Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2024: 1.7
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Sun, Shuwan | Bian, Weixin | Xie, Dong | Xu, Deqin | Huang, Yi
Article Type: Research Article
Abstract: With the development of wireless communication technology and the rapid increase of user data, multi-server key agreement authentication scheme has been widely used. In order to protect users’ privacy and legitimate rights, a two-factor multi-server authentication scheme based on device PUF and users’ biometrics is proposed. The users’ biometrics are combined with the physical characteristics of the Physically Unclonable Functions (PUF ) as authentication factors, which not only ensures the security of the scheme, but it also is user-friendly without a password. The proposed scheme can be applied to telemedicine, smart home, Internet of Vehicles and other fields to …achieve mutual authentication and key agreement between users and servers. In order to prove the security of the proposed scheme, the widely accepted ROR model and BAN logic are used for formal security analysis. The scheme can effectively resist various security attacks, and the comparison with existing schemes shows that it has better performance in terms of communication cost and computational complexity. Show more
Keywords: Multi-server, physical unclonable function, password-free, mutual authentication, biometric security and privacy
DOI: 10.3233/JIFS-221354
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 911-928, 2023
Authors: Nishy Reshmi, S. | Shreelekshmi, R.
Article Type: Research Article
Abstract: In this paper, we propose a method exploiting syntactic structure, semantic relations and word embeddings for recognizing textual entailment. The sentence pairs are analyzed using their syntactic structure and categorization of sentences in active voice, sentences in passive voice and sentences holding copular relations. The main syntactic relations such as subject, verb and object are extracted and lemmatized using a lemmatization algorithm based on parts-of-speech. The subject-to-subject, verb-to-verb and object-to-object similarity is identified using enhanced Wordnet semantic relations. Further similarity is analyzed using modifier relation, number relation, nominal modifier relation, compound relation, conjunction relation and negative relation. The experimental evaluation …of the method on Stanford Natural Language Inference dataset shows that the accuracy of the method is 1.4% more when compared to the state-of-the-art zero shot domain adaptation methods. Show more
Keywords: GloVe, natural language processing, textual entailment, Wordnet
DOI: 10.3233/JIFS-223275
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 929-939, 2023
Authors: Liu, Boting | Guan, Weili | Yang, Changjin | Fang, Zhijie
Article Type: Research Article
Abstract: Word vector is an important tool for natural language processing (NLP) tasks such as text classification. However, existing static language models such as Word2vec cannot solve the polysemy problem, leading to a decline in text classification performance. To solve this problem, this paper proposes a method for making Chinese word vector dynamic (MCWVD). The part of speech (POS) is used to solve the ambiguity problem caused by different POS. The POS structure graph is constructed and the syntactic structure information of POS features is extracted by GCN (Graph Convolutional Network). POS vector and word vector are concatenated into PW (POS-Word) …vector. Parametric matrix is added to improve the fusion effect of POS and word features. Multilayer attention is used to distinguish the importance of different features and further update the vector expression of word vectors about the current context. Experiments on Chinese datasets THUCNews and SogouNews show that MCWVD effectively improves the accuracy of text classification and achieves better performance than CoVe (Context Vectors) and ELMo (Embeddings from Language Models). MCWVD also achieves similar performance to BERT and GPT-1 (Generative Pre-Training), but with a much lower computational cost and only 4% of BERT parameters. Show more
Keywords: Word vector, Word2vec, part of speech, Graph Convolutional Network, multi-layer attention
DOI: 10.3233/JIFS-224052
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 941-952, 2023
Authors: Tong, Shekun | Peng, Jie
Article Type: Research Article
Abstract: In this work, with the aim of separating the genuine and forgery samples of the signature, we developed a new dual-path architecture using deep neural network and a traditional descriptor for feature extraction toward an automatic offline signature recognition. The proposed approach is an extended version of VGG-16, which is enhanced using our two paths architecture. In the first path, we explore features using a deep convolutional neural network, and in the second path, we discover global features using a traditional heuristic approach. For classical feature extraction, an innovative idea is presented, in which the descriptor is stable for some …common changes, such as magnification and epoch, in the signature samples. Our traditional approach extracts global features that are stable with rotation and scaling. The proposed method was analyzed and compared with three well-known databases of CEDAR, UTsig, and GPDS signature images. A dual-patched model architecture is significantly more accurate than the basic model when compared to the basic model. In agreement with the proposed method, the best signature recognition accuracy on the CEDAR database is in the range of 98.04-99.96%, while the best recognition accuracy on the GPDS and UTsig databases is 98.04% and 99.56%, respectively. Furthermore, this technique has been compared with four popular methods such as VGG-S, VGG-M, VGG-16, and LS2Net. The presented approach achieved a recognition rate of 99.96% using a diverse signature database. Experimental results demonstrate that the proposed VGG-16 based signature recognition system is superior over texture-based and deep-learning methods and also outperforms the existing state-of-the-art results in this regard. It is expected that the proposed system will provide fresh acumen to the researchers in developing offline signature verification and recognition systems in other scripts. Show more
Keywords: Signature recognition, offline, deep learning, VGG 16-layer neural network, feature extraction
DOI: 10.3233/JIFS-224326
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 953-964, 2023
Authors: Devika, M. | Shaby, Maflin
Article Type: Research Article
Abstract: One of the major challenge in Wireless Sensor Networks (WSN’s) deployment is efficient energy consumption. Critical distance, proper routing algorithm and error control coding techniques can be used for energy optimization. As WSN contains a large number of power constrained sensors, the sensed data from the environment should be transmitted in a cooperative way to the base station (BS). The pattern of the clustering structure can extend the sensor network life time, reduce the total consumed energy and regulate the data transmission. Clustering concept combines group of sensors which are located in the same communication range. Some of the routing …protocol like, SEED, LEACH, SEP, Z-SEP etc., suffers from idle listening problem, which cannot cope with an environment with sensor nodes. It leads to energy wastage across the network. To manage energy efficiency and traffic heterogeneity issues, a new routing protocol called enhanced energy efficient sleep awake aware intelligent sensor network (EEESAA) is proposed. Here, one sensor in each group will be in active mode whereas other sensors entered in sleep mode. Based on the nodes energy, sleep and awake node pairs will be altered. In the proposed method, one slot is allotted for group of pairs. The proposed approach is evaluated and compared against LEACH, SEP and Z-SEP protocols. Simulation results show that EEESAA protocol performs better than LEACH, SEP, Z-SEP in terms of cluster head selection, throughput, number of alive & dead nodes and network lifetime. Show more
Keywords: Wireless sensor network, enhanced energy efficient sleep awake aware intelligent sensor network (EEESAA), low-energy adaptive clustering hierarchy (LEACH), stable election protocol, zonal stable election protocol
DOI: 10.3233/JIFS-224380
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 965-973, 2023
Authors: Yao, Zhuangkai | Zeng, Bi | Hu, Huiting | Wei, Pengfei
Article Type: Research Article
Abstract: In recent mathematical reasoning tasks, self-attention has achieved better results in public datasets. However, self-attention performs poorly on more complex mathematical problems due to the lack of capacity to capture local features and the ill-conditioned training after deepening the number of layers. To tackle the problem and enhance its ability of extracting local features while learning the global contexts, we propose an implicit mathematical reasoning model that improves Transformer by combining self-attention and convolution to achieve joint modeling of global and local context. Also, by introducing Reweight connection and adversarial loss function, we prevent the model gradient from disappearing or …exploding in a deep neural network while ensuring the convergence speed and avoiding overfitting. Experimental results show that the proposed model improves the accuracy by 4.47% on average for complex mathematical problems compared to the best existing results. In addition, we verify the validity of our model using ablation analysis and further demonstrate the interpretability of the model by attention mapping and task role analysis. Show more
Keywords: Implicit mathematical reasoning, self-attention, depth separable convolution, causal language model, adversarial loss
DOI: 10.3233/JIFS-224598
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 975-988, 2023
Authors: Wang, Wei | Zhang, Ning | Peng, Weishi | Liu, Zhengqi
Article Type: Research Article
Abstract: Intonation evaluation is an important precondition that offers guidance to music practices. This paper present a new intonation quality evaluation method based on self-supervised learning to solve the fuzzy evaluation problem at the critical intonations. Firstly, the effective features of audios are automatically extracted by a self-supervised learning-based deep neural network. Secondly, the intonation evaluation of the single tones and pitch intervals are carried out by combining with the key local features of the audios. Finally, the intonation evaluation method characterized by physical calculations, which simulates and enhances the manual assessment. Experimental results show that the proposed method achieved the …accuracy of 93.38% which is the average value of multiple experimental results obtained by randomly assigning audio data, which is much higher than that of the frequency-based intonation evaluation method(37.5%). In addition, this method has been applied in music teaching for the first time and delivers visual evaluation results. Show more
Keywords: Music practice, intonation evaluation, self-supervised learning, deep neural network, audio feature extraction
DOI: 10.3233/JIFS-230165
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 989-1000, 2023
Authors: Lin, Fucai | Wu, Tingyi | Cao, Xiyan | Li, Jinjin
Article Type: Research Article
Abstract: The theory of knowledge spaces (KST) which is regarded as a mathematical framework for the assessment of knowledge and advices for further learning. Now the theory of knowledge spaces has many applications in education. From the topological point of view, we discuss the language of the theory of knowledge spaces by the axioms of separation and the accumulation points of pre-topology respectively, which establishes some relations between topological spaces and knowledge spaces; in particular, we show that the language of the regularity of pre-topology in knowledge spaces and give a characterization for knowledge spaces by inner fringe of knowledge states. …Moreover, we study the relations of Alexandroff spaces and quasi ordinal spaces; then we give an application of the density of pre-topological spaces in primary items for knowledge spaces, which shows that one person in order to master an item, she or he must master some necessary items. In particular, we give a characterization of a skill multimap such that the delineated knowledge structure is a knowledge space, which gives an answer to a problem in [14 ] or [18 ] whenever each item with finitely many competencies; further, we give an algorithm to find the set of atom primary items for any finite knowledge space. Show more
Keywords: Knowledge space, knowledge structure, learning space, pre-topological space, skill multimap, quasi ordinal space, Alexandroff space, separation of axiom, primary item, Primary 54A05, secondary 54A25, 54B05, 54B10, 54D05, 54D70
DOI: 10.3233/JIFS-230498
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1001-1013, 2023
Authors: Wang, Encheng | Liu, Xiufeng | Wan, Jiyin
Article Type: Research Article
Abstract: Received Signal Strength Indication (RSSI) fluctuates with the change of indoor noise, resulting in a large positioning error of the trained Back Propagation Neural Network (BPNN). An adaptive indoor positioning model based on Cauchy particle swarm optimization (Cauchy-PSO) BPNN is proposed to solve the problem. In the off-line training phase, the signal with less noise intensity acquired in a good environment is selected as the original training set in the localization phase. The variance of the received set of signals is used as a measure of the noise intensity of the current environment. In the localization phase, the variance of …each set of signals received is calculated at equal intervals. If the variance of adjacent intervals differs significantly, the system adjusts the original training set data according to the current noise intensity and re-trains the BP model online. Meanwhile, the particle swarm optimization algorithm using Cauchy variance to optimize the BP network tends to fall into the disadvantage of local optimum. Considering that the collected fingerprint database may generate “high-dimensional disasters”, Principal Component Analysis (PCA) is used to select and downscale the features of the wireless Access Point (AP). The proposed adaptive localization model can be trained online. The improved Cauchy-PSO algorithm and data dimensionality reduction can further improve the localization accuracy and training speed of the BP model. The experimental results show that the adaptive indoor localization model has strong adaptive capability in a noise-varying environment. Show more
Keywords: RSSI, adaptive BP model (AI-BP), BPNN, PCA, Cauchy-PSO
DOI: 10.3233/JIFS-231082
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1015-1027, 2023
Authors: Qiao, Wenbao
Article Type: Research Article
Abstract: Computer network security evaluation is a basic work to determine the security performance of the network system and implement the network security management. It involves organizational management, network technology, personnel psychology, social environment and other factors. In recent years, with the rapid development of information technology in China, the problem of computer network security has become increasingly prominent. Although domestic and foreign scholars have sought effective methods of network security evaluation from different aspects and using different methods, many factors involved in network security are difficult to quantify, so far, there is no relatively mature quantitative evaluation method of network …security. The computer network security evaluation is classical multiple attribute decision making (MADM) problems. In this article, based on projection measure, we shall introduce the projection models with q-rung orthopair fuzzy information. First of all, the definition of q-rung orthopair fuzzy sets (q-ROFSs) is introduced. In addition, to fuse overall q-rung orthopair fuzzy evaluation information, two aggregation operators including q-ROFWA and q-ROFWG operators is introduced. Furthermore, combine projection with q-ROFSs, we develop the projection models with q-rung orthopair fuzzy information. Based on developed weighted projection models, the multiple attribute decision making model is established and all computing steps are simply depicted. Finally, a numerical example for computer network security evaluation is given to illustrate this new model and some comparisons between the new proposed models and q-ROFWA and q-ROFWG operators are also conducted to illustrate advantages of the new built method. Show more
Keywords: Multiple attribute decision making (MADM) problems, q-rung orthopair fuzzy sets (q-ROFSs), q-rung orthopair fuzzy projection model, computer network security evaluation
DOI: 10.3233/JIFS-231351
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1029-1038, 2023
Authors: Wajid, Mohd Anas | Zafar, Aasim | Terashima-Marín, Hugo | Wajid, Mohammad Saif
Article Type: Research Article
Abstract: Recent advances in technology and devices have caused a data explosion on the Internet and on our home PCs. This data is predominantly obtained in various modalities (text, image, video, etc.) and is essential for e-commerce websites. The products on these websites have both images and descriptions in text form, making them multimodal in nature. Earlier categorization and information retrieval methods focused mostly on a single modality. This study employs multimodal data for classification using neutrosophic fuzzy sets for uncertainty management for information retrieval tasks. This effort utilizes image and text data and, inspired by past techniques of embedding text …over an image, attempts to classify the images using neutrosophic classification algorithms. For classification tasks, Neutrosophic Convolutional Neural Networks (NCNNs) are used to learn feature representations of the produced images. We demonstrate how a pipeline based on NCNN can be utilized to learn representations of the innovative fusion method. Traditional convolutional neural networks are vulnerable to unknown noisy conditions in the test phase, and as a result, their performance for the classification of noisy data declines. Comparing our method against individual sources on two large-scale multi-modal categorization datasets yielded good results. In addition, we have compared our method to two well-known multi-modal fusion methodologies, namely early fusion and late fusion. Show more
Keywords: Multimodal data, early & late fusion, fuzzy logic, neutrosophic logic, convolutional neutral network
DOI: 10.3233/JIFS-223752
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1039-1055, 2023
Authors: Thao, Le Quang | Linh, Le Khanh | Thien, Nguyen Duy | Cuong, Duong Duc | Bach, Ngo Chi | Dang, Nguyen Ha Thai | Hieu, Nguyen Ha Minh | Minh, Nguyen Trieu Hoang | Diep, Nguyen Thi Bich
Article Type: Research Article
Abstract: The detection and prediction of cleaning conditions in school restrooms are crucial for reducing health risks and improving service quality. Traditional methods like manual hygienic inspection, fixed cleaning schedules, and automatic flushing devices have required large investments of money and effort from cleaning businesses to maintain cleanliness in school restrooms. To address this issue, we propose a prediction model based on Recurrent Neural Network (RNN) and Long Short-Term Memory (LSTM) architecture. The model uses a dataset obtained from real-time conditions of the toilet via a wireless sensor network, enabling more efficient scheduling of toilet cleaning tasks. By predicting patterns of …Ammoniac (NH3) concentrations and Relative Humidity (RH) levels over time, our LSTM model is superior to the RNN model in performance, significantly reducing deviations in the NH3 and RH values with RMSE values of 3.32 and 2.85 , respectively. Furthermore, the model’s flexibility allows a variety of inputs to evaluate the need for cleaning at specific times, achieving maximum efficiency without requiring excessive neurons. Show more
Keywords: Wireless sensor network, manage clean restroom, LSTM, prediction
DOI: 10.3233/JIFS-230056
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1057-1065, 2023
Authors: Thao, Nguyen Xuan | Duong, Truong Thi Thuy
Article Type: Research Article
Abstract: Online reviews play a vital role in providing multidimensional information for tourists. It also has an effect on the ranking and overall score of hotels. As a powerful tool, the Fermatean fuzzy set efficiently models dealing with uncertain information. Considering that there is no study using the correlation coefficient in Fermatean fuzzy context to assess the effect of online reviews on ratings and overall score of hotels. Therefore, a correlation coefficient measure is put forward to determine the relationship between two Fermaten fuzzy numbers and then they are utilized to assess the impact of online reviews on ranking and overall …rating of hotels. The paper first introduces the TOPSIS–based ranking model using a new distance under Fermatean set. Then, we construct a new correlation coefficient between two Fermatean fuzzy numbers to measure the effect of online reviews with ranking, overall score and score of hotels under given criteria. A case study on TripAdvisor.com is performed to illustrate the proposed operator and model. Show more
Keywords: Hotels, decision making, picture fuzzy set, intuitionistic fuzzy set, Fermatean fuzzy set, correlation coefficient
DOI: 10.3233/JIFS-230667
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1067-1087, 2023
Authors: Babiyola, A. | Aruna, S. | Sumithra, S. | Buvaneswari, B.
Article Type: Research Article
Abstract: The need for a monitoring system has grown as a result of rising crime and anomalous activity. To avoid unusual incidents, the common man initiated video surveillance of important areas, which was then passed on to the government. In typical surveillance operations, surveillance devices create a vast volume of data that must be manually analysed. Manually handling huge data sets in real time results in information loss. To prevent abnormal incidents, the actions in sensitive areas can be properly monitored, evaluated, and alerted to the appropriate authorities. Previous deep learning-based activity identification methods have appeared, but the findings are inaccurate, …and the proposed Hybrid Machine Learning Algorithms (HMLA) incorporate two detection methods for surveillance videos like as Transfer Learning (TL) and Continual Learning (CL). As a result, the suspicious activity in the video may be missed. Consequently, numerous image processing and computer vision technologies were used in activity detection to decrease human effort and mistakes in surveillance operations. Activities in sensitive areas can be properly monitored and evaluated to avoid unusual incidents, and the appropriate authorities may be alerted. Hence, in order to decrease human error and effort in surveillance operations, activity recognition embraced a variety of image processing and computer vision technologies. In this present work, the capacity has constraints that impact recognition accuracy. Consequently, this research paper presents a HMLA based technique that uses feature extraction using multilayer (Long Short Term Memory) LSTM, Convolutional Neural Networks (CNN), and Temporal feature extraction using multilayer LSTM to improve identification accuracy by 96% while requiring minimal execution time. To show the superior performance of the proposed hybrid machine learning technique, a standard UCF crime dataset was utilised for experimental analysis and compared to existing deep learning algorithms. Show more
Keywords: Hybrid machine learning algorithms, surveillance videos, transfer learning, continual learning, recognition abnormal events
DOI: 10.3233/JIFS-231187
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1089-1102, 2023
Authors: Deng, Wentao | Ma, Guoqing
Article Type: Research Article
Abstract: The quality evaluation of Chinese universities ideological and political (IAP) education has gone through the stages of defining tasks, proposing standards and exploring and carrying out, and has completed the stage tasks and accumulated practical experience. To construct the quality evaluation system of IAP education of Chinese universities in the new era, it is necessary to find the quality positioning in the fundamental task of establishing moral education and pay attention to the synergy between the internal and external parts of the quality of IAP education of Chinese universities. The IAP education quality evaluation of Chinese universities are the multiple-attribute …decision-making (MADM) issue. In this paper, we extend the geometric Heronian mean (GHM) operator to fuzzy number intuitionistic fuzzy numbers (FNIFNs) to propose the fuzzy number intuitionistic fuzzy weighted geometric HM (FNIFWGHM) operator. Then, the MADM method are built on FNIFWGHM operator. Finally, a numerical example for IAP education quality evaluation of Chinese universities and some comparative studies are used to prove the built methods’ credibility and reliability. Show more
Keywords: Multiple-attribute decision-making (MADM), Fuzzy number intuitionistic fuzzy numbers (FNIFNs), FNIFWHM operator, education quality evaluation
DOI: 10.3233/JIFS-224145
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1103-1118, 2023
Authors: Subha, K.J. | Rajavel, R. | Paulchamy, B.
Article Type: Research Article
Abstract: The Retinal image analysis has received significant attention from researchers due to the compelling need of early detection systems that aid in the screening and treatment of diseases. Several automated retinal disease detection studies are carried out as part of retinal image processing. Heren an Improved Ensemble Deep Learning (IEDL) model has been proposed to detect the various retinal diseases with a higher rate of accuracy, having multiclass classification on various stages of deep learning algorithms. This model incorporates deep learning algorithms which automatically extract the properties from training data, that lacks in traditional machine learning approaches. Here, Retinal Fundus …Multi-Disease Image Dataset (RFMiD) is considered for evaluation. First, image augmentation is performed for manipulating the existing images followed by upsampling and normalization. The proposed IEDL model then process the normalized images which is computationally intensive with several ensemble learning strategies like heterogeneous deep learning models, bagging through 5-fold cross-validation which consists of four deep learning models like ResNet, Bagging, DenseNet, EfficientNet and a stacked logistic regression for predicting purpose. The accuracy rate achieved by this method is 97.78%, with a specificity rate of 97.23%, sensitivity of 96.45%, precision of 96.45%, and recall of 94.23%. The model is capable of achieving a greater accuracy rate of 1.7% than the traditional machine learning methods. Show more
Keywords: Improved Ensemble Deep learning (IEDL), bagging through 5-fold cross-validation, Retinal Fundus Multi-Disease Image Dataset (RFMiD), Stacked logistic regression
DOI: 10.3233/JIFS-230912
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1119-1130, 2023
Authors: Yang, Xu
Article Type: Research Article
Abstract: The Petri net structure of workflow is used to model, and the moment generating function is used to analyze the time performance of workflow, and the complexity of analysis is given. It provides basic theory and basis for analysis and verification. The calculation of time complexity is given for sequence, concurrency, cycle, conflict (selection) and mutual exclusion. The performance analysis method based on moment generating function can be used to analyze the performance of arbitrarily distributed bounded or unbounded random Petri nets. Establish a broad-random Petri net model that conforms to the concept of workflow. Then, based on statistical analysis …and experience estimation of relevant data in the actual system, analyze the time nature of the on-demand service based on the analysis method based on behavioral expression, and obtain some valuable performance and index information. A necessary and sufficient condition for maintaining reliability of a workflow network model is given; A polynomial decomposition algorithm for P-invariants is proposed; Combining the moment function, a performance analysis method for workflow systems is established. An example is given to verify the effectiveness of the algorithm. Show more
Keywords: Performance analysis, workflow net, concurrent selection structure, read arcs, loop structure
DOI: 10.3233/JIFS-231137
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1131-1139, 2023
Authors: Al Ghour, Samer
Article Type: Research Article
Abstract: We use soft ω s -open sets to define soft ω s -irresoluteness, soft ω s -openness, and soft pre-ω s -openness as three new classes of soft mappings. We give several characterizations for each of them, specially via soft ω s -closure and soft ω s -interior soft operators. With the help of examples, we study several relationships regarding these three notions and their related known notions. In particular, we show that soft ω s -irresoluteness is strictly weaker than soft ω s -continuity, soft ω s -openness lies strictly …between soft openness and soft semi-openness, pre-ω s -openness is strictly weaker than ω s -openness, soft ω s -irresoluteness is independent of each of soft continuity and soft irresoluteness, soft pre-ω s -openness is independent of each of soft openness and soft pre-semi-openness, soft ω s -irresoluteness and soft continuity (resp. soft irresoluteness) are equivalent for soft mappings between soft locally countable (resp. soft anti-locally countable) soft topological spaces, and soft pre-ω s -openness and soft pre-semi-continuity are equivalent for soft mappings between soft locally countable soft topological spaces. Moreover, we study the relationship between our new concepts in soft topological spaces and their topological analog. Show more
Keywords: Soft ωs-open sets, soft ωs-continuous function, soft irresolute soft mapping, soft semi-open soft mapping, soft pre-semi-open soft mapping
DOI: 10.3233/JIFS-223332
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1141-1154, 2023
Authors: Tan, Guimei | Yu, Xichang
Article Type: Research Article
Abstract: As a powerful tool to model some unsharp concepts in real life, uncertain sets have been studied by more and more scholars. In order to characterize the degree of difficulty of uncertain sets, the hyperbolic entropy of an uncertain set and the hyperbolic relative entropy of uncertain sets are introduced in this paper. After that, this paper derived a key formula to calculate the hyperbolic entropy of an uncertain set via membership function, and some mathematical properties of hyperbolic entropy are also investigated in this paper. Finally, the hyperbolic entropy is applied in some research fields such as uncertain learning …curve, clustering of rare books and portfolio selection of collecting rare books. Show more
Keywords: Uncertainty theory, uncertain set, hyperbolic entropy, uncertain learning curve
DOI: 10.3233/JIFS-223626
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1155-1168, 2023
Authors: Xie, Wenxuan | Wu, Jiali | Sheng, Yuhong
Article Type: Research Article
Abstract: This article has been retracted. A retraction notice can be found at https://doi.org/10.3233/JIFS-219433 .
DOI: 10.3233/JIFS-223641
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1169-1178, 2023
Authors: Bhuvanya, R. | Kavitha, M.
Article Type: Research Article
Abstract: This article has been retracted. A retraction notice can be found at https://doi.org/10.3233/JIFS-219433 .
DOI: 10.3233/JIFS-223754
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1179-1193, 2023
Authors: Jannu, Chaitanya | Vanambathina, Sunny Dayal
Article Type: Research Article
Abstract: Over the past ten years, deep learning has enabled significant advancements in the improvement of noisy speech. Due to the short time stability of speech signal, previous speech enhancement (SE) methods concentrated only on magnitude estimation, and these methods added a phase of the mixture in reconstructing the speech. The performance is limited in these approaches since the phase will also carry some of the speech information. Some of the speech enhancement approaches were developed later to jointly estimate both magnitudes as well as phases. Recently, complex-valued models, like deep complex convolution recurrent network (DCCRN), are proposed, but the computation …of the model is very huge. In this work, we propose a Discrete Cosine Transform-based Densely Connected Convolutional Gated Recurrent Unit (DCTDCCGRU) model using dilated dense block and stacked GRU. The dense connectivity strengthens the gradient propagation by concatenating features from previous layers at the input. The advantage of the dense block is that at various resolutions, the dilated convolutions aid with context aggregation, and the dense connectivity provides a feature map with more precise target information by passing through multiple layers. To represent the correlation between neighboring noisy speech frames, a two Layer GRU is added in the bottleneck of U-Net. The experimental findings demonstrate that the proposed model outperformed the other existing models in terms of STOI (short-time objective intelligibility), PESQ (perceptual evaluation of the speech quality), and output SNR (signal-to-noise ratio). Show more
Keywords: SE-Speech enhancement, DTC-Discrete cosine transform, SNR-Signal to noise ratio, dense block
DOI: 10.3233/JIFS-223951
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1195-1208, 2023
Authors: Bektur, Gulcin
Article Type: Research Article
Abstract: In this study, an energy-efficient distributed flow shop scheduling (DFSS) problem with total tardiness minimisation and machine-sequence dependent setup times is addressed. A mixed integer linear programming (MILP) model is proposed for the problem. A variant of the NSGA II algorithm is suggested for the solution of large scale problems. The proposed algorithm is compared with the state-of-the-art NSGA II, SPEA II, and multiobjective iterated local search algorithm. The computational results show that the proposed algorithm is efficient and effective for the problem. This is the first study to propose a heuristic algorithm for the distributed flow shop scheduling problem …with total tardiness minimisation, speed scaling and setups. Show more
Keywords: Energy efficient scheduling, distributed flow shop scheduling, multiobjective optimisation, heuristic algorithms, minimisation of total tardiness, speed scaling mechanism
DOI: 10.3233/JIFS-224199
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1209-1222, 2023
Authors: Xu, Qian
Article Type: Research Article
Abstract: As the problem of sub-health continues to expand among urban residents, forestry tourism has been further developed, and forest wellness travel for the purpose of recuperation has gradually become the focus of transformation and upgrading of the current big health industry. In order to refine the evaluation of the development potential of regional forest health tourism and achieve further promotion of regional forest health tourism, the study first established the construction principles of the evaluation system, combined with expert consultation and theoretical analysis methods to select evaluation indicators, and used analytic hierarchy process to obtain the weight of each indicator. …An adaptive variational genetic algorithm was then proposed to improve the BP neural network to form the AGA-BP model, which was finally applied to the assessment of the progression potentiality of forest wellness travel. The outcomes demonstrate that among the assessment indicators of forest wellness travel progression potentiality, the environmental quality has the largest weight of 0.4598; the convergence and precision of the AGA-BP model proposed by the research have been upgraded by 80% and 50% respectively, with a faster global search speed; in the assessment of the regional forest wellness travel progression potentiality, the method is highly consistent with the actual assessment outcomes, with an average precision rate of 98% indicating that it can accurately and effectively conduct potentiality assessment, providing a methodological reference for the sustainable progression of forest wellness travel. Show more
Keywords: Forest recreation, tourism, progression potentiality, BP neural network
DOI: 10.3233/JIFS-230582
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1223-1234, 2023
Authors: Zou, Wang | Zhang, Wubo | Tian, Zhuofeng | Wu, Wenhuan
Article Type: Research Article
Abstract: In the field of text classification, current research ignores the role of part-of-speech features, and the multi-channel model that can learn richer text information compared to a single model. Moreover, the method based on neural network models to achieve final classification, using fully connected layer and Softmax layer can be further improved and optimized. This paper proposes a hybrid model for text classification using part-of-speech features, namely PAGNN-Stacking1 . In the text representation stage of the model, introducing part-of-speech features facilitates a more accurate representation of text information. In the feature extraction stage of the model, using the multi-channel attention …gated neural network model can fully learn the text information. In the text final classification stage of the model, this paper innovatively adopts Stacking algorithm to improve the fully connected layer and Softmax layer, which fuses five machine learning algorithms as base classifier and uses fully connected layer Softmax layer as meta classifier. The experiments on the IMDB, SST-2, and AG_News datasets show that the accuracy of the PAGNN-Stacking model is significantly improved compared to the benchmark models. Show more
Keywords: Text classification, part-of-speech features, multi-channel, stacking algorithm
DOI: 10.3233/JIFS-231699
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1235-1249, 2023
Authors: Chen, Huakun | Jia, Qianlei | Huang, Wei | Shi, Jingping | Safwat, Ehab
Article Type: Research Article
Abstract: There is a growing body of literature that recognises the importance of Z-numbers proposed by Prof Zadeh. However, due to the complicated structure and short presentation time, many unknowns about Z-numbers still exist. To fill these gaps, this study aims to make use of rectangular coordinate system to express linguistic Z-numbers. Simultaneously, this study sets out to design a score function to quantify the information contained in different Z-numbers. Subsequently, distance measure and similarity measure are also presented from the perspective of coordinate system. Besides, linguistic discrete Z-numbers and belief rule base (BRB) model are combined to construct a novel …reasoning model on the basis of implication operators. To verify the validity of the proposed method, three representative examples of epidemic level assessment, multicriteria group decision-making (MCGDM), and network security assessment are employed. The comparison with other widely used methods are performed to further demonstrate the superiority of the proposed method. Show more
Keywords: Linguistic Z-numbers, score function, rectangular coordinate system, distance measure, similarity measure
DOI: 10.3233/JIFS-223025
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1251-1268, 2023
Authors: Zhu, Zhihui | Zhu, Meifang
Article Type: Research Article
Abstract: In recent years, chronic diseases, an aging population, and high healthcare costs have become global concerns. The Internet of Things (IoT) is transforming society by enabling physical objects to sense and collect data about their surroundings. It has evolved to encompass a wide range of sensing strategies, and it continues to improve in terms of sophistication and cost reduction. IoT can play an important role in enhancing human health through remote healthcare. The application of advanced IoT technology in healthcare is still a significant challenge due to a number of issues, such as the shortage of cost-effective and accurate smart …medical sensors, the absence of standardized IoT architectures, the heterogeneity of connected wearable devices, the multidimensionality of data generated, and the need for interoperability. In order to provide insight into the advance of IoT technologies in healthcare, this paper presents a comprehensive discussion on IoT device capabilities, focusing on the hardware and software systems, as well as the processing abilities, operating systems, and built-in tools. Show more
Keywords: Healthcare, internet of things, medical device, wireless sensor networks, data management, literature review
DOI: 10.3233/JIFS-224166
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1269-1288, 2023
Authors: Yuan, Pei
Article Type: Research Article
Abstract: With the globalization of the world’s economy, culture, science and technology, and the increasing frequency of international cooperation and exchanges, English will play an increasingly important role. For non-English majors in Chinese colleges and universities, college English is a public compulsory basic course, which plays a very important role in expanding students’ knowledge, improving foreign language cultural literacy and comprehensive language use ability. An important part of college English classroom teaching is teaching evaluation, which not only helps teachers obtain teaching feedback information, improve teaching management, and ensure teaching quality, but also effectively helps students adjust learning strategies, improve learning …methods, and improve learning efficiency. The English classroom teaching quality evaluation could be deemed as a classic multiple attribute group decision making (MAGDM) problem. In this paper, as a useful outranking approach, the extended QUALIFLEX method is utilized to address some MAGDM issues by using picture 2-tuple linguistic sets (P2TLSs). In addition, integrating the QUALIFLEX method with P2TLSs, the extended QUALIFLEX method with P2TLNs is constructed and all calculating procedures are simply depicted. Eventually, an empirical application of English classroom teaching quality evaluation has been offered to demonstrate this novel method. Show more
Keywords: Multiple attribute group decision making (MAGDM), picture fuzzy sets (PFSs), picture 2-tuple linguistic sets (P2TLSs), the extended QUALIFLEX method, English classroom teaching quality evaluation
DOI: 10.3233/JIFS-230969
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1289-1302, 2023
Authors: Jin, Xiaofang
Article Type: Research Article
Abstract: This article has been retracted. A retraction notice can be found at https://doi.org/10.3233/JIFS-219433 .
DOI: 10.3233/JIFS-231191
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1303-1312, 2023
Authors: Li, Yan
Article Type: Research Article
Abstract: With the development of socialist market economy, the exhibition industry has emerged as the tertiary industry matures in a globalized economic environment. As a new economic form, the exhibition economy presents new opportunities for economic development. The research on the exhibition industry at home and abroad has been relatively mature, and there has been a scientific analysis of the industrial linkage effect of the exhibition industry. The strong industrial linkage effect has made the exhibition industry occupy a very important position in the economic development of cities. However, in the development of China’s urban exhibition industry today, it is no …longer a simple question of developing and enhancing the strategic position of the exhibition industry in economic development, but rather a question of how to enhance the competitiveness of China’s urban exhibition industry. Only when the level of competitiveness is improved can the economic and social benefits brought by the exhibition industry be brought into full play. The fuzzy comprehensive competitiveness evaluation of urban exhibition industry is a classical multiple attribute decision making (MADM) problems. Recently, the TODIM and VIKOR method has been used to cope with MAGDM issues. The hesitant fuzzy sets (HFSs) are used as a tool for characterizing uncertain information during the fuzzy comprehensive competitiveness evaluation of urban exhibition industry. In this manuscript, the hesitant fuzzy TODIM-VIKOR (HF-TODIM-VIKOR) method is built to solve the MADM under HFSs. In the end, a numerical case study for fuzzy comprehensive competitiveness evaluation of urban exhibition industry is given to validate the proposed method. Show more
Keywords: Multiple attribute decision making(MAGDM), Hesitant fuzzy sets (HFSs), TODIM, VIKOR, urban exhibition industry
DOI: 10.3233/JIFS-231672
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1313-1323, 2023
Authors: Liu, Ting
Article Type: Research Article
Abstract: In this paper, a new timing synchronization algorithm for the main synchronous signal (PSS) is proposed for the risk identification of cross-border e-commerce in the Internet of things, aiming at the problems of poor performance of anti frequency bias and high computational complexity of the improved PSS timing synchronization algorithm. Based on the piecewise correlation algorithm, the normalized frequency deviation of PSS sequence is preset. The segmented ones are pre stored at the terminal by using the conjugate symmetry of PSS sequence. The fast correlation of each segment correlation window is realized by combining convolution and overlapping reservation block method. …Then, the threshold judgment is made after the time delay accumulation of the correlation values of the segments is made, so as to complete the joint detection of timing synchronization and coarse frequency deviation. The simulation results show that the algorithm can improve the performance of the system anti frequency offset effectively, reduce the complexity of the calculation and show that the timing synchronization conditions of the Internet can be satisfied. At the same time, under the background of the current development of cross-border logistics, this paper reviews the current research status of Transnational E-commerce logistics and Transnational E-commerce logistics risk. By comparing the advantages and disadvantages of various risk assessment methods, neural network and genetic algorithm are selected as the basic risk assessment methods in this paper. Based on the improved PSS timing synchronization algorithm and the Internet of things, the risk indicators of e-commerce logistics transnational will be selected from five risk dimensions: platform risk, customs clearance risk, organizational risk, process risk and environmental risk. Through the comprehensive literature and expert’s opinion, the logistics risk assessment index system of cross-border e-commerce is established. Show more
Keywords: PSS timing synchronization algorithm, internet of things, cross border e-commerce, risk identification
DOI: 10.3233/JIFS-221194
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1325-1340, 2023
Authors: Gao, Pengcheng | Chen, Mingxian | Zhou, Yu | Zhou, Ligang
Article Type: Research Article
Abstract: In order to estimate the deficiency of a city in its ability to prevent and control risks, as well as to evaluate the corresponding measures, this paper focuses on multi-attribute decision making based on LINMAP method and Manhattan distance at linguistic q-rung orthopair fuzzy. Manhattan distance is a new product that combines clustering distance with linguistic q-rung orthopair fuzzy to be able to use the data more effectively for measurement. LINMAP method is a decision making method based on ideal points, which can solve the weights as well as provide ideal solutions by linear programming model. The combination of the …two can create a new decision-making method, which can effectively evaluate the decision scheme of social public facilities according to the actual needs of decision-makers. The new method has the following advantages: (1) the conditions of linguistic fuzzy numbers can be applied more comprehensively, making the decision more realistic and effective; (2) the Manhattan distance is more in line with the human way of thinking and closer to life; (3) after comparative study, the results produced by this method have certain reliability. Show more
Keywords: Multi-attribute decision making, linguistic q-rung orthopair fuzzy, LINMAP method, Manhattan distance
DOI: 10.3233/JIFS-221750
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1341-1355, 2023
Authors: Padmanaban, K. | Shunmugalatha, A.
Article Type: Research Article
Abstract: A novel metaheuristic algorithm has been presented based on the physical significance of palm tree leaves and petioles, which can themselves water and fertilize with their unique architecture. Palm tree leaves collect almost all the raindrops that fall on the tree, which drags the nutrient-rich dropping of crawlers and birds that inhabit it and funnel them back to the palm tree’s roots. The proposed Palm Tree Optimization (PTO) algorithm is based on two main stages of rainwater before it reaches the trunk. Stage one is that the rainwater drops search for petioles in the local search space of a particular …leaf, and stage two involves that the rainwater drops after reaching the petioles search for trunk to funnel back to the root along with nutrients. The performance of PTO in searching for global optima is tested on 33 Standard Benchmark Functions (SBF), 29 constrained optimization problems from IEEE-CEC2017 and real-world optimization problems from IEEE-CEC2011 competition especially for testing the evolutionary algorithms. Mathematical benchmark functions are classified into six groups as unimodal, multimodal, plate & valley-shaped, steep ridges, hybrid functions and composition functions which are used to check the exploration and exploitation capabilities of the algorithm. The experimental results prove the effectiveness of the proposed algorithm with better search ability over different classes of benchmark functions and real-world applications. Show more
Keywords: PTO-palm tree optimization, exploration, exploitation, petioles, crankshaft
DOI: 10.3233/JIFS-222413
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1357-1385, 2023
Authors: Wang, Wei | Zhang, Weidong | Zhang, Zhe
Article Type: Research Article
Abstract: The complexity of the cohesive soil structure necessitates settlement modeling beneath shallow foundations. The goal of this research is to use recently discovered machine learning techniques called the hybridized radial basis function neural network (RBFNN ) with sine cosine algorithm (SCA ) and firefly algorithm (FFA ) to detect settlement (S m ) of shallow foundations. The purpose of using optimization methods was to find the optimal value for the primary attributes of the model under investigation. With R 2 values of at least 0.9422 for the learning series and 0.9271 for the assessment series, both the produced …SCA - RBFNN and FFA - RBFNN correctly replicated the S m , which indicates a considerable degree of efficacy and even a reasonable match between reported and modeled S m . In comparison to FFA - RBFNN and ANFIS - PSO , the SCA - RBFNN is believed to be the more correct method, with the values of R 2 , RMSE and MAE was 0.9422, 7.2255 mm and 5.1257 mm, which is superior than ANFIS - PSO and FFA - RBFNN . The SCA - RBFNN could surpass FFA one by 25% for the learning component and 14.2% for the test data, according to the values of PI index. Ultimately, it is apparent that the RBFNN combined with SCA could score higher than the FFA and even the ANFIS - PSO , which is the proposed system in the S m forecasting model, after assessing the reliability and considering the assumptions. Show more
Keywords: Shallow foundation settlement, prediction, RBF neural network, sine cosine algorithm
DOI: 10.3233/JIFS-223907
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1387-1396, 2023
Authors: Keerthika, V. | Muhiuddin, G. | Jun, Y. B. | Elavarasan, B.
Article Type: Research Article
Abstract: Fuzzy sets, soft sets, and their generalisations have always been important tools for mathematicians and researchers working with uncertainty. Jun proposed a hybrid structure that combined the concepts of a fuzzy set and a soft set. It should be noted that hybrid structures are a combination of soft set and fuzzy set speculation. Our aim is to explore the concept of hybrid ordered ideals and hybrid interior ideals in ordered semirings, as well as look at some of their related properties, which is one of the important aspects of this paper. In order to investigate the structure theory of hybrid …ideals in ordered semirings, we define hybrid composition and hybrid addition. We also establish and characterise the regularity of ordered semirings in terms of hybrid structures. Show more
Keywords: Semiring, ideals, hybrid structure, hybrid interior ideals, ordered semirings
DOI: 10.3233/JIFS-224060
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1397-1408, 2023
Authors: Singh, Nitin Kumar | Singh, Pardeep | Das, Prativa | Chand, Satish
Article Type: Research Article
Abstract: Social media platforms allow people across the globe to share their thoughts and opinions and conveniently communicate with each other. Apart from various advantages of social media, it is also misused by a set of users for hate-mongering with toxic and offensive comments. The majority of the earlier proposed toxicity detection methods are primarily focused on the English language, but there is a lack of research on low-resource languages and multilingual text data. We propose an XRBi-GAC framework comprising XLM-RoBERTa, Bi-GRU with self-attention and capsule networks for multilingual toxic text detection. A loss function is also presented, which fuses the …binary cross-entropy loss and focal loss to address the class imbalance problem. We evaluated the proposed framework on two datasets, namely, the Jigsaw Multilingual Toxic Comment dataset and HASOC 2019 dataset and achieved F1-score of 0.865 and 0.829, respectively. The results of the experiments show that the proposed framework has outperformed the state-of-the-art multilingual models XLM-RoBERTa and mBERT on both datasets, which shows the versatility and robustness of the proposed XRBi-GAC framework. Show more
Keywords: Toxicity, multilingual text, XLM-RoBERTa, Bi-GRU, self-attention, capsule network
DOI: 10.3233/JIFS-224536
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1409-1421, 2023
Authors: Xu, Siyu | Qin, Keyun | Pan, Xiaodong | Fu, Chao
Article Type: Research Article
Abstract: Both fuzzy set and rough set are important mathematical tools to describe incomplete and uncertain information, and they are highly complementary to each other. What is more, most fuzzy rough sets are obtained by combining Zadeh fuzzy sets and Pawlak rough sets. There are few reports about the combination of axiomatic fuzzy sets and Pawlak rough sets. For this reason, we propose the axiomatic fuzzy rough sets (namely rough set model with respect to the axiomatic fuzzy set) establishing on fuzzy membership space. In this paper, we first present a similarity description method based on vague partitions. Then the concept …of similarity operator is proposed to describe uncertainty in the fuzzy approximation space. Finally, some characterizations concerning upper and lower approximation operators are shown, including basic properties. Furthermore, we give a algorithm to verify the effectiveness and efficiency of the model. Show more
Keywords: Rough sets, axiomatic fuzzy rough sets, residuated lattices, fuzzy relations, approximation operators
DOI: 10.3233/JIFS-223643
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1423-1436, 2023
Authors: Sharma, Rahul | Singh, Amar
Article Type: Research Article
Abstract: In the recent decade, plant disease classification using convolution neural networks has proven to be superior because of its ability to extract key features. Obtaining the optimum feature subset with the necessary discriminant information is challenging. The main objective of this paper is to design an efficient hybrid plant disease feature selection approach and validate it on standard image datasets. The raw input image features were transformed into 8192 learned features by employing the VGG16. To reduce the training time and enhance classification accuracy, the dimensionality reduction technique Principal Component Analysis (PCA) is integrated with the big bang-big crunch (BBBC) …optimization algorithm. The PCA-BBBC feature selection method reduces computing time by eliminating unnecessary and redundant features. The proposed approach was evaluated on plant diseases and benchmarked image datasets. Experimental results reveal that the Artificial Neural Network (ANN) classifier integrated with the VGG16-PCA-BBBC approach enhanced the performance of the classifier. The proposed approach outperformed the VGG16-PCA-ANN method and other popular image classification techniques. For the rice disease dataset, the proposed hybrid approach reduced the VGG16 extracted 8192 deep features to 200 relevant principal components. The recommended reduced features were used for training ANN. The test dataset was classified by ANN with an accuracy of 99.12%. Experimental results demonstrate that the proposed approach improved the performance of the classifier and accurately labeled image and plant diseases datasets aiding farmers to adopt remedial measures. Show more
Keywords: BBBC, dimensionality reduction, feature selection, PCA, plant disease detection
DOI: 10.3233/JIFS-222517
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1437-1451, 2023
Authors: Vinodha, D. | Mary Anita, E.A.
Article Type: Research Article
Abstract: Industrial revolutions and demand of novel applications drive the development of sensors which offer continuous monitoring of remote hostile areas by collecting accurate measurement of physical phenomena. Data aggregation is considered as one of the significant energy-saving mechanism of resource constraint Wireless Sensor Networks (WSNs) which reduces bandwidth consumption by eliminating redundant data. Novel applications demand WSN to provide information about the monitoring region in multiple aspects in large scale. To meet this requirement, different kinds of sensors of different parameters are deployed in the same region which in turn demands the aggregator node to integrate diverse data in a …smooth and secure manner. Novelty in applications also requires Base station (BS) to apply multiple statistical functions. Hence, we propose to develop a novel secure cost-efficient data aggregation scheme based on asymmetric privacy homomorphism to aggregate data of multiple parameters and facilitate the BS to compute multiple functions in one round of data collection by providing elaborated view of monitoring region. To meet the claim of large scale WSN which requires dynamic change in size, vector-based data collection method is adopted in our proposed scheme. The security aspect is strengthened by allowing BS to verify the authenticity of source node and validity of data received. The performance of the system is analyzed in terms of computation and communication overhead using the mathematical model and simulation results. Show more
Keywords: Wireless sensor networks, secured data aggregation, privacy homomorphism
DOI: 10.3233/JIFS-223511
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1453-1472, 2023
Authors: Tian, Chang | Liu, Yanjung | Li, Meng | Fen, Chaofan
Article Type: Research Article
Abstract: The key step in the intelligence of tongue diagnosis is the segmentation of the tongue image, and the accuracy of the segmented edges has a significant impact on the subsequent medical judgment. Deep learning can predict the class of pixel points to achieve pixel-level segmentation of images, so it can be used to handle tongue segmentation tasks. However, different models have different segmentation effects, and they did not learn the connection between space and channels, resulting in inaccurate tongue segmentation. This paper first discussed the choice of model and loss function and then compared the results of different options to …find the better model. Associating the red feature of the tongue is very conducive to segmentation as a feature, this paper tested many methods to try to get the color features of the original image to be paid attention to. Finally, this paper proposed an improved Encoder-Decoder network model to solve the problem based on the results. Start with Resnet as the backbone network, then introduce the U-Net model, and then we fused the attention layer, obtained from the source image through convolution and CBAM attention mechanism, and the feature layer obtained from the last upsampling in U-Net. Experimental results show that: The new, improved algorithm results are 2-3 percentage points higher than the popular algorithm, making it more suitable for tongue segmentation tasks. Show more
Keywords: Deep convolutional neural network, attention mechanism, tongue image, image segmentation
DOI: 10.3233/JIFS-221411
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1473-1480, 2023
Authors: Liang, Baohua | Lu, Zhengyu
Article Type: Research Article
Abstract: Attribute reduction is a widely used technique in data preprocessing, aiming to remove redundant and irrelevant attributes. However, most attribute reduction models only consider the importance of attributes as an important basis for reduction, without considering the relationship between attributes and the impact on classification results. In order to overcome this shortcoming, this article firstly defines the distance between samples based on the number of combinations formed by comparing the samples in the same sub-division. Secondly, from the point of view of clustering, according to the principle that the distance between each point in the cluster should be as small …as possible, and the sample distance between different clusters should be as large as possible, the combined distance is used to define the importance of attributes. Finally, according to the importance of attributes, a new attribute reduction mechanism is proposed. Furthermore, plenty of experiments are done to verify the performance of the proposed reduction algorithm. The results show that the data sets reduced by our algorithm has a prominent advantage in classification accuracy, which can effectively reduce the dimensionality of high-dimensional data, and at the same time provide new methods for the study of attribute reduction models. Show more
Keywords: Rough sets, attribute reduction, clustering, combined distance
DOI: 10.3233/JIFS-222666
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1481-1496, 2023
Authors: Sakthivel, S. | Vinotha, N.
Article Type: Research Article
Abstract: Concerns of security as well as privacy are the chief obstacles which have prevented the public cloud’s extensive adoption in Intel IT as well as across the industry. Generally, IT organizations are quite reluctant to store sensitive as well as valuable data in infrastructures which are out of their control. The technique of anonymization is employed by enterprises to raise the security of the public cloud’s data whilst facilitating the data’s analysis as well as application. The procedure of data anonymization will modify how the data is either employed or published in such a way that it will prevent the …key information’s identification. The privacy issues are addressed using k-anonymity. However, the issue of selecting the variables for anonymization and suppression of variables without the loss of knowledge is an optimization problem. To address the selection of variables for anonymization and suppression, metaheuristic algorithms are used. Diverse research groups have successfully utilized the River Formation Dynamics (RFD) metaheuristic to handle numerous problems of discrete combinatorial optimization. Even so, this metaheuristic has never been adapted for use in domains of continuous optimization. To mitigate the local minima problem, hybridization of the algorithms is proposed. In this work, a modified K-Anonymity technique’s proposal has been given by using the Modified Hill Climbing (MHC) optimization, the RFD-MHC optimization, the RFD-PSO optimization, the RFD-MHC suppression as well as the RFD-PSO suppression. Furthermore, proposal for a suppression technique has also been given in this work. Experiments demonstrated that the RFD-PSO optimization has higher classification accuracy in the range of 6.73% to 8.55% when compared to manual K-anonymization. The work has also given better trade off for security analysis and data utility effectiveness. Show more
Keywords: Privacy preservation, security, K-anonymity model, river formation dynamics (RFD) and particle swarm optimization (PSO) algorithm, modified hill climbing (MHC)
DOI: 10.3233/JIFS-223509
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1497-1512, 2023
Authors: Wang, Changjing | Jiang, Huiwen | Wang, Yuxin | Huang, Qing | Zuo, Zhengkang
Article Type: Research Article
Abstract: The smart contract, a self-executing program on the blockchain, is key to programmable finance. However, the rise of smart contract use has also led to an increase in vulnerabilities that attract illegal activity from hackers. Traditional manual approaches for vulnerability detection, relying on domain experts, have limitations such as low automation and weak generalization. In this paper, we propose a deep learning approach that leverages domain-specific features and an attention mechanism to accurately detect vulnerabilities in smart contracts. Our approach reduces the reliance on manual input and enhances generalization by continuously learning code patterns of vulnerabilities, specifically detecting various types …of vulnerabilities such as reentrancy, integer overflow, forced Ether injection, unchecked return value, denial of service, access control, short address attack, tx.origin, call stack overflow, timestamp dependency, random number dependency, and transaction order dependency vulnerabilities. In order to extract semantic information, we present a semantic distillation approach for detecting smart contract vulnerabilities. This approach involves using a syntax parser, Slither, to segment the code into smaller slices and word embedding to create a matrix for model training and prediction. Our experiments indicate that the BILSTM model is the best deep learning model for smart contract vulnerability detection task. We looked at how domain features and self-attentiveness mechanisms affected the ability to identify 12 different kinds of smart contract vulnerabilities. Our results show that by including domain features, we significantly increased the F1 values for 8 different types of vulnerabilities, with improvements ranging from 7.35% to 48.58%. The methods suggested in this study demonstrate a significant improvement in F1 scores ranging from 4.18% to 38.70% when compared to conventional detection tools like Oyente, Mythril, Osiris, Slither, Smartcheck, and Securify. This study provides developers with a more effective method of detecting smart contract vulnerabilities, assisting in the prevention of potential financial losses. This research provides developers with a more effective means of detecting smart contract vulnerabilities, thereby helping to prevent potential financial losses. Show more
Keywords: Smart contract, vulnerability detection, attention mechanism, domain features, recurrent neural network 2010 MSC: 00-01, 99-00
DOI: 10.3233/JIFS-224489
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1513-1525, 2023
Authors: Xu, Haiyan | Zhang, Hao | Zhu, Anfeng | Xu, Gang
Article Type: Research Article
Abstract: In order to improve the accuracy and security of encrypted holographic 3D geographic information data acquisition and improve the actual resolution of geographic information files, a blind watermarking algorithm for encrypted holographic 3D geographic information data based on mapping mechanism is proposed. According to the characteristics of the mapping mechanism, a mapping mechanism structure diagram is constructed; Under the mapping mechanism technology, blind watermark data is preprocessed. Then, a watermark embedding operation is performed to obtain the watermark information image, and then a blind watermark that encrypts the holographic three-dimensional geographic information data is extracted. Finally, using the blind watermark …signal as input, the blind watermark information is obtained by using the watermark strength, and the holographic 3D geographic data information is segmented and encrypted to complete blind watermark detection. The blind watermark algorithm for encrypting the holographic 3D geographic information data is studied. The results show that the maximum difference between the correlation coefficient of the algorithm in this paper and the correlation coefficient of the unaffected algorithm is only 0.04, which has better anti attack performance, high security, good terrain information collection ability, high data accuracy, and can achieve curvature repair of information data. Show more
Keywords: Mapping mechanism, encrypted holography, 3D geographic information data, blind watermarking algorithm
DOI: 10.3233/JIFS-230064
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1527-1537, 2023
Authors: Smitha, E.S. | Sendhilkumar, S. | Mahalakshmi, G.S.
Article Type: Research Article
Abstract: Multi-modal information outbreak is consistently increasing in social media. Classification of tweet sentiments using various information modalities will help the recommender systems to achieve success in digital marketing. Moreover, aspect-level sentiment analysis categorizes a target’s sentiment polarity in a specific environment. Using topic modelling in aspect-level sentiment analysis enables the identification of more accurate aspect-based tweet sentiments. The existing sentiment classification techniques used for the development of recommendation systems do not focus on the aspect-based approach modelled using deep learning classifier with temporal analysis on the social media data. Hence, this paper proposes an efficient sentiment classification model that highlights …the impact of topic modelling-based word feature embedding for improvising the classification of Twitter sentiments and product reviews based on temporal reasoning and analysis for performing predictive analysis. For tweets context analysis, Latent Dirichlet Allocation based topic modelling is used in this work which generates the topics. For each topic, the sentiment is calculated separately and the topic guided feature expansion is done using Senti-wordnet. Moreover, an extended deep learning classification algorithm called Long Short-Term Memory (LSTM) with word embedding and temporal reasoning(LSTMWTR) is proposed in this paper for improving the classification accuracy. Finally, the labelled data are classified using the existing machine learning algorithms namely Naïve Bayes, Support Vector Machines and also using the deep learning models such as Convolution Neural Network(CNN),LSTM, Recurrent Neural Networks (RNN) and the transformer model namelyBi-directional Encoder Representation from Transformers (BERT),Convolution Bi-directional Recurrent Neural Network (CBRNN) and the proposed deep learning algorithm namelyLSTMWTR. These sentiment classification algorithms have been evaluated with word embedding for tweet sentiment classification and product review classification. The results obtained from this work show that the proposed LSTMWTR algorithm emerges as the highly accurate model for tweet sentiment and product review classification. Show more
Keywords: Sentiment, classification, word embedding, temporal reasoning, NB, multinomial NB, SVM, LSTM, LSTMWTR, BERT, CNN, RNN, and CBRNN
DOI: 10.3233/JIFS-230246
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1539-1565, 2023
Authors: Ali, Imran | Li, Yongming | Pedrycz, Witold
Article Type: Research Article
Abstract: In literature granular computing and formal concept analysis algorithm use only single-value attributes to knowledge discovery for the data of spatio-temporal aspects. However, most of the datasets like forest fires and tornado storms involve multiscale values for attributes. The limitation of single-value attributes of the existing approaches indicates only the data related to event occurrence which may be missing the elicitation of important knowledge related to severity of event occurrence. Motivated by these limitations, this research article proposes a novel and generalized method which uses ordinal semantic weighted multiscale values for attributes in formal concept analysis with granular computing measures …especially when spatio-temporal attributes are not given. The originality of proposed methodology is using ordinal semantic weighted multiscale values for attributes that give complete information of event occurrences. Moreover, the use of ordinal semantic weighted multiscale values improves the results of granular computing measures. The significance of proposed approach is well explained by experimental evaluation performed on publicly available datasets on storm occurring in different States of America. Show more
Keywords: Formal concept analysis, granular computing, granulation measures, ordinal semantic weighted multiscales
DOI: 10.3233/JIFS-223764
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1567-1586, 2023
Authors: Hati, Santu
Article Type: Research Article
Abstract: In present world the major cause of global warming and climate change are emission of carbon and greenhouse gas. Governments and policymakers around the world want to put their best efforts to control the pollution and climate change to save our environment. To reduce greenhouse gas emissions Government and policymakers takes carbon tax policy on carbon emission. Also in real world uncertainty is a pervasive phenomenon. Humans have a significant ability to make logical decisions based on uncertain information. For this purpose, we are developing a pollution control fuzzy production inventory model with imperfect and break-ability items under preservation technology …investment and carbon tax policy. In this model, the break-ability rate is dependent on inventory level as the break-ability rate of breakable items depends on the collected stress of inventory stock level. Here the unit production cost is dependent on raw material cost, wear-tear cost and development cost. Carbon emission is controlled by investing in carbon reduction technology and a fraction of product items are imperfect. In this study demand of the product depends on selling price and inventory stock level of product. Finally, this optimal control problem solved by using Pontryagin Maximum principle and the optimal results are illustrated graphically and numerically using MATLAB software. Subsequently, some sensitivity analysis is investigated as the impact of parameters on total profit. Show more
Keywords: Break-ability, deteriorating items, preservation technology, environment pollution control, fuzzy granular differentiability, fuzzy optimal control production inventory
DOI: 10.3233/JIFS-224019
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1587-1601, 2023
Authors: Murugesan, Malathi | Jeyali Laseetha, T.S. | Sundaram, Senthilkumar | Kandasamy, Hariprasath
Article Type: Research Article
Abstract: Glaucoma is a condition of the eye that is caused by an increase in the eye’s intraocular pressure that, when it reaches its advanced stage, causes the patient to lose all of their vision. Thus, glaucoma screening-based treatment administered in a timely manner has the potential to prevent the patient from losing all of their vision. However, because glaucoma screening is a complicated process and there is a shortage of human resources, we frequently experience delays, which can lead to an increase in the proportion of people who have lost their eyesight worldwide. In order to overcome the limitations of …current manual approaches, there is a critical need to create a reliable automated framework for early detection of Optic Disc (OD) and Optic Cup (OC) lesions. In addition, the classification process is made more difficult by the high degree of overlap between the lesion and eye colour. In this paper, we proposed an automatic detection of Glaucoma disease. In this proposed model is consisting of two major stages. First approach is segmentation and other method is classification. The initial phase uses a Stacked Attention based U-Net architecture to identify the optic disc in a retinal fundus image and then extract it. MobileNet-V2 is used for classification of and glaucoma and non-glaucoma images. Experiment results show that the proposed method outperforms other methods with an accuracy, sensitivity and specificity of 98.9%, 95.2% and 97.5% respectively. Show more
Keywords: Medical image segmentation, classification, convolutional neural network, U-Net, MobileNet-V2
DOI: 10.3233/JIFS-230659
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1603-1616, 2023
Authors: Jebril, Akram H. | Rashid, Rozeha A.
Article Type: Research Article
Abstract: Low power wide area networks (LPWANs) are made to survive conditions of extensive installation. Technological innovations, including Global Network Operator, Long Range Wide Area Network (LoRaWAN), Narrowband Internet of Things (NB-IoT), Weightless, Sigfox, etc., have adopted LPWANs. LoRaWAN is currently regarded to be one of the most cutting-edge and intriguing technology for the widespread implementation of the IoT. Although LoRaWAN offers the best features that make it fit with Internet - of - things specifications, there are still certain technical issues to overcome, such as link coordination, resource allocation and reliable transmission. In LoRaWAN, End-devices transmit randomized uplink frames to …the gateways using un-slotted random-access protocol. This randomness with the restrictions placed on the gateways is a reason that leads to a considerable decline in network performance, in particular downlink frames. In this paper, we propose a new approach to increase Acknowledgement (ACK) messages throughput. The suggested method takes advantage of both class A and class B features to enhance and assist LoRaWAN’s reliability by ensuring that an ACK message is sent for every confirmed uplink while retaining the minimum energy level that is utilized by nodes. Show more
Keywords: Internet of Things, LoRaWAN, Downlink Frame, Differential Evolution optimization, Collision, Acknowledgement Message
DOI: 10.3233/JIFS-230730
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1617-1631, 2023
Authors: Prusty, Sashikanta | Das, Priti | Dash, Sujit Kumar | Patnaik, Srikanta | Prusty, Sushree Gayatri Priyadarsini
Article Type: Research Article
Abstract: This article has been retracted. A retraction notice can be found at https://doi.org/10.3233/JIFS-219433 .
DOI: 10.3233/JIFS-223265
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1633-1652, 2023
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl