’s economic transition to green and low-carbon and the achievement of the double carbon goal. Show more
Keywords: Economic quality assessment, dual carbon context, quality function deployment theory, G1-entropy value method, green financial system
DOI: 10.3233/JIFS-222935
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8257-8280, 2023
Authors: Wang, Shuai | Ning, Yufu | Huang, Hong | Chen, Xiumei
Article Type: Research Article
Abstract: Uncertain least squares estimation is one of the important methods to deal with imprecise data, which can fully consider the influence of given data on regression equation and minimize the absolute error. In fact, some scientific studies or observational data are often evaluated in terms of relative error, which to some extent allows the error of the forecasting value to vary with the size of the observed value. Based on the least squares estimation and the uncertainty theory, this paper proposed the uncertain relative error least squares estimation model of the linear regression. The uncertain relative error least squares estimation …minimizes the relative error, which can not only solve the fitting regression equation of the imprecise observation data, but also fully consider the variation of the error with the given data, so the regression equation is more reasonable and reliable. Two numerical examples verified the feasibility of the uncertain relative error least squares estimation, and compared it with the existing method. The data analysis shows that the uncertain relative error least squares estimation has a good fitting effect. Show more
Keywords: Relative error least squares estimation, relative error, least squares estimation, uncertainty theory
DOI: 10.3233/JIFS-222955
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8281-8290, 2023
Authors: Cui, Zhexin | Yue, Jiguang | Tao, Wei | Xia, Qian | Wu, Chenhao
Article Type: Research Article
Abstract: Collaboration is essential to improve the efficiency of product research and development (R&D), shorten the R&D cycle, and reduce the R&D costs in complex product lifecycle model management (CPLMM). However, disorganized processes and the unreliability of the result evaluation remain enormous challenges for efficient collaboration. This article proposes an active-passive collaboration mechanism to enable a regulated collaboration system, which can direct the self-organized collaboration of stakeholders. C-D-Petri Net is presented for the formal collaboration process modeling. The result evaluation in active-passive collaboration involves multi-source knowledge across disciplines and phases. To address the unreliable collaboration evaluation (Co-evaluation) caused by insufficient evaluation …knowledge and weak correlation between expertise and evaluation task, the collaborative fuzzy comprehensive evaluation (CFCE) model is established to support Co-evaluation actions, and its core improvement lies in the definition and introduction of collaboration volume. Finally, a simulated aircraft horizontal tail control system is regarded as an engineering application case to demonstrate and verify the effectiveness of the proposed method. Show more
Keywords: Active-passive collaboration, Knowledge-related fuzzy evaluation, C-D-Petri Net, Collaboration volume
DOI: 10.3233/JIFS-223978
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8291-8308, 2023
Authors: Li, Yufeng | Xu, Keyi | Ding, Yumei | Sun, Zhiwei | Ke, Ting
Article Type: Research Article
Abstract: Many traditional clustering algorithms are incapable of processing mixed-type datasets in parallel, limiting their applications in big data. In this paper, we propose a CF tree clustering algorithm based on MapReduce to handle mixed-type datasets. Mapper phase and reducer phase are the two primary phases of MR-CF. In the mapper phase, the original CF tree algorithm is modified to collect intermediate CF entries, and in the reducer phase, k -prototypes is extended to cluster CF entries. To avoid the high costs associated with I/O overheads and data serialization, MR-CF loads a dataset from HDFS only once. We first analyze the …time complexity, space complexity, and I/O complexity of MR-CF. We also compare it with sklearn BIRCH, Apache Mahout k -means, k -prototypes, and mrk-prototypes on several real-world datasets and synthetic datasets. Experiments on two mixed-type big datasets reveal that MR-CF reduces execution time by 45.4% and 61.3% when compared to k -prototypes, and it reduces execution time by 73.8% and 55.0% when compared to mrk-prototypes. Show more
Keywords: Clustering analysis, CF tree, mixed-type datasets, BIRCH, k-prototypes
DOI: 10.3233/JIFS-224234
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8309-8320, 2023
Authors: Khan, Muhammad Zahir | Aslam, Muhammad | Albassam, Mohammed
Article Type: Research Article
Abstract: When the target value (T) is located in the midpoint of the specification interval (m). Traditional process capability indices (PCIs) are often employed for a process with a symmetric tolerance (T = m). In case a process with asymmetric tolerance (T ≠m) traditional PCIs can be misleading. Process capability indices (PCIs) with asymmetric tolerance have been designed and successfully used in a crisp form in process capability analysis (PCA). These PCIs with asymmetric tolerance can benefit from the use of fuzzy set theory to deal with ambiguity and to add greater flexibility and sensitivity to mean variance, and target value (T), …and specification limits (SLs). In order to produce fuzzy SLs of PCIs with asymmetric tolerance fuzzy mean, fuzzy variance and the fuzzy target value have been used. Furthermore, these PCIs are graphically represented. It is concluded that the intermediate values of fuzzy SLs can be explored, which is not achievable with crisp SLs. Furthermore, it is recommended to utilize fuzzy SLs of PCIs with asymmetric tolerance to monitor goods that fall outside specification limits due to their flexibility and sensitivity in a fuzzy environment. The proposed FPCIs were illustrated with a real-life example using piston diameters that were produced in a factory. Show more
Keywords: Target value, fuzzy mean, fuzzy variance, asymmetric tolerance
DOI: 10.3233/JIFS-221993
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8321-8327, 2023
Authors: Jain, Archika | Sharma, Sandhya
Article Type: Research Article
Abstract: Hate speech on social media post is running now a days. Social media like YouTube, Twitter, and Facebook etc. are responsible for hated speech. Hated speech spreads through digital media, causing individuals to get confused and adopt prejudiced viewpoints. To limit the negative effects of disinformation on the digital platform, it is critical to detect it. Now a days, lots of digital platforms are available. Hate speech detection in dataset is very difficult. As a result, the Twitter dataset is of the size of 25296 is presented in this work. Many deep learning techniques are applied on Twitter dataset. The …Google Colab tool is used to scrape dataset material. Different deep learning approaches are utilized to boost the accuracy of the hated speech dataset. For training and validation accuracy and loss some models are used on Twitter dataset like Bi-directional Long Short Term Memory with Glove, Bi-LSTM, and Embedding from Language Model (Elmo) with deep learning, Convolutional Neural Network (CNN), Long Short Term Memory with Glove and LSTM. The performance of the proposed tweet dataset is evaluated using a variety of deep learning classifiers on text dataset. The planned deep learning techniques produced good results on tweet dataset. LSTM with Glove gave the highest accuracy 0.89 and minimum loss 0.19 on tweet dataset. So when compare our model on same dataset that was used earlier then we get highest accuracy and minimum loss. Show more
Keywords: Deep learning, classifiers, twitter dataset, LSTM, and accuracy
DOI: 10.3233/JIFS-222431
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8329-8341, 2023
Authors: Camgoz Akdag, Hatice | Menekse, Akin
Article Type: Research Article
Abstract: Breast cancer is the leading cause of cancer-related deaths, and choosing a suitable treatment plan for this disease has proved difficult for oncologists owing to the variety of criteria and alternatives that must be considered during the decision-making process. Since prospective treatment options influence patients’ health-related quality of life in a variety of ways, a methodology that can completely and objectively evaluate alternative treatments has become an essential issue. This paper proposes a novel multi-criteria decision-making (MCDM) methodology by integrating the CRiteria Importance Through Intercriteria Correlation (CRITIC) and the REGIME techniques and handles the problem of breast cancer treatment selection …problem. CRITIC enables the determination of objective criterion weights based on the decision matrix, while REGIME ranks the options without the need for lengthy computations or normalization procedures. The suggested methodology is demonstrated in a spherical fuzzy atmosphere, which allows decision experts to independently express their degrees of membership, non-membership, and hesitancy in a broad three-dimensional spherical space. In the numerical example provided, three oncologists evaluate four breast cancer treatment alternatives, namely, surgery, radiotherapy, chemotherapy, and hormone therapy, with respect to five criteria, which are disease or tumor type, stage of disease, patient type, side effects, and financial status of the patient. The tumor type is determined to be the most important assessment criterion, and surgery is selected as the best course of action. The stability and validity of the proposed methodology are verified through sensitivity and comparative studies. The discussions, limitations, and future research avenues are also given within the study. Show more
Keywords: CRITIC, REGIME, spherical fuzzy set, MCDM, breast cancer treatment selection
DOI: 10.3233/JIFS-222648
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8343-8356, 2023
Authors: Ma, Zhanyou | Gao, Yingnan | Li, Zhaokai | Li, Xia | Liu, Ziyuan
Article Type: Research Article
Abstract: The verification of reachability properties of fuzzy systems is usually based on the fuzzy Kripke structure or possibilistic Kripke structure. However, fuzzy Kripke structure or possibilistic Kripke structure is not enough to describe nondeterministic and concurrent fuzzy systems in real life. In this paper, firstly, we propose the generalized possibilistic decision process as the model of nondeterministic and concurrent fuzzy systems, and deduce the possibilities of sets of paths of the generalized possibilistic decision process relying on defining of schedulers. Then, we give fuzzy matrices calculation methods of the maximal possibilities and the minimal possibilities of eventual reachability, always reachability, …constrained reachability, repeated reachability and persistent reachability. Finally, we propose a model checking approach to convert the verification of safety property into the analysis of reachabilities. Show more
Keywords: Generalized possibilistic decision processes, scheduler, fuzzy matrices, reachability, safety property
DOI: 10.3233/JIFS-222803
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8357-8373, 2023
Authors: Wu, Yisheng | Jin, Xin | Huang, Haiping
Article Type: Research Article
Abstract: This paper focuses on the task of Point-of-interest (POI) recommendation whose goal is to generate a list of POIs for a target user based on his or her history check-in records. Different from the traditional recommendation tasks (e.g., movie recommendation), there are many factors, like temporal factor and geographical factor, which make a great influence on user preference. Though existing POI recommendation methods tend to model the user preference from temporal factor, geographical factor or social factor, they fail to model these factors into a jointly model, leading to learn the suboptimal user preference. To tackle this issue, we propose …a Muti-channel Graph Attention Network (MGAN) for POI recommendation which learns the user preference from multiple aspects in a unify model. Specifically, MGAN first constructs several graphs with corresponding contextual features to capture the user preference from temporal, geographical, semantic and social aspects. Then MGAN leverages the graph attention networks to learn the representations of POIs from these graphs. Finally, MGAN estimates the user preference from the history check-in records and other similar users via the learned POI representations. We conduct extensive experiments on real-world datasets. And the results indicate that our proposed MGAN outperforms mainstream POI recommendation methods. Show more
Keywords: Point-of-interest, recommendation, graph attention network, temporal, geographical
DOI: 10.3233/JIFS-222952
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8375-8385, 2023
Authors: Deng, Xue | Geng, Fengting | Fang, Wen | Huang, Cuirong | Liang, Yong
Article Type: Research Article
Abstract: By considering the stock market’s fuzzy uncertainty and investors’ psychological factors, this paper studies the portfolio performance evaluation problems with different risk attitudes (optimistic, pessimistic, and neutral) by the Data Envelopment Analysis (DEA) approach. In this work, the return rates of assets are characterized as trapezoidal fuzzy numbers, whose membership functions with risk attitude parameters are described by exponential expression. Firstly, these characteristics with risk attitude are strictly derived including the possibilistic mean, variance, semi-variance, and semi-absolute deviation based on possibility theory. Secondly, three portfolio models (mean-variance, mean-semi-variance, and mean-semi-absolute-deviation) with different risk attitudes are proposed. Thirdly, we prove the …real frontiers determined by our models are concave functions through mathematical theoretical derivation. In addition, two novel indicators are defined by difference and ratio formulas to characterize the correlation between DEA efficiency and portfolio efficiency. Finally, numerical examples are given to verify the feasibility and effectiveness of our model. No matter what risk attitude an investor holds, the DEA can generate approximate real frontiers. Correlation analysis indicates that our proposed approach outperforms in evaluating portfolios with risk attitudes. At the same time, our model is an improvement of Tsaur’s work (2013) which did not study the different risk measures, and an extension of Chen et al.’s work (2018) which only considered risk-neutral attitude. Show more
Keywords: Portfolio performance evaluation, risk attitude, data envelopment analysis (DEA), possibility theory, real frontier
DOI: 10.3233/JIFS-223543
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8387-8411, 2023
Authors: Lin, Sihong | Zhang, Kunbin | Guan, Dun | He, Linjie | Chen, Yumin
Article Type: Research Article
Abstract: Intrusion detection systems have become one of the important tools for network security due to the frequent attacks brought about by the explosive growth of network traffic. Autoencoder is an unsupervised learning model with a neural network structure. It has a powerful feature learning capability and is effective in intrusion detection. However, its network construction suffers from overfitting and gradient disappearance problems. Traditional granular computing methods have advantages in solving such problems, but the process is relatively complex, the granularity dimension is high, and the computational cost is large, which is not suitable for application in intrusion detection systems. To …address these problems, we propose a novel autoencoder: Granular AutoEncoders (GAE). The granulation reference set is constructed by random sampling. The granulation of training samples is based on single-feature similarity in a reference set to form granules. The granulation of multiple features results in granular vectors. Some operations of granules are defined. Furthermore, we propose some granular measures, including granular norms and granular loss functions. The GAE is further applied to the field of intrusion detection by designing an anomaly detection algorithm based on the GAE. The algorithm determines whether the network flows are anomalous by comparing the difference between an input granular vector and its output granular vector that is reconstructed by the GAE. Finally, some experiments are conducted using an intrusion detection dataset, comparing multiple metrics in terms of precision, recall, and F1-Score. The experimental results validate the correctness and effectiveness of the intrusion detection method based on GAE. And contrast experiments show that the proposed method has stronger ability for detecting anomalies than the correlation algorithms. Show more
Keywords: Granular computing, intrusion detection, autoencoder, deep Learning, anomaly detection
DOI: 10.3233/JIFS-223649
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8413-8424, 2023
Authors: Shanmukha, M.C. | Lee, Sokjoon | Usha, A. | Shilpa, K.C. | Azeem, Muhammad
Article Type: Research Article
Abstract: Topological indices and coindices are numerical invariants that relate to quantitative structure property/activity connections. The purpose of topological indices and coindices were introduced to draw the data related to chemical graphs with respect to adjacent & non adjacent pairs of vertex degrees respectively. These indices equip the researchers with a lot of information related to the properties and structure of the chemical compound. In this article, CoM-polynomials for molecular graph of linear and multiple Anthracene are computed from which eleven degree based topological coindices are derived.
Keywords: CoM-polynomial, topological coindex, anthracene
DOI: 10.3233/JIFS-223947
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8425-8436, 2023
Authors: Devi Sri Nandhini, M. | Pradeep, Gurunathan
Article Type: Research Article
Abstract: Sentiment analysis is the contextual analysis of words to retrieve the social opinion of a brand which aids the business firms/institutions to know the impact of their products/services. It is habitual that users may express different opinions regarding various aspects of the same entity. Therefore, there is a strong demand to extract all the opinion targets may those be explicitly mentioned aspects or implicit aspects which are not directly specified in the reviews. In this context, comparatively less amount of work has been carried out concerning implicit aspect detection. The proposed work has been dedicated solely to extracting the implicit …aspects using a dynamic approach based on the type of sentence containing the clues for implicit aspect. A novel aspect pointer compendium (APC) has been developed that catalyzes the task of finding implicit aspects to the maximum extent possible. The APC incorporates the usage of different types of clues such as synonym clues, context clues, phrase clues, and partially implicit aspects that aid in the detection of hidden aspects. Based on this idea, the proposed work classifies the implicit aspect sentences into six types and proceeds with the task in an efficient manner. To strengthen the task of implicit aspect detection, the proposed work utilizes a hybrid technique encompassing APC, domain-specific adjective-noun collocation list (DSANCL), and the explicit aspect-opinion word pairs extracted from the reviews. The experimentation and results reveal that the proposed hybrid approach shows a good improvement in terms of the efficacy of extracting the implicit aspects as compared to the existing baseline models. Show more
Keywords: Implicit aspect detection, aspect pointer compendium, partially implicit aspects
DOI: 10.3233/JIFS-222927
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8437-8450, 2023
Authors: Yang, Yali | Zhang, Tianwei
Article Type: Research Article
Abstract: This paper firstly establishes the discrete-time lattice networks for nonlocal stochastic competitive neural networks with reaction diffusions and fuzzy logic by employing a mix techniques of finite difference to space variables and Mittag-Leffler time Euler difference to time variable. The proposed networks consider both the effects of spatial diffusion and fuzzy logic, whereas most of the existing literatures focus only on discrete-time networks without spatial diffusion. Firstly, the existence of a unique ω-anti-periodic in distribution to the networks is addressed by employing Banach contractive mapping principle and the theory of stochastic calculus. Secondly, global exponential convergence in mean-square sense to …the networks is discussed on the basis of constant variation formulas for sequences. Finally, an illustrative example is used to show the feasible of the works in the current paper with the help of MATLAB Toolbox. The work in this paper is pioneering in this regard and it has created a certain research foundations for future studies in this area. Show more
Keywords: Lattice, reaction diffusion, stochastic, finite difference method
DOI: 10.3233/JIFS-223495
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8451-8470, 2023
Authors: Comakli Sokmen, Özlem | yılmaz, Mustafa
Article Type: Research Article
Abstract: The hierarchical Chinese postman problem (HCPP) aims to find the shortest tour or tours by passing through the arcs classified according to precedence relationship. HCPP, which has a wide application area in real-life problems such as shovel snow and routing patrol vehicles where precedence relations are important, belongs to the NP-hard problem class. In real-life problems, travel time between the two locations in city traffic varies due to reasons such as traffic jam, weather conditions, etc. Therefore, travel times are uncertain. In this study, HCPP was handled with the chance-constrained stochastic programming approach, and a new type of problem, the …hierarchical Chinese postman problem with stochastic travel times, was introduced. Due to the NP-hard nature of the problem, the developed mathematical model with stochastic parameter values cannot find proper solutions in large-size problems within the appropriate time interval. Therefore, two new solution approaches, a heuristic method based on the Greedy Search algorithm and a meta-heuristic method based on ant colony optimization were proposed in this study. These new algorithms were tested on modified benchmark instances and randomly generated problem instances with 817 edges. The performance of algorithms was compared in terms of solution quality and computational time. Show more
Keywords: Optimization, arc routing problems, chance-constrained stochastic programming, new efficient algorithm, hierarchical Chinese postman problem
DOI: 10.3233/JIFS-222097
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8471-8492, 2023
Authors: Zhong, Cheng | Wang, Jie-Sheng | Liu, Yu
Article Type: Research Article
Abstract: The rolling bearing fault diagnosis is affected by industrial environmental noise and other factors, leading to the existence of some redundant components after signal decomposition. At the same time, the existence of the modal aliasing phenomenon in empirical mode decomposition (EMD) and the relevant improved algorithms also leads to the existence of many invalid features in the components. These phenomena have great influence on the bearing fault diagnosis. So a rolling bearing bidirectional-long short term memory (Bi-LSTM) fault diagnosis method was proposed based on segmented interception auto regressive (SIAR) spectrum analysis and information fusion. The ensemble empirical mode decomposition (EEMD), …the complementary ensemble empirical mode decomposition (CEEMD) and the robust EMD (REMD) algorithms decompose the rolling bearing fault signals, and AR spectrum analysis is performed on the obtained components respectively. By comparing the AR spectra of the components corresponding to different fault locations, the effective AR spectral values are intercepted as the eigenvalues of the data, and finally all the eigenvalues are fused to achieve the purpose of screening effective features more efficiently so as to reduce the impact of feature redundancy caused by mode aliasing on neural network training. Then the Bi-LSTM neural network was used as a rolling bearing fault diagnosis classifier, and the simulation experiments were conducted based on the rolling bearing fault signal data from Case Western Reserve University to verify the effectiveness of the proposed feature extraction and fault diagnosis method. Show more
Keywords: Rolling bearing, fault diagnosis, AR spectrum analysis, information fusion, empirical mode decomposition, LSTM
DOI: 10.3233/JIFS-222476
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8493-8519, 2023
Authors: Rajesh, Thota Radha | Rajendran, Surendran | Alharbi, Meshal
Article Type: Research Article
Abstract: Multi-agent reinforcement learning (MARL) is a generally researched approach for decentralized controlling in difficult large-scale autonomous methods. Typical features create RL system as an appropriate candidate to develop powerful solutions in variation of healthcare fields, whereas analyzing decision or treatment systems can be commonly considered by a prolonged and sequential process. This study develops a new Penguin Search Optimization Algorithm with Multi-agent Reinforcement Learning for Disease Prediction and Recommendation (PSOAMRL-DPR) model. This research aimed to use a unique PSOAMRL-DPR algorithm to forecast diseases based on data collected from networks and the cloud by a mobile agent. The major intention of …the proposed PSOAMRL-DPR algorithm is to identify the presence of disease and recommend treatment to the patient. The model manages the agent container with different mobile agents and fetched data from dissimilar locations of the network as well as cloud. For disease detection and prediction, the PSOAMRL-DPR technique exploits deep Q-network (DQN) technique. In order to tune the hyperparameters related to the DQN technique, the PSOA technique is used. The experimental result analysis of the PSOAMRL-DPR technique is validated on heart disease dataset. The simulation values demonstrate that the PSOAMRL-DPR technique outperforms the other existing methods. Show more
Keywords: Multi-agent reinforcement learning, penguin search optimization, deep Q-learning, disease prediction, treatment recommendation
DOI: 10.3233/JIFS-223933
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8521-8533, 2023
Authors: Wang, Jing | Cai, Qiang | Wang, Hongjun | Wei, Guiwu | Liao, Ningna
Article Type: Research Article
Abstract: Green supply chain management attaches great importance to the coordinated development of social economy and ecological environment, and requires enterprises to consider environmental protection factors in product design, packaging, procurement, production, sales, logistics, waste and recycling. Suppliers are the “source” of the entire supply chain, and the choice of green suppliers is the basis of green supply chain management, and their quality will directly affect the environmental performance of enterprises. The green supplier selection is a classical multiple attribute group decision making (MAGDM) problems. Interval-valued intuitionistic fuzzy sets (IVIFSs) are the extension of intuitionistic fuzzy sets (IFSs), and are utilized …to depict the complex and changeable circumstance. To better adapt to complex environment, the purpose of this paper is to construct a new method to solve the MAGDM problems for green supplier selection. Taking the fuzzy and uncertain character of the IVIFSs and the psychological preference into consideration, the original MABAC method based on the cumulative prospect theory (CPT) is extended into IVIFSs (IVIF-CPT-MABAC) method for MAGDM issues. Meanwhile, the method to evaluate the attribute weighting vector is calculated by CRITIC method. Finally, a numerical example for green supplier selection has been given and some comparisons is used to illustrate advantages of IVIF-CPT-MABAC method and some comparison analysis and sensitivity analysis are applied to prove this new method’s effectiveness and stability. Show more
Keywords: Multiple attribute group decision making (MAGDM), interval-valued intuitionistic fuzzy sets (IVIFSs), MABAC, cumulative prospect theory (CPT), CRITIC, green supplier selection
DOI: 10.3233/JIFS-224206
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8535-8560, 2023
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl