Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2024: 1.7
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Xiao, Yanjun | Yin, Shanshan | Ren, Guoqing | Liu, Weiling
Article Type: Research Article
Abstract: The Flexible Job Shop Scheduling Problem (FJSP) is an extension of the classical Job Shop Scheduling Problem (JSP). The research objective of the traditional FJSP mainly considers the completion time, but ignores the energy consumption of the manufacturing system. In this paper, a mathematical model of the energy-efficient flexible job shop scheduling problem is constructed. The optimization objectives are completion time, delay time, and total equipment energy consumption. To solve the model, an improved non-dominated sorting genetic algorithm (CT-NSGA-II) is proposed to obtain the optimal scheduling solution. First, the heuristic rules of GLR were used to generate the initial population …with good quality and diversity. Second, different crossover and variation operators are designed for the process sequencing and equipment selection parts to enhance the diversity of the evolutionary population. The sparsity theory is introduced to find sparse solutions and three neighborhood structures are designed to perform local search on sparse solutions to improve the uniformity of the optimal solution set distribution. Finally, a competitive selection strategy based on the bidding mechanism is proposed for the Pareto optimal solution set to obtain a better scheduling scheme. The experimental results show that the proposed improved algorithm is feasible and effective in the FJSP problem considering energy consumption, and the algorithm has some application value in improving the efficiency of smart shop operation. Show more
Keywords: Flexible job shop scheduling, energy consumption, non-dominated sorting genetic algorithm, sparsity theory, neighborhood search
DOI: 10.3233/JIFS-233337
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5493-5520, 2024
Authors: Gao, Yuan
Article Type: Research Article
Abstract: Accounting professionals are increasingly being encouraged to shift their focus from conventional accounting to accounting information as a result of new management strategies and ideas. Cybercrime and other attempts to exploit weaknesses in online systems have become more common in recent years. By introducing the concept of cloud computing and analyzing its logical structure, this research applies the technology and design model to the development of an Accounting Information Management System (AIMS). In accounting information technology administration, efficient resource allocation and decision-making are crucial for optimizing financial performance and strategic planning. Algorithms for dynamic planning are a useful tool in …meeting these issues. To maximize efficiency in an accounting group’s allocation of resources, this study employs a dynamic planning method called value iteration. The research presented a new Bayesian optimized Restricted Boltzmann machine (BO-RBM) for acquittal IT management. The data set was first gathered and then pre-processed using z-score normalization. Then, an improved genetic algorithm was used to feature selection. After the system’s design and construction are complete, BO-RBM utilizes to both specify the cloud platform’s distributed storage mode and assess the cluster’s performance. The results show that the algorithm may boost financial performance, increase cost management, and accomplish strategic goals in the IT administration of accounting. The research in this study demonstrates that the cloud platform for handling massive amounts of data may accelerate processes and complete tasks quickly. Show more
Keywords: Accounting information management systems (AIMS), Bayesian optimized restricted boltzmann machine (BO-RBM), financial, dynamic planning
DOI: 10.3233/JIFS-234951
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5521-5532, 2024
Authors: Yu, Zhiqiang | Wang, Ting | Liu, Shihu | Tan, Xuewen
Article Type: Research Article
Abstract: As the typical distant language pair, Chinese and Vietnamese vary widely in syntactic structure, which significantly influences the performance of Chinese-Vietnamese machine translation. To address this problem, we present a simple approach with a pre-reordering model for closing syntactic gaps of the Chinese-Vietnamese language pair. Specifically, we first propose an algorithm for recognizing the modifier inverse, one of the most representative syntactic different in Chinese-Vietnamese language pair. Then we pre-train a pre-reordering model based on the former recognition algorithm and incorporate it into the attention-based translation framework for syntactic different reordering. We conduct empirical studies on Chinese-Vietnamese neural machine translation …task, the results show that our approach achieves average improvement of 2.75 BLEU points in translation quality over the baseline model. In addition, the translation fluency can be significantly improved by over 2.44 RIBES points. Show more
Keywords: Neural machine translation, linguistic difference, Chinese-Vietnamese
DOI: 10.3233/JIFS-233762
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5533-5544, 2024
Authors: He, Hongxuan | Wang, Pei | Lu, Jiakuan
Article Type: Research Article
Abstract: Fuzzy β-covering(Fβ-C) plays a key role in processing real-valued data sets and covering plays an important role in the topological spaces. Thus they have attracted much attention. But the relationship between Fβ-C and topology has not been studied. This inspires the research of Fβ-C from the perspective of topology. In this paper, we construct Fβ-C rough continuous and homeomorphism mappings by using Fβ-C operator. We not only obtain some equivalent descriptions of the mappings but also profoundly reveal the relationship of two Fβ-C approximation spaces. We give the classification method of Fβ-C approximation spaces with the help of homeomorphism mapping, …propose a new method to construct topology induced by Fβ-C operator and investigate the properties in the topological spaces further. Finally, we obtain the necessary and sufficient conditions for Fβ-C operators to be topological closure operators. Show more
Keywords: Fuzzy β-covering, Fuzzy β-covering mapping, Fuzzy β-covering operator, Topology
DOI: 10.3233/JIFS-231117
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5545-5553, 2024
Authors: Aurangzeb, Khursheed
Article Type: Research Article
Abstract: Background: Due to rapid progress in the fields of artificial intelligence, machine learning and deep learning, the power grids are transforming into Smart Grids (SG) which are versatile, reliable, intelligent and stable. The power consumption of the energy users is varying throughout the day as well as in different days of the week. Power consumption forecasting is of vital importance for the sustainable management and operation of SG. Methodology: In this work, the aim is to apply clustering for dividing a smart residential community into several group of similar profile energy user, which will be effective for developing …and training representative deep neural network (DNN) models for power load forecasting of users in respective groups. The DNN models is composed of convolutional neural network (CNN) followed by LSTM layers for feature extraction and sequence learning respectively. The DNN For experimentation, the Smart Grid Smart City (SGSC) project database is used and its energy users are grouped into various clusters. Results: The residential community is divided into four groups of customers based on the chosen criterion where Group 1, 2, 3 and 4 contains 14 percent, 22 percent, 19 percent and 45 percent users respectively. Almost half of the population (45 percent) of the considered residential community exhibits less than 23 outliers in their electricity consumption patterns. The rest of the population is divided into three groups, where specialized deep learning models developed and trained for respective groups are able to achieve higher forecasting accuracy. The results of our proposed approach will assist researchers and utility companies by requiring fewer specialized deep-learning models for accurate forecasting of users who belong to various groups of similar-profile energy consumption. Show more
Keywords: Smart community, smart grids, power load forecasting, sustainable systems, outliers, machine learning, deep learning, data analytic, clustering, power consumption, consumption behavior
DOI: 10.3233/JIFS-235873
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5555-5573, 2024
Authors: Natarajan, Ezhilarasan | Augustin, Felix
Article Type: Research Article
Abstract: Tuberculosis (TB) stands as the second leading global infectious cause of death, following closely behind the impact of COVID-19. The standard approach to diagnose TB involves skin tests, but these tests can yield inaccurate results due to limited access to healthcare and insufficient diagnostic resources. To enhance diagnostic accuracy, this study introduces a novel approach employing a Bipolar Fuzzy Utility Matrix Inference System (BFUMIS) and a Bipolar Mamdani Fuzzy Inference System (BMFIS) to assess TB disease levels. By considering factors associated with the causation of TB, the study devises suitable membership functions for bipolar fuzzy sets (BFS) using both triangular …and trapezoidal fuzzy numbers. Using a point factor scale, the study clusters the rules systematically and assesses the level of uncertainty within these grouped rules by utilizing bipolar triangular fuzzy numbers (BTFN). To handle the BTFN, this study proposes converting bipolar triangular fuzzy into bipolar crisp score (CBTFBCS) algorithm as a defuzzification method. The optimal bipolar fuzzy utility sets (BFUS) are determined from the bipolar fuzzy utility matrix to identify patients’ TB disease levels. These sets play a pivotal role in characterizing the severity of TB disease levels in patients. Additionally, rigorous validation of the utility framework is accomplished through measures of bipolar fuzzy satisfactory factors and sensitivity analyses. Furthermore, the study introduces the BMFIS, which presents a novel perspective on the conventional fuzzy inference system. This innovative system integrates the Mamdani fuzzy inference system (MFIS) into a bipolar fuzzy context, enriching the diagnostic process with enhanced insights. To demonstrate the efficacy of the proposed methods, extensive validation is carried out using actual clinical data. The performance metrics used in this validation effectively demonstrate the superiority of the proposed approach. Show more
Keywords: Bipolar triangular fuzzy number, pulmonary tuberculosis, bipolar fuzzy utility matrix, bipolar Mamdani fuzzy inference system, performance measures
DOI: 10.3233/JIFS-233682
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5575-5607, 2024
Authors: Zhang, Xing-Xian | Liu, Wenli | Wang, Xu | Zuo, Wenjin | Wang, Ying-Ming | Sun, Licheng
Article Type: Research Article
Abstract: Efficiency is a relative measure that allows assessment across different ranges. Evaluating the performance of decision-making units (DMUs) from an optimistic perspective yields the best relative efficiency (optimistic efficiency), which establishes an efficiency frontier. Conversely, evaluating from a pessimistic perspective produces the worst relative efficiency (pessimistic efficiency) and creates an inefficiency frontier. This study examines the efficiency of DMUs in two scenarios and proposes models for adjustment coefficient. The pessimistic and optimistic efficiencies are adjusted to the lower and upper bounds of the DMUs based on the adjustment coefficient, enabling determination of efficiency intervals for all DMUs, as well as …evaluation and ranking. A Hurwicz criterion-based approach is introduced and applied to compare and rank the interval efficiencies of DMUs. Two numerical examples are examined using the proposed DEA adjustment coefficient models to demonstrate its potential application and validity. Show more
Keywords: Data envelopment analysis, interval efficiency, adjustment coefficient model, ranking
DOI: 10.3233/JIFS-233051
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5609-5621, 2024
Authors: Pang, Kuo | Lu, Yifan | Xu, Lixian | Yan, Wei | Zou, Li | Lu, Mingyu
Article Type: Research Article
Abstract: The research of object-oriented concept is one of the basic contents of formal concept analysis. To overcome the complexity of computing object-oriented concept, this paper proposes an Object-oriented Concept Acquisition model (OCA) based on attribute topology. The object-oriented attribute topology is first proposed to visualize the coupling relationship between attributes. Second, inspired by rough set theory, object-oriented attribute topology is transformed into rough object-oriented attribute topology. Furthermore, based on the weights of the edges in the rough object-oriented attribute topology, object-oriented concepts are obtained by finding reachable paths. Finally, examples and experiments are used to demonstrate the effectiveness of our …proposed method. Show more
Keywords: Formal concept analysis, object-oriented concept, rough object-oriented attribute topology, object-oriented concept acquisition
DOI: 10.3233/JIFS-233062
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5623-5633, 2024
Authors: Sharmila, V. | Ezhumalai, P.
Article Type: Research Article
Abstract: The global incidence of skin cancer has been rising, resulting in increased mortality and morbidity if left untreated. Accurate diagnosis of skin malignancies is crucial for early intervention through excision. While various innovative medical imaging techniques, such as dermoscopy, have improved the way we examine skin cancers, the progress in medical imaging for identifying skin lesions has not kept pace. Skin lesions exhibit diverse visual features, including variations in size, shape, boundaries, and artifacts, necessitating an efficient image-processing approach to assist dermatologists in decision-making. In this research, we propose an automated skin lesion classifier called GreyNet, which utilizes optimized convolutional …neural networks (CNNs) or shift-invariant networks (SIN). GreyNet comprises three components: (i) a trained fully deep CNN for semantic segmentation, relating input images to manually labeled standard scans; (ii) an enhanced dense CNN with global information exchange and adaptive feature salvaging module to accurately classify each pixel in histopathological scans as benign or malignant; and (iii) a binary grey wolf optimizer (BGWO) to improve the classification process by optimizing the network’s hyperparameters. We evaluate the performance of GreyNet in terms of lesion segmentation and classification on the HAM10000 database. Extensive empirical results demonstrate that GreyNet outperforms existing lesion segmentation methods, achieving improved dice similarity score, volume error, and average processing time of 1.008±0.009, 0.903±0.009%, and 0.079±0.010 s, respectively. Moreover, GreyNet surpasses other skin melanoma classification models, exhibiting improved accuracy, precision, specificity, sensitivity, false negative rate, false positive rate, and Jaccard similarity score (JSS) of 96.5%, 97%, 96.2%, 92.1%, 3.8%, 3%, and 89.5%, respectively. Based on our experimental analysis, we conclude that GreyNet is an efficient tool to aid dermatologists in identifying skin melanoma. Show more
Keywords: Classification, convolution neural networks, optimization, semantic segmentation, skin cancer, super-resolution
DOI: 10.3233/JIFS-232325
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5635-5653, 2024
Authors: Gu, Xiaohong
Article Type: Research Article
Abstract: Hand-drawn is one of the few visual descriptors that can directly represent visual content, and has significant research in the area of computer vision. Aiming at the problem of sparse features in the realm of hand-drawn image retrieval, hand-drawn images, and the easy deformation of hand-drawn images, this paper proposes a feature extraction method of grid resource sharing collaborative algorithm, which can be obtained utilizing precisely extracted semantic characteristics from hand-drawn images through computer multimedia-aided design Efficient and accurate retrieval results. First, the fundamental framework for obtaining semantic features is algorithm; then the attention model mechanism is the grid resource …sharing collaborative introduced in the process of supervised training, and the attention structure block is introduced after the convolutional neural network’s bottom layer. To locate effective semantic features, In order to accomplish high-precision retrieval, the attention structure block combines channel attention structure and spatial attention structure to build the attention structure block. The last feature descriptor is then created by combining various semantic feature levels. The proposed strategy is practical and efficient, as demonstrated by the experimental findings on the comparison database Flickr15k. In addition, in the task of hand-drawn image classification, the proposed attention mechanism greatly improves the classification accuracy. Show more
Keywords: Hand-painted retrieval, grid resource sharing collaborative algorithm, computer-aided, hand-painted classification
DOI: 10.3233/JIFS-233701
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5655-5666, 2024
Authors: Qiao, Jian-min | Li, Wo-yuan | Liu, Lin
Article Type: Research Article
Abstract: In this paper, a two-sided matching decision model based on interval-valued intuitionistic fuzzy environment is proposed to maximize the demand of individual differences. Firstly, the attribute feature table and weight matrix of both agents are constructed, and a formula for calculating the comprehensive advantage in the interval-valued intuitionistic fuzzy environment is given, namely the interval-valued intuitionistic fuzzy comprehensive advantage aggregation operator (IIFCAAO); Secondly, the interval-valued intuitionistic fuzzy decision matrix of both agents is calculated by using the comprehensive advantage aggregation operator, and the interval-valued intuitionistic fuzzy decision matrix is transformed into a score function matrix by using a score function …formula; Thirdly, the two-sided matching model is established to maximize the score; Finally, the scientificity and practicability of the model are verified by an example of college students changing their majors. Show more
Keywords: Interval intuitionistic fuzzy set, interval-valued intuitionistic fuzzy comprehensive advantage aggregation operator (IIFCAAO), two-sided matching
DOI: 10.3233/JIFS-234191
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5667-5676, 2024
Authors: Qi, Ruijuan | Liu, Chang | Zhang, Qiwen | Gu, Lingzi
Article Type: Research Article
Abstract: Business investments are prone to market risks, so pre-analysis is mandatory. The type of risk, its period, sustainability, and economic impact are the analyzable features for preventing loss and downfall. In recent years, mathematical models have been used for representing business cycles and analyzing the impacting risks. This article introduces a Decisive Risk Analytical Model (DRAM) for identifying spur defects in business investments. The proposed risk analytical model exploits the investments, returns, and influencing factors over the various market periods. The risk model is tuned for identifying the influencing factors across various small and large investment periods. The model is …tuned to adapt to different economic periods split into a single financial year. In the process of tuning and training the mathematical analysis model, deep learning is used. The learning paradigm trains the risks and modifying features from expert opinion and previous predictions. Based on these three factors, the risk for the current investment is forecasted. The forecast aids in improving the new investment feasibilities with minimal risks and model modifications. The frequent market status is identified for preventing unnecessary risk-oriented forecasts using the training performed. Therefore, the proposed model is reliable in identifying risks and providing better investment recommendations. Show more
Keywords: Business investment, deep learning, mathematical model, risk analysis
DOI: 10.3233/JIFS-233038
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5677-5693, 2024
Authors: Zhang, Yongcun | Bai, Zhe
Article Type: Research Article
Abstract: Compressive strength (CS) is concrete’s most important mechanical property, as it plays an important role in setting design criteria. Thus, an accurate and early assessment of the CS of concrete can minimize time, labor, and cost. This paper investigated the ability of the Radial Basis Function (RBF) to handle the prediction of CS. The nonlinearities raised from the novel utilized admixtures between the input variables and output CS is tried to be conducted with the RBF model. In order to make a flexible framework combination of the RBF model with the African Vulture Optimization (AVOA) and Salp Swarm Algorithm (SSA) …techniques are considered. The results achieved from the RBF-AVOA model indicated good agreement between the actual and predicted values. The proposed model provides a very accurate HPC compressive strength prediction. In addition, the correlation coefficient R2 is equal to (0.997), and the values of mean absolute error (MAE) (0.1917 MPa), root mean square error (RMSE) (0.937 MPa), and variance account coefficient (VAF) (99.73%) are low. The performance of the RBF-AVOA model, compared to other models, provided the desired advantage and more stable predictions. AVOA plays a key role in modeling results, improving generalization capabilities, avoiding redundant data, and decreasing uncertainty. Show more
Keywords: High-performance concrete, compressive strength, african vulture optimization algorithm, salp swarm algorithm, radial basis function
DOI: 10.3233/JIFS-230907
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5695-5707, 2024
Authors: Shan, Liqian | Zhao, Hui | Feng, Yuhui
Article Type: Research Article
Abstract: Task-oriented collaborative dialogues have become an indispensable form of communication in our daily work and learning, in which participants exchange ideas and share information to advance goals. It is crucial to automatically analyze participants’ contributions and understand these dialogues relative to individuals with limited attention spans. In this paper, seven Discourse Role (DR) labels are designed to describe discourse’s different roles in collaborative dialogues for goal achievement. We collected about 11K discourses from a publicly available dialogue corpus and annotated them with DR tags to construct a dataset named MRDR (Meeting Recorder Discourse Role). In addition, this paper proposes a …novel hierarchical model, STTAHM (Speaker Turn and Topic-Aware Hierarchical Model), for Discourse Role classification. The model is equipped to perceive speaker turn and dialogue topic and can effectively capture the discourse’s local and global semantic information. Experimental results show that our proposed method is effective on the constructed dataset, and the accuracy of Discourse Role classification reaches 86.99%. Show more
Keywords: Task-oriented collaborative dialogue, discourse role, dataset, speaker turn, topic-aware
DOI: 10.3233/JIFS-235263
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5709-5721, 2024
Authors: Liu, Shuanghua
Article Type: Research Article
Abstract: The prediction of shock disturbed systems is always a major challenge in the field of grey prediction. Considering the characteristics of grey buffer operator, this paper proposes a new grey buffer operator based on inverse accumulation, new information priority and logarithmic function to cope with the prediction challenge. In addition, some relevant properties of the new grey buffer operator are discussed in this paper, including adjustment intensity and smoothness. The new grey buffer operator is used to process monotonically increasing sequences, monotonically decreasing sequences and oscillating sequences, respectively. Experimental results show that the proposed buffer operator can effectively improve prediction …accuracy. Show more
Keywords: Grey prediction, grey buffer operator, variable weight coefficient, adjustment intensity, smoothness
DOI: 10.3233/JIFS-230091
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5723-5731, 2024
Authors: Ilakkiya, N. | Rajaram, A.
Article Type: Research Article
Abstract: Different physical objects can be employed in the modern technological environment to facilitate human activity. In order to connect physical objects with the universe of digital using a variety of networks and communication technologies, an IoT, the cutting edges technological and effective solution, is deployed. Mobile ad hoc networks (MANET) interact with the IoTin smart settings, enhancing its user appeal and boosting its commercial viability. The new system of MANET based IoT and IT-network may be created by integrating wireless sensor and MANET with the Internet of Things. A solution like this increases user mobility while lowering network deployment costs. …However, it also raises new, difficult problems in terms of networking considerations. In this, we presented a novel DAG (Directed Acyclic Graph)-Blockchain structure for MANET-IoT security. The network is secured through Multi-Factor PUF (MF-PUF) authentication scheme. With all authorized nodes, the network is segregated into cluster topology. For trusted data transmission, we proposed Jelly Fish Optimization (JFO) algorithm with the consideration of multiple criteria. For deep packet inspection, we proposed a Fully Connected Recurrent Neural Network (FCRNN). Through deep packet inspection, the intrusions are detected and mitigated through blocking system.With help of merged algorithm, the suggested method obtained improved ability in the PDR (Packet Delivery Ratio), production, analysis of time, detection accuracy also security levels. The comparison results clearly indicate that the proposed study outperforms all previous studies in various aspects. Particularly, the suggested methods for cluster creation, data aggregation, routing, encryption, and authentication significantly improve the system of DAG-IDS. Additionally, the planned task exhibits an exceptionally low standard deviation, making the suggested approach highly suitable for a WSN-IoT environment. Show more
Keywords: DAG-blockchain, PUF, trusted routing, RNN, IDS, MANET-IoT
DOI: 10.3233/JIFS-232924
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5733-5752, 2024
Authors: Sui, Duo | Gao, Peng | Fang, Minhang | Lian, Jing | Li, Linhui
Article Type: Research Article
Abstract: Aiming at the problems of low precision and low real-time performance when deploying to embedded platforms in existing multi-task networks, this paper proposes a traffic scene multi-task perception network model (ETS_YOLOP) based on feature fusion. Firstly, an Efficient Attention Control Aggregation Network Module (EACAN) is constructed to improve the real-time perception of the model, and the Space Pyramid Pool Fast Convolutional Module (SPPFCSPC) is used at the end of the backbone network to increase the receptive field. Finally, a Multiscale Convolution Transformer Fusion Module (CTFM) is designed in the task branch to better capture global information and rich context information. …The experimental results show that compared with the YOLOP model, the ETS_YOLOP model has a significant improvement in perception accuracy, 156% in real-time performance, 0.4% increase in mAP on the object detection task, 0.5% increase in mIoU on the drivable area segmentation task, and an 11.4% increase in accuracy on the lane detection task. In order to verify the real-time perception of the model on the embedded platform, the ETS_YOLOP model is deployed on the Huawei MDC300F computing platform. Under the condition of the image input size of 640×640, the average frame rate can reach 55FPS, which can realize real-time perception on the embedded platform. Show more
Keywords: Traffic scene, multi-task perception, self-attention, feature fusion, intelligent vehicle
DOI: 10.3233/JIFS-235246
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5753-5765, 2024
Authors: Shen, Haiyang
Article Type: Research Article
Abstract: Mechanical parameters used in many design codes can be achieved by expensive and time-consuming experiments or by non-destructive approaches such as estimative modelling. This investigation proposed Extreme Gradient Boost (XGB) for estimating the slump (SL) and compressive strength (CS) of high-performance concrete (HPC). In addition, to bring the results of the models closer to the experimental data and increase the accuracy, algorithms were combined with the model, including Sunflower Optimizer (SFO) and Jellyfish Search Optimize (JSO). The relevant models have been examined in three frameworks: individual, hybrid, and ensemble-hybrid. For this purpose, several evaluators were provided to determine the errors, …compare, and accuracy of the presented models. The XGFJ model has demonstrated exceptional performance, achieving remarkable results in terms of RMSE (Root Mean Square Error) and R2 (R-squared) values. Specifically, it has attained an exceptionally small RMSE value of 1.785 for CS and 5.183 for SL, indicating the model’s high precision in predicting these parameters. Additionally, it has achieved the biggest R2 values of 0.9960 for CS and 0.9949 for SL. Additionally, it is worth noting that the XGSF model closely matches the performance of the ensemble form of XGFJ, as evident from its R2 values of 0.9956 for CS and 0.9934 for SL. Based on the study, it was observed that using machine learning to anticipate the mechanical characteristics of concrete is valuable and efficient and can be considered an alternative method instead of time-consuming laboratory methods. This research addresses challenges in predicting HPC properties fueled by the need to overcome drawbacks in traditional methods. Costly and time-intensive laboratory experiments prompted the exploration of alternatives, leading to the proposal of XGB combined with optimization algorithms (SFO and JSO). The study aims to enhance prediction accuracy while tackling broader concerns such as construction costs, material efficiency, and environmental impact. The resource-intensive nature of conventional methods, along with inaccuracies due to material variations, serves as a primary challenge. The proposed resolution advocates for a paradigm shift to machine learning, exemplified by the XGFJ model, showcasing exceptional precision and efficiency in predicting HPC properties. Show more
Keywords: High-performance concrete compressive strength and slump, extreme gradient boost, sunflower optimizer, jellyfish search optimizer
DOI: 10.3233/JIFS-236234
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5767-5782, 2024
Authors: Zong, Yi | Li, Ying | Pan, Enze | Chen, Simin | Zhang, Jingkuan | Gao, Binbin
Article Type: Research Article
Abstract: Stratifying long-tail customers and identifying high-quality customers with high growth potential are crucial for civil aviation companies to explore new profit growth points. This paper proposes a long-tail customer stratification model based on clustering ensemble to address the problems of insufficient attention to long-tail customers in previous studies and the low accuracy and lack of accuracy testing of single clustering algorithms. First, the Bayesian information criterion is used to determine the optimal number of clusters. Then, an ensemble framework integrating the Gaussian mixture model, spectral clustering, Two step clustering and K-means algorithm is constructed, and the stacking and bagging ensemble …methods are used for the cluster ensemble. Finally, three different indicators are used to evaluate the algorithm performance. Experimental results indicate that compared with single clustering algorithms, the Stacking algorithm increases the silhouette coefficient by 14.77% to 27.11%, the Calinski-Harabasz index by 38.83% to 122.18%, and the Davies-Bouldin Index by 19.38% to 98.04%. This indicates that each clustering has high cohesion and separation, with samples within a category being more closely related and those between categories having clear boundaries. It shows that the Stacking algorithm more accurately stratifies long-tail customers with similar consumption behaviors into different categories, achieving customer stratification. Show more
Keywords: Customer stratification, long tail theory, ensemble learning, stacking algorithm, bagging algorithm
DOI: 10.3233/JIFS-234155
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5783-5799, 2024
Authors: Feng, Chongren | Qin, Jiwei | Zhang, Yuhang
Article Type: Research Article
Abstract: Hypernym discovery aims to distinguish potential hypernyms for a query term. However, existing methods for hypernym discovery suffer from the following problems: (1) traditional unsupervised pattern-based methods suffer from low recall; (2) recent supervised box embedding methods are deficient in identifying specific hypernyms. To cope with the above problems, this paper presents a method for hypernym discovery based on E xtended P atterns and Box E mbeddings (EP-BoxE). Firstly, to acquire more hypernymy relation entity pairs, we identify co-hyponyms of a given term and use their hypernyms as the candidate hypernym set for the given term; Secondly, by analyzing the …text corpus, we find that the language patterns also provide additional information for hypernym discovery, which also solves the deficiency of the box embedding methods in identifying specific hypernyms. Finally, experimentations on two domain-specific datasets reveal that EP-BoxE surpasses the performance of popular methods on the majority of evaluation metrics. Show more
Keywords: Hypernym discovery, pattern-based, box embeddings
DOI: 10.3233/JIFS-235181
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5801-5810, 2024
Authors: Kang, Zhonghui
Article Type: Research Article
Abstract: Intangible cultural heritage can be said to be an important component of tourism resources. With the rapid development of society in today’s era, tourism development and intangible cultural heritage protection have gradually attracted attention from Chinese society, and in recent years, it has attracted high attention from relevant departments of the Chinese government. Tourism development has a “dual” impact on the protection of intangible cultural heritage, with both positive and negative impacts. The risk assessment of intangible cultural heritage tourism development is a MAGDM problems. Recently, the TODIM and GRA technique has been employed to manage MAGDM issues. The interval-valued …Pythagorean fuzzy sets (IVPFSs) are employed as a tool for characterizing uncertain information during the risk assessment of intangible cultural heritage tourism development. In this paper, the interval-valued Pythagorean fuzzy TODIM-GRA (IVPF-TODIM-GRA) technique is construct to manage the MAGDM under IVPFSs. Finally, a numerical case study for risk assessment of intangible cultural heritage tourism development is employed to validate the proposed technique. Show more
Keywords: Multiple-attribute group decision-making (MAGDM), interval-valued pythagorean fuzzy sets (IVPFSs), TODIM technique, GRA technique, intangible cultural heritage tourism development
DOI: 10.3233/JIFS-236937
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5811-5824, 2024
Authors: Chang, Zaibin | Mao, Lingling
Article Type: Research Article
Abstract: Fuzzy complementary β-neighborhoods (FCNs) are used to find information relevant to the target in data mining. Based on FCNs, there are six types of covering-based multigranulation fuzzy rough set (CMFRS) models have been constructed, which can be used to deal with the problem of multi-criteria information systems. These CMFRS models are calculated by set representations. However, it is time-consuming and error-prone when set representations are used to compute these CMFRS models in a large multi-criteria information system. Hence, it is important to present a novel method to compute them quickly, which is our motivation for this paper. In this paper, …we present the matrix representations of six types of CMFRS models on FCNs. Firstly, some new matrices and matrix operations are given in a multi-criteria information system. Then, matrix representations of three types of optimistic CMFRSs on FCNs are proposed. Moreover, matrix approaches are also used for computing three types of pessimistic CMFRSs on FCNs. Finally, some experiments are presented to show the effectiveness of our approaches. Show more
Keywords: Fuzzy rough set, covering, matrix, multigranulation
DOI: 10.3233/JIFS-224323
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5825-5839, 2024
Authors: Wang, Yong | Jiang, Zhipeng | Wang, Yihan | Yang, Chunyu | Zou, Liang
Article Type: Research Article
Abstract: The mining belt conveyor is one of the most important modules in coal mine, whose safety always be threatened by the foreign objects. Although the traditional target detection methods achieve promising results in various computer vision tasks, the performance heavily depends on sufficient labelled data. However, in real-world production scenario, it is difficult to acquire huge number of images with foreign objects. The obtained datasets lacking of capacity and diversity are not suitable for training supervised learning-based foreign objects detection models. To address this concern, we propose a novel method for detecting the foreign objects on the surface of underground …coal conveyor belt via improved GANomaly. The proposed foreign objects detection method employs generative adversarial networks (GAN) with attention gate to capture the distribution of normality in both high-dimensional image space and low-dimensional latent vector space. Only the normal images without foreign object are utilized to adversarially train the proposed network, including a U-shape generator to reconstruct the input image and a discriminator to classify real images from reconstructed ones. Then the combination of the difference between the input and generated images as well as the difference between latent representations are utilized as the anomaly score to evaluate whether the input image contain foreign objects. Experimental results over 707 images from real-world industrial scenarios demonstrate that the proposed method achieves an area under the receiver operating characteristic curve of 0.864 and is superior to the previous GAN-based anomaly detection methods. Show more
Keywords: Generative adversarial networks, anomaly detection, attention, industrial scenarios, mining belt conveyor
DOI: 10.3233/JIFS-230647
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5841-5851, 2024
Authors: Li, Keyuan | Zhang, Qinghua | Xie, Qin | Huang, Shuaishuai
Article Type: Research Article
Abstract: Medical image classification is an essential task in the fields of computer-aided diagnosis and medical image analysis. In recent years, researchers have made extensive work on medical image classification by computer vision techniques. However, most of the current work is based on deep learning methods, which still suffer from expensive hardware resources, long time consuming and a lot of parameters to be optimized. In this paper, a multi-granularity ensemble algorithm for medical image classification based on broad learning system is proposed, which is an end-to-end lightweight model. On the one hand, the proposed method is designed to address the problem …of weak image feature learning ability of broad learning system. The convolution module with fixed weights based on transfer learning is introduced as a feature extractor to extract fusion features of medical images. On the other hand, the multi-granularity ensemble framework is proposed, which learn the fusion features of medical images from fine-grained to coarse-grained respectively, and the prediction results at different granularity levels are integrated by ensemble learning. In this way, the bottom local features can be sufficiently considered, while the global features can also be taken into account. The experimental results show that on the MedMNIST dataset (containing 10 sub-datasets), the proposed method can shorten the training time by tens of times while having similar accuracy to deep convolutional neural networks. On the ChestXRay2017 dataset, the proposed method can achieve an accuracy of 92.5%, and the training time is also significantly better than other methods. Show more
Keywords: Broad learning system(BLS), multi-granularity, ensemble learning, medical image classification
DOI: 10.3233/JIFS-235725
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5853-5867, 2024
Authors: Shen, Hanhan | Zhang, Fu | Pan, Xiaodong | Sun, Xiaofei
Article Type: Research Article
Abstract: As significant carriers of the application of fuzzy set theories, fuzzy systems have been widely used in many fields. However, selecting fuzzifications, fuzzy reasoning engines, and defuzzifications is subjective for Mamdani fuzzy systems, and the fuzzy rule of Takagi-Sugeno-Kang fuzzy systems is less of a linguistic interpretation. Regarding these shortcomings, this paper proposes a fuzzy system based on vague partitions processing information directly from the fuzzy rule base, in which fuzzy rules have explicit semantics. Firstly, the n -dimensional vague partition of the n -dimensional universe is defined based on 1-dimensional vague partitions and the aggregation function, and its properties …are discussed. Based on these, we design the new fuzzy system, and investigate its approximation properties which is the theoretical guarantee for applying the fuzzy system. As an application, we combine the fuzzy system with PID control system to deal with autonomous vehicle path tracking control problems. A series of experiments are constructed, and experimental results indicate that the fuzzy system based on vague partitions makes the fuzzy PID control system strong robustness, and has obvious advantages compared with other traditional fuzzy systems for path tracking control problems. Show more
Keywords: Fuzzy systems, vague partitions, aggregation functions, fuzzy PID control, path tracking
DOI: 10.3233/JIFS-232903
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5869-5892, 2024
Authors: Wang, Chia-Hung | Ye, Qing | Cai, Jiongbiao | Suo, Yifan | Lin, Shengming | Yuan, Jinchen | Wu, Xiaojing
Article Type: Research Article
Abstract: The multi-feature and imbalanced nature of network data has always been a challenge to be overcome in the field of network intrusion detection. The redundant features in data could reduce the overall quality of network data and the accuracy of detection models, because imbalance could lead to a decrease in the detection rate for minority classes. To improve the detection accuracy for imbalanced intrusion data, we develop a data-driven integrated detection method, which utilizes Recursive Feature Elimination (RFE) for feature selection, and screens out features that are conducive to model recognition for improving the overall quality of data analysis. In …this work, we also apply the Adaptive Synthetic Sampling (ADASYN) method to generate the input data close to the original dataset, which aims to eliminate the data imbalance in the studied intrusion detection model. Besides, a novel VGG-ResNet classification algorithm is also proposed via integrating the convolutional block with the output feature map size of 128 from the Visual Geometry Group 16 (VGG16) of the deep learning algorithm and the residual block with output feature map size of 256 from the Residual Network 18 (ResNet18). Based on the numerical results conducted on the well-known NSL-KDD dataset and UNSW-NB15 dataset, it illustrates that our method can achieve the accuracy rates of 86.31% and 82.56% in those two test datasets, respectively. Moreover, it can be found that the present algorithm can achieve a better accuracy and performance in the experiments of comparing our method with several existing algorithms proposed in the recent three years. Show more
Keywords: Artificial Intelligence, Classification Algorithms, Deep Learning Algorithms, Network Intrusion Detection, Multi-class Pattern Classification
DOI: 10.3233/JIFS-234402
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5893-5910, 2024
Authors: Sundar, R. | Purushotham Reddy, M. | Sethy, Abhisek | Selvam, K. | Abidin, Shafiqul | Chakrabarti, Prasun | Nagarjuna, Valeti | Ravuri, Ananda | Selvan, P.
Article Type: Research Article
Abstract: In today’s rapidly evolving landscape of cloud computing technologies, security and privacy have become paramount concerns, particularly in sectors like healthcare and cloud storage services. One of the most critical challenges is safeguarding sensitive data, such as images, from unauthorized access and leakage during transmission. In this context, we propose a novel framework named Hybrid Buffalo Bat based Homomorphic Convolution (HBBbHC), designed to facilitate the retrieval of source images from encrypted representations during data transmission. The technique efficiently transforms plaintext data into ciphertext, employing blockchain technology for enhanced encryption during the transfer process. We have implemented the HBBbHC method using …the Python tool and rigorously evaluated its performance in terms of resource utilization, encryption and decryption efficiency, and other relevant metrics. The results demonstrate that our approach significantly enhances data transmission efficiency, thereby elevating overall system effectiveness Show more
Keywords: Cloud computing, homomorphic, blockchain technology, encryption time, Decryption time
DOI: 10.3233/JIFS-237948
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5911-5925, 2024
Authors: Wang, Kai | Bai, Yameng
Article Type: Research Article
Abstract: With the rapid development of science and technology, the flow of information has become more convenient, and society has entered the era of knowledge economy. In this era, technological innovation capability is becoming increasingly important and has become an important weapon for enterprises to survive in fierce competition, especially for technology-based small and medium-sized enterprises. Nowadays, technology-based small and medium-sized enterprises have developed many technological innovation achievements through continuous technological innovation, and have created a large number of high-tech products and services. Technological innovation has been proven to effectively improve the core competitiveness and economic benefits of technology-based small and …medium-sized enterprises. Therefore, evaluating the technological innovation capabilities of technology-based small and medium-sized enterprises has both theoretical and practical significance. The enterprise technological innovation capability evaluation from a low carbon perspective could be deemed as the multiple attribute group decision making (MAGDM) problem. Recently, the evaluation based on distance from average solution (EDAS) technique and cosine similarity measure (CSM) technique has been employed to manage MAGDM issues. The spherical fuzzy sets (SFSs) are used as an efficient tool for portraying uncertain information during the enterprise technological innovation capability evaluation from a low carbon perspective. In this paper, the spherical fuzzy number EDAS based on the CSM (SFN-CSM-EDAS) technique is cultivated to manage the MAGDM under SFSs. Finally, a numerical study for enterprise technological innovation capability evaluation from a low carbon perspective is supplied to validate the proposed technique. The main contributions of this paper are outlined: (1) the EDAS and CSM technique was extended to SFSs; (2) the CRITIC technique is used to derive weight based on CSM technique under SFSs. (3) the SFN-CSM-EDAS technique is founded to manage the MAGDM under SFSs; (4) a numerical case study for enterprise technological innovation capability evaluation from a low carbon perspective and some comparative analysis is supplied to validate the SFN-CSM-EDAS technique. Show more
Keywords: Multiple attribute group decision making (MAGDM), spherical fuzzy sets (SFSs), EDAS technique, CRITIC technique, enterprise technological innovation capability evaluation
DOI: 10.3233/JIFS-236778
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5927-5940, 2024
Authors: Yang, Guangfu | Xiao, Chunyun
Article Type: Research Article
Abstract: The employment of college graduates is related to the overall situation of China’s social development, and the difficulty of employment has become a social problem that cannot be ignored. Through the analysis of the current situation of employment, it is found that the lack of employment guidance in colleges and universities and the lack of employment concept of college students are important factors for the difficulty of college students’ employment, and college counselors play an irreplaceable role in college students’ career planning. Based on the characteristics of college counselors’ work, the paper constructs a career planning evaluation system, hoping to …provide new ideas for counselors’ employment guidance. The college students’ career planning evaluation is a multiple attributes group decision making (MAGDM). Recently, the TODIM and GRA technique has been employed to manage MAGDM. The probabilistic hesitant fuzzy sets (PHFSs) are employed as a useful tool for depicting uncertain information during the college students’ career planning evaluation. In this paper, the probabilistic hesitant fuzzy TODIM-GRA (PHF-TODIM-GRA) technique is built to manage the MAGDM under PHFSs. At last, the numerical example for college students’ career planning evaluation is employed to show the PHF-TODIM-GRA technique. The main contribution of this paper is outlined: (1) the TODIM technique based on GRA technique has been extended to PHFSs based on CRITIC technique; (2) the CRITIC technique is employed to derive weight values under PHFSs. (3) the PHF-TODIM-GRA technique is founded to manage the MAGDM under PHFSs; (4) a numerical case study for college students’ career planning evaluation and some comparative analysis is supplied to validate the proposed PHF-TODIM-GRA technique. Show more
Keywords: Multiple attributes group decision making (MAGDM), probabilistic hesitant fuzzy sets (PHFSs), TODIM technique, GRA technique, career planning evaluation
DOI: 10.3233/JIFS-232606
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5941-5956, 2024
Authors: Yin, Bingquan | Ouyang, Shaojuan | Hou, Yali | Ma, Jizhao
Article Type: Research Article
Abstract: Innovation and entrepreneurship education is an important component of cultivating the comprehensive quality of college students and an important force in promoting economic and social development. Meanwhile, due to changes in the social environment and economic structure, traditional university education is no longer able to meet the needs of contemporary society. Therefore, innovation and reform of innovation and entrepreneurship education for college students are urgent. Innovation and entrepreneurship education for college students needs to keep up with the times, constantly update concepts and techniques, in order to adapt to the ever-changing social and economic environment. The innovation and entrepreneurship education …evaluation in the application-oriented vocational colleges is a multiple-attribute decision-making (MADM) problem. Recently, the TODIM and TOPSIS technique has been used to cope with MADM issues. The Type-2 neutrosophic numbers (T2NNs) are employed as a technique for characterizing uncertain information during the innovation and entrepreneurship education evaluation in the application-oriented vocational colleges. In this paper, the Type-2 neutrosophic number TODIM-TOPSIS (T2NN-TODIM-TOPSIS) technique is implemented to solve the MADM under T2NNs. Finally, a numerical case study for innovation and entrepreneurship education evaluation in the application-oriented vocational colleges and several comparative analysis is implemented to validate the proposed T2NN-TODIM-TOPSIS technique. The main research contribution of this paper is managed: (1) the TODIM and TOPSIS technique was enhanced with T2NNs; (2) Entropy technique is enhanced to manage the weight values with T2NNs. (3) the T2NN-TODIM-TOPSIS technique is founded to manage the MADM with T2NNs; (4) Algorithm framework for innovation and entrepreneurship education evaluation in the application-oriented vocational colleges and several comparative analysis are constructed based on one numerical example to verify the effectiveness of the T2NN-TODIM-TOPSIS technique. Show more
Keywords: Multiple-attribute decision-making (MADM), Type-2 neutrosophic numbers (T2NNs), TODIM technique, TOPSIS technique, innovation and entrepreneurship education evaluation
DOI: 10.3233/JIFS-233811
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5957-5973, 2024
Article Type: Research Article
Abstract: The accurate detection of traffic signs is a critical component of self-driving systems, enabling safe and efficient navigation. In the literature, various methods have been investigated for traffic sign detection, among which deep learning-based approaches have demonstrated superior performance compared to other techniques. This paper justifies the widespread adoption of deep learning due to its ability to provide highly accurate results. However, the current research challenge lies in addressing the need for high accuracy rates and real-time processing requirements. In this study, we propose a convolutional neural network based on the YOLOv8 algorithm to overcome the aforementioned research challenge. Our …approach involves generating a custom dataset with diverse traffic sign images, followed by conducting training, validation, and testing sets to ensure the robustness and generalization of the model. Experimental results and performance evaluation demonstrate the effectiveness of the proposed method. Extensive experiments show that our model achieved remarkable accuracy rates in traffic sign detection, meeting the real-time requirements of the input data. Show more
Keywords: Traffic sign detection, deep learning, YOLOv8 model, self-driving cars, real-time processing
DOI: 10.3233/JIFS-235863
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5975-5984, 2024
Authors: Simin, Wang | Yifei, Kang | Yixuan, Xu | Chunmiao, Ma | Jinyu, Wang | Weiguo, Wu
Article Type: Research Article
Abstract: Task scheduling based on temperature perception is beneficial for avoiding hotspots and optimizing the internal temperature distribution of data centers. However, the accuracy of task scheduling largely depends on the accuracy of temperature prediction. There are many features that affect the accuracy of temperature prediction in data centers, and the variation periods of these features vary greatly. Traditional machine learning models are difficult to accurately fit them. Therefore, this article proposes a step-by-step temperature prediction algorithm based on Gated Recurrent Unit (GRU). This algorithm establishes prediction models for important parameters such as CPU utilization and air conditioning temperature that affect …temperature prediction, and uses the outputs of these two models as inputs for the server temperature prediction model to better fit the changes of feature values. The model combines the principle of thermal locality and integrates the temperature of upper and lower servers for joint modeling. Experiments show that our prediction model can accurately predict the inlet temperature evolution of the server with dynamic workload. RSME reaches 0.278 and the average prediction temperature difference is 0.633, which is much higher than the traditional model. In addition, this article also propose a minimum temperature difference scheduling algorithm based on temperature prediction model, which can effectively reduce the number of servers running at high temperature and low temperature in the data center, make the temperature of the data center more balanced and achieve better energy-saving compared with other baseline algorithms. Show more
Keywords: Machine learning, GRU, data center, energy saving, temperature prediction, thermal-aware, task scheduling
DOI: 10.3233/JIFS-231320
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5985-5999, 2024
Authors: Tong, Mingjia
Article Type: Research Article
Abstract: How to explore the potential value of landscape, realize the organic combination of tourism landscape, enrich landscape elements and enhance tourism experience has become an important topic of tourism landscape planning and design, which is also a practical problem that needs to be solved urgently in the process of tourism landscape development and planning in different regions of China. The tourism landscape planning design scheme evaluation based on the virtual reality technology a typical multi-attribute group decision-making (MAGDM) problem. With the complexity of economic activities, uncertain information has an increasing impact on production activities. However, due to the ambiguity and …uncertainty of human cognition, the factors affecting the risk of things cannot be accurately expressed. Therefore, selecting spherical fuzzy sets (SFSs) can make the expression of information more accurate and complete. On basis of the TODIM method and the PROMETHEE method, in this study, spherical fuzzy number TOMIM-PROMETHEE (SFN-TOMIM-PROMETHEE) method is implemented to solve the MAGDM problem under SFSs. Furthermore, CRITIC method under SFSs is implemented to determine relative weights. Then a numerical example for tourism landscape planning design scheme evaluation based on the virtual reality technology is selected to illustrate the effectiveness and practicality of the method. Finally, the comparative analysis shows that the SFN-TOMIM-PROMETHEE method under SFSs is an effective method to deal with MAGDM problems. The main contribution of this paper is managed: (1) the TODIM and PROMETHEE technique was extended to SFSs; (2) CRITIC technique is employed to manage the weight values under SFSs. (3) the SFN-TOMIM-PROMETHEE technique is founded to manage the MAGDM under IVPFSs; (4) a numerical example for tourism landscape planning design scheme evaluation based on the virtual reality technology and comparison analysis are constructed to verify the feasibility and effectiveness of the SFN-TOMIM-PROMETHEE technique. Show more
Keywords: Multi-attribute group decision-making (MAGDM), TODIM-PROMETHEE method, spherical fuzzy sets, CRITIC method, tourism landscape planning design scheme
DOI: 10.3233/JIFS-233401
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6001-6017, 2024
Authors: Tyagi, Pooja | Singh, Jaspreeti | Gosain, Anjana
Article Type: Research Article
Abstract: The contemporary real-world datasets often suffer from the problem of class imbalance as well as high dimensionality. For combating class imbalance, data resampling is a commonly used approach whereas for tackling high dimensionality feature selection is used. The aforesaid problems have been studied extensively as independent problems in the literature but the possible synergy between them is still not clear. This paper studies the effects of addressing both the issues in conjunction by using a combination of resampling and feature selection techniques on binary-class imbalance classification. In particular, the primary goal of this study is to prioritize the sequence or …pipeline of using these techniques and to analyze the performance of the two opposite pipelines that apply feature selection before or after resampling techniques i.e., F + S or S + F. For this, a comprehensive empirical study is carried out by conducting a total of 34,560 tests on 30 publicly available datasets using a combination of 12 resampling techniques for class imbalance and 12 feature selection methods, evaluating the performance on 4 different classifiers. Through the experiments we conclude that there is no specific pipeline that proves better than the other and both the pipelines should be considered for obtaining the best classification results on high dimensional imbalanced data. Additionally, while using Decision Tree (DT) or Random Forest (RF) as base learner the predominance of S + F over F + S is observed whereas in case of Support Vector Machine (SVM) and Logistic Regression (LR), F + S outperforms S + F in most cases. According to the mean ranking obtained from Friedman test the best combination of resampling and feature selection techniques for DT, SVM, LR and RF are SMOTE + RFE (Synthetic Minority Oversampling Technique and Recursive Feature Elimination), Least Absolute Shrinkage and Selection Operator (LASSO) + SMOTE, SMOTE + Embedded feature selection using RF and SMOTE + RFE respectively. Show more
Keywords: Imbalanced data, feature selection, machine learning, oversampling, undersampling
DOI: 10.3233/JIFS-233511
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6019-6040, 2024
Authors: Yuan, Songlin
Article Type: Research Article
Abstract: Since the dawn of the digital web era, web-based learning resources have become more and more significant in the field of education. To a certain extent, the visual communication design of these resources influences how well students learn. In view of this, the study proposes a deep learning-based approach to visual communication design. Convolutional neural networks are introduced to automatically construct the visual communication interface, a recommendation algorithm is used to develop the system’s recommendation function, and machine translation is used to translate the language description text. The study method’s efficacy was evaluated. According to the experimental results, the research …method’s runtime in a color environment was only about 37.7 seconds at 4k resolution; in a non-color environment, the method’s F1 value was 0.87 at a recommended list length of 35, which was higher than that of other methods; and when it came to the interface solutions in real terms, the research method produced 526 at 30 buttons. The aforementioned findings demonstrate that the suggested approach can successfully increase the visual communication’s design speed and performance in online learning materials and offer a suitable answer to the needs of real-world applications. Show more
Keywords: Visual communication design, convolutional neural networks, transformer, learning resources, teacher forcing
DOI: 10.3233/JIFS-233944
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6041-6052, 2024
Authors: Gou, Hongyuan | Zhang, Xianyong
Article Type: Research Article
Abstract: Multi-granularity rough sets facilitate knowledge-based granular computing, and their compromised models (called CMGRSs) outperform classical optimistic and pessimistic models with extremity. Three-level CMGRSs with statistic-optimization-location effectively process hierarchical granularities with attribute enlargements, and they are worth generalizing for general granularities with arbitrary feature subsets. Thus, three-level CMGRSs on knowledge, approximation, and accuracy are established for arbitrary granularities by using three-way decision (3WD). Corresponding 3WD-CMGRSs adopt statistic-optimization-3WD by adding optimistic and pessimistic bounds to the representative location, so they resort to optimal index sets to acquire the multi-granularity equilibrium and decision systematicness. As a result, multiple CMGRSs emerge within the three-level …and three-way framework, they improve the classical MGRSs and enrich 3WD as well as three-level analysis, and exhibit the good simulation, extension, effectiveness, improvement, and generalization. Firstly at the knowledge level, cardinality statistic-optimization improves previous label statistic-optimization for equilibrium realization, so CMGRSs are improved for hierarchical granularities while 3WD-CMGRSs are proposed for arbitrary granularities. Then at the approximation and accuracy levels, measure statistic-optimization determines optimal index sets, so 3WD-CMGRSs are similarly proposed to complete the simulation and extension. Furthermore, mathematical properties and computational algorithms of relevant models are investigated. Finally, three-level 3WD-CMGRSs are illustrated by table examples and are validated by data experiments. Show more
Keywords: Multi-granularity rough sets, compromised models, statistic-optimal equilibrium, three-way decision, three-level analysis
DOI: 10.3233/JIFS-236063
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6053-6081, 2024
Authors: Zhang, Hao | Sheng, Yuhong
Article Type: Research Article
Abstract: In this study, an innovative approach that combines least square support vector regression (LSSVR) with uncertainty theory to enhance its performance in dealing with low-quality or imprecise data from real-world be proposed. The resulting model, called uncertain least square support vector regression (ULSSVR), incorporates chance constraints and simplified parameter selection, which are critical to handle imprecise observations. A numerical algorithm called the conjugate residual method (CR) is introduced to reduce the computational complexity of the model solution. The experimental results using both small and medium-sized datasets demonstrate the superior performance of ULSSVR in terms of prediction accuracy and generalization ability …compared to other models such as uncertain support vector regression (USVR), uncertain linear lodel, uncertain polynomial model, and uncertain growth models. ULSSVR not only improves prediction accuracy by at least 28.49% but also demonstrates faster computational speed. Overall, ULSSVR presents a promising solution for data science and internet applications where dealing with imprecise and low-quality data is a common challenge. Show more
Keywords: Least square support vector regression, uncertainty theory, conjugate residual method, chance constraint
DOI: 10.3233/JIFS-236849
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6083-6092, 2024
Authors: Shi, Lin
Article Type: Research Article
Abstract: With the improvement of the public’s aesthetic level, product appearance has become an important influencing factor for consumers to make purchasing decisions. Product styling design is based on this market demand, combining the aesthetic and functional aspects of the product to create a personalized product appearance, in order to better attract consumers, improve the competitiveness and added value of the product. Usually, product styling design involves multiple elements such as product form, color, proportion, etc. The quality evaluation of product styling design is a MAGDM problems. Recently, the TODIM and EDAS technique has been employed to manage MAGDM issues. The …interval-valued Pythagorean fuzzy sets (IVPFSs) are employed as a tool for characterizing uncertain information during the quality evaluation of product styling design. In this paper, the interval-valued Pythagorean fuzzy TODIM-EDAS (IVPF-TODIM-EDAS) technique is construct to manage the MAGDM under IVPFSs. Finally, a numerical case study for quality evaluation of product styling design is employed to validate the proposed technique. The main contribution of this paper is managed: (1) the TODIM and EDAS technique was extended to IVPFSs; (2) Entropy technique is employed to manage the weight values under IVPFSs. (3) the IVPF-TODIM-EDAS technique is founded to manage the MAGDM under IVPFSs; (4) Algorithm analysis for quality evaluation of product styling design and comparison analysis are constructed based on one numerical example to verify the feasibility and effectiveness of the IVPF-TODIM-EDAS technique. Show more
Keywords: Multiple-attribute group decision-making (MAGDM), Interval-valued Pythagorean fuzzy sets (IVPFSs), TODIM technique, EDAS technique, product styling design
DOI: 10.3233/JIFS-236947
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6093-6108, 2024
Authors: Weng, Shizhou | Huang, Zhengwei | Lv, Yuejin
Article Type: Research Article
Abstract: In the face of increasingly complex data forms and decision-making problems, the uncertainty of information poses a major challenge to multi-attribute decision-making methods. How to effectively organize information and serve realistic decision-making problems has attracted extensive attention in the academic circles. In view of this, based on the distribution law of random variables, we put forward the basic concept of probability numbers and construct a general framework, including the concepts of type, order, item, isomorphism and isomerism, same domain and same distribution of probability numbers. On this basis, we further define the expectation and variance formula of probability numbers, and …its operation rules are defined for the same type of probability numbers. To compare the dominance and inferiority of probability numbers further accurately, we put forward the concepts of dominance degree and comparability degree of probability numbers, so that decision makers can realize the ranking of probability numbers by calculating the comprehensive dominance degree. In view of the related concepts of probability numbers, we summarize the properties and theorems of probability numbers and prove them. In addition, a probability numbers-based multi-attribute decision-making framework model is proposed to solve the multi-attribute decision-making problem. Decision makers can select appropriate sub-models to construct personalized multi-attribute decision-making methods according to actual needs. At the end of the paper, we apply the method to the multi-attribute decision case of campus express stations evaluation and verify the scientificity and rationality of the evaluation method. The concept of probability numbers and its decision model proposed in this paper extend the concept category of numbers, enrich the multi-attribute decision-making method based on probability numbers, and have certain reference significance for further research of uncertain decision theory and method. Show more
Keywords: Probability numbers, calculation rule, dominance degree, ranking method, multi-attribute decision-making
DOI: 10.3233/JIFS-223565
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6109-6132, 2024
Authors: Jiang, Yanping | Tang, Zhenpeng | Song, Xinchao | Shao, Xinran
Article Type: Research Article
Abstract: There has been widespread and growing concern about parking. This paper attempts to provide decision support for a shared parking system to reduce parking difficulty. We study a many-to-many matching problem between shared private idle parking spaces and their demanders. A novelty is that the demanders are allowed to use different parking spaces successively in parking relocation service support. This can further reintegrate the idle time of the parking spaces and improve their utilization rate. A multi-objective optimization model is constructed to maximize the number of matched demanders, the total priority of the parking spaces, and the total priority of …the demanders. More importantly, the priorities of the parking spaces and the demanders are innovatively considered. Each of the parking spaces and the demanders is given a priority for the matching and the priority of a parking space or a demander will be increased if the parking space or demander rarely gets matched successfully. This helps reduce the withdrawal of parking spaces and the demanders from the parking platform. In addition, an NSGA-II algorithm is designed to solve the model efficiently. Finally, the feasibility of the proposed method is illustrated via an example. Show more
Keywords: Sharing economy, shared private idle parking space, many-to-many matching, parking priority, improved NSGA-II algorithm
DOI: 10.3233/JIFS-223789
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6133-6148, 2024
Authors: Wang, Daiwen | Sun, Jie | Wei, Cuiping
Article Type: Research Article
Abstract: Spent lithium-ion battery (LIB) recycling can create great pollution to the environment. Understanding the safety, environment, technique, and regulation factors’ impact on the recycling process is crucial. Due to the complexity of the relevant factors, and there is a certain degree of correlation and dependence between the factors, the Decision Making Trial and Evaluation Laboratory (DEMATEL) method is used to analyze the factors’ degree of impact in this study. As the experts are ambiguous about some relations between the factors, it is impossible to conduct integrated evaluation. The improved DEMATEL method is proposed in this study to make up the …missing relations. Further, the weights of the factors will be calculated. In the improved DEMATEL method, the numerical scale of a linguistic term set is introduced. Therefore, the numerical scale used by experts can not only be uniform and symmetrical, but can also be non-uniform symmetric, non-uniform asymmetric, etc. Finally, both reusing and recycling companies are included in this study and their factors’ importance weights were analyzed with the fuzzy comprehensive evaluation method. Show more
Keywords: Automotive waste lithium-ion battery recycling, numerical scale function, DEMATEL method, fuzzy comprehensive evaluation
DOI: 10.3233/JIFS-224124
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6149-6169, 2024
Authors: Mohan Raj, K.R. | Katiravan, Jeevaa
Article Type: Research Article
Abstract: Recently, security has been necessary in this computer world due to the fast development of technology and enormous user strength. The different kinds of security mechanisms including the Intrusion Detection System (IDS) were developed by many researchers to confirm the security of the data in the communication process. In general, the IDS are used to detect anomalous nodes, and attacks and increase the security level. Even though, the various disadvantages are available to ensure the data reliability on different kinds of applications. For this purpose, this work proposes a cross-layer IDS that is a combination of the trust-based secure routing …method, attribute selection and classification algorithms. This study introduces a novel attribute selection approach known as the Weighted Genetic Feature Selection Algorithm (WGFSA). This method is designed to identify and prioritize valuable attributes within the context of network, physical, and data link layers. And introduce a deep classifier called the Hyperparameter-Tuned Fuzzy Temporal Convolutional Neural Network (HFT-CNN) for efficient categorization. Additionally, we propose a pioneering secure routing algorithm known as the Fuzzy Logic and Time-Constrained Dynamic Trusted Cross-Layer-Based Secure Routing Algorithm (FCSRA) to ensure the secure transmission of data packets. The effectiveness of the newly developed system is proved by conducting experiments with the network, standard Aegean Wi-Fi intrusion dataset (AWID) and proved superior to other systems in delay, energy consumption, packet delivery rate, and prediction accuracy. Show more
Keywords: Fuzzy temporal logic, intrusion detection systems, trust score, cross-layer, deep learning, attribute selection, secure routing
DOI: 10.3233/JIFS-233275
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6171-6183, 2024
Authors: Wei, Ying | Gong, Kaixin | Chen, Chunfang | Zhu, Xianghong
Article Type: Research Article
Abstract: This research proposes a new method to solve group decision-making(GDM) problems with intuitionistic fuzzy preference relations(IFPRs). First, a new definition of multiplicative consistency of IFPR is presented to address the defects of the existing consistency definitions. Then, two programming models are established to obtain the most optimistic and pessimistic consistent IFPRs and corresponding intuitionistic fuzzy priority weights. Also, in order to improve the accuracy of aggregate information, a new method to determine the weights of decision-makers(DMs) is offered by considering the interaction among DMs. Subsequently, by combining the vagueness and non-vagueness of the aggregated information, a multiplicative consistency definition of …the collective IFPR is provided. Moreover, to simplify the GDM process, a programming model for solving the priority weight is established, which effectively avoids the consistency test and correction of IFPRs. Finally, the values of the proposed method are illustrated by comparative analysis. Show more
Keywords: Group decision-making, interaction, risk preference, intuitionistic fuzzy preference relation, consistency
DOI: 10.3233/JIFS-233543
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6185-6199, 2024
Authors: Hou, Xianyu | Chen, Yumin | Wu, Keshou | Zhou, Ying | Lu, Junwen | Weng, Xuan
Article Type: Research Article
Abstract: Neighborhood granulation is a classical granulation method. Although it is adequate for clustering and classification tasks, its granules are more complex, and the data representation is binary. This paper proposes a new granulation method based on the neighborhood granulation. Firstly, a detailed definition of the granular form is given with fuzzy rough set theory. Then, a modified fuzzy rough discriminant function is proposed based on neighborhood systems. The samples are globally granulated on single features to construct granules and on multiple features to construct granular vectors. Also, a feature selection technique based on the Chi-square, which strikingly reduces the complexity …of the fuzzy rough granular vectors, is introduced to address the disadvantage of the fuzzy rough granular vectors. An ensemble model structure is also proposed in the paper for the mixed nature of fuzzy rough granular vectors. The paper makes a detailed comparison between the fuzzy rough granulation and the neighborhood granulation. The results show that fuzzy rough granulation has higher computational efficiency and classification performance. Finally, a detailed comparison is made between the fuzzy rough granular ensemble model and various classical ensemble algorithms. The final results show that the fuzzy rough granular ensemble model has better robustness and generalization. Show more
Keywords: Granular computing, fuzzy rough granulation, neighborhood granulation, granular ensemble learning, granular selection
DOI: 10.3233/JIFS-234510
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6201-6217, 2024
Authors: Sun, Hong | Zhang, Xianyong
Article Type: Research Article
Abstract: Z-numbers contain fuzzy restrictions, credibility measures, and probability distributions to effectively represent uncertain information. Converting Z-numbers to fuzzy numbers facilitates extensive applications (such as multi-attribute decision-making (MADM)), thus becoming valuable for research purposes. Regarding Z-number conversions, the original method never considers the association probability, while probabilistic strategies offer better informatization. Recently, a probability-driven conversion starts with a linear transformation of the centroid difference between the fuzzy restriction and probabilistic distribution. However, it has the invalidation weakness of edge information due to underlying non-normalization. To improve this probability-linear conversion, a Z-number conversion is proposed by using underlying probability-exponential descriptions, and this …new method is further applied to MADM. At first, the current probability-linear conversion is analyzed based on the initial non-probabilistic conversion, and its intrinsic weakness and correctional improvement are revealed. Then, the novel probability-exponential conversion resorts to an exponential characterization of centroid difference between the restriction and distribution, and it gains information enrichment due to underlying normalization. The refined method preserves the inherent characteristics of Z-numbers more effectively, facilitating their application in subsequent engineering practices. This is especially pertinent in decision-making systems based on expert input and initial value problems. The proposed method for converting Z-numbers aims to minimize information loss in transitions between Z-numbers and classical fuzzy numbers. This approach will be further explored in future research. Furthermore, the probability-exponential conversion induces an ExpTODIM algorithm for MADM, called PE-ExpTODIM. Three Z-number conversions (i.e., the non-probabilistic, probability-linear, and probability-exponential types) and three decision algorithms (i.e., ExpTODIM, EDAS, MOORA) are combined to establish a 3 × 3 framework of Z-number-driven MADM. Finally, the systematical 9 algorithms are applied to the problem of site selection of carbon storage. They are validated by criss-cross contrast analyses and statistical significance tests. Thus, PE-ExpTODIM exhibits the desired optimization. The last technology of statistical testing is original, ingenious, and valuable for MADM. Show more
Keywords: Z-numbers, fuzzy numbers, probability-exponential conversion, multi-attribute decision making, ExpTODIM/EDAS/MOORA
DOI: 10.3233/JIFS-235304
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6219-6233, 2024
Authors: Kavitha, D. | Radha, V.
Article Type: Research Article
Abstract: This work proposes an unique hardware design for a multi-line Refreshable Braille Display (RBD) device using Imprint Punch Head Technology with Optical Character Recognition (OCR) capabilities for learning and reading text in Braille codes. The device uses a microprocessor board to seamlessly integrate stepper/servo motors with OCR algorithms. A thin flexible metal sheet coated with rubber is used as a display surface on which the raised points for Braille codes are repeatedly formed and deformed. The device is designed in such a way that the material used for its construction are low cost which makes them economical and affordable. The …device was evaluated in the lab setup and showed promising results, and had prospects of becoming a vital Assistive Technology for vision impaired people. Show more
Keywords: OCR, refreshable braille display, raspberry pi, text detection
DOI: 10.3233/JIFS-236527
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6235-6248, 2024
Authors: Li, Heng
Article Type: Research Article
Abstract: The financial performance of enterprises has always been the key to their survival and development, especially for high-tech enterprises. Evaluating the financial performance of high-tech enterprises is beneficial for the management department to accurately understand the financial situation of the enterprise, timely identify financial problems, and study solutions based on this; On the other hand, the scientific evaluation of enterprise performance also provides useful assistance for other stakeholders such as the government, creditors, and enterprise employees to exercise their rights. With the development of the times and the progress of society, high-tech enterprises have developed rapidly. Studying the financial performance …of high-tech enterprises has important theoretical and practical significance. The financial performance evaluation of high-tech enterprises is a classical MAGDM problems. Recently, the TODIM (TODIM) and (grey relational analysis) GRA technique has been employed to cope with MAGDM issues. The interval neutrosophic sets (INSs) are employed as a tool for characterizing uncertain information during the financial performance evaluation of high-tech enterprises. In this manuscript, the interval neutrosophic number TODIM-GRA (INN-TODIM-GRA) technique is implemented to solve the MAGDM under INSs. In the end, a numerical case study for financial performance evaluation of high-tech enterprises is employed to validate the proposed technique. Show more
Keywords: Multiple-attribute group decision-making (MAGDM), Interval neutrosophic sets (INSs), TODIM, GRA, financial performance evaluation
DOI: 10.3233/JIFS-237196
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6249-6263, 2024
Authors: Li, Bo | Lu, TongWei | Min, Feng
Article Type: Research Article
Abstract: 3D point cloud has irregularity and disorder, which pose challenges for point cloud analysis. In the past, the projection or point cloud voxelization methods often used were insufficient in accuracy and speed. In recent years, the methods using Transformer in the NLP field or ResNet in the deep learning field have shown promising results. This article expands these ideas and introduces a novel approach. This paper designs a model AaDR-PointCloud that combines self-attention blocks and deep residual point blocks and operates iteratively to extract point cloud information. The self-attention blocks used in the model are particularly suitable for point cloud …processing because of their order independence. The deep residual point blocks used provide the expression of depth features. The model performs point cloud classification and segmentation tests on two shape classification datasets and an object part segmentation dataset, achieving higher accuracy on these benchmarks. Show more
Keywords: PointCloud, transformer, ResNet, point cloud classification, point cloud part segmentation
DOI: 10.3233/JIFS-231997
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6265-6277, 2024
Authors: Yu, Huan
Article Type: Research Article
Abstract: With the acceleration of urbanization and the significant improvement of people’s living standards, the motorization of urban transportation in China has developed rapidly, and the number of urban motor vehicles has sharply increased. This has also caused a series of problems such as increasingly severe urban road traffic congestion, increased traffic energy consumption, and atmospheric environmental pollution. Unprecedented social and environmental pressures have put forward higher requirements for the development model of urban transportation. Against the backdrop of increasingly severe conflicts between urban transportation and resource environment in China, green transportation with the goal of “meeting maximum demand with minimum …consumption” has gradually received widespread attention from the academic community. The urban green transportation development level evaluation is a classical multiple attribute decision making (MADM). In this paper, we define the triangular Pythagorean fuzzy sets (TPFSs) and investigate the MADM problems under TPFSs. Based on the traditional geometric BM (GBM) operator and generalized weighted GBM (GWGBM) operator, some triangular Pythagorean fuzzy operators are proposed: triangular Pythagorean fuzzy generalized GBM (TPFGGBM) operator and triangular Pythagorean fuzzy generalized WGBM (TPFGWGBM) operator. Accordingly, we have took advantage of these operators to develop some approaches to work out the triangular Pythagorean fuzzy MADM. Ultimately, a practical example for urban green transportation development level evaluation is took advantage of to validate the developed approach, and an influence analysis of the parameter on the final results is been presented to attest its availability and validity. Show more
Keywords: Multiple attribute decision making (MADM), Triangular Pythagorean fuzzy set, geometric BM (GBM) operator, Triangular Pythagorean fuzzy generalized WGBM (TPFGWGBM), green transportation development level
DOI: 10.3233/JIFS-232579
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6279-6297, 2024
Authors: Bolourchi, Pouya | Gholami, Mohammadreza
Article Type: Research Article
Abstract: Alzheimer’s disease (AD) is the most prevalent brain disorder which affects millions of people worldwide. Early detection is crucial for possible treatment. In this regard, machine learning (ML) approaches are widely utilized for AD detection. In this paper, we propose an ML-based method that drastically reduces the dimensionality of features while maintaining the relevant features and boosting the overall performance. To remove irrelevant features, first statistical feature extraction method is applied, and then further reduction among remaining features is applied by utilizing the harmony search method (HSM). The selected features are the most informative features that are fed to the …different classifiers. To test the effectiveness of the proposed method, we deployed three classification techniques including support vector machine (SVM), k -nearest neighbor (k -NN), and decision tree (DT). The experimental results show that the proposed method has a higher performance while decreasing the dimensionality of feature space. To guarantee that the performance of the proposed method is accurate, we applied an ensemble of three classifiers (SVM, KNN, and DT) for classification. The results of the proposed method verify that this method can be successfully deployed for AD detection, due to its high performance and low dimensional features, and can help improve the accuracy and efficiency of Alzheimer’s disease diagnosis. The proposed method demonstrated a significant improvement, achieving high performance in AD/HC classification, with accuracy, sensitivity, specificity, F1 -score, MCC , and Cohen’s Kappa rates reaching 95.5%, 97%, 94%, 95.56%, 0.9104, and 0.9109, respectively. AD/HC classification displayed the highest performance. Additionally, in the more challenging pMCI/sMCI classification, the method achieved an accuracy of 78.50%, sensitivity of 84.00%, specificity of 73.00%, F1 -score of 79.62%, MCC of 0.57, and Cohen’s Kappa of 0.59. Show more
Keywords: Alzheimer’s disease, ensemble of classifiers, harmony search, statistical feature extraction, sMRI
DOI: 10.3233/JIFS-233000
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6299-6312, 2024
Authors: Khenglawt, Vanlalmuansangi | Laskar, Sahinur Rahman | Pakray, Partha | Khan, Ajoy Kumar
Article Type: Research Article
Abstract: Low-resource language in machine translation systems poses multiple complications regarding accuracy in translation due to insufficient incorporation of linguistic information. The difference in the linguistic information between the language pair also significantly impacts the dataset creation for improving translation accuracy. Although neural machine translation achieves a state-of-the-art approach, dealing with low-resource language is challenging since it struggled with limited resources. This paper attempts to address the data scarcity problem using augmentation of synthetic parallel sentences, source-target phrase pairs, and language models at the target side for English-to-Mizo and Mizo-to-English translation via transformer-based neural machine translation. We have attained state-of-the-art results …for both directions of translation. Show more
Keywords: English–Mizo, NMT, transformer, augmentation, language model
DOI: 10.3233/JIFS-235740
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6313-6323, 2024
Authors: Jin, Yongbing | Ran, Teng | Yuan, Liang | Lv, Kai | Wang, Guoliang | Xiao, Wendong
Article Type: Research Article
Abstract: Handwriting robots as an application of Imitation Learning (IL). However, most methods have poor accuracy of trajectory generation under task constraints, and models are less robust to changes in demonstration data. This paper proposes an IL algorithm named Bagging in Hidden Semi-Markov Model (BHSMM). The demonstration data is first divided into several sub-datasets, and each sub-dataset is encoded into several basic learning models by Hidden Semi-Markov Models (HSMM). Then the relationship between the task constraint points and the basic learning models is used to derive the weights. Finally, the trajectories adapted to the task constraints are generated based on the …weights. We conducted experiments on the handwritten dataset LASA and compared the accuracy error with the original HSMM method. The results show that the BHSMM can generate trajectories that satisfy the position and velocity constraints and is more robust to changes in the demonstration data than the HSMM. In addition, satisfactory results are obtained in trajectory generation for real robot handwriting. Show more
Keywords: Imitation learning, human-robot collaboration, handwriting robot, BHSMM
DOI: 10.3233/JIFS-237275
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6325-6335, 2024
Authors: You, Haoyang
Article Type: Research Article
Abstract: Students’ English learning ability depends on the knowledge and practice provided during the teaching sessions. Besides, language usage improves the self-ability to scale up the learning levels for professional communication. Therefore, the appraisal identification and ability estimation are expected to be consistent for different English learning levels. This paper introduces Performance Data-based Appraisal Identification Model (PDAIM) to support such reference. This proposed model is computed using fuzzy logic to identify learning level lags. The lag in performance and retains in scaling-up are identified using different fuzzification levels. The study suggests a fuzzy logic model pinpointing learning level gaps and consistently …evaluating performance across various English learning levels. The PDAIM model gathers high and low degrees of variance in the learning process to give students flexible learning knowledge. Based on the student’s performance and capacity for knowledge retention, it enables scaling up the learning levels for professional communication. The performance measure in the model is adjusted to accommodate the student’s diverse grades within discernible assessment boundaries. This individualized method offers focused education and advancement to students’ unique requirements and skills. The model contains continuous normalization to enhance the fuzzification process by employing prior lags and retentions. Several indicators, including appraisal rate, lag detection, number of retentions, data analysis rate, and analysis time, are used to validate the PDAIM model’s performance. The model may adjust to the various performance levels and offer pertinent feedback using fuzzification. The high and low variation levels in the learning process are accumulated to provide adaptable learning knowledge to the students. Therefore, the performance measure is modified to fit the student’s various grades under distinguishable appraisal limits. If a consistent appraisal level from the fuzzification is observed for continuous sessions, then the learning is scaled up to the next level, failing, which results in retention. This proposed model occupies constant normalization for improving the fuzzification using previous lags and retentions. Hence the performance of this model is validated using appraisal rate, lag detection, number of retentions, data analysis rate, and analysis time. Show more
Keywords: Appraisal model, big data, English learning, fuzzy logic and fuzzification
DOI: 10.3233/JIFS-233414
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6337-6353, 2024
Authors: Men, Rui | FAN, Xiumei | Yan, Jun | Shan, Axida | Fan, Shujia
Article Type: Research Article
Abstract: Vehicle Edge Computing (VEC) is a promising technique to improve the quality of service (QoS) and quality of experience (QoE) in autonomous driving by exploiting the resources at the network edge. However, the high mobility of the vehicles leads to stochastic communication link duration, and the tasks generated by various applications in autonomous driving incur fierce competition for resources. These challenges cause excessive task completion delays. In this paper, we propose a vehicle-to-vehicle (V2V) partial computation offloading scheme that leverages the prediction results of the communication link lifetime between vehicles. A History track, Current interactions and Future planning trajectory-aware Gated …Recurrent Units (HCF-GRU) network is built to capture the essential factors to improve the prediction accuracy. Then, we design a GRU-based Proximal Policy Optimization (GRU-PPO) algorithm to obtain an optimal one-to-many offloading decision to minimize the task execution cost. The HCF-GRU prediction algorithm is evaluated on a real world vehicle trajectory dataset, and the performance of the GRU-PPO algorithm is analyzed on extensive numerical simulations. Experimental results demonstrate that our prediction network and offloading decision algorithm outperform the baseline methods in terms of prediction accuracy and task execution cost. Show more
Keywords: Communication link lifetime prediction, partial offloading decision, machine learning, autonomous driving
DOI: 10.3233/JIFS-235954
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6355-6368, 2024
Authors: Amin, Umair | Fahmi, Aliya | Yaqoob, Naveed | Farid, Aqsa | Hassan, Muhammad Arshad Shehzad
Article Type: Research Article
Abstract: The concept of domination in graphs is very ancient. Several types of notions of domination in graphs have been discussed by many researchers. In this work, the concept of domination and some notions of domination sets, minimal dominating sets, independence sets, and maximal independence sets are introduced in bipolar fuzzy soft graphs. Additionally, several properties of dominating sets are discussed and some theorems in bipolar fuzzy soft graphs are proved.
Keywords: Domination in bipolar fuzzy soft graphs, minimal domination set in bipolar fuzzy soft graphs, maximal independence set in bipolar fuzzy soft graphs
DOI: 10.3233/JIFS-236485
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6369-6382, 2024
Authors: Xu, Fang
Article Type: Research Article
Abstract: In the context of globalization, cross-border e-commerce platforms have become the main way for enterprises to achieve international trade transformation and overseas investment. From this, it can be seen that cross-border e-commerce platforms are of great importance to the development of enterprises, and the development of cross-border e-commerce platforms is also a necessary choice for the development of the times. In the new era, in order to make cross-border e-commerce platforms better serve enterprises and bring economic benefits to their development. The sustainable development capability evaluation of third-party cross-border e-commerce (TPCBEC) platform is a MAGDM. Recently, the Exponential TODIM (ExpTODIM) …technique and Evaluation Based on Distance from Average Solution (EDAS) technique has been employed to cope with MAGDM issues. The 2-tuple linguistic neutrosophic sets (2TLNSs) are employed as a tool for portraying uncertain information during the sustainable development capability evaluation of TPCBEC platform. In this paper, the 2-tuple linguistic neutrosophic number Exponential TODIM-EDAS (2TLNN-ExpTODIM-EDAS) technique is implemented to manage the MAGDM under 2TLNSs. Finally, a numerical study for sustainable development capability evaluation of TPCBEC platform is constructed to validate the implemented technique. Thus, the main advantages of the proposed 2TLNN-ExpTODIM-EDAS technique are outlined: (1) the proposed 2TLNN-ExpTODIM-EDAS technique not only handles the distances information from the 2TLNNAS, but also portrays the DMs’ psychological behavior during the sustainable development capability evaluation of TPCBEC platform. (2) the proposed 2TLNN-ExpTODIM-EDAS technique analyze the behavior of the TODIM technique and EDAS technique as MADM techniques when they are hybridized. Show more
Keywords: Multiple-attribute group decision-making (MAGDM), 2-tuple linguistic neutrosophic sets (2TLNSs), Exponential TODIM (ExpTODIM) technique, EDAS technique, sustainable development capability evaluation
DOI: 10.3233/JIFS-237170
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6383-6398, 2024
Authors: Gao, Jun | Peng, Zhiyuan | Cao, Qiang | Zhang, Jie
Article Type: Research Article
Abstract: The traditional rule-based energy management strategy for plug-in hybrid vehicles has issues, such as difficulty in online correction and limited online optimization capabilities. In addition, the global optimization energy management strategy cannot be applied online or in real-time. Considering the above difficulties, this study proposes a real-time optimization energy management strategy based on the Markov chain for driving condition prediction and online optimization with the minimum principle. To verify the proposed control strategy, the plug-in hybrid vehicle dynamics model, driving condition prediction model, and online optimization control model were first established. The initial value of the battery state of charge …was set to 0.4 under the UDDS (Urban Dynamometer Driving Schedule) standard cycle. The simulation results showed that the comprehensive fuel consumption cost was 1.66 yuan, which was 8.28% better than the energy economy of the traditional rule-based energy management strategy. At the same time, a complete vehicle test was also conducted based on a sample vehicle test platform. The experimental results indicated that the energy management strategy proposed herein exhibits better fuel economy compared to that exhibited by the traditional rule-based energy management strategy. Simulations and experiments have verified the effectiveness of the proposed control strategy in this study. Show more
Keywords: Energy management strategy, Markov chain, minimum principle, optimal control
DOI: 10.3233/JIFS-238713
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6399-6409, 2024
Authors: Zhang, Nan | Yin, Jiayi | Zhang, Ning | Sun, Tongtong | Yin, Shi | Wan, Lijun
Article Type: Research Article
Abstract: Digital technologies, such as big data, the Internet, and artificial intelligence, are rapidly advancing. Photovoltaic building materials enterprises (PBMEs) have been leveraging digital transformation to enhance their technological innovation capabilities and gain a competitive edge. In the global context of transitioning towards a low-carbon economy, the deep integration of digital technology offers a new solution for the green transformation of PBMEs. The synergy between green traction digitalization and digitalization enables green practices, making collaborative integration crucial for the far-reaching development of PBMEs. Within the framework of China’s “double carbon” policy, domestic PBMEs are experiencing exponential growth, where digital green innovation …(DGI) has become their primary objective. In this DGI context, selecting the right partners is the first step that significantly impacts the efficiency and effectiveness of DGI implementation. Therefore, the purpose of this study is to assist PBMEs in selecting high-quality partners, promoting the DGI process, enhancing technological innovation capabilities, and gaining a competitive advantage. To achieve this, the paper proposes constructing a theoretical framework for evaluating the DGI cooperation ability of PBMEs using the theory of ecological reciprocity. Based on this framework, an evaluation index system is established to assess the DGI cooperation ability of potential partners The interval intuitionistic fuzzy evaluation method, combined with a double combination weighting approach, is employed to evaluate the DGI ability of selected partners. Furthermore, by applying field theory, a dynamic selection model for strategic alliance partners is developed to aid PBMEs in selecting high-quality partners for DGI and facilitating the DGI process. The research findings indicate that: i) The evaluation standard framework for DGI cooperation ability of PBMEs encompasses “symbiosis,” “mutualism,” and “regeneration,” along with the crucial environmental element of mutual trust. ii) The evaluation method based on double combination weighting effectively assesses the comprehensive DGI capabilities of selected PBME partners. The application of field theory enables scientific and effective dynamic partner selection for PBMEs through resource complementarity. iii) The proposed framework and partner selection model can be employed in real partner selection scenarios for PBMEs, allowing them to choose high-quality partners, enhance their DGI capabilities, and attain practical selection outcomes. This paper presents novel partner selection model that integrates decision rules and resource complementarity, enabling PBMEs to efficiently select DGI partners from a pool of potential candidates and improve their innovation efficiency. The utilization of the double combination weighting method and field theory in the partner selection paradigm of D extends the theoretical foundation, while the establishment of the DGI capability evaluation index system for PBME partners contributes to empirical applications. Show more
Keywords: Photovoltaic building materials enterprises, digital green innovation, partner selection, double combination weighting, field theory
DOI: 10.3233/JIFS-234838
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6411-6437, 2024
Authors: You, Fang | Li, Yaru | Fu, Qianwen | Zhang, Jun
Article Type: Research Article
Abstract: With the increasing levels of intelligence and automation, the relationship between humans and vehicles has evolved from a utilitarian perspective to a partnership. Among the crucial factors for enhancing user experiences are the analysis of driving tasks, the construction of user needs models, and the design of intelligent interfaces. Based on this background, this paper proposes a cognitive task analysis model using intelligent steering wheel information interaction design as the vehicle. The model aims to extract key design elements to assist designers in making design decisions, thereby improving the human-machine cooperation performance of intelligent automobiles and enhancing user perceptual experiences. …Firstly, within the context of human-machine cooperation systems, a cognitive task analysis method integrating the SRK model is proposed. By analyzing the behavioral decision characteristics between the vehicle and the user, a framework for the human-machine interface (HMI) logic of the steering wheel and a dynamic layout prototype are established. Secondly, the design of the steering wheel’s HMI interaction is based on an analysis of users’ affective needs and rational physiological characteristics. This paper integrates the analysis of users’ affective needs to identify design elements that align with a high level of user satisfaction. Lastly, the design methodology model is applied to a navigation scenario, resulting in the creation of a steering wheel HMI prototype within a human-machine cooperation system. The prototype is then subjected to a combined subjective and objective experimental analysis, thereby validating the superiority of the steering wheel HMI’s detection indicators over those of the central control HMI and establishing the design pattern for the steering wheel HMI. Show more
Keywords: Intelligent cockpit, steering wheel, cognitive task analysis, human-machine interaction interface
DOI: 10.3233/JIFS-233500
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6439-6464, 2024
Authors: Zhao, Dongping
Article Type: Research Article
Abstract: Chinese Language learning grows ever more essential to develop the students’ personalities and values as the curriculum, thereby improving teaching strategies based on students’ learning preferences are more crucial. Students’ participation in learning the Chinese Language is generally minimal and typically operates in a passive learning mode. The development of the Chinese Language instruction in these higher educational settings will be impacted by the absence of an organized strategy for teaching the Chinese Language. An algorithm is called the Fuzzy Pattern-driven Personalized Teaching (FPPT) has been proposed to identify the association between the students learning patterns and interests in the …Chinese Language in the higher education for providing the personalized teaching to solve these challenges. Fuzzy sets are incorporated into FP-Growth for personalized the Chinese Language learning to improve the suggestions by considering the ambiguous preferences and the proficiency levels. The fuzzy pattern is unrevealed by implementing the Frequent Pattern (FP) growth algorithm to find patterns in the students learning activity and preferences so that personalized the teaching methods can be developed to meet the needs of each student and maximize their motivation for the language learning. Using the support and the confidence measures, these identified Fuzzy association relationships of student learning interest results in personalized the Chinese Language teaching in the higher education. The experimental results showed that the proposed FPPT system significantly improved each student’s learning outcome, communication effectiveness, learning motivation, and the Language proficiency level. Show more
Keywords: Personalized Chinese language, fuzzy set, frequent pattern growth, frequent item set, learning preferences, teaching strategies
DOI: 10.3233/JIFS-235734
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6465-6478, 2024
Authors: Ouyang, Zhiyuan | Wan, Yanling | Zhang, Tao | Wu, Wen-Ze
Article Type: Research Article
Abstract: The introduction of fractional order accumulation has played a crucial role in the development of grey forecasting methods. However, accurately identifying a single fractional order accumulation for modeling diverse sequences is challenging due to the dependence of different fractional order accumulations on data structure over time. To address this issue, we propose a novel fractional grey model abbreviated as FGMMA, incorporating a model averaging method. The new model combines existing fractional grey models by using four judgment criteria, including Akaike information criteria, Bayesian information criteria, Mallows criteria, and Jackknife criteria. Meanwhile, the cutting-edge algorithm named breed particle swarm optimization is …employed to search the optimal fractional order for each candidate model to enhance the effectiveness of the designed model. Subsequently, we conduct a Monte Carlo simulation for verification and validation purposes. Finally, empirical analysis based on energy consumption in three countries is conducted to verify the applicability of the proposed model. Compared with other benchmark models, we can conclude that the proposed model outperforms the other competitive models. Show more
Keywords: Grey forecasting model, fractional order accumulation, model averaging, breed particle swarm optimization
DOI: 10.3233/JIFS-237479
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6479-6490, 2024
Authors: Zhang, Yihao | Wang, Yuhao | Lan, Pengxiang | Xiang, Haoran | Zhu, Junlin | Yuan, Meng
Article Type: Research Article
Abstract: Conversational recommender systems use natural language conversations to elicit user preferences and recommend items proactively. Existing methods based on graph neural networks have been proven to be effective in exploiting knowledge graphs. However, node positions are often treated as constants, which leads to the neglect of graph connectivity due to fuzzy processing. In addition, although the transformer has significant advantages in understanding the text, its secondary computational complexity may be incapable when dealing with long texts. In order to solve these problems, we propose an additive positional conversational recommender model called APCR. This model converts the pair product of transformer …into a linear operation, and uses the Laplacian eigenvector to build a location graph. The extended graph neural network captures the topology structure of the location knowledge graph. Specifically, we design an encoder based on additive attention to break through the bottleneck of long text. Furthermore, we develop a recommendation model based on a positional graph neural network to match items with dialogue context, thereby capturing the graph topology. Extensive experiments on the REDIAL dataset show significant improvements in our proposed model over the state-of-the-art methods in recommendation and dialogue generation evaluations. Show more
Keywords: Interactive recommender systems, graph neural networks, knowledge graphs, additive attention
DOI: 10.3233/JIFS-230905
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6491-6503, 2024
Authors: Qian, Jin | Wang, Taotao | Lu, Yuehua | Yu, Ying
Article Type: Research Article
Abstract: Multi-granularity hesitant fuzzy linguistic terms set is an effective expression of linguistic information, which can utilize some fuzzy linguistic terms to evaluate various common qualitative information and plays an important role when experts provide linguistic information to express hesitancy. Since the alternative description in the decision-making information system is characterized by multi-granularity, uncertainty, and vagueness, this paper proposes a multi-granularity hesitant fuzzy linguistic decision-making VIKOR method based on entropy weight and information transformation. Specifically, this paper firstly adopts fuzzy information entropy to obtain the weights of different attributes and introduces a multi-granularity hesitant fuzzy linguistic term set conversion method to …realize the semantic information conversion between different granularities. Then for the converted affiliation linguistic decision matrix, the entropy weighting method is used to obtain the weights of different affiliation granularity layers, and a weight optimization VIKOR method based on the affiliation linguistic decision matrix is further proposed to rank the alternatives. Finally, the feasibility of the proposed method verified by arithmetic examples, experimental analysis is carried out in terms of parameter sensitivity analysis and comparison with other methods. The experimental results prove the rationality and effectiveness of the proposed method. Show more
Keywords: Multi-granularity hesitant fuzzy term set, affiliation degree, information transformation, VIKOR method
DOI: 10.3233/JIFS-237951
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6505-6516, 2024
Authors: Prasath, J.S. | Shyja, V. Irine | Chandrakanth, P. | Kumar, Boddepalli Kiran | Raja Basha, Adam
Article Type: Research Article
Abstract: Now, the Cyber security is facing unprecedented difficulties as a result of the proliferation of smart devices in the Internet of Things (IoT) environment. The rapid growth in the number of Internet users over the past two decades has increased the need for cyber security. Users have provided new opportunities for attackers to do harm. Limited security budgets leave IoT devices vulnerable and easily hacked to launch distributed denial-of-service (DDoS) attacks, with disastrous results. Unfortunately, due to the unique nature of the Internet of Things environment, most security solutions and intrusion detection systems (IDS) cannot be directly adapted to the …IoT with acceptable security performance and are vulnerable to various attacks that do not benefit. In this paper we propose an optimal secure defense mechanism for DDoS in IoT network using feature optimization and intrusion detection system (OSD-IDS). In OSD-IDS mechanism, first we introduce an enhanced ResNet architecture for feature extraction which extracts more deep features from given traffic traces. An improved quantum query optimization (IQQO) algorithm for is used feature selection to selects optimal best among multiple features which reduces the data dimensionality issues. The selected features have given to the detection and classification module to classify the traffic traces are affected by intrusion or not. For this, we design a fast and accurate intrusion detection mechanism, named as hybrid deep learning technique which combines convolutional neural network (CNN) and diagonal XG boosting (CNN-DigXG) for the fast and accurate intrusion detection in IoT network. Finally, we validate the performance of proposed technique by using different benchmark datasets are BoNeSi-SlowHTTPtest and CIC-DDoS2019. The simulation results of proposed IDS mechanism are compared with the existing state-of-art IDS mechanism and analyze the performance with respects to different statistical measures. The results show that the DDoS detection accuracy of proposed OSD-IDS mechanism is high as 99.476% and 99.078% for BoNeSi-SlowHTTPtest, CICDDoS2019, respectively. Show more
Keywords: Defense mechanism, DDoS intrusion, intrusion detection system, feature selection, IoT
DOI: 10.3233/JIFS-235529
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6517-6534, 2024
Authors: Ye, Qing | Song, Zihan | Zhao, Yuqi | Zhang, Yongmei
Article Type: Research Article
Abstract: Video anomaly detection refers to the automatic identification of abnormal behaviors, objects, or events in videos. However, current methods for anomaly detection based on original frames lack a comprehensive understanding of the importance of foreground information, making it challenging to efficiently address video anomaly detection in the presence of complex background interference. In this paper, we propose a video anomaly detection algorithm based on Background Separation Network (BSN) to address this issue. Firstly, we utilize a video stabilization algorithm to reduce video jitter and enhance the quality of input video frames. Secondly, BSN shifts the focus from the entire frame …to the foreground region with higher anomaly detection value. BSN utilizes the motion pixel distribution of the video as the basis for foreground extraction, enabling pixel-level background separation to obtain more accurate and complete foreground targets. Lastly, a certain proportion of foreground targets in the foreground image are masked as background, reducing the interference caused by redundant targets on the detection results. The proposed method achieves an accuracy of 96.2% on the UCSD ped2 dataset, demonstrating its effectiveness. This method contributes to accurately detecting abnormal behaviors in real-world surveillance videos to protect the safety of public lives and assets. Show more
Keywords: Video anomaly detection, auto encoder, background separation network, video jitter elimination
DOI: 10.3233/JIFS-235717
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6535-6551, 2024
Authors: Sheikh, Ansar Isak | Sadish Sendil, M. | Sridhar, P. | Thariq Hussan, M.I. | Abidin, Shafiqul | Kumar, Ravi | Irshad, Reyazur Rashid | Muniyandy, Elangovan | Phani Kumar, Solleti
Article Type: Research Article
Abstract: Effective data management has arisen as a major concern in today’s era of ubiquitous data generation from a plethora of intelligent gadgets. While data proliferation promises unparalleled benefits, it imposes significant storage and computing constraints, particularly on end-users with limited capabilities. To solve these difficulties, this article investigates the confluence of cloud storage, blockchain technology, public auditing, reputation systems, and dynamic auditing. Because of their low-cost data storage and processing capabilities, cloud computing services have grown in popularity, leading customers to embrace data outsourcing to reduce local administrative overhead. This study digs into a novel paradigm for ensuring the integrity …and security of data stored in cloud environments using blockchain technology. Integrating public auditing systems enables visible and verifiable data audits, ensuring consumers of data trustworthiness. A reputation system is also included to build trust among cloud service providers and users, improving the overall trustworthiness of the ecosystem. The suggested system also includes dynamic auditing, which allows for real-time changes and data verification, reacting to the changing nature of cloud-stored information. This study provides a thorough examination of the architectural components, techniques, and protocols used in this novel approach. We illustrate the feasibility and usefulness of our approach in ensuring data integrity, security, and reliability in cloud storage systems through empirical analysis and case studies. The findings show the potential benefits of this integrated strategy to solving the issues posed by the modern digital landscape’s tremendous proliferation of data. Through the synergistic integration of cloud storage, blockchain technology, public auditing, reputation systems, and dynamic auditing, this research provides a holistic solution for managing data in the cloud while ensuring data integrity, security, and trust. This comprehensive strategy lays the way for a more robust and dependable cloud data management ecosystem, increasing user trust in cloud-based services. Show more
Keywords: Low-cost data storage, blockchain technology, data integrity, security, cloud storage
DOI: 10.3233/JIFS-237474
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6553-6564, 2024
Authors: Runkler, Thomas A.
Article Type: Research Article
Abstract: Pairwise fuzzy preference matrices can be constructed using expert ratings. The number of pairwise preference values to be specified by the experts increases quadratically with the number of options. Consistency (transitivity) allows to reduce this quadratic complexity to linear complexity which makes this approach feasible also for large scale applications. Preference values are usually expected to be on a fixed finite interval. Additive preference is defined on such a finite interval. However, completing preference matrices using additive consistency may yield preferences outside this finite interval. Multiplicative preference is defined on an infinite interval and is therefore not suitable here. …To overcome this problem we extend the concept of consistency beyond additive and multiplicative to arbitrary commutative, associative, and invertible operators. Infinitely many of such operators induce infinitely many types of consistency. As one example, we examine Einstein consistency, which is induced by the Einstein sum operator. Completing preference matrices using Einstein consistency always yields preferences inside the finite interval, which yields the first method that allows to construct large scale finite preference matrices using expert ratings. A case study with the real–world car preference data set indicates that Einstein consistency also yields more accurate preference estimates than additive or multiplicative consistency. Show more
Keywords: Fuzzy preference relations, consistent preference, additive preference, multiplicative preference, Einstein sum
DOI: 10.3233/JIFS-224179
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6565-6576, 2024
Authors: Bu, Yanbin | Chen, Ting | Duan, Hongxiu | Liu, Mei | Xue, Yandan
Article Type: Research Article
Abstract: In the modern world, structured and semi-structured knowledge bases hold a considerable amount of data. There-fore, people who are familiar with formal query languages should not be the only ones who can efficiently and clearly query them. Semantic Parsing (SP) is converting natural language utterances into formal meaning representations. The paper suggests a model for SP that uses a novel method of utilizing the Semi-Supervised Generative Adversarial Network (SS-GAN) to enhance the classifier performance. The proposed SS-GAN extends the fine-tuning of word embedding architectures using unlabeled examples in a generative adversarial environment. We provide a regularization strategy for addressing the …mode missing problem and unstable training in SS-GAN. The main viewpoint is to use the extracted feature vectors from the discriminator. Hence, the generator produces outputs by aiding the discriminator’s learned features. A reconstruction loss is added to the loss function of the SS-GAN to drive the genera-tor to reconstruct outputs from the discriminator’s features, hence steering the generator toward actual data configurations. The proposed reconstruction loss improves the performance of SS-GAN, produces high-quality outputs, and may be combined with other regularization loss functions to improve the performance of diverse GANs. We employ BERT word embedding for our model, which can be included in a downstream task and fine-tuned as a model, while the pre-trained BERT model can capture various linguistic properties. We examine the suggested model using the WikiSQL and SparC datasets, and the analysis findings reveal our model outperforms its rivals. The findings from our experiments indicate that the need for labeled samples can be minimized, down to as few as 100 instances, while still achieving commendable classification outcomes. Show more
Keywords: Semantic parsing, generative adversarial network, semi-supervised learning, BERT
DOI: 10.3233/JIFS-233212
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6577-6588, 2024
Authors: Li, Feng | Zhu, Mozhong | Lin, Ling
Article Type: Research Article
Abstract: Once industrial control systems are targeted by cyber-attacks, the consequences can be severe, including asset loss, environmental pollution, and public security risks. Risk assessment is an important way to ensure that industrial control systems operate efficiently, steadily and safely. The purpose of this paper is to develop a risk assessment model for industrial control systems based on asymmetric connection cloud and Choquet integral, which fully takes into account the fact that values of risk indicators are often fuzzy, random, asymmetrically distributed in finite intervals, and there are interactions among different indicators. To do so, we first establish a risk assessment …index system to ensure the full reflection of availability, integrity, and confidentiality in the results of risk assessment for industrial control systems. Then we establish classification standards for each evaluation indicator based on the importance of assets, vulnerabilities, and threats in evaluating the risk of industrial control systems. Next we develop a risk assessment model based on asymmetric connection cloud and Choquet integral to determine the risk level of industrial control systems. In the following, an example is provided to demonstrate the feasibility and reliability of this proposed model. The experimental results have demonstrated a high level of credibility in assessing cyber-attacks by the proposed model, indicating its potential for analyzing the current security and risk posture of industrial control systems. Show more
Keywords: Industrial control systems, risk assessment, asymmetric connection cloud, choquet integral
DOI: 10.3233/JIFS-234686
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6589-6605, 2024
Authors: Ma, Fanglan | Zhu, Changsheng | Liu, Dukui
Article Type: Research Article
Abstract: Knowledge tracing (KT), which aims to trace human knowledge learning process by using machines, has widely applied in online learning systems. It dynamically models student’s knowledge states in relation to different learning factors through their learning interactions. Recently, KT has attracted many researches attention due to its good performance to using deep learning. Although most of KT models have shown outstanding results, they have limitations: either ignore the human cognitive law and learning behavior, or lack the ability to go deeper modeling to trace knowledge state. In this paper, we propose a deeper knowledge tracking model integrating cognitive theory and …learning behavior (CLDKT). It united the advantages of memory network and recurrent neural network of the existing deep learning KT models for modeling student learning. To better implement CLDKT, we add the residual network (ResNet) to realize the deep modeling of learning behaviors. Extensive experiments on three open benchmark datasets to evaluate our model. Experimental results demonstrate that (I) CLDKT outperforms the state-of-the-art KT models on students’ performance prediction. (II) CLDKT can deeper modeling to trace knowledge state owing to the ResNet import. (III) CLDKT has better interpretability and predictability, which proves the effectiveness of the knowledge tracing model integrating cognitive law and learning behavior. Show more
Keywords: Knowledge tracing, cognitive law, learning behavior, ResNet, deep learning
DOI: 10.3233/JIFS-235723
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6607-6617, 2024
Authors: Yang, Shuyi | Li, Lusu | Feng, Libo
Article Type: Research Article
Abstract: Currently, scientific big data management is generally faced with the problems of scattered data resources, inconsistent data standards, and the inability to share and circulate data safely. Research personnel attaches great importance to whether sharing the first-hand property is secure under clear ownership and whether it can contribute to the large society. The isolation of the data management system is the obvious obstacle to collecting and managing across-disciplinary data. To a large extent, sharing and trading scientific big data is the primary purpose to realize the clarity of property rights, secure data sharing, and the value of the data assets …step by step. We propose to construct a public platform for scientific big data management. The system is managed to unify and authorize the on-chain data, on which data sharing and trading is tracked throughout the process. Smart contracts are executed with vital functions and guarantee price matching in data transactions. We design the incentive mechanism which measures the incentive yield of data cost quality based on Evolutionary Game Theory and Data Quality Control Theory (EGQCY), considering how the cost of data quality performs in controlling and impacting the rational release of the incentive yields in the sharing and trading process. The experiments found that the design of incentive yield and incentive coefficients only significantly affected the transition from low-quality data to medium-quality data. Both parameters converged to fixed values as the cost of data quality increased. Show more
Keywords: Scientific big data, blockchain, smart contract, data sharing and transaction, data incentive mechanism, the cost of data quality control
DOI: 10.3233/JIFS-236521
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6619-6635, 2024
Authors: Lin, Shanlang | Lin, Zeyu
Article Type: Research Article
Abstract: The relationship between transportation infrastructure and entrepreneurship has been widely discussed by scholars. However, as an important transportation infrastructure, the impact of subway construction on entrepreneurship has been less studied. Based on the Synthetic Control Method, this paper takes the urban data of China from 2003 to 2017 as the research sample and uses the synthetic control method to study the influence of eight cities with subway service on entrepreneurship. The results show that: (1) The impact of subway openings on entrepreneurship varies across different cities. Specifically, it has a positive effect on entrepreneurship in Hangzhou, Zhengzhou, and Changsha, while …it has a negative impact on entrepreneurship in Harbin and Ningbo. In the cases of Suzhou, Wuxi, and Kunming, the influence on entrepreneurship levels could not be conclusively established. (2) For cities where entrepreneurship activity increased following the opening of subways, further investigation revealed that subway openings did not directly stimulate entrepreneurship within transport-related industries. Instead, they indirectly boosted the entrepreneurial landscape in Hangzhou, Zhengzhou, and Changsha by accelerating the flow of resources and enhancing spillover effects within their respective advantageous industries. This study’s contributions are twofold. Firstly, it introduces innovative perspectives and methodologies for assessing the impact of subway systems on entrepreneurship, highlighting the differentiated effects observed across various cities and industries. Secondly, it emphasizes the importance of considering local advantageous industries in subway construction planning for government authorities, as this can maximize the subway’s potential to drive entrepreneurship in urban areas. Show more
Keywords: Subway system, synthetic control analysis, entrepreneurship, analysis of urban differences
DOI: 10.3233/JIFS-233366
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6637-6655, 2024
Authors: Li, Dongmei | Yang, Lehua | Liu, Shaojun | Tan, Ruipu
Article Type: Research Article
Abstract: Emergency rescue decisions in case of a typhoon disaster can be considered multi-attribute decision-making problems. Considering the need for the timeliness and authenticity of decision-making information sources after such a disaster, this study proposed using learning methods to process real-time online data and interval-valued neutrosophic numbers (NNs) to express the classification results. Using Typhoon Hagupit as an example, a trained text classification model was used to classify real-time data (online comments), following which the classification results were used as weights to convert these data into interval-valued NNs. Finally, the technique for order of preference by similarity to ideal solution (TOPSIS) …method was adopted to rank the extent of damage caused by the typhoon in each region; the sorting results were consistent with the official statistical data, proving the effectiveness of the proposed method. A detailed sensitivity analysis was conducted to determine the optimal parameter settings of the classification model. Furthermore, the proposed method was compared with existing methods in terms of data conversion and deep learning efficiency; the results confirmed the superior capabilities of the proposed method. Notably, the proposed method can provide support to disaster management professionals in their post-disaster emergency relief work. Show more
Keywords: Deep learning, interval-valued neutrosophic numbers, multi-attribute decision making, typhoon disaster
DOI: 10.3233/JIFS-235315
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6657-6677, 2024
Authors: Liu, Huilin | Wang, Yansi | Yang, Gaoming | Xu, Huan | Wang, Tao
Article Type: Research Article
Abstract: Photorealistic image style transfer aims to transfer style information while preserving the realistic details of the content image. However, an existing limitation is the inability to effectively balance the relationship between image realism and stylization intensity, resulting in poor image transfer performance. To address this issue, we propose an photorealistic style transfer method that fusing Frequency Separation Channel Attention Mechanism (FSCAM) and Mirror Fluid Pyramid Integration (MFPI). This method achieves superior stylization intensity while improves image realism. Firstly, we propose an improved channel attention mechanism called FSCAM. This mechanism utilizes Discrete Cosine Transform (DCT) to decompose features into different frequency …components and screens out high-valued texture and color features, thereby enhancing the stylization intensity of the generated images. In addition, we designed a MFPI module. The module is able to integrate information from different scales, enhance the preservation of low-level detail features in high-level features, and thus improve the realism of the images. Experimental results demonstrate that our method not only enhances the stylization intensity but also improves the image realism. It achieves satisfactory performance in terms of subjective visual performance and objective evaluation metrics. Show more
Keywords: Generate image, style transfer, discrete cosine transform, channel attention mechanism, feature fusion
DOI: 10.3233/JIFS-235903
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6679-6696, 2024
Authors: Zhan, Linjie | Tang, Zhenpeng
Article Type: Research Article
Abstract: Effective energy futures price prediction is an important work in the energy market. However, the existing research on the application of “decomposition-prediction” framework still has shortcomings in noise processing and signal reconstruction. In view of this, this paper first uses PSO to optimize VMD to improve the effectiveness of single decomposition, and further uses SGMD to capture the remaining key information after extracting low-frequency modal components by using PSO-VMD technology. Further, combined with LSTM to predict each component, a new PSO-VMD-SGMD-LSTM hybrid model is innovatively constructed. The empirical research results based on the real energy market transaction price show that …compared with the benchmark model, the hybrid model proposed in this paper has obvious forecasting advantages in different forecasting scenarios. Show more
Keywords: Energy futures price forecast, secondary decomposition technique, long short term memory
DOI: 10.3233/JIFS-236019
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6697-6713, 2024
Authors: Koam, Ali N.A. | Ahmad, Ali | Azeem, Muhammad | Qahiti, Raed
Article Type: Research Article
Abstract: Let G be a graph and R = {r 1 , r 2 , …, r k } be an ordered subset of vertices of G , if every two vertices of G have different representation r (v |R ) = (d (v , r 1 ) , d (v , r 2 ) , …, d (v , r k )) with respect to R , then R is said to be a metric-based resolving parameter or resolving set of G and its minimum cardinality is called the metric dimension of graph G . Metric dimension …is considered as an important applied concept of graph theory especially in the localization of a network and also in the chemical graph theoretical study of molecular compounds. Therefore, it is hot topic to study for different families of graphs as well. Convex polytopes play an important role both in various branches of mathematics and in applied areas, most notably in linear programming. In this paper, we determine the metric-based resolving parameter of line graph of a convex polytope S n , and conclude that it has constant metric dimension but vary with the parity of n . This article presents a measurement of the line graph of a convex polytope, denoted as ( S n ) . The subsequent section provides the metric dimension of the resulting graph. There are two scenarios pertaining to the metric dimension of a selected graph with respect to the metric dimension. The metric dimension of even cycle-based convex polytopes is three, whereas for other values, the metric dimension is four. Show more
Keywords: Convex polytope, metric dimension, resolving set, constant metric dimension, line graph of convex polytope
DOI: 10.3233/JIFS-236517
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6715-6727, 2024
Authors: Arul, A. | Kathirvelu, M.
Article Type: Research Article
Abstract: In this paper, we present a novel DILTS algorithm that uses a new approach inspired by the energy efficiency of dragonflies. The algorithm optimizes the energy-harvesting mechanisms in IoT devices, inspired by the way dragonflies use wind energy to fly. A sophisticated algorithm optimizes power consumption during task execution, saving energy and speeding up tasks while maintaining the application throughput. The algorithm leverages lazy task scheduling (LTS) to enhance task execution performance. The proposed algorithm evaluates the energy levels of each task and implements an LTS method. This LTS approach improves performance and task management by streamlining scheduling data and …reducing overhead. The LTS model reliably optimizes the energy across microbenchmarks and real-time IoT devices. To assess the efficiency and practicality of our algorithm, we compared it to four alternatives. Our novel algorithm outperformed the others with a chip area of 856 μm2 , performance speed of 7.11 ns, scheduling accuracy of 94%, and response time of 2.61 ns. Our simulations showed that our proposed method reduced energy consumption by up to 10.02% compared to existing methods. We evaluated the performance of the algorithms on a Zynq 7000 FPGA using the Xilinx Vivado platform via simulations. Our novel algorithm can improve the energy efficiency of green data centers. Show more
Keywords: Dragonfly algorithm, lazy task scheduling, VHDL, internet of things, energy-efficiency, Xilinx Vivado
DOI: 10.3233/JIFS-237475
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6729-6746, 2024
Authors: Sun, Shaoye
Article Type: Research Article
Abstract: In recent years, the lack of coordination in cross-border logistics has been one of the challenges and challenges faced by cross-border e-commerce. As the primary link in cross-border logistics, the selection of logistics service providers is an important foundation for promoting the development of cross-border e-commerce, and also a key link in improving the competitiveness of cross-border e-commerce enterprises. How to choose suitable and effective cross-border e-commerce logistics service providers has important theoretical significance and practical application value. The cross-border e-commerce logistics service providers evaluation is a multiple-attributed decision-making (MADM) problem. In this paper, the Type-2 neutrosophic number cross-entropy (T2NN-CE) …technique is designed with help of cross-entropy and Type-2 neutrosophic number (T2NN). Furthermore, Then, T2NN-CE technique is built to solve the MADM. Finally, a numerical example for cross-border e-commerce logistics service providers evaluation is given and some comparisons are conducted to illustrate advantages of the designed T2NN-CE technique. The research contribution of the paper is outlined: (1) The T2NN-CE is managed under T2NNs; (2) the T2NN-CE method is implemented for MADM under T2NNs; (3) the T2NN-CE technique for cross-border e-commerce logistics service providers evaluation is constructed and were compared with some existing techniques; (4) Through the comparison, it is known that T2NN-CE technique for cross-border e-commerce logistics service providers evaluation is effective. Show more
Keywords: Multiple-attributed decision-making (MADM), Type-2 neutrosophic number (T2NN), cross entropy, cross-border e-commerce logistics service providers evaluation
DOI: 10.3233/JIFS-238592
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6747-6762, 2024
Authors: Rao, Fengshuo | Chung, Sung-Pil | Xing, Kailin
Article Type: Research Article
Abstract: With the continuous improvement of modern basketball technology, higher requirements have been put forward for the personal abilities of basketball players. As the core of an organization, the offensive ability of a defender largely determines the team’s performance. Therefore, it is necessary to objectively evaluate the attacking ability of defenders. Traditional techniques cannot objectively reflect the true level of players due to their strong subjectivity. Therefore, establishing a scientific evaluation technique is particularly important. The fuzzy comprehensive evaluation of attack ability of basketball defenders is viewed as the multi-attribute decision-making (MADM). In this paper, the triangular fuzzy neutrosophic number cross-entropy …(TFNN-CE) technique is designed with help of cross-entropy and triangular fuzzy neutrosophic sets (TFNSs). Furthermore, Then, TFNN-CE technique is addressed to solve the MADM. Finally, a numerical example for fuzzy comprehensive evaluation of attack ability of basketball defenders is given and some comparisons are conducted to r illustrate advantages of the designed technique. The main contribution of this paper is addressed: (1) The TFNN-CE technique is addressed under TFNSs; (2) the TFNN-CE technique is addressed for MADM under TFNSs; (2) the TFNN-CE technique for fuzzy comprehensive evaluation of attack ability of basketball defenders is addressed; (3) Through the several efficient comparisons, it is addressed that TFNN-CE technique is effective for fuzzy comprehensive evaluation of attack ability of basketball defenders. Show more
Keywords: Multiple attribute decision making (MADM), triangular fuzzy neutrosophic sets (TFNSs), cross-entropy technique, TFNN-CE technique, attack ability of basketball defenders
DOI: 10.3233/JIFS-238836
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6763-6780, 2024
Authors: Radhakrishnan, P. | Senthilkumar, G.
Article Type: Research Article
Abstract: Automatic text summarization is the task of creating concise and fluent summaries without human intervention while preserving the meaning of the original text document. To increase the readability of the languages, a summary should be generated. In this paper, a novel Nesterov-accelerated Adaptive Moment Estimation Optimization based on Long Short-Term Memory [NADAM-LSTM] has been proposed to summarize the text. The proposed NADAM-LSTM model involves three stages namely pre-processing, summary generation, and parameter tuning. Initially, the Giga word Corpus dataset is pre-processed using Tokenization, Word Removal, Stemming, Lemmatization, and Normalization for removing irrelevant data. In the summary generation phase, the text …is converted to the word-to-vector method. Further, the text is fed to LSTM to summarize the text. The parameter of the LSTM is then tuned using NADAM Optimization. The performance analysis of the proposed NADAM-LSTM is calculated based on parameters like accuracy, specificity, Recall, Precision, and F1 score. The suggested NADAM-LSTM achieves an accuracy range of 99.5%. The result illustrates that the proposed NADAM-LSTM enhances the overall accuracy better than 12%, 2.5%, and 1.5% in BERT, CNN-LSTM, and RNN respectively. Show more
Keywords: Text summarization, automatic text summarization, Nesterov-accelerated Adaptive Moment Estimation, Long Short-Term Memory
DOI: 10.3233/JIFS-224299
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6781-6793, 2024
Authors: Liu, Qi
Article Type: Research Article
Abstract: In the era of advanced technology, integrating and distributing data are crucial in smart grid-connected systems. However, as energy loads continue to increase, practical implementation of these systems faces challenges in resource allocation and lacks efficient data collaboration. In this study, the ant colony optimization algorithm is further investigated for stochastic crossover systems and cluster nodes in intelligent path planning management. To improve the pheromone setting method in smart grid-connected systems, we propose an adaptive intelligent ant colony optimization algorithm called the Group Allocation Optimization Algorithm (GAOA). This algorithm expands the pheromone transmission rate of network nodes, establishes a multi-constrained …adaptive model with data mining as the pheromone target, and analyzes the accuracy of resource allocation to import the optimal scheme for smart grid-connected systems. Through experimental results, we demonstrate that the optimized adaptive ant colony algorithm leads to effective improvements in grid-connected systems, pheromone evaluation, data throughput, convergence speed, and data load distribution. These findings provide evidence that the optimized ant colony algorithm is both feasible and effective for resource allocation in smart grid-connected systems. Show more
Keywords: Smart Grid-connected system, data-driven allocation, ant colony algorithm, group allocation optimization algorithm
DOI: 10.3233/JIFS-235091
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6795-6805, 2024
Authors: Pandey, Raksha | Kushwaha, Alok Kumar Singh | Kumar, Vinay
Article Type: Research Article
Abstract: Video forgery, a prevalent concern in today’s digital age, involves the deliberate manipulation of video content, often carried out using sophisticated video editing software. In response to this challenge, the need for an automated approach to detect forged video footage has become increasingly pressing. Our proposed methodology addresses this need by employing a multi-faceted strategy. It begins with the classification of video frames as either originating from genuine sources or having undergone manipulation. To assess the authenticity, the Δ r ¯ s metric is applied to evaluate the coherence of frame sequences. …Additionally, we’ve harnessed the power of machine learning, training a model on a diverse dataset, namely the VIFFD dataset. This robust machine learning approach, particularly the suggested Support Vector Machine (SVM) method, consistently achieves an impressive average accuracy of 94.4%, showcasing its potential as a dependable and effective solution for video forgery detection. In an era where the trustworthiness of video content is of paramount importance, our method emerges as a pivotal safeguard, contributing significantly to the preservation of the integrity and credibility of visual media. Show more
Keywords: Correlation coefficient, forgery detection, interframe video forgery, machine learning, video forensic
DOI: 10.3233/JIFS-235818
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6807-6820, 2024
Authors: Ma, Mengyuan | Huang, Huiling | Han, Jun | Feng, Yanbing | Yang, Yi
Article Type: Research Article
Abstract: Semantic segmentation is a pivotal task in the field of computer vision, encompassing diverse applications and undergoing continuous development. Despite the growing dominance of deep learning methods in this field, many existing network models suffer from trade-offs between accuracy and computational cost, or between speed and accuracy. In essence, semantic segmentation aims to extract semantic information from deep features and optimize them before upsampling output. However, shallow features tend to contain more detailed information but also more noise, while deep features have strong semantic information but lose some spatial information. To address this issue, we propose a novel mutual optimization …strategy based on shallow spatial information and deep semantic information, and construct a details and semantic mutual optimization network (DSMONet). This effectively reduces the noise in the shallow features and guides the deep features to reconstruct the lost spatial information, avoiding cumbersome side auxiliary or complex decoders. The Mutual Optimization Module (MOM) includes Semantic Adjustment Details Module (SADM) and Detail Guided Semantic Module (DGSM), which enables mutual optimization of shallow spatial information and deep semantic information. Comparative evaluations against other methods demonstrate that DSMONet achieves a favorable balance between accuracy and speed. On the Cityscapes dataset, DSMONet achieves performances of 79.3% mean of class-wise intersection-over-union (mIoU)/44.6 frames per second (FPS) and 78.0% mIoU/102 FPS. The code is available at https://github.com/m828/DSMONet . Show more
Keywords: Semantic segmentation, real time, deep learning, mutual optimization, accuracy
DOI: 10.3233/JIFS-235929
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6821-6834, 2024
Authors: Zhang, Zhifei | Wang, Shenmin
Article Type: Research Article
Abstract: The focus of attention has shifted to land use and land cover changes as a result of the world’s fast urbanisation, and logical planning of urban land resources depends greatly on the forecast and analysis of these changes. In order to more precisely forecast and assess patterns of land use change, the study suggests a grey Markov land pattern analysis and prediction model that incorporates social aspects. The study builds a land pattern analysis and prediction model using a major city as the research object. The outcomes demonstrated the high accuracy and reliability of the grey Markov land pattern analysis …and prediction model incorporating social factors, which can more accurately reflect and predict the land use pattern of the study area, with an average relative error of less than 0.01, an accuracy of more than 98%, and an overall fit that has increased by more than 3%. The overall pattern of change is very consistent with the reality. The model predicts that the main trend of future land use in the study area is the continued expansion of urban land such as industrial land, land for transport facilities and land for settlements, while non-construction land such as agricultural land and forest land will continue to decrease. The optimized land pattern analysis and prediction model of the study has a good application environment. Show more
Keywords: Grey system theory, land use change, prediction model, socio-economic factors
DOI: 10.3233/JIFS-235965
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6835-6850, 2024
Authors: Arivanandhan, Rajesh | Ramanathan, Kalaivani | Chellamuthu, Senthilkumar
Article Type: Research Article
Abstract: Users possess the option to rent instances of various sorts, in a variety of regions, and a variety of availability zones, thanks to cloud service carriers like AWS, GCP, and Azure. In the cloud business right now, fixed price models are king when it comes to pricing. However, as the diversity of cloud providers and users grows, this approach is unable to accurately reflect the market’s current needs for cost savings. As a consequence, a dynamic pricing strategy has become a desirable tactic to better handle the erratic cloud demand. In this study, a deep learning model was used to …propose a dynamic pricing structure that ensures service providers are treated fairly in a multi-cloud context. The computational optimization of DL approaches can be severely hampered by the requirement for human hyperparameter selection. Traditional automated solutions to this issue have inadequate durability or fail in specific circumstances. To choose the hyper-parameters in the Dueling Deep Q-Network (DDQN), the hybrid DL approach in this study uses the concept-based wild horse optimization (WHO) method. A community of untamed horses is evolved, and the fitness of the population is evaluated concurrently to estimate the optimum hyper-parameters. The plan changes the price appropriately to promote the use of underutilized resources and discourage the use of overutilized resources. The evaluation’s findings demonstrated that the suggested strategy can lower end-user costs while conducting compute- and data-intensive activities in a multi-cloud environment. The research was concluded by comparing current models after the results were analyzed using various performance indicators. Show more
Keywords: Cloud providers, dynamic pricing scheme, Deep Learning, hyper-parameter selection, Oppositional-Based Learning, Wild Horse Optimization and Dueling Deep Q-Network
DOI: 10.3233/JIFS-236043
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6851-6865, 2024
Authors: Essaki Muthu, A. | Saravanan, K.
Article Type: Research Article
Abstract: Cataract, a common eye disease, causes lens opacification, which can lead to blindness. Early cataract detection in a privacy-preserving approach has led us to investigate the concept of Federated Learning (FL) and its prominent technique, known as Federated Averaging (FedAVG). Federated learning has the potential to solve the privacy issues by allowing data servers to train their models natively and distribute them without invading patient confidentiality. This research introduces an interactive federated learning framework that permits multiple medical institutions to screen cataract from split lamp images utilising convolutional neural network (CNN) without sharing patient data, as well as grade normal, …mild, moderate, and severe cataracts. The CNN is developed based on Modified-ResNet-50 and FedAVG technique could achieve relatively high accuracy. The experimental results demonstrate that the proposed modification reduces the processing time to a greater extent. Show more
Keywords: Federated learning, confidentiality, accuracy, CNN
DOI: 10.3233/JIFS-223465
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6867-6880, 2024
Authors: Wang, Haohao | Li, Wei | Yang, Bin
Article Type: Research Article
Abstract: Rosenfeld defined a fuzzy subgroup of a given group as a fuzzy subset with two special conditions and Mustafa Demirci proposed the idea of fuzzifying the operations on a group through a fuzzy equality and a fuzzy equivalence relation. This paper mainly focuses on fuzzy subsets and vague sets of monoids with several extended algebraic properties. Firstly, we generalize some algebraic properties of t -norms to fuzzy t -norms, this allows for a broader analysis and classification of fuzzy t -norms, enabling their wider application. Furthermore, we explore specific research on the properties of vague t -norms. Finally, selected conclusions …about fuzzy t -norms are extended to bounded lattices. Show more
Keywords: t-norm, t-conorm, uninorm, nullnorm, aggregation function, fuzzy monoid, vague monoid
DOI: 10.3233/JIFS-231401
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6881-6891, 2024
Authors: Du, Wen Sheng
Article Type: Research Article
Abstract: The geometric-arithmetic mean inequality is undoubtedly the most important one in the area of information aggregation. Recently, some q -rung orthopair fuzzy aggregation operators were proposed based on the Hamacher operations. In this paper, we give a detailed theoretical and practical analysis of the developed Hamacher arithmetic and geometric operators for q -rung orthopair fuzzy values. First, we investigate the monotonicity of these Hamacher aggregation operators on q -rung orthopair fuzzy values with respect to the parameter within Hamacher operations. Then, we discuss the limiting cases of these q -rung orthopair fuzzy Hamacher aggregation operators as the parameter therein approaches …to zero or infinity and give a new characterization of the boundedness of these aggregation operators. Subsequently, we establish the geometric-arithmetic mean inequality for q -rung orthopair fuzzy information based on Hamacher operations. Finally, we present a decision making method by use of these aggregation operators and apply it to the problem of enterprise resource planning system selection. Show more
Keywords: Aggregation operator, enterprise resource planning system, geometric-arithmetic mean inequality, Hamacher operation, q-rung orthopair fuzzy value
DOI: 10.3233/JIFS-231452
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6893-6910, 2024
Authors: Xu, Xiaohui
Article Type: Research Article
Abstract: In the new normal period, the trend changes and adjustments of the environment such as international trade, production capacity, labor supply and resource constraints have put forward new requirements for China’s industrial development, which have brought new challenges and given new opportunities. In the new normal stage where economic growth continues to decline, industrial growth is still an important support for economic growth. The advancement of industrial technology is the main driving force for improving the total factor productivity of the industrial industry. Therefore, the most important thing to promote industrial growth is to upgrade the level of industrial technology. …In response to the above-mentioned problems, this paper analyzed the relationship between industrial technology and industrial output in the new normal environment by using the BP neural network (BPNN) algorithm. The connection between the two has been found, which provided a clear direction for the functional adjustment of economic law. Experimental studies have shown that there is a positive relationship between industrial technological progress and industrial output. When other conditions are the same, and when the non-new normal is selected, industrial output increases by about 0.36% for every 1% increase in industrial technological progress. When choosing to be in the new normal, industrial technological progress has a higher impact on industrial output. For every 1% increase in technological progress, industrial output increases by about 0.39%. Show more
Keywords: Sustainable development, new industrial normal, economic law, functional adjustment, artificial neural network
DOI: 10.3233/JIFS-233251
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6911-6924, 2024
Authors: Wang, Fei
Article Type: Research Article
Abstract: Recently, there has been a lot of interest in using the wearable sensors for tracking the exercise progress because of the unbiased accuracy and precision they are provided throughout the continual monitoring. For those with physical impairments, the system’s non-intrusive, lightweight ways of the monitoring activity may ease their load and enhance the quality of their decision-making. As a different measuring unit measures the exercise activity levels recorded by the each wearable sensor, it is challenging to assess the monitoring system. Hence, this paper proposes a Hybridized Fuzzy Multi-Attribute for Exercise Monitoring System (HFMA-EMS) to address the uncertainty issues of …the wearable sensors. The Triangular Fuzzy membership function is proposed to begin classifying the observed values. Pair-wise attribute comparison and evaluator weighting in a T-spherical uncertain linguistic set setting utilizing the Techniques for Ordering of Preferences by Similarities to Ideal Solutions (TOPSIS). In the suggested method, a utility function is used to assess the merits of a model in which attribute the weights are calculated, followed by an exercise in which the attributes are ordered employing the Measurements of the Alternative and Ranking Compromise Solutions model (MARCOS). The performance is performed to analyze the proposed method’s accuracy, precision, recall, f1-score, and correct and incorrect exercise assessment by an accelerometer, gyroscope, and magnetic field sensor unit. The application scenario of the HFMA-EMS can be used in the clinical applications, healthcare management, and sports injury detection. Show more
Keywords: Exercise monitoring system, wearable sensors, disabled individuals, TOPSIS, MARCOS, fuzzy multi-attribute model
DOI: 10.3233/JIFS-235112
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6925-6938, 2024
Authors: Zhou, Yuzhong | Lin, Zhengping | Wu, Zhengrong | Zhang, Zifeng
Article Type: Research Article
Abstract: Due to the complexity of the calculation process of the existing methods, the efficiency of data fusion of the power grid model is low. In order to improve the knowledge fusion effect of power grid model, this paper studied the knowledge fusion method of power grid model based on Seq2seq half pointer and half label method. The Text Rank algorithm is used to calculate the weight of semantic nodes of each grid model, and combined with the topological potential method, the semantic information of the grid model is extracted according to the final weight value, and the Seq2Seq semi-pointer semi-label …model framework is constructed. The data of the scheduling automation system OMS and the production management system PMS are used as input. The extracted candidate mesh model semantics and the original mesh model semantics are encoded by Seq2Seq half-pointer half-label model. The semantic data of the power grid model is fused and sent to the Seq2Seq encoder. After the training is completed, the effective information is extracted from the power grid model through the Seq2Seq model to complete the knowledge fusion of the power grid model. Experimental results show that this method eliminates the redundant part of the basic attributes of each data source in the substation grid model after knowledge fusion, and the description of each basic attribute is more standardized, unified and perfect. Under different mesh model data dimensions, the support of the proposed method is all above 98%. The model trained by the proposed method tends to be stable after 120 iterations, and the precision, recall and F1 of the test set are 0.98, 0.93 and 0.91, respectively. At the same time, this method has high efficiency in the knowledge fusion processing of the power grid model, and its data processing speed is less than 160 s. The average integrity of the private data of the power grid model is 98.86%, indicating that the proposed method can better ensure the integrity of the data. Finally, compared with the application of other methods under different data amounts, the mean square error obtained by the proposed method is the smallest, indicating that the proposed method effectively improves the fusion accuracy. Show more
Keywords: Grid model, knowledge fusion method, half label method, LSTM neural network, Seq2seq half pointer, TPC TextRank algorithm
DOI: 10.3233/JIFS-236465
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6939-6950, 2024
Authors: Xiao, Yuteng | Liu, Zhaoyang | Yin, Hongsheng | Wang, Xingang | Zhang, Yudong
Article Type: Research Article
Abstract: Multivariate Time Series (MTS) forecasting has gained significant importance in diverse domains. Although Recurrent Neural Network (RNN)-based approaches have made notable advancements in MTS forecasting, they do not effectively tackle the challenges posed by noise and unordered data. Drawing inspiration from advancing the Transformer model, we introduce a transformer-based method called STFormer to address this predicament. The STFormer utilizes a two-stage Transformer to capture spatio-temporal relationships and tackle the issue of noise. Furthermore, the MTS incorporates adaptive spatio-temporal graph structures to tackle the issue of unordered data specifically. The Transformer incorporates graph embedding to combine spatial position information with long-term …temporal connections. Experimental results based on typical finance and environment datasets demonstrate that STFormer surpasses alternative baseline forecasting models and achieves state-of-the-art results for single-step horizon and multistep horizon forecasting. Show more
Keywords: Multivariate time series forecasting, Spatio-temporal structure, transformer, graph embedding, recurrent neural network
DOI: 10.3233/JIFS-237250
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6951-6967, 2024
Authors: Behera, Santi Kumari | Rao, Mannava Srinivasa | Amat, Rajat | Sethy, Prabira Kumar
Article Type: Research Article
Abstract: Mineral classification is a crucial task for geologists. Minerals are identified by their characteristics. In the field, geologists can identify minerals by examining lustre, color, streak, hardness, crystal habit, cleavage, fracture, and specific features. Geologists sometimes use a magnifying hand lens to identify minerals in the field. Surface color can assist in identifying minerals. However, it varies widely, even within a single mineral family. Some minerals predominantly show a single color. So, identifying minerals is possible considering surface color and texture. But, again, a limited database of minerals is available with large-scale images. So, the challenges arise to identify the …minerals using their images with limited images. With the advancement of machine learning, the deep learning approach with bi-layer feature fusion enhances the dimension of the feature vector with the possibility of high accuracy. Here, an experimental analysis is reported with three possibilities of bi-layer feature fusion of three CNN models like Alexnet, VGG16 & VGG19, and a framework is suggested. Alexnet delivers the highest performance with the bi-layer fusion of fc6 and fc7. The achieved accuracy is 84.23%, sensitivity 84.23%, specificity 97.37%, precision 84.7%, FPR 2.63%, F1 Score 84.17%, MCC 81.75%, and Kappa 53.59%. Show more
Keywords: Mineral identification, deep learning, bi-layer feature fusion, deep feature
DOI: 10.3233/JIFS-221987
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6969-6976, 2024
Authors: Danielraj, A. | Venugopal, P. | Padmapriya, N.
Article Type: Research Article
Abstract: Graph Neural Networks (GNNs) have gained popularity across various research fields in recent years. GNNs utilize graphs to construct an embedding that includes details about the nodes and edges in a graph’s neighborhood. In this work, a set of Region Adjacency Graphs (RAG) derives the attribute values from Static Signature (SS) images. These attribute values are used to label the nodes of the complete graph, which is formed by considering each signature as a node taken from the sample of signatures of a specific signer. The complete graph is trained by using GraphSAGE, an inductive representation learning method. This trained …model helps to determine any newly introduced node (static signature to be tested) as genuine or fake. Standard static signature datasets, notably GPDSsynthetic and MCYT-75 are used to test the prevailing model. Experimental results on genuine and counterfeit signature networks demonstrate that our computed model enables a high rate of accuracy (GPDSsynthetic 99.91% and MCYT-75 99.56%) and minimum range of loss (GPDSsynthetic 0.0061 and MCYT-75 0.0070) on node classification. Show more
Keywords: Signature verification, GNN, region adjacency graph, complete graph, GraphSAGE Node classifications
DOI: 10.3233/JIFS-231369
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6977-6994, 2024
Authors: Li, Jing | Hu, Yifan | Fan, Jiulun | Yu, Haiyan | Jia, Bin | Liu, Rui | Zhao, Feng
Article Type: Research Article
Abstract: The Fuzzy C-means (FCM) algorithm is one of the most widely used algorithms in unsupervised pattern recognition. As the intensity of observation noise increases, FCM tends to produce large center deviations and even overlap clustering problems. The relative entropy fuzzy C-means algorithm (REFCM) adds relative entropy as a regularization function to the fuzzy C-means algorithm, which has a good ability for noise detection and membership assignment to observed values. However, REFCM still tends to generate overlapping clusters as the size of the cluster increases and becomes imbalanced. Moreover, the convergence speed of this algorithm is slow. To solve this problem, …modified suppressed relative entropy fuzzy c-means clustering (MSREFCM) is proposed. Specifically, the MSREFCM algorithm improves the convergence speed of the algorithm while maintaining the accuracy and anti-noise capability of the REFCM algorithm by adding a suppression strategy based on the intra-class average distance measurement. In addition, to further improve the clustering performance of MSREFCM for multidimensional imbalanced data, the center overlapping problem and the center offset problem of elliptical data are solved by replacing the Euclidean distance in REFCM with the Mahalanobis distance. Experiments on several synthetic and UCI datasets indicate that MSREFCM can improve the convergence speed and classification performance of the REFCM for spherical and ellipsoidal datasets with imbalanced sizes. In particular, for the Statlog dataset, the running time of MSREFCM is nearly one second less than that of REFCM, and the accuracy of MSREFCM is 0.034 higher than that of REFCM. Show more
Keywords: Fuzzy c-means clustering, relative entropy fuzzy c-means clustering, modified suppressed relative entropy fuzzy c-means, Mahalanobis distance
DOI: 10.3233/JIFS-231515
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 6995-7019, 2024
Authors: Liu, Ziwei | Xu, Ziyu | Zheng, Xiyu | Zhao, Yongxing | Wang, Jinghua
Article Type: Research Article
Abstract: Ground mobile robots can replace human beings to perform special tasks in threatened areas. Path planning technology provides mobile robots with the ability to reach the target position autonomously. When there are threats in the environment, the ground mobile robot needs to be able to reach the target position quickly and safely. Because threats are often difficult to calculate in such environments, and planned paths are difficult to use for path tracing. Therefore, path planning should comprehensively consider the distance, continuity and possible threats when moving. Aiming at the problem that the threat in the environment cannot be accurately calibrated …usually, this paper proposes a method to mark the threat degree on the global elevation map by using the fuzzy logic system. In order to verify the feasibility of the algorithm, the improved algorithm with the classical algorithm in different environments and the current similar algorithm are compared with the current simulation experiment. The simulation results show that the algorithm has achieved good results, which proves the superiority of the algorithm. The path planning results of the algorithm in the threatened 3D environment not only have less threat, but also have better adaptability to the natural environment, and the planning path quality is better than that of the same type of algorithm. Show more
Keywords: Mobile robot, fuzzy logic system, threat assessment, Hybrid-A*, path planning
DOI: 10.3233/JIFS-232076
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 7021-7034, 2024
Authors: Behera, Santi Kumari | Anitha, Komma | Amat, Rajat | Sethy, Prabira Kumar
Article Type: Research Article
Abstract: Recognizing and classifying citrus fruits is a challenging yet crucial task for agriculture, food processing, and quality control. Classifying citrus fruits is challenging because of their wide variety, often with a similar flesh appearance, shape, and size. Therefore, efficient and effective approaches are required for accurate identification. Our study focused on efficiently identifying citrus fruit types by utilizing a hybrid ResNet101-SVM model. ResNet101-SVM is the combination of the feature extraction capabilities of the ResNet101 with the classification power of SVM. This hybrid approach leverages the strengths of both deep learning (feature extraction) and traditional machine learning (SVM classification) to improve …the accuracy and robustness of citrus fruit classification. The model outperformed the standard ResNet101 model across various performance metrics, achieving impressive accuracy, sensitivity, specificity, precision, F1 Score, MCC, and Kappa values of 99.81%, 99.81%, 99.8%, 99.82%, 0.18%, 99.81%, 99.80%, and 98.77%, respectively. This study holds significant promise for various applications, particularly in the domains of food processing and quality control. Show more
Keywords: Citrus fruits, classification, support vector machine, convolutional neural network, feature extraction
DOI: 10.3233/JIFS-233910
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 7035-7045, 2024
Authors: Suganthi, J. Roselin | Rajeswari, K.
Article Type: Research Article
Abstract: Communication is an essential component of human nature. It connects humans, allowing them to learn, grow, col-laborate, and resolve conflicts. Several aspects of human society, relationships, and growth would be significantly hampered in the absence of efficient communication. Hand gesture recognition is a way to interact with technology that can be particularly useful for individuals with disabilities. This hand gesture recognition is mainly employed in sign language translation, healthcare, rehabilitation, prosthesis, and Human-Computer Interaction (HCI). The high degree of dexterity is a main challenge for prosthetic limbs. In order to meet this challenge, hand gesture recognition is employed for the …prosthetic limb, which can be used for rehabilitation. The objective of this article is to show the methodology for the recognition of hand gestures using Electromyography (EMG) signals. This article uses the pro-posed time domain feature extraction method called Absolute Fluctuation Analysis (AFA) along with the Root Mean Square (RMS) for the feature extraction method. Along with these feature extraction methods, repeated stratified K-fold cross validation is used for the validation of the classifiers such as the XGB classifier, the K-Nearest Neighbour (KNN) classifier, the Decision Tree classifier, the Random Forest classifier, and the SVM classifier, whose mean recognition accuracy is given by 93.26%, 87.42%, 85.26%, 92.23%, and 91.78%, respectively. The recognition accuracy of machine learning classifiers is being compared with state-of-the-art networks such as artificial neural net-works (ANN), long short-term memory (LSTM), bidirectional LSTM, gated recurrent units (GRU), and convolution-al neural networks (CNN), which provide recognition accuracy of 96.65%, 99.16%, 99.94%, and 99.99%, respectively. Show more
Keywords: Human computer interaction(HCI), Absolute fluctuation analysis, LSTM, GRU, CNN
DOI: 10.3233/JIFS-234196
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 7047-7059, 2024
Authors: Lian, Jing | Chen, Shi | Li, Linhui | Sui, Duo | Ren, Weiwei
Article Type: Research Article
Abstract: Intelligent vehicles require accurate identification of traversable road areas and the ability to provide precise and real-time localization data in unstructured road environments. To address these issues, we propose a system for traversable map construction and robust localization in unstructured road environments based on a priori knowledge. The proposed method performs traversable area segmentation on the LiDAR point cloud and employs a submap strategy to jointly optimize multiple frames of data to obtain a reliable and accurate point cloud map of the traversable area, which is then rasterized and combined with the vehicle kinematic model for global path planning. Then, …it integrates priori map information and real-time sensor information to provide confidence and priori constraints to ensure the robustness of localization, and it fuses multi-sensor heterogeneous data to improve real-time localization. Experiments are conducted in a mining environment to evaluate the performance of the proposed method on an unstructured road. The experimental results demonstrate that the traversable map and localization results based on the proposed method can meet the requirements for autonomous vehicle driving on unstructured roads and provide reliable priori foundation and localization information for autonomous vehicle navigation. Show more
Keywords: Autonomous vehicles, traversability analysis, map construction, robust localization
DOI: 10.3233/JIFS-235063
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 7061-7075, 2024
Authors: Srinivasa Rao Illapu, Sankara | Mula, Aswini | Malarowthu, Padmaja
Article Type: Research Article
Abstract: Wireless Body Area Network (WBAN) is an interconnection of tiny biosensors that are organized in/on several parts of the body. The developed WBAN is used to sense and transmit health-related data over the wireless medium. Energy efficiency is the primary challenges for increasing the life expectancy of the network. To address the issue of energy efficiency, one of the essential approaches i.e., the selection of an appropriate relay node is modelled as an optimization problem. In this paper, energy efficient routing optimization using Multiobjective-Energy Centric Honey Badger Optimization (M-ECHBA) is proposed to improve life expectancy. The proposed M-ECHBA is optimized …by using the energy, distance, delay and node degree. Moreover, the Time Division Multiple Access (TDMA) is used to perform the node scheduling at transmission. Therefore, the M-ECHBA method is used to discover the optimal routing path for enhancing energy efficiency while minimizing the transmission delay of WBAN. The performances of the M-ECHBA are analyzed using life expectancy, dead nodes, residual energy, delay, packets received by the Base Station (BS), Packet Loss Ratio (PLR) and routing overhead. The M-ECHBA is evaluated with some classical approaches namely SIMPLE, ATTEMPT and RE-ATTEMPT. Further, this M-ECHBA is compared with the existing routing approach Novel Energy Efficient hybrid Meta-heuristic Approach (NEEMA), hybrid Particle Swarm Optimization-Simulated Annealing (hPSO-SA), Energy Balanced Routing (EBR), Threshold-based Energy-Efficient Routing Protocol for physiological Critical Data Transmission (T-EERPDCT), Clustering and Cooperative Routing Protocol (CCRP), Intelligent-Routing Algorithm for WBANs namely I-RAW, distributed energy-efficient two-hop-based clustering and routing namely DECR and Modified Power Line System (M-POLC). The dead nodes of M-ECHBA for scenario 3 at 8000 rounds are 4 which is less when compared to the dead nodes of EBR. Show more
Keywords: Energy efficiency, life expectancy, multiobjective-energy centric honey badger optimization, time division multiple access, wireless body area network
DOI: 10.3233/JIFS-235387
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 7077-7091, 2024
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl