Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2024: 1.7
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Tan, Lirui | Zheng, Qiuju | Chen, Junji
Article Type: Research Article
Abstract: Network security is one of the key concerns with wireless sensor networks. Because sensor nodes employ radio channel frequencies, which are riskier than traditional networks, the attacker may be able to force the node to compromise, disrupt data integrity, eavesdrop, or insert false data into the network, wasting network resources. Creating dependable sensor networks that offer the highest level of security while using the fewest resources is thus one of the problems. The designers of wireless sensor networks can take into account providing an efficient key management system that can enhance any efficiency features such as communication overhead, calculation rate, …memory demand, and energy consumption rate. The energy level of nodes is determined in this article using a novel approach based on fuzzy systems and simple to implement in both hardware and software. In this study, the memory needed to carry out the plan was decreased, and the search performance was raised by integrating elliptic curve cryptography with an AVL search tree and a LEACH model. Also, the frequency range of radio channels in this study is 2.4 GHz. Based on the theoretical analysis as well as the outcomes of the experiments, the suggested key management strategy for wireless sensor networks improves security while also reducing computational overhead by 23%, energy consumption by 14%, and memory consumption parameters by 14%. 18% of people have used the network. Additionally, it was demonstrated that the suggested approach is scalable and extendable. Because of this, the suggested technique has a wide range of applications in massive wireless sensor networks. Show more
Keywords: Effective key management, transaction security, homogeneous mobile wireless sensor networks
DOI: 10.3233/JIFS-233476
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10451-10466, 2023
Authors: Dong, Yanfeng | Wang, Meng
Article Type: Research Article
Abstract: At present, China’s football sports are relatively backward in training theory and practice. If you want to break out of Asia and enter the world, and gain a firm foothold in the international football arena, you must use a scientific and realistic attitude, absorb the successful experience of advanced football countries, reflect on our training concepts and practices, and deeply study the training laws of football, in order to find a way suitable for our development. Athletes’ competitive ability is the core issue of sports training. The failure of our football level is directly related to our systematic understanding of …athletes’ competitive ability. This problem has led to the separation of our training practice from the actual competition, making training unable to meet the needs of the competition. Only by solving this problem, can we improve the level of football in China. The football players’ competitive ability evaluation is affirmed as multiple attribute decision making (MADM). In such paper, motivated by the idea of cotangent similarity measure (CSM), the CSMs are extended to DVNSs and four CSMs are created under DVNSs. Then, two weighted CSMs are built for MADM under DVNSs. Finally, a numerical example for Football players’ competitive ability evaluation is affirmed and some comparative algorithms are produced to affirm the built method. Show more
Keywords: Multiple attribute decision making (MADM), double-valued neutrosophic sets (DVNSs), cotangent similarity measure (CSM), football players’ competitive ability evaluation
DOI: 10.3233/JIFS-231194
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10467-10476, 2023
Authors: Kolla, Bhavannarayanna | Venugopal, P.
Article Type: Research Article
Abstract: Breast cancer is a widespread and significant health concern among women globally. Accurately categorizing breast cancer is essential for effective treatment, ultimately improving survival rates. Moreover, deep learning (DL) has emerged as a widely adopted approach for precise medical image classification in recent years, showing promise in this domain. However, despite the availability of DL models proposed in the literature for automated classification of breast cancer histopathology images, achieving high accuracy remains challenging. A minor modification to pre-trained models and simple training strategies can further enhance model accuracy. Based on the approach, this paper proposed an anti-aliased filter in a …pre-trained ResNet-34 and a novel three-step training process to improve BC histopathology image classification accuracy. The training involves systematically unfreezing layers and imposing additional constraints on the rate of change of learnable parameters. In addition, four-fold on-the-fly data augmentation enhances model generalization. The Ada-Hessian optimizer adjusts learning rates based on first and second-order gradients to improve convergence speed. The training process utilizes a large batch size to minimize the training loss associated with batch normalization layers. Even with the limited GPU size, the gradient accumulation technique achieves a large batch size. Collectively, these strategies minimize training time while maintaining or improving the accuracy of BC histopathology image classification models. In the experimental implementation, the proposed architecture achieves superior results compared to recent existing models, with an accuracy of 98.64%, recall (98.98%), precision (99.35%), F1-Score (99.17%), and MCC (97.36%) for binary classification. Similarly, the model achieves an accuracy of 95.01%, recall (95.01%), precision (94.95%), F1-Score (94.94%), and MCC (93.42%) for the eight-class category of BC images. Show more
Keywords: Deep learning, anti-aliased ResNet, BreakHis, breast cancer, fine-tuning, transfer learning
DOI: 10.3233/JIFS-231563
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10477-10495, 2023
Authors: Sowmya, S. | Jose, Deepa
Article Type: Research Article
Abstract: In order to assess the fetus health and make timely decisions throughout pregnancy, Fetal Electrocardiography (FECG) monitoring is essential. Huge datasets for electrocardiograms are freely accessible from Physionet ATM Dataset1- Abdominal and Direct Fetal ECG Database (adfecgdb), Dataset2- Fetal ECG Synthetic Database (fecgsyndb), Dataset3- Non-Invasive Fetal ECG Database(nifecgdb). In this study, categorization is done based on normal and abnormal (Atrial fibrillation) FECG from three online dataset which contains FECG recordings as major details. Deep learning models like Transfer Learning (TL) and Convolutional Neural Networks (CNN) are being investigated. The composite abdominal signal and the FECG are separated using a wavelet …transform approach. The best model for categorizing the parameters of the FECG is determined through a comparative analysis and performance is improved using Continuous Wavelet Transform (CWT). The accuracy of the CNN-based technique is found to be 98.59%, whereas the accuracy of the transfer learning model is 99.01% for FECG classification. The computation of metric parameters for all the datasets is done. The classification of normal and abnormal (Atrial fibrillation) is best performed in TL model compared to CNN. Real-time data analysis is done for PQRST plotting and comparative study is done using Net Reclassification Improvement (NRI) and obtained NRI = 13%, z static 0f 3.7641, p -Value of 0.00016721. Acute Myocardial Infraction (AMI) identification is done based on ST segment of Maternal ECG (MECG) images to analyze the heart attack risk. The proposed work can be utilized to track FECG waveforms in real-time for wearable technology because of its end-to-end properties and expandable intrinsic for diagnosing multi-lead heart disorders. Show more
Keywords: Fetal electrocardiogram, convolutional neural networks, transfer learning, physio net ATM, deep learning models
DOI: 10.3233/JIFS-231681
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10497-10514, 2023
Authors: Deepika, S. | Anandakumar, S. | Bhuvanesh Kumar, M. | Baskar, C.
Article Type: Research Article
Abstract: In the present marketing environment, choosing the right suppliers is very difficult for any construction company. Current supplier selection models in the construction industry often suffer from limitations such as incomplete criteria coverage, inadequate handling of uncertainties, and oversimplification of decision-making, leading to sub-optimal supplier choices and project risks. This paper aims in selecting the best suppliers among the different M-Sand environment suppliers. In this study 13 qualitative criterions are selected by the expert team. For handling the attributes, uncertainties, vagueness associated with supplier selection problems the Fuzzy Delphi, Fuzzy Analytical hierarchal Process (AHP) and Fuzzy Technique for order preference …by similarity to ideal solution (TOPSIS) methods were chosen. In the first phase of this study, Fuzzy Delphi Method is employed to select the 5 significant criterions. These criterions can be used to help the construction company in the direction to choose the right suppliers at the end. During the second phase, one of the significant Multi-criteria Decision Making Method called AHP is employed with extended support of fuzzy logic to evaluate the weightage of each criterion. Further ranking of various alternative suppliers are done by Fuzzy TOPSIS model. The ranking results indicate that A2 is the best supplier followed by A1 and A2. The third phase of this study deals with analyzing both the qualitative and quantitative criteria, hence Data Envelopment Analysis (DEA) is adopted to correlate the criteria. This is done to select efficient suppliers. The develop model is demonstrated in the construction industry. Show more
Keywords: Supplier selection, multi-criteria decision making method, fuzzy delphi method, fuzzy AHP, Fuzzy TOPSIS and DEA model.
DOI: 10.3233/JIFS-231790
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10515-10528, 2023
Authors: Wang, Liyang | Yang, Xiao
Article Type: Research Article
Abstract: Evaluating English teaching quality is vital for improving knowledge-based developments through communication for different aged students. Teaching quality assessment relies on the teachers’ and students’ features for constructive progression. With the development of computational intelligence, optimization and machine learning techniques are widely adapted for teaching quality assessment. In this article, a Quality-centric Assessment Model aided by Fuzzy Optimization (QAM-FO) is designed. This optimization approach validates the student-teacher features for a balanced model assessment. The distinguishable features for improving students’ oral and verbal communication from different teaching levels (basic, intermediate, and proficient) are extracted. The extracted features are the crisp input …for the fuzzy optimization such that the recurring fuzzification detains the least fit feature. Such features are replaced by the level-based teaching and performance feature that differs from the previous fuzzy input. This replacement is pursued until a maximum recommendable feature (performance/ learning) is identified. The identified feature is applicable for different teaching levels for improving the quality assessment. Therefore, the proposed optimization approach provides different feasible recommendations for teaching improvements. Show more
Keywords: English teaching, fuzzy optimization, quality assessment, recommendation model
DOI: 10.3233/JIFS-232034
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10529-10543, 2023
Authors: Bai, Xuemei | Tan, Jiaqi | Hu, Hanping | Zhang, Chenjie | Gu, Dongbing
Article Type: Research Article
Abstract: The paper proposes a deep learning model based on Chebyshev Network Gated Recurrent Units, which is called Spectral Graph Convolution Recurrent Neural Network, for multichannel electroencephalogram emotion recognition. First, in this paper, an adjacency matrix capturing the local relationships among electroencephalogram channels is established based on the cosine similarity of the spatial locations of electroencephalogram electrodes. The training efficiency is improved by utilizing the computational speed of the cosine distance. This advantage enables our method to have the potential for real-time emotion recognition, allowing for fast and accurate emotion classification in real-time application scenarios. Secondly, the spatial and temporal dependence …of the Spectral Graph Convolution Recurrent Neural Network for capturing electroencephalogram sequences is established based on the characteristics of the Chebyshev network and Gated Recurrent Units to extract the spatial and temporal features of electroencephalogram sequences. The proposed model was tested on the publicly accessible dataset DEAP. Its average recognition accuracy is 88%, 89.5%, and 89.7% for valence, arousal, and dominance, respectively. The experiment results demonstrated that the Spectral Graph Convolution Recurrent Neural Network method performed better than current models for electroencephalogram emotion identification. This model has broad applicability and holds potential for use in real-time emotion recognition scenarios. Show more
Keywords: Electroencephalogram, emotion recognition, chebyshev network gated recurrent units, spectral graph convolution recurrent neural network, adjacency matrix
DOI: 10.3233/JIFS-232465
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10545-10561, 2023
Authors: Xian, Luo | Tian, Lan
Article Type: Research Article
Abstract: In the era of big data, the exponentially increasing data volume and emerging technical tools have put forward new requirements for enterprise information management. Therefore, it is of great significance to enhance the core competitiveness of enterprises to explore how big data can empower the innovation of enterprise information management. Intelligent transportation system combines a variety of technologies and applies them to a large-scale transportation management system, so as to make a reasonable dispatch of traffic conditions. Aiming at the problem of the relatively low accuracy of bus passenger flow forecasting with the existing models, a short-term passenger flow prediction …model combining Stacked Denoising Auto Encoder (SDAE) and improved bidirectional Long-short Term Memory network (Bi-LSTM) is proposed. First, the SDAE model is used to fill in the missing bus passenger flow data, the characteristics of the bus passenger flow data are effectively utilized, and the data with rich information is used to predict the missing values with high accuracy. Second, Bi-LSTM model combined with attention mechanism is used for short-term bus passenger flow prediction. Considering that the data sequence of bus passenger flow is relatively long and there is a two-way information flow, the BiLSTM neural network is used for prediction tasks, and the influence of key factors is highlighted through attention weights to mine the internal laws of passenger flow data. The experimental results show that the proposed method achieves the lowest prediction error among all the comparison methods in the task of short-term bus passenger flow prediction on the public transportation dataset, with MAE, MRE, and RMSE values of 6.014, 0.052, and 9.874, respectively. These findings confirmed the effectiveness of the new model in the passenger flow prediction field. Show more
Keywords: Intelligent transportation system, passenger flow prediction, stacked denoising autoencoder, bidirectional long short-term memory network, attention mechanism introduction
DOI: 10.3233/JIFS-232979
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10563-10577, 2023
Authors: Fan, Kun | Hu, Yanrong | Liu, Hongjiu | Liu, Qingyang
Article Type: Research Article
Abstract: Accurately predicting soybean futures fluctuations can benefit various market participants such as farmers, policymakers, and speculators. This paper presents a novel approach for predicting soybean futures price that involves adding sequence decomposition and feature expansion to an Long Short-Term Memory (LSTM) model with dual-stage attention. Sequence decomposition is based on the Complete Ensemble Empirical Mode Decomposition with Adaptive Noise (CEEMDAN) method, a technique for extracting sequence patterns and eliminating noise. The technical indicators generated enrich the input features of the model. Dual-stage attention are finally employed to learn the spatio-temporal relationships between the input features and the target sequence. The …research is founded on data related to soybean contract trading from the Dalian Commodity Exchange. The suggested method surpasses the comparison models and establishes a fresh benchmark for future price forecasting research in China’s agricultural futures market. Show more
Keywords: Soybean futures, time series forecasting, attention mechanism, sequence decomposition, technical indicator
DOI: 10.3233/JIFS-233060
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10579-10602, 2023
Authors: Jingjing, Huang | Xu, Zhang
Article Type: Research Article
Abstract: In view of the individual differences in learners’ abilities, learning objectives, and learning time, an intelligent recommendation method for offline course resources of tax law based on the chaos particle swarm optimization algorithm is proposed to provide personalized digital courses for each learner. The concept map and knowledge structure theory are comprehended to create the network structure map of understanding points of tax law offline courses and determine the learning objectives of learners; the project response theory is used to analyze the ability of different learners; According to the learners’ learning objectives and ability level, the intelligent recommendation model of …offline course resources of tax law is established with the minimum concept difference, minimum ability difference, minimum time difference, and minimum learning concept imbalance as the objective functions; Through the cultural framework, the chaotic particle swarm optimization algorithm based on the cultural framework is obtained by combining the particle swarm optimization algorithm and the chaotic mapping algorithm; The algorithm is used to solve the intelligent recommendation model, and the intelligent recommendation results of offline course resources in tax law are obtained. The experiential outcomes indicate that the process has a smaller inverse generation distance, larger super-volume, and smaller distribution performance index when solving the model; that is, the convergence performance and distribution performance of the model is better; This method can effectively recommend offline course resources of tax law for learners intelligently, and the minimum normalized cumulative loss gain is about 0.75, which is significantly higher than other methods, that is, the effect of intelligent recommendation is better. Show more
Keywords: Chaotic mapping, particle swarm, optimization algorithm, offline courses of tax law, resource intelligence recommendation
DOI: 10.3233/JIFS-233095
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10603-10617, 2023
Authors: Alsuwat, Emad
Article Type: Research Article
Abstract: Machine learning (ML) techniques play a crucial role in producing precise predictions without the use of explicit programming by utilizing representative and unbiased data. These methods, which are a subset of artificial intelligence (AI), are used in a variety of settings, including recommendation engines, spam filtering, malware detection, classification, and predictive maintenance. While ML algorithms improve results, they also present security and privacy threats, especially in the face of adversarial ML attacks such as data poisoning assaults that can undermine data modeling applications. This study introduces SecK2, a cutting-edge ML method developed to stop dangerous input from entering ML models. …The scalability of SecK2 is proved through meticulous experimental research, revealing its astonishing capacity to identify data poisoning attacks at a previously unheard-of pace. As a result, SecK2 becomes a valuable tool for guaranteeing the reliability and security of ML models. Our suggested method produces outstanding results by a variety of criteria. Notably, it achieves a noteworthy 61% convergence rate and an exceptional 89% attack detection rate. Additionally, it offers a phenomenal 96% throughput while protecting data integrity at 53%. The technique also boasts impressive Validation accuracy of 96% and Training accuracy of 92%. The suggested technology offers a strong and reliable barrier against the rising danger of data poisoning attacks. ML practitioners can have more faith in their models, thanks to SecK2’s capabilities, protecting against potential adversarial assaults and preserving the dependability of ML-based applications. Show more
Keywords: Data poisoning attacks, machine learning, privacy prediction, malicious data
DOI: 10.3233/JIFS-233942
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10619-10633, 2023
Authors: Nie, Kuang | Langari, Reza
Article Type: Research Article
Abstract: Surface electromyography (sEMG) signals have great potential for predicting upper limb motion. Although prior investigations have explored diverse applications of sEMG signal analysis, but few studies have focused on real-time motion prediction within the context of upper limb configuration space. Additionally, previous research has not adequately considered individual variability in sEMG features. This study aims to accomplish two main objectives. Firstly, it seeks to examine the dissimilarities in signal distribution across different subjects when employing various features. Additionally, the study aims to establish a correlation between signal distribution patterns and the model’s predictive accuracy. Secondly, the study introduced a personalized …standardization (PSD) technique, which will serve to normalize the shape of the signal distribution across different subjects, thereby addressing the inter-individual differences in sEMG features. A bi-directional long short-term memory (Bi-LSTM) network is employed to estimate the real-time moving intention of the upper limb after applying the PSD technique. The analysis of signal distribution involved nine combinations of features, encompassing six features, namely mean absolute value (MAV), wave length (WL), variance (VAR), root mean square (RMS), mean frequency (MNF) and median frequency (MDF). To assess predictive capabilities, several models were evaluated. Remarkably, the distribution analysis clearly demonstrated that the shape of the signal distribution notably influences the model’s performance. Accroding to results, the incorporation of the PSD technique resulted in a notable improvement in the accuracy of the Bi-LSTM model, which leds to an enhancement of up to 2.8 percentage points in predictive accuracy. Additionally, the Bi-LSTM model emerged as the highest-performing model among all the compared models during the analysis. These findings underscore the importance of considering individual variability in sEMG features when developing predictive models for upper limb motion and highlight the potential benefits of employing the PSD technique to enhance model performance. Show more
Keywords: Surface electromyography, Real-time motion prediction, Deep Learning, Signal pre-processing
DOI: 10.3233/JIFS-234018
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10635-10648, 2023
Authors: Gui, Zhen
Article Type: Research Article
Abstract: The task of multi-label text classification involves assigning a set of related labels to a given document. However, there are three main problems with this task. Firstly, the joint modeling of label-text and label-label relationships is inadequate. Secondly, the semantic mining of the label itself is insufficient. Lastly, the utilization of the internal structure information of the label is ignored. To address these issues, a new multi-label text classification method has been proposed. This method is based on joint attention and shared semantic space. The joint multi-head attention mechanism models the relationship between labels and documents as well as the …relationship between labels simultaneously. This helps to avoid error transmission and utilizes the interaction information between them. The decouple shared semantic space embedding method improves the method of using labels semantic information and reduces deviation in the phase of modeling correlation. The hierarchical hinting method based on prior knowledge relies on the prior knowledge in the pre-trained model to exploit the labels hierarchy information. Experimental results have shown that this proposed method is superior to existing multi-label text classification methods in public datasets. Show more
Keywords: Multi-label text classification, attention mechanism, label representation, semantic embedding, pre-trained model
DOI: 10.3233/JIFS-234151
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10649-10659, 2023
Authors: Deng, Yu | Zhang, Wenxia
Article Type: Research Article
Abstract: In recent years, due to the rapid development of internet technology, the integration process of digital technology and financial services has accelerated. Digital Financial inclusion has emerged as the times require, becoming an important force to promote private enterprises to get out of financing difficulties. The development level evaluation of digital inclusive finance is a classical multiple attribute group decision making (MAGDM) problems. Recently, Recently, the Exponential TODIM(ExpTODIM) and (grey relational analysis) GRA method has been used to cope with MAGDM issues. The intuitionistic fuzzy sets (IFSs) are used as a tool for characterizing uncertain information during the development level …evaluation of digital inclusive finance. In this paper, the intuitionistic fuzzy Exponential TODIM-GRA (IF-ExpTODIM-GRA) method is built to solve the MAGDM under IFSs. In the end, a numerical case study for development level evaluation of digital inclusive finance is supplied to validate the proposed method. The main contributions of this paper are outlined: (1) the ExpTODIM and GRA method has been extended to IFSs; (2) Information Entropy is used to derive weight under IFSs. (3) the IF-ExpTODIM-GRA method is founded to solve the MAGDM under IFSs; (4) a numerical case study for development level evaluation of digital inclusive finance and some comparative analysis are supplied to validate the proposed method. Show more
Keywords: Multiple attribute group decision making (MAGDM), intuitionistic fuzzy sets (IFSs), ExpTODIM, GRA, digital inclusive finance
DOI: 10.3233/JIFS-234827
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10661-10673, 2023
Authors: Chen, Ze | Lu, Ning | Hou, Botao | Liu, Xin | Zuo, Xiaojun
Article Type: Research Article
Abstract: In order to improve the effect and accuracy of risk source identification, this paper studied the network security risk source identification model of power CPS system based on fuzzy artificial neural network. The network security risk source index system of power CPS system was constructed, and the dimension of index data was reduced by principal component analysis. Fuzzy theory is used to process the index data after dimension reduction, and the comprehensive membership vector of each index is obtained. The dynamic clustering algorithm is used to determine the number of hidden layer units of radial basis function neural network, and …the network security risk source identification model is established. Finally, the quantitative value of risk source identification is output. The experimental results show that the model can effectively reduce the dimension of the network security risk source index data of the power CPS system. The optimal distance threshold of the hidden layer is 4.2, and the optimal number of units is 6. In the final identification results, four severe risk sources and five moderate risk sources were obtained, and the quantitative values of risk source identification of each index were 63, 70, 71, 77, 65, 89 and 96, respectively, indicating that the model can effectively identify network security risk sources of power CPS systems. With the increase of the proportion of communication nodes removed, when there are various types of security vulnerability information, the mean square error value of the model is always lower than the set threshold, indicating that the model has high recognition accuracy. Show more
Keywords: Fuzzy theory, artificial neural network, power CPS system, network security, risk sources, identification model
DOI: 10.3233/JIFS-224090
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10675-10691, 2023
Authors: Kamran, Muhammad | Ashraf, Shahzaib | Salamat, Nadeem | Naeem, Muhammad | Hameed, Muhammad Shazib
Article Type: Research Article
Abstract: One of the hottest areas for applying the solutions currently available is the internet of things-based smart housing society architecture and its uncertainty analysis. When intelligent parking, waste management, public transportation, public safety, and other automatic methods for housing society’s growth were implemented, it became even more crucial. An intelligent, smart system is necessary to manage these problems and provide smooth services. Additionally, it will be helpful in reducing issues with time waste and societal safety. However, the issue comes up when describing accurate, approximate, or questionable parking, transit, safety, and waste management areas. This paper discusses several mathematical solutions …for the smart housing society that use fuzzy rough sets, probabilistic hesitant fuzzy sets, and their extensions with neutrosophic sets. For further growth, a few studies on the graphic display of the evolution of the smart housing society are also considered. The rough set theory can be useful when dealing with imprecise, incomplete, or indeterminate data sets. The core contribution of this work is the construction of a novel generalized notion of a single-valued neutrosophic probabilistic hesitant fuzzy rough set (SV-NPHFRS), which is a hybrid structure of the single-valued neutrosophic set, the probabilistic hesitant fuzzy set, and the rough set. In contrast to the present literature, the underlying idea of SV-NPHFRS is that it is a powerful mathematical tool for managing uncertainty and imperfect information. This method is particularly beneficial when there are a number of competing criteria to consider. The aggregation technique plays an important role in decision-making concerns, especially when more competing criteria are present. In the study’s comparison phase, the suggested decision support system is compared to relevant existing approaches. The results suggest that, in terms of choice flexibility, the suggested technique has the potential to outperform the drawbacks of the current decision-making tools. The proposed study is expected to be useful for a number of researchers conducting future work on housing societies, waste management, public safety diagnostics, and hybridization. Show more
Keywords: Single-valued neutrosophic probabilistic hesitant fuzzy rough sets, aggregation operators, decision making
DOI: 10.3233/JIFS-224364
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10693-10737, 2023
Authors: Suo, Chunfeng | Li, Yongming | Guo, Li
Article Type: Research Article
Abstract: The polygonal interval-valued fuzzy number is constructed based on the polygonal fuzzy number and the interval-valued fuzzy number. Its main feature is that the linear operation of finite ordered points reduces the complexity of traditional interval-valued fuzzy number operations. This research presents a generalized distance formula between two polygonal interval-valued fuzzy numbers and explores topological properties under the distance of polygonal interval-valued fuzzy numbers. In addition, we adopt the TOPSIS (technique for order preference by similarity to an ideal solution) and prospect theory approach for the multi-attribute decision-making problem. The information of attributes describes with polygonal interval-valued fuzzy numbers, and …we then implement optimized ranking on the alternatives according to the profit and loss ratio. Finally, we verify the effectiveness and practicability of the decision-making method and fuzzy numbers at polygonal interval-valued fuzzy numbers in e-commerce risk assessment. Show more
Keywords: Polygonal interval-valued fuzzy number, human resource recruitment, generalized distance, arithmetic operation
DOI: 10.3233/JIFS-230040
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10739-10755, 2023
Authors: Cao, Xianghong | Wu, Kunning | Geng, Xin | Wang, Yongdong
Article Type: Research Article
Abstract: With the acceleration of urbanization, the frequency of building fire incidents has been increasing year by year. Therefore, rapid, efficient, and safe evacuation from buildings has become an urgent and important task. A construction fire escape path planning method based on an improved NavMesh algorithm is proposed in this paper. Firstly, by using the method of local updates in the navigation grid, redundant computation is reduced, and the update time of the improved algorithm is about 6.8% of that of the original algorithm, immediate generation of navigation is achieved. Secondly, the heuristic function of the pathfinding algorithm is improved, and …a multi-exit path planning mechanism is proposed to achieve more efficient, which can quickly plan a safe evacuation path away from the spreading fire and smoke in the event of a fire. Finally, a new evaluation index called Navigation Grid Complexity (NGC) is proposed and demonstrated to measure the quality of navigation grids. The feasibility and effectiveness of the proposed method are validated through simulation experiments on actual building models, which can provide real-time, efficient, intelligent, and safe path planning for rapid evacuation of evacuees in the fire scene. Show more
Keywords: NavMesh, path planning, fire emergency evacuation, dynamic environments
DOI: 10.3233/JIFS-232681
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10757-10768, 2023
Authors: Ran, Lang | Hong, Chaoqun | Zhang, Xuebai | Tang, Chaohui | Xie, Yuhong
Article Type: Research Article
Abstract: Human pose estimation is a challenging visual task that relies on spatial location information. To improve the performance of human pose estimation, it is important to accurately determine the constraint relationship among keypoints. To address this, we propose MfvPose, a novel hybrid model that leverages rich multi-scale information. The proposed model incorporates the HRFOV module, which uses cascaded atrous convolution to maintain high-resolution representations of the backbone extractor and enrich the multi-scale information. In addition, we introduce learnable scalar weights to the Transformer encoder. In detail, it involves a multiplication by a diagonal matrix with learnable scalar weights on output …of each residual block, which improves the dynamics of model training and enhances the accuracy of human pose estimation. It is experimentally shown that our proposed MfvPose achieves promising results on various benchmarks. Show more
Keywords: Receptive field, multi-head self-attention, atrous convolution, human pose estimation
DOI: 10.3233/JIFS-233375
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10769-10778, 2023
Authors: Baskar, A. | Rajaram, A.
Article Type: Research Article
Abstract: Mobile Adhoc Network (MANET) is a dynamic network with mobility nodes. Emerging applications for MANETs in real-time present numerous research challenges. Specifically, the mobile nodes’ dynamic character hinders the routing efficacy in MANET. Previous algorithms for routing like DSDV DSR, AODV, and are inefficient due to an ineffective route discovery method. Route selection becomes more complex and energy-intensive for large-scale applications, such as air pollution monitoring. For air pollution monitoring applications, this research seeks to improve data delivery while reducing energy consumption. In this work, we proposed DeepOptimizer for achieving optimal data transmission. First, the network is segregated into multiple …clusters using the Rough set theory. In the all clusters, Cluster Head is accountable for split a data into normal and emergency. This process is performed by grouping data by K++ means algorithm. For emergency data, Graph-based Route Selection (GRS) algorithm. This is the fast algorithm that selects the optimal route. On the other hand, the normal data transmission route is selected by the Deep-SpikeQNetwok-based Whale Optimization (WO) algorithm. Finally, the network is tested through simulations made in ns-3 based on network lifetime, throughput, energy level, delay and packet delivery ratio. Show more
Keywords: Deep routing, emergency data transmission, spiking networks, MANET
DOI: 10.3233/JIFS-233425
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10779-10797, 2023
Authors: Xia, Wenxin | Che, Jinxing
Article Type: Research Article
Abstract: Wind energy needs to be used efficiently, which depends heavily on the accuracy and reliability of wind speed forecasting. However, the volatility and nonlinearity of wind speed make this difficult. In volatility and nonlinearity reduction, we sequentially apply complete ensemble empirical mode decomposition with adaptive noise (CEEMDAN) and variational mode decomposition (VMD) to secondarily decompose the wind speed data. This framework, however, requires effectively modeling multiple uncertainty components. Eliminating this limitation, we integrate crow search algorithm (CSA) with deep belief network (DBN) to generate a unified optimal deep learning system, which not only eliminates the influence of multiple uncertainties, but …also only adopts DBN as a predictor to realize parsimonious ensemble. Two experiments demonstrate the superiority of this system. Show more
Keywords: Parsimonious ensemble, secondary decomposition, optimal deep learning, crow search algorithm
DOI: 10.3233/JIFS-233782
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10799-10822, 2023
Authors: Kumari, Ritika | Singh, Jaspreeti | Gosain, Anjana
Article Type: Research Article
Abstract: Class imbalance problem (CIP) exists when the class distribution is not uniform. Many real-world scenarios face CIP which attracted the researcher’s attention to this problem. Training machine learning (ML) models with class imbalanced datasets is a challenging problem. Ensemble methods in ML involve training multiple classifiers, combining or averaging their predictions to come to a final prediction. Specifically designed ensemble-based methods can overcome the difficulty faced by traditional classifiers and can handle the CIP. The performance of 19 ensemble methods for 44 unbalanced datasets is assessed in this paper in order to observe the effects of the class imbalance ratio …(CIR). For performance evaluation, we divide these datasets into three categories, i.e., Slightly Imbalance (SI), Moderately Imbalance (MI) and Highly Imbalance (HI) based on CIR. With the proposed perspective, we observe that different ensemble methods perform well in different categories suggesting that the percentage of minority or majority class could be a criterion for the selection of ensemble methods for class imbalance datasets. Moreover, visual representations and different non-parametric statistical tests are also used to have more reliable results. Show more
Keywords: Ensemble methods, boosting, bagging, hybrid approaches, classification
DOI: 10.3233/JIFS-223333
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10823-10834, 2023
Authors: Koshti, Dipali | Gupta, Ashutosh | Kalla, Mukesh
Article Type: Research Article
Abstract: Visual question Answering (VQA) is a computer vision task that requires a system to infer an answer to a text-based question about an image. Prior approaches did not take into account an image’s positional information or the questions’ grammatical and semantic relationships during image and question processing. Featurization, which leads to the false answering of the question. Hence to overcome this issue CNN –Graph based LSTM with optimized BP Featurization technique is introduced for feature extraction of image as well as question. The position of the subjects in the image has been determined using CNN with a dropout layer and …the optimized momentum backpropagation during the extraction of image features without losing any image data. Then, using a graph-based LSTM with loopy backpropagation, the questions’ syntactic and semantic dependencies are retrieved. However, due to their lack of external knowledge about the input image, the existing approaches are unable to respond to common sense knowledge-based questions (open domain). As a result, the proposed Spatial GCNN knowledge retrieval with PDB Model and Spatial Graph Convolutional Neural Network, which recovers external data from Wikidata, have been used to address the open domain problems. Then the Probabilistic Discriminative Bayesian model, based Attention mechanism predicts the answer by referring to all concepts in question. Thus, the proposed method answers the open domain question with high accuracy of 88.30%. Show more
Keywords: Visual Question Answering, graph-based LSTM, SVO triples sentence, Discriminative Bayesian model, dynamic memory network
DOI: 10.3233/JIFS-230198
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10835-10852, 2023
Authors: My, Bui T.T. | Ta, Bao Q.
Article Type: Research Article
Abstract: Credit scoring is a typical example of imbalanced classification, which poses a challenge to conventional machine learning algorithms and statistical classifiers when attempting to accurately predict outcomes for defaulting customers. In this paper, we propose a credit scoring classifier called Decision Tree Ensemble model (DTE). This model effectively addresses the challenge of imbalanced data and identifies significant features that influence the likelihood of credit status. An experiment demonstrates that DTE exhibits superior performance metrics in comparison to well-known based-tree ensemble classifiers such as Bagging, Random Forest, and AdaBoost, particularly when integrated with resampling techniques for handling imbalanced data.
Keywords: Classifiers, credit scoring, decision tree, ensemble classifiers, imbalanced data
DOI: 10.3233/JIFS-230825
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10853-10864, 2023
Authors: Catherine Grace John, J. | Deepika, M. | Elavarasan, B.
Article Type: Research Article
Abstract: This article has been retracted. A retraction notice can be found at https://doi.org/10.3233/JIFS-219433 .
DOI: 10.3233/JIFS-232591
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10865-10872, 2023
Authors: Thumilvannan, S. | Balamanigandan, R.
Article Type: Research Article
Abstract: The survival of patients’ deaths owing to Heart Disease (HD) could be improved with the assistance of an enhanced approach for predicting the risk of diabetes and HD. Nevertheless, such schemes are developed rarely. Thus, this paper proposes a new Power Lognormal Distribution-Semi-Supervised Learning-centric Restricted Boltzmann Machine (PLD-SSL-RBM) diabetes and HD risk level prediction model for IoT data. The missing data are removed by partial Derivation of the Hamilton-Cluster Centered-K-means Clustering (DH-CC-KC) to efficiently train the classifier and then, the data are aggregated. Next, to reduce the dataset size, the features are reduced with Shell Sort-Principal Component Analysis (SS-PCA). Then, …the fuzzy rule-based decisions are created with the T -test-centric Uniform Distribution-Elephant Herd Optimization Algorithm (T -test-UDEHOA) Correlated Features (CF) to classify the risk levels accurately. Lastly, the risk levels of HD and diabetes are predicted; in addition, by employing the Elliptic Curve Cryptography (ECC)7encryption technique, the data is securely stored on the medical database. The proposed risk prediction model’s performance is analyzed on the Framingham dataset. As per the experimental outcomes, when analogized to the prevailing methodologies, the proposed technique attained a higher accuracy of 99.55%. Show more
Keywords: Internet of Things (IoT), heart disease and diabetes risk, Restricted Boltzmann Machine (RBM), correlated features, Elephant Herd Optimization Algorithm (EHOA), Correlated Feature (CF)
DOI: 10.3233/JIFS-232851
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10873-10886, 2023
Authors: Thakur, Divya | Lalwani, Praveen
Article Type: Research Article
Abstract: The use of mobile devices has contributed greatly to the expansion of Human Activity Recognition (HAR) studies in recent years. Researchers find it attractive because of its versatility, low cost, compact size, ease of usage, and wide range of possible applications. Conventional, biological, and control-based systems are just some of the methods that have been created for humanoid robot movement in recent years. This article specifically targeted improvement in the proposed method, which is different from previous papers. This is being done with the use of the publicly available Human Activity Gait (HAG) data set, which documents a wide range …of different types of activities. IMU sensors were used to collect this data set. Several experiments were conducted using different machine-learning strategies, each with its own set of hyper-parameters, to determine how best to utilize these data. In our proposed model Cuckoo Search Optimization is being used for optimum feature selection. On this data set, we have tested a number of machine learning models, including LR, KNN, DT, and proposed CSOEM (Cuckoo Search-Based Optimized Ensemble Model). The simulation suggests that the proposed model CSOEM achieves an impressive accuracy of 98%. This CSOEM is built by combining the feature selection strategy of Cuckoo Search Optimizations with the ensembling of the LR, KNN, and DT. Show more
Keywords: Bipedal robot locomotion, CSO: cuckoo search optimization, HAG: human activity gait, HAR: human activity recognition
DOI: 10.3233/JIFS-232986
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10887-10900, 2023
Authors: Lian, Jing | Chen, Shi | Pi, Jiahao | Li, Linhui | Li, Qingfeng
Article Type: Research Article
Abstract: Localization through intricate traffic scenes poses challenges due to their dynamic, light-variable, and low-textured nature. Existing visual Simultaneous Localization and Mapping (SLAM) methods, which are based on static and texture-rich assumptions, struggle with drift and tracking failures in such complex environments. To address this, we propose a visual SLAM algorithm based on semantic information and geometric consistency in order to solve the above issues and further realize autonomous driving applications in road environments. In dynamic traffic scenes, we employ an object detection network to identify moving objects and further classify them based on geometric consistency as dynamic objects or potential …dynamic objects. This method permits us to preserve more reliable static feature points. In low-texture environments, we propose a method that employs key object categories and geometric parameters of static scene objects for object matching between consecutive frames, effectively resolving the problem of tracking failure in such scenarios. We conducted experiments on the KITTI and ApolloScape datasets for autonomous driving and compared them to current representative algorithms. The results indicate that in the dynamic environment of the KITTI dataset, our algorithm improves the compared metrics by an average of 29.68%. In the static environment of the KITTI dataset, our algorithm’s performance is comparable to that of the other compared algorithms. In the complex traffic scenario R11R003 from the ApolloScape dataset, our algorithm improves the compared metrics by an average of 25.27%. These results establish the algorithm’s exceptional localization accuracy in dynamic environments and its robust localization capabilities in environments with low texture. It provides development and support for the implementation of autonomous driving technology applications. Show more
Keywords: Autonomous vehicles, SLAM, traffic environments, object detection
DOI: 10.3233/JIFS-233068
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10901-10919, 2023
Authors: Liu, Zhichao | Wang, Yachao | Ma, Zhiyuan | Cao, Mengnan | Liu, Mingda | Yang, Xiaochu
Article Type: Research Article
Abstract: Real-time monitoring of electricity usage details through load monitoring techniques is a crucial aspect of smart power grid management and monitoring, allowing for the acquisition of information on the electricity usage of individual appliances for power users. Accurate detection of electricity load is essential for refined load management and monitoring of power supply quality, facilitating the improvement of power management at the user side and enhancing power operation efficiency. Non-intrusive load monitoring (NILM) techniques require only the analysis of total load data to achieve load monitoring of electricity usage details, and offer advantages such as low cost, easy implementation, high …reliability, and user acceptance. However, with the increasing number of distributed new load devices on the user side and the diversification of device development, simple load recognition algorithms are insufficient to meet the identification needs of multiple devices and achieve high recognition accuracy. To address this issue, a non-intrusive load recognition (NILR) model that combines an adaptive particle swarm optimization algorithm (PSO) and convolutional neural network (CNN) has been proposed. In this model, pixelated images of different electrical V-I trajectories are used as inputs for the CNN, and the optimal network layer and convolutional kernel size are determined by the adaptive PSO optimization algorithm during the CNN training process. The proposed model has been validated on the public dataset PLAID, and experimental results demonstrate that it has achieved a overall recognition accuracy of 97.26% and F-1 score of 96.92%, significantly better than other comparison models. The proposed model effectively reduces the confusion between various devices, exhibiting good recognition and generalization capabilities. Show more
Keywords: Smart grid, non-intrusive load recognition, DL, Convolutional Neural Network, adaptive Particle Swarm Optimization
DOI: 10.3233/JIFS-233813
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10921-10935, 2023
Authors: Afzali, Parvaneh | Rezapour, Abdoreza | Rezaee Jordehi, Ahmad
Article Type: Research Article
Abstract: Handwriting is an individual trait that serves as evidence to authenticate a particular writer. Identifying the writer of a handwritten text has shown encouraging results in examining historical and forensic documents. In this paper, we propose a novel offline writer identification system based on the challenging analysis of small amount of data to extract distinct patterns. In our deep network, the feature extraction process relies on a specially designed dual-path architecture, and the resulting embeddings are concatenated to produce the final learned features. To deal with a variety of uncertainties such as high intra-class variations and noises, we leverage the …fuzzy logic in the design of a custom Convolutional Neural Network (CNN) with a type-2 fuzzy activation function for the first path. Additionally, the second path utilizes the transfer learning-based CNN to enhance the discriminability of the learned features. Our method allows for text-independent writer identification, eliminating the need for identical handwriting samples to train and test the model. Considering that various factors can influence the handwriting style, a dataset containing right-to-left handwriting samples is assembled. The proposed method is evaluated on our developed dataset and four widely-known public datasets, namely KHATT, CVL, Firemaker, and IAM. High accuracy values are achieved, with results of 99.85%, 99.83%, 99.79%, 99.64%, and 98.17% for each dataset, respectively. One noteworthy aspect of this study is that the evaluation results on diverse datasets demonstrate the applicability of the proposed model to various languages. Moreover, the model performs effectively in real-world scenarios with limited handwritten data. Show more
Keywords: Writer identification, convolutional neural networks, Type-2 fuzzy logic, deep feature concatenation
DOI: 10.3233/JIFS-231889
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10937-10949, 2023
Authors: Mishra, Rajiv Kumar | Yadav, Rajesh Kumar | Nath, Prem
Article Type: Research Article
Abstract: The massive amounts of data produced and gathered by smart devices through the internet support a wide range of applications, considerably improving our daily lives. Data sharing among smart devices must be safeguarded due to the sensitivity of the data involved in the transmission. The Internet of Things (IoT) environment must be protected from unauthorised access due to a variety of variables, including its attractiveness to cybercriminals, previous successful cyber-attacks, and consumers’ perceptions of security and reliability. Blockchain technology appears to be one promising technology that appears to address these security challenges extremely effectively. However, given the volume and rate …at which smart devices generate data, Blockchain appears to be inefficient for storing it. The pace of data collection in the IoT context and the speed of transaction confirmation in the Blockchain network are the two key elements behind this. We connect the Blockchain and the Inter-Planetary File System (IPFS) in this study to permit data recording on a distributed storage and a mechanism to restrict access to recorded data to authorised organisations only. Over the Blockchain network, the access policy definition for safe data sharing and cryptographic hash content is stored. The real IoT-generated data, on the other hand, is collected via a distributed storage network, which improves availability and security. The proposed scheme’s analysis and performance evaluation show that it is secure and feasible. Furthermore, simulations are undertaken to assess the operating costs of smart contracts and to test the efficacy and viability of the suggested architecture. Show more
Keywords: IoT, secure data sharing, unauthorized access, blockchain, IPFS, etc.
DOI: 10.3233/JIFS-232483
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10951-10966, 2023
Authors: Rubia J, Jency | Lincy R, Babitha
Article Type: Research Article
Abstract: Deep learning strategies have been achieved over the historical decades to resolve many computer vision applications. Recently, these deep learning algorithms have been extensively used as a tool in classification problems. Generally, the deep learning algorithms trained with gradient-based optimizers, which has some downsides such as the slow speed of convergence and stuck in local minima. As a solution, the planned work using meta-heuristic based Grey Wolf and Whales optimization algorithms for the automatic plant disease detection model. The planned work has explored the application of automatic plant disease identification through the leaf images with the help of the image …processing approach. The planned research has evaluated the deep learning algorithm with Grey Wolf and Whales optimization techniques using the three types of datasets, such as Plant Village, New Plant Disease, and Rice Leaf Disease databases. The simulation consequences illustrate that the computational efficiency of the Grey Wolf and Whales based automatic disease identification process is boosted when coupled with the deep learning method. Show more
Keywords: Plant disease detection, deep learning, meta-heuristic optimizers, Grey Wolf optimization algorithms, Whales optimization algorithms
DOI: 10.3233/JIFS-213423
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10967-10983, 2023
Authors: Wang, Ming
Article Type: Research Article
Abstract: This article has been retracted. A retraction notice can be found at https://doi.org/10.3233/JIFS-219433 .
DOI: 10.3233/JIFS-224523
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10985-10996, 2023
Authors: Ren, Zenggen | Guo, Fu | Hu, Mingcai | Qu, Qingxing | Li, Fengxiang
Article Type: Research Article
Abstract: Generating kansei profiles for products represent fundamental aspects of kansei engineering (KE). Conventionally, the semantic differential (SD) method has been extensively employed to construct product kansei profiles, aiming to delve into consumers’ perceptions of products. However, this approach is associated with significant time consumption and inefficiency. In light of this, we introduce an innovative kansei evaluation approach that incorporates consumers’ kansei preferences, thereby enhancing the efficiency of the evaluation process. This approach comprises three integral modules: Firstly, the generation of product kansei profiles and the construction of a kansei database for decision alternatives are achieved through the analysis of online …reviews. Subsequently, the kansei data is adjusted based on consumers’ kansei preferences. Finally, the rank correlation analysis (RCA) is conducted to establish the prioritization of decision alternatives. Notably, this method facilitates the ranking of products in accordance with consumers’ kansei preferences, thereby assisting consumers in navigating through an array of functionally similar products to identify their preferred choices. A comprehensive case study illustrates the implementation procedure and validates the practicality of our proposed method. Show more
Keywords: Kansei evaluation, kansei preferences, kansei profiles, online reviews, rank correlation analysis
DOI: 10.3233/JIFS-230654
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10997-11012, 2023
Authors: Shafi, Muhammad Ammar | Rusiman, Mohd Saifullah | Jacob, Kavikumar | Musa, Aisya Natasya
Article Type: Research Article
Abstract: With relevant computational software, fuzzy prediction, a new intelligent modelling technique, is utilised to resolve unclear phenomena in various disciplines. Excellent software risk prediction is essential for effective prediction, such as risk management, case planning, and control. We provide an intelligent modelling strategy for software risk prediction in this research. We are applying a support vector machine model and two phases of hybrid fuzzy linear regression clustering (SVM). This method may produce the most accurate risk predictions for various continuous data. The best model with even less error value, acceptable interpretability, and imprecise uncertainty inputs is a fuzzy linear regression …with symmetric parameter clustering with a support vector machine (FLRWSPCSVM), a new intelligent modelling technique. The model’s predictive accuracy is demonstrably higher than other prediction models, according to validation utilising simulation data and four software packages such as SPSS, MATLAB and Weka Explorer. Show more
Keywords: Intelligent modelling, fuzzy hybrid, Prediction data, computation software, statistical error
DOI: 10.3233/JIFS-231814
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 11013-11019, 2023
Authors: Sun, Peixi | Wang, Yixuan | Song, Jaehoon
Article Type: Research Article
Abstract: A brand is an enterprise’s market image and huge intangible assets. A brand is an enterprise’s market image and huge intangible assets, and it is also a comprehensive embodiment of an enterprise’s core competitiveness. Therefore, continuous improvement of brand competitiveness undoubtedly has far-reaching significance for manufacturing enterprises. Using the brand competitiveness evaluation index system and selected evaluation methods of manufacturing enterprises constructed in this article, the brand competitiveness evaluation index system and selected evaluation methods can not only study the overall brand competitiveness of the participating enterprises, but also understand the advantages and disadvantages of the brand competitiveness of the …participating enterprises from different perspectives, To help and guide manufacturing enterprises to strengthen brand building in a targeted manner and continuously improve the brand competitiveness of manufacturing enterprises. The brand competitiveness evaluation of manufacturing enterprises is a classical MAGDM problems. Recently, the TODIM and VIKOR method has been used to cope with MAGDM issues. The interval neutrosophic sets (INSs) are used as a tool for characterizing uncertain information during the brand competitiveness evaluation of manufacturing enterprises. In this manuscript, the interval neutrosophic number TODIM-VIKOR (INN-TODIM-VIKOR) method is built to solve the MAGDM under INSs. In the end, a numerical case study for brand competitiveness evaluation of manufacturing enterprises is given to validate the proposed method. Show more
Keywords: Multiple attribute group decision making (MAGDM), Interval neutrosophic sets (INSs), TODIM, VIKOR, Brand competitiveness evaluation
DOI: 10.3233/JIFS-232001
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 11021-11034, 2023
Authors: Kalaiarasan, D. | Ahilan, A. | Ramalingam, S.
Article Type: Research Article
Abstract: This article has been retracted. A retraction notice can be found at https://doi.org/10.3233/JIFS-219433 .
DOI: 10.3233/JIFS-213337
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 11035-11057, 2023
Authors: Zhang, Shiguang | Guo, Di | Zhou, Ting
Article Type: Research Article
Abstract: Extreme learning machine (ELM) has received increasingly more attention because of its high efficiency and ease of implementation. However, the existing ELM algorithms generally suffer from the drawbacks of noise sensitivity and poor robustness. Therefore, we combine the advantages of twin hyperplanes with the fast speed of ELM, and then introduce the characteristics of heteroscedastic Gaussian noise. In this paper, a new regressor is proposed, which is called twin extreme learning machine based on heteroskedastic Gaussian noise (TELM-HGN). In addition, the augmented Lagrange multiplier method is introduced to optimize and solve the presented model. Finally, a significant number of experiments …were conducted on different data-sets including real wind-speed data, Boston housing price dataset and stock dataset. Experimental results show that the proposed algorithms not only inherits most of the merits of the original ELM, but also has more stable and reliable generalization performance and more accurate prediction results. These applications demonstrate the correctness and effectiveness of the proposed model. Show more
Keywords: Extreme learning machine, heteroscedastic Gaussian noise, least squares support vector regression, twin hyperplanes, wind-speed forecasting
DOI: 10.3233/JIFS-232121
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 11059-11073, 2023
Authors: Vidyabharathi, D. | Sivanesh, S. | Theetchenya, S. | Vidhya, G.
Article Type: Research Article
Abstract: Detecting of cracks and damages, especially in multi storied buildings is a crucial aspect of infrastructure and building maintenance, as it ensures safety and reliability. An enhanced framework for the crack detection is proposed to identify the fine cracks which are present at greater heights and not captured to the human vision from the ground. The cracks are identified and classified by the deep convolutional neural network model. The Oriented Non-Maximal Suppression module reduces the false positives to improve the classification accuracy and reliability. The proposed method O-CNN(CNN with ONMS)can be used in real-world for the infrastructure inspection and potential …applications in civil engineering construction. The ability to input different types of data, including images and videos, makes the proposed system user-friendly and easy to use. Furthermore the system reduces the risk of human error and prevents the huge damages caused to the building. Also, it prevents the major loss which may be caused to the lives. Overall, the proposed system contributes to the field of deep learning and computer vision by providing an effective and better solution for crack detection in real-world scenarios. Show more
Keywords: Deep learning, convolutional neural networks, oriented non-maximal suppression, O-CNN
DOI: 10.3233/JIFS-232793
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 11075-11091, 2023
Authors: Alphy, Anna | Rajamohamed, | Velusamy, Jayaraj | Vidhya, K. | Ravi, G. | Rajasekaran, Arun Sekar
Article Type: Research Article
Abstract: Age-Related Macular Degeneration is a progressive, irreversible eye condition that causes vision loss and impairs quality of life. The lost potential of the optic nerve cannot be regained, but a patient with Age-Related Macular Degeneration must have early diagnosis and treatment in order to prevent visual loss. The diagnosis of Age-Related Macular Degeneration is based on visual field loss tests, a patient’s medical history, intraocular pressure, and a physical fundus evaluation. Age-Related Macular Degeneration must be diagnosed early in order to avoid irreparable structural damage and vision loss. The objective of the proposed study is to develop a new optimization-driven …strategy-based recurrent neural network using the Internet of Things for the identification of age-related macular degeneration. The Recurrent Neural Network (RNN) classifier is trained using the Particle Swarm Optimization (PSO) technique included into the RNN-IoMT. Initially, the input picture is sent through pre-processing in order to remove noise and artefacts. The generated preprocessed picture is simultaneously sent to optical disc detection and blood vessel detection. In addition, picture level characteristics are extracted from the image that has been preprocessed. Finally, the image-level, optic disc-level, and blood vessel-level features are retrieved and compiled into a feature vector. The acquired feature vector is fed into the RNN classifier, with the suggested PSO used to train the RNN for Age-Related Macular Degeneration detection via the Internet of Medical Things. The suggested PSO+RNN exhibits better performance with enhanced precision of 97.194%, sensitivity of 97.184%, and specificity of 97.2044%, respectively. Show more
Keywords: Wearables, internet of things, teleophthalmology, deep learning, fundus images
DOI: 10.3233/JIFS-233044
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 11093-11105, 2023
Authors: Nguyen, Vy Duong Kim | Do, Phuc
Article Type: Research Article
Abstract: People will increasingly get expedited and diverse means of accessing news as societies progress. Furthermore, there is a noticeable increase in the prevalence of incorrect and misleading information. Our research is motivated by the significant concerns regarding the detrimental impacts of disinformation on the general public, political stability, and trust in the media. The scarcity of Vietnamese-language datasets can be attributed to the predominant focus of false news detection studies on datasets only in English. Detection investigations of fake news have predominantly relied on supervised machine learning algorithms, which possess notable limitations when confronted with unclassified news articles that are …either authentic or untrue. The utilization of Knowledge Graphs (KG) and Graph Convolutional Networks (GCN) holds promise in addressing the constraints of supervised machine learning algorithms. To address these problems, we propose an approach that integrates KG)into the procedure for detecting fake news. We utilize the Vietnamese Fake News Detection dataset (VFND-vietnamese-fake-news), comprising authentic and deceptive news articles from reputable Vietnamese newspapers such as vnexpress, tuoitre, and have been collected from 2018 to 2023. News articles are only labeled as real or fake after experiencing independent verification. The Glove embedding (Global Vectors for Word Representation) is employed to establish a knowledge network for the given dataset. This knowledge graph’s construction is accomplished using the Word Mover’s Distance (WMD) algorithm in conjunction with the K-nearest neighbor approach; GCN approach and the input KG train models to discern between real and fake news. With labeling half of the input dataset, the experimental findings indicate a notable level of accuracy, reaching up to 85%. Our research holds significant importance in identifying fake news, particularly within the context of the Vietnamese language. Show more
Keywords: Fake news detection, graph convolutional network, semi-supervised, K-nearest neighbor, word mover’s distance
DOI: 10.3233/JIFS-233260
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 11107-11119, 2023
Authors: Bo, Lina
Article Type: Research Article
Abstract: In college education, English is a required course for every college student, and undergraduate colleges have certain requirements for college English proficiency. At the same time, English is directly related to its learning, so improving the quality of college English teaching (CET) is very important. Teaching quality is a key indicator for measuring the effectiveness of English teaching. Learning quality evaluation is a very complex process that involves many factors, such as evaluation indicators, evaluation methods, etc. Therefore, establishing an objective and scientific English quality evaluation system is a challenging issue. The CET quality evaluation is a MAGDM. Then, the …TODIM and VIKOR was used to set up MAGDM. The interval-valued intuitionistic fuzzy sets (IVIFSs) are employed as a tool for depicting uncertain information during the CET quality evaluation. In this study, the entropy and score values are employed to establish the objective weights. Then, an integrated interval-valued intuitionistic fuzzy TODIM-VIKOR (IVIF-TODIM-VIKOR) is developed to cope with the MAGDM problem. An illustrative example for CET quality evaluation and some comparative analysis are developed to demonstrate the validity and reliability of IVIF-TODIM-VIKOR method. Show more
Keywords: Multiple attribute group decision making (MAGDM), 2 interval-valued intuitionistic fuzzy sets (IVIFSs), TODIM, VIKOR, CET quality evaluation
DOI: 10.3233/JIFS-234149
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 11121-11133, 2023
Authors: Sreelatha, Tammineni | Maheswari, M. | Ravi, G. | Manikanda Devarajan, N. | Arun, M.
Article Type: Research Article
Abstract: Data compression is the ancestor of image compression, which uses fewer bits to represent the same picture. It is categorised as lossy or lossless depending on the quality required. In a lossless compression situation, no information is lost during the decompression process. Data loss is possible with the lossy technique since it is not reversible. In an effort to boost compression efficiency while maintaining a high xiv reconstruction quality of picture, near lossless approaches have evolved. The medical pictures consist of a large number of items, each of which may be described in detail and utilised for a variety of …purposes. The clinically relevant item in 2D medical pictures is referred to as the Region of Interest (ROI), whereas in 3D images, it is referred to as the Volume of Interest (VOI). Saving energy is crucial since it is one of the most limited resources in these networks. However, DTN has an additional difficulty since communication between nodes is maintained so long as they are in physical proximity to one another. However, because to the nodes’ mobility, this may not be long enough to provide the necessary multimedia data transmission. Wireless networks are susceptible to security assaults, and traditional security solutions are computationally demanding, making them unsuitable for networks that constantly need to recharge their batteries. All of these are reasons for tackling the problems of multimedia data processing and transmission via wireless networks in this dissertation. With this in mind, it has been attempted to investigate low-overhead and safe multimedia data compression as a solution to the issue that energy-constrained nodes in these networks limit complex multimedia processing while keeping at least basic security features. LZW-OMCA compression using the Octagonal Multimedia Compression Algorithm is part of the suggested method. The purpose of this is to improve the compression ratio. The proposed approach uses a little bit of crypt to compress data, which makes the data unreadable to anybody except the intended receiver, hence providing network security. The previous proposed works analysed the performance of several compression algorithms applied to multimedia material. Performance assessment utilising MSE, SSIM, and other metrics are used to show the pros and cons of each segment. Show more
Keywords: Octagonal multimedia compression algorithm, data compression, LZW-OMCA compression, MSE, SSIM
DOI: 10.3233/JIFS-234314
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 11135-11147, 2023
Authors: Shi, Jianzhong
Article Type: Research Article
Abstract: Compared with type-2 fuzzy sets, the secondary membership degree of interval type-3 fuzzy sets is an interval rather than crisp value, which makes interval type-3 fuzzy sets can obtain more degree of freedoms. This article studies an interval type-3 fuzzy PID controller based on interval type-3 fuzz sets. The framework of interval type-3 fuzzy PID controller is identical with type-2 fuzzy PID controller, but it contains more adjustment controller parameters and its type reduction procedure is more complex. In this paper, type reduction of interval type-3 fuzzy sets is derived from general type-2 fuzzy sets represented by α-plane and a …direct NT type reduction algorithm is applied. The control effects of interval type-3 fuzzy PID controller are firstly tested by 2 nonlinear plants, the simulation results show that interval type-3 fuzzy PID controller has better control performance indexes than PID controller, type-1 fuzzy PID controller, interval type-2 fuzzy PID controller and general type-2 fuzzy PID controller. Furthermore, the interval type-3 fuzzy PID controller will be applied in rated voltage control of solid oxide fuel cells (SOFC) power plant. The output voltage control of SOFC is quite challenging because of the strong nonlinearity, limited fuel flow, and rapid variation of the load disturbance. The simulation results demonstrate the advantages and robustness of proposed interval type-3 fuzzy PID controller. Show more
Keywords: Type-2 fuzzy sets, interval type-3 fuzzy sets, interval type-3 fuzzy control system, type reduction, solid oxide fuel cells
DOI: 10.3233/JIFS-231460
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 11149-11162, 2023
Authors: Chandra, Harshit | Bajpai, Shrish | Alam, Monauwer | Chandel, Vishal Singh | Pandey, Amit Kumar | Pandey, Digvijay
Article Type: Research Article
Abstract: Hyperspectral (HS) images contain rich spatial and spectral information. Due to its large size, it is difficult to store, process, analyze, or transmit the critical information contained in it. The compression of hyperspectral images is inevitable. Many transform based Hyper Spectral Image Compression Algorithms (HSICAs) have been proposed in the past that work for both lossy and lossless compression processes. The transform based HSICA uses linked lists or dedicated markers or array structure to keep track of significant and insignificant sets or coefficients of a transformed HS image. However, these algorithms either suffered from low coding efficiency, high memory requirements, …or high coding complexity. This work proposes a transform based HSICA using a curvelet transform to improve the directional elements and the ability to represent edges and other singularities along curves. The proposed HSICA aims to provide superior quality compressed HS images by representing HS images at different scales and directions and to achieve a high compression ratio. Experimental results show that the proposed algorithm has a low coding memory requirement with a 2% to 5% increase in coding gain compared to the other state of art compression algorithms. Show more
Keywords: Complexity theory, curvelet transform, hyperspectral image, hyperspectral image compression, transform coding
DOI: 10.3233/JIFS-231684
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 11163-11187, 2023
Article Type: Research Article
Abstract: As China’s economic and social development enters a new stage, the role of innovation and entrepreneurship is becoming increasingly prominent, and its importance is also being emphasized. As the main force for future employment and national economic construction, college students naturally become the new force for innovation and entrepreneurship. Therefore, it is imperative for universities to carry out in-depth innovation and entrepreneurship education (IEE) for college students. Then, with the continuous development of social development needs and the professional growth needs of college students, the “innovation and entrepreneurship” education for college students should also be adjusted in a timely manner …in terms of educational concepts, models, and methods. The IEE environment evaluation in universities under the background of “ Double Innovation” is looked as multiple attribute decision-making (MADM). In this paper, the information entropy model is employed to calculate the objective weight of the evaluation attribute. Then, interval-valued intuitionistic fuzzy Combined Compromise Solution (IVIF-CoCoSo) is built based on the Hamming distance and Euclid distance to cope with MADM under interval-valued intuitionistic fuzzy sets (IVIFSs). The new MADM method is proposed for IEE environment evaluation in universities under the background of “ Double Innovation”. Finally, the IVIF-CoCoSo approach is compared with existing methods to verify the effectiveness of IVIF-CoCoSo algorithm. The main contributions of this constructed paper are: (1) the IVIF-CoCoSo method is built based on the Hamming distance and Euclid distance. (2) the information entropy model is employed to calculate the objective weight of the evaluation attribute. (3) The new MADM method is proposed for IEE environment evaluation in universities under the background of “ Double Innovation” based on IVIF-CoCoSo. (4) The IVIF-CoCoSo model is compared with existing methods to verify the effectiveness of the IVIF-CoCoSo algorithm. Show more
Keywords: Multi-attribute decision making (MADM), interval-valued intuitionistic fuzzy sets (IVIFSs), IVIF-CoCoSo method, information entropy method; IEE environment
DOI: 10.3233/JIFS-232151
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 11189-11201, 2023
Authors: Abiyev, Rahib H. | Aliev, Rafik | Kaynak, Okyay
Article Type: Research Article
Abstract: In this paper, a novel Z-number based Fuzzy Neural Network (Z-FNN) based on the integration of Z-valued fuzzy logic and neural networks is proposed. Z-valued fuzzy rule base is presented and its inference process is described using interpolative approximate reasoning. Accordingly, the structure of the Z-FNN is proposed using a distance measure and interpolative approximate reasoning scheme. Based on presented architecture the learning algorithm of Z-FNN is designed. The updating of the unknown parameters of the network is carried out using Genetic Algorithms (GA). The proposed Z-FNN system is utilized for dynamic plant identification. The effectiveness of Z-FNN has been …tested by comparing its performance with the performances of other fuzzy systems available in the literature. The proposed approach has been proven to be a suitable alternative for the identification of nonlinear systems characterized by uncertain and imprecise information. Show more
Keywords: Fuzzy neural networks, Z-number, fuzzy rule, learning
DOI: 10.3233/JIFS-232741
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 11203-11216, 2023
Authors: Ashwin Shenoy, M. | Thillaiarasu, N.
Article Type: Research Article
Abstract: Automated identification of human activities remains a complex endeavor, particularly in unique settings like temple environments. This study focuses on employing machine learning and deep learning techniques to analyze human activities for intelligent temple surveillance. However, due to the scarcity of standardized datasets tailored for temple surveillance, there is a need for specialized data. In response, this research introduces a pioneering dataset featuring Eight distinct classes of human activities, predominantly centered on hand gestures and body postures. To identify the most effective solution for Human Activity Recognition (HAR), a comprehensive ablation study is conducted, involving a variety of conventional machine …learning and deep learning models. By integrating YOLOv4’s robust object detection capabilities with ConvLSTM’s ability to model both spatial and temporal dependencies in spatio-temporal data, the approach becomes capable of recognizing and understanding human activities in sequences of images or video frames. Notably, the proposed YOLOv4-ConvLSTM approach emerges as the optimal choice, showcasing a remarkable accuracy of 93.68%. This outcome underscores the suitability of the outlined methodology for diverse HAR applications in temple environments. Show more
Keywords: Dataset, machine learning, deep learning, YOLOv4, ConvLSTM, Human Activity Recognition
DOI: 10.3233/JIFS-233919
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 11217-11232, 2023
Authors: Zhou, Jiwen
Article Type: Research Article
Abstract: With the proposal of the “Double First Class” construction concept in Chinese universities, cultivating high-quality talents has become the main direction of university education. At present, local universities in China are actively adapting to the changes of the times, taking the construction of the Double First Class as an opportunity, continuously adjusting and deepening the reform of the double innovation and innovation talent cultivation mode, further improving the curriculum system, increasing investment in professional practical teaching, stimulating students’ enthusiasm for innovation and entrepreneurship (IAE), and focusing on improving students’ comprehensive abilities, achieving significant results in talent cultivation. The “Entrepreneurship and …Entrepreneurship” career ability evaluation of local college students could be considered as multiple attribute decision-making (MADM). Recently, the Combined Compromise Solution (CoCoSo) method and information entropy method was employed to deal with MADM. The triangular fuzzy neutrosophic sets (TFNSs) are employed as a better tool for expressing uncertain information during the “Entrepreneurship and Entrepreneurship” career ability evaluation of local college students. In this paper, the triangular fuzzy neutrosophic number CoCoSo (TFNN-CoCoSo) based on the Hamming distance and Euclid distance is constructed to cope with the MADM under TFNSs. The information entropy method is employed to compute the weight values based on the Hamming distance and Euclid distance under TFNSs. Finally, a numerical example of “Entrepreneurship and Entrepreneurship” career ability evaluation of local college students is constructed and some decision comparisons are constructed to verify the TFNN-CoCoSo method. Show more
Keywords: Multiple attribute decision making (MADM), TFNSs, CoCoSo model, information entropy, career education quality evaluation
DOI: 10.3233/JIFS-234138
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 11233-11246, 2023
Authors: Tan, Ruipu | Chen, Chong | Zhang, Wende | Yang, Lehua | Ma, Hangfei
Article Type: Research Article
Abstract: With the rising incidences of emergencies, it is both challenging and meaningful to study how to make decisions quickly and take appropriate measures to control the spread and evolution of the situation. However, most current emergency decision-making focuses on mathematical model construction, whereas fuzzy decision-making is biased towards subjective assumptions, which are both insufficient for practicability. We studied the intelligent acquisition of single-valued neutrosophic numbers based on emotional tendency analysis and applied them to emergency decision-making. First, Python programming technology was used to crawl, preprocess, and statistically analyse the network comment data of emergencies, and a quantised single-value neutrosophic number …was obtained. Second, the attribute values, represented as neutrosophic numbers, were uniformly converted into cloud droplets, and the weight of the attribute values was objectively determined according to the digital feature entropy in the cloud droplets. Subsequently, a case-based reasoning approach was used to calculate the combined weighted similarity between the alternatives and ideal solution (target case) to obtain a ranking of the alternatives and historical cases in the case base that best matches the target case. Finally, a typhoon disaster assessment was considered as an example to verify the feasibility and effectiveness of the proposed method, and the advantages of the proposed method were emphasised through multi-aspect and multi-angle comparative analyses. The relevant research can be used for public opinion monitoring during emergencies and emergency handling. Show more
Keywords: Emergency decision-making, intelligent acquisition of single-valued neutrosophic numbers, emotional tendency analysis, cloud model, case-based reasoning (CBR)
DOI: 10.3233/JIFS-231039
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 11247-11268, 2023
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl