Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2023: 2
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Wang, Qi | Lu, TongWei
Article Type: Research Article
Abstract: Recently, with the emergence of many image editing tools (photoshop, Topaz studio, etc.), the authenticity of images has been severely challenged. However, the performance of some existing traditional feature extraction methods and detection methods based on convolutional neural network (CNN) is poor, and the information provided by the features extracted from the network is limited and single. In this paper, an end-to-end ringed residual U-Net is proposed to detect image splicing forgery by blending features of non-natural regions. Some regions with significant differences from the image background are defined as non-natural regions(such as the irregular border at the splicing of …images). In this paper, a feature enhancement module for non-natural regions is constructed, which the image through the pooling of four different scales, and these features are then combined with the original image and input to the backbone network for processing, aiming to highlight regions of the image that differ significantly from the background. Therefore, after adding the feature enhancement module for non-natural regions to the end-to-end ring residual U-Net, more attention will be paid to the tampering regions in the feature extraction stage, image manipulation detection and localization will also become more accurate. Compared with some mainstream methods, this method achieves better performance on the three standard datasets(CASIA2.0, NIST2016, COLUMBIA). In addition, it has excellent robustness under JPEG compression attack and noise corruption attack. Show more
Keywords: Convolutional neural network, image splicing forgery detection, non-natural regions
DOI: 10.3233/JIFS-232025
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7447-7459, 2024
Authors: Xu, Zhedong | Su, Yongbo | Guo, Fei
Article Type: Research Article
Abstract: In the process of digital transformation and development in various industries, there are more and more large-scale optimization problems. Currently, swarm intelligence optimization algorithms are the best method to solve such problems. However, previous experimental research has found that there is still room for improvement in the performance of using existing swarm intelligence optimization algorithms to solve such problems. To obtain the high-precision optimal value of whale optimization algorithm (WOA) for solving large-scale optimization problems, the optimization problem knowledge model is studied to guide the iterative process of WOA algorithm, and a novel whale optimization algorithm based on knowledge model …guidance (KMGWOA) is proposed. First, a population update strategy based on multiple elite individuals is proposed to reduce the impact of the local optimal values, and the knowledge model to guide population update is constructed by combining the proposed population update strategy with the population update strategy based on global optimal individual. Second, a collaborative reverse learning knowledge model with multiple elite and poor individuals in the solution space is proposed to prevent long-term non-ideal region search. The above two knowledge models guide the iterative process of WOA algorithm in solving large-scale optimization problems. The performance of the KMGWOA algorithm guided by the proposed knowledge models is tested through the well-known classical test functions. The results demonstrate that the proposed KMGWOA algorithm not only has good search ability for the theoretical optimal value, but also achieves higher accuracy in obtaining the optimal value when it is difficult to obtain the theoretical optimal value. Moreover, KMGWOA algorithm has fast convergence speed and high effective iteration percentage. Show more
Keywords: Knowledge model, whale optimization algorithm, large-scale problem, population update strategy, collaborative reverse learning
DOI: 10.3233/JIFS-236930
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7461-7478, 2024
Authors: Sangeetha, M. | Nimala, K.
Article Type: Research Article
Abstract: NLP, or natural language processing, is a subfield of AI that aims to equip computers with the ability to understand and analyze human language. Sentiment analysis is a widely used application of NLP, particularly for examining attitudes expressed in online conversations. Nevertheless, many social media comments are written in languages that are not native to the authors, making sentiment analysis more difficult, especially for languages with limited resources, such as Tamil. To tackle this issue, a code-mixed and sentiment-annotated corpus in Tamil and English was created. This article will explain how the corpus was established, including the process of data …collection and the assignment of polarities. The article will also explore the agreement between annotators and the results of sentiment analysis performed on the corpus. This work signifies various performance metrics such as precision, recall, support, and F1-score for the transformer-based model such as BERT, RoBerta, and XLM-RoBerta. Among the various models, XLM-Robert shows slightly significant positive results on the code-mixed corpus when compared to the state of art models. Show more
Keywords: Sentiment analysis, Tamil-English Code-mix, natural language processing, corpus, grammar rule
DOI: 10.3233/JIFS-236971
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7479-7493, 2024
Authors: Zhou, Mi | Xiong, Xue-Di | Pei, Feng
Article Type: Research Article
Abstract: Marine high-end equipment reflects a country’s comprehensive national strength. The safety assessment of it is very important to avoid accident either from human or facility factors. Attribute structure and assessment approach are two key points in the safety assessment of marine high-end equipment. In this paper, we construct a hierarchical attribute structure based on literature review and text mining of reports and news. The hierarchical attribute structure includes human, equipment, environment and management level. The correlations among these attributes are analyzed. The assessment standards of attributes are described in details. Different evaluation grades associated with attributes are transformed to a …unified one by the given rules. As for the assessment approach, the evidential reasoning approach is applied for uncertain information fusion. Group analytical hierarchical process is used to generate attribute weights from a group of experts, where process aggregation method and result aggregation method are combined in a comprehensive way. The importance of expert is computed by the uncertainty measure of expert’s subjective judgment. A drilling platform is finally assessed by the proposed attribute structure and assessment approach to illustrate the effectiveness of the assessment framework. Show more
Keywords: Safety assessment, marine high-end equipment, evidential reasoning, uncertainty, group analytical hierarchical process
DOI: 10.3233/JIFS-237750
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7495-7520, 2024
Article Type: Research Article
Abstract: Compared with large enterprises, the development scale and organizational structure of small and medium-sized enterprises are insufficient, which brings certain limitations to the development of small and medium-sized enterprises in China. In order to promote the long-term development of small and medium-sized enterprises in the new era, it is necessary to require enterprise leaders to innovate marketing plans, strengthen risk management of enterprises, and enhance their strength in market competition. The market risk evaluation of small and medium sized enterprises (SMSEs) in the new era is a multiple-attribute decision-making (MADM). The IVIFSs are employed as the tool for portraying uncertain …information during the market risk evaluation of SMSEs in the new era. In this paper, the interval-valued intuitionistic fuzzy (IVIF) Hamacher interactive power geometric (IVIFHIPG) technique is addressed based on IVIF Hamacher interactive weighted geometric (IVIFHIWG) technique and power geometric (PG) technique. Some properties of IVIFHIPG technique were addressed. Then, the IVIFHIPG technique is employed to manage MADM under IVIFSs. Finally, an example for market risk evaluation of SMSEs in the new era is employed to verify the IVIFHIPG technique. Thus, the main contributions of this paper are addressed: (1) the IVIFHIPG technique is addressed based on IVIFHIWG technique and PG technique; (2) the IVIFHIPG technique is came up with to manage the MADM under IVIFSs; (3) a numerical example for market risk evaluation of SMSEs in the new era has been came up with to show the IVIFHIPG technique; and (4) some comparative analysis is addressed to verify the I IVIFHIPG technique. Show more
Keywords: Multiple-attribute decision-making (MADM), IVIF sets (IVIFSs), IVIFHIPG technique, market risk evaluation
DOI: 10.3233/JIFS-238763
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7521-7537, 2024
Authors: Mathavan, N. | Ramesh, G.
Article Type: Research Article
Abstract: A groundbreaking study employs interval arithmetic to address the challenging multi-objective interval traveling salesperson problem. Customizing methods like a nearest neighbor, branch and bound, two-way heuristics, and dynamic programming effectively resolve this complex problem. Preserving interval values without the need for classical form conversion is a significant advantage. Researchers validated this approach through extensive experiments, consistently demonstrating superior outcomes compared to existing methods. These algorithmic approaches were optimized for Python 3.11 64-bit to enhance processing speed and efficiency.
Keywords: Multi-objective interval traveling salesperson problem, new interval arithmetic, weighted sum method, Python program
DOI: 10.3233/JIFS-235966
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7539-7553, 2024
Authors: Wang, Yuansen | Lv, Guibin | He, Jialin | Cheng, Feng | Li, Dongke
Article Type: Research Article
Abstract: To comprehensively and objectively evaluate the actual safety condition in road and bridge engineering construction, the road and bridge engineering construction safety risk evaluation index system is constructed combined with the factors induced by emergencies in the road and bridge engineering construction process. Aiming at the dynamic uncertainty of road and bridge construction safety risk, using Fuzzy Set Theory and an improved similar aggregation method to determine the prior probabilities and conditional probabilities of network nodes, and then selecting the transition probabilities of nodes through expert opinions and incident reports, leading to the development of a dynamic evaluation model for …safety risks in road and bridge engineering construction based on Fuzzy Dynamic Bayesian Network, this model can make the construction safety risk prediction result accurately. Taking the Hebi City Provincial Highway 304 reconstruction project as an example for analysis, the results indicate that the model can accurately predict the probability of changes in safety risks in road and bridge engineering construction. Additionally, it can identify critical risk factors and provide crucial supporting information for decision-makers to optimize risk management strategies. Show more
Keywords: Road and bridge engineering, similar aggregation method, Dynamic Bayesian Network, risk analysis
DOI: 10.3233/JIFS-236301
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7555-7566, 2024
Authors: Gao, Zhihui | Han, Meng | Liu, Shujuan | Li, Ang | Mu, Dongliang
Article Type: Research Article
Abstract: The commonly used high utility itemsets mining method for massive data is the intelligent optimization algorithm. In this paper, the WHO (Whale-Hawk Optimization) algorithm is proposed by integrating the harris hawk optimization (HHO) algorithm with the beluga whale optimization (BWO) algorithm. Additionally, a whale initialization strategy based on good point set is proposed. This strategy helps to guide the search in the initial phase and increase the diversity of the population, which in turn improve the convergence speed and algorithm performance. By applying this improved algorithm to the field of high utility itemsets mining, it provides new solutions to optimization …problems and data mining problems. To evaluate the performance of the proposed WHO, a large number of experiments are conducted on six datasets, chess, connect, mushroom, accidents, foodmart, and retail, in terms of convergence, recall rates, and runtime. The experimental results show that the convergence of the proposed WHO is optimal in five datasets and has the shortest runtime in all datasets. Compared to PSO, AF, BA, and GA, the average recall rate in the six datasets increased by 32.13%, 49.95%, 12.15%, and 16.24%, respectively. Show more
Keywords: Beluga whale optimization algorithm, harris hawk optimization algorithm, high utility itemsets mining, good point set, intelligent optimization algorithm
DOI: 10.3233/JIFS-236793
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7567-7602, 2024
Authors: Wu, Yanqiu | Liu, Min | Sun, Dehong
Article Type: Research Article
Abstract: Person re-identification relies on discriminative features. However, most researches focus on extracting features from the high-layer of network while ignoring the middle-layer features, some important details are overlooked frequently. To address this issue, we propose a Multi-Scale and Multi-Patch Feature Fusion Network(MSPF). We employ modified OSFA to extract, align, and fuse the feature maps in the middle-layer of network, which can compensate for the lack of detailed information in the high-level network features. To obtain richer detailed global features of pedestrian, we construct a multi-patch feature fusion module(MPF). We concatenate the global features extracted from modified OSFA and MPF to …obtain global features with richer detailed representations. Cross-entropy loss, triplet loss and center loss are combined to constrain our model. We evaluate the performance of our model on Market-1501, CUHK03_labeled and DukeMTMC. The results prove that our method is superior to the state-of-the-art approaches. Show more
Keywords: Person re-identification, multi-scale, multi-patch, feature fusion
DOI: 10.3233/JIFS-237113
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7603-7612, 2024
Authors: Ketepalli, Gayatri | Bulla, Premamayudu
Article Type: Research Article
Abstract: In intrusion detection, the curse of dimensionality and the trade-off between maintaining a low false alarm rate and achieving a high detection rate are significant challenges. This research suggests a unique strategy based on dimensionality reduction methods to improve the performance of network intrusion detection systems (NIDS). Compressing high-dimensional network traffic data using a Long Short-Term Memory Autoencoder (LSTMAE) allows the reduced characteristics to be submitted to a classifier to identify anomalies that may indicate an attack. Using standard datasets, including Network Security Laboratory - Knowledge Discovery in Datasets (NSL-KDD), UNSW-NB15, and Canadian Institute for Cyber Security - Intrusion Detection …Systems (CICIDS2017), the proposed model is tested with classifiers like Random Forest (RF) and LightGBM (Light Gradient Boosting Machines). It is hoped that by adopting this method, NIDS response times may be improved while costs associated with storing and processing data are minimized. Precision, recall, F-score, accuracy, detection rate (DR), and false alarm rate (FAR) are only a few of the performance measures used to assess the quality of the suggested models. The experimental findings show that the proposed LSTMAE model reduces prediction errors more effectively than classic machine learning techniques such as Random Forest (RF), Gradient Boosting (GB), Support Vector Machines (SVM), Deep Belief Networks (DBN), Deep Neural Networks (DNN), Autoencoder (AE), and Long Short-Term Memory (LSTM). The results also show that the proposed solution outperforms the state-of-the-art methods of detection accuracy and computing complexity using accuracy, precision, recall, F1_Score, detection rate, and FAR. Show more
Keywords: Network intrusion detection system, dimensionality reduction, LSTMAE, RF classifier, NSL-KDD, CICIDS2017, UNSW-NB15
DOI: 10.3233/JIFS-232228
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7613-7626, 2024
Authors: Yadav, Ravindra Kumar | Bhadoria, Vikas Singh | Hrisheekesha, P.N.
Article Type: Research Article
Abstract: The increasing demand for electrical energy is a result of advancing technologies and changing lifestyles worldwide. Meeting this escalating energy need poses a substantial challenge, especially the difficulty in constructing new conventional power plants due to limited fossil fuel resources. To address this, demand-side management (DSM) in smart grid (SG), integrated with solar photovoltaic energy (SPE) have emerged as a crucial tool for effectively managing electricity demand, ensuring flexibility and reliability. DSM achieves optimal electricity utilization by rescheduling the operation schedules of consumer appliances and carefully adjusting their demand profiles. Integrating DSM into a smart grid framework is highly advantageous …for the power industry’s pursuit of sustainable energy goals. While various heuristic-based optimization techniques have been employed for DSM, the focus on SPE has been limited to small-scale residential loads. This study utilizes the Ant Colony Optimization (ACO) algorithm to tackle a day ahead DSM minimization problem, considering SPE in areas with large number of appliances. The DSM minimization problem falls into the category of discrete combinatorial problems, making it well-suited for ACO optimization. The self-healing, self-protection, and self-organizing attributes of ACO make it particularly effective for DSM solutions. Residential, commercial, and industrial loads, with and without SPE integration, are considered to demonstrate the efficacy of the proposed ACO algorithm. Simulation results are compared with other studies in the literature, including Evolutionary Algorithm (EA), Moth Flame Optimization (MFO), and Bacterial Foraging Optimization (BFO), in terms of reducing consumer’s cost of energy (CCE) and utility peak load (UPL). The findings indicate that the proposed ACO algorithm outperforms the other algorithms considered in the current context. Show more
Keywords: Demand side management, ant colony optimization, solar photovoltaic energy, utility peak load, consumer’s cost of energy
DOI: 10.3233/JIFS-234281
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7627-7642, 2024
Authors: Wang, Caichuan | Li, Jiajun
Article Type: Research Article
Abstract: With the continuous changes and development of financial markets, it has brought many difficulties to investment decision-making. For the multi-objective investment decision-making problem, the improved Ant colony optimization algorithms was used to improve the effectiveness and efficiency of the multi-objective investment decision-making. Therefore, based on intelligent Fuzzy clustering algorithm and Ant colony optimization algorithms, this paper studied a new multi-objective investment decision model, and proved the advantages of this method through comparative analysis of experiments. The experimental results showed that the improved Ant colony optimization algorithms has significantly reduced the system’s construction costs, operating costs and financial costs, all of …which were controlled below 41%. Compared with the traditional Ant colony optimization algorithms, this method had lower values in policy risk, technical risk and market risk, and can effectively control risks. Meanwhile, the environmental, economic, and social benefits of this method were all above 58%, and the average absolute return rate and success rate in this experiment were 21.5450% and 69.4083%, respectively. Therefore, from the above point of view, the multi-objective investment decision model based on intelligent Fuzzy clustering algorithm and the improved Ant colony optimization algorithms can effectively help decision-makers to find the best investment decision-making scheme, and can improve the accuracy and stability of decision-making. This research can provide reference significance for other matters in the field of investment decision-making. Show more
Keywords: Multi-objective investment, investment decision model, improved ant colony algorithm, intelligent fuzzy clustering algorithm, traditional ant colony algorithm
DOI: 10.3233/JIFS-234704
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7643-7657, 2024
Authors: Li, Zhongliang | Tu, Xuezhen | Gao, Hong | Huang, Shiyue | Ma, Zongmin
Article Type: Research Article
Abstract: With the development of artificial intelligence, deep-learning-based log anomaly detection proves to be an important research topic. In this paper, we propose LogCSS, a novel log anomaly detection framework based on the Context-Semantics-Statistics Convolutional Neural Network (CSSCNN). It is the first model that uses BERT (Bidirectional Encoder Representation from Transformers) and CNN (Convolutional Neural Network) to extract the semantic, temporal, and correlational features of the logs. We combine the features with the statistic information of log templates for the classification model to improve the accuracy. We also propose a technique, DOOT (Deals with the Out-Of-Templates), for online template matching. The …experimental research shows that our framework improves the average F1 score of the six best algorithms in the industry by more than 5% on the open-source dataset HDFS, and improves the average F1 score of the six best algorithms in the industry by more than 8% on the BGL dataset, LogCSS also performs better than other similar methods on our own constructed dataset. Show more
Keywords: Anomaly detection, convolutional neural network, intelligent operation and maintenance, data mining
DOI: 10.3233/JIFS-235801
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7659-7676, 2024
Authors: Byeon, Haewon | Tammina, Manoj Ram | Soni, Mukesh | Kuzieva, Nargiza | Jindal, Latika | Keshta, Ismail | Kulkarni, Mrunalini Harish
Article Type: Research Article
Abstract: Online health consultations are becoming more popular as a result of technological improvements. Patients routinely look for information about medical disorders online, which could jeopardize the privacy of medical records and increase the workload of healthcare professionals. Nonetheless, academics continue to be extremely concerned about issues related to the quality characteristics that relate to the current architectural models, such as energy consumption, latency, resource utilization, scalability, and packet loss. This method, however, also results in a significant strain being placed on medical experts who must sort through vast amounts of medical records to extract certain information. This paper presents a …novel ciphertext policy attribute-based encryption method coupled with fuzzy logic to overcome these issues. This solution uses a hybrid structure of IPFS and blockchain to store data and enables complex bidirectional access control. Before being added to IPFS, medical records are encrypted. To ensure data integrity, related IPFS hash indexes are then added to the blockchain. Utilizing attribute-based technology, users’ data is encrypted to give them fine-grained bidirectional access control. A thorough security analysis proves the system’s resilience, especially when faced with chosen plaintext assaults inside the random oracle model. Tests for this study were conducted using 10–50 attribute sets. This paper’s technique solely makes use of a hash operation. All things considered; the study demonstrates that the proposed design is more efficient than earlier schemes. Thus, from the comparison study above, it can be concluded that the system presented in this work is more efficient. Results from simulations provide additional support for the suggested methodology by highlighting the improved computing efficiency of users as compared to baseline conventional systems. This study demonstrates how technological advancement and healthcare requirements can coexist harmoniously, paving the way for secure and effective online medical consultations that are powered by fuzzy logic. Show more
Keywords: Fuzzy logic, data analysis, online health consultation, advanced encryption system
DOI: 10.3233/JIFS-235893
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7677-7695, 2024
Authors: Luan, Fei | Tang, Biao | Li, Ye | Liu, Shi Qiang | Yang, Xueqin | Masoud, Mahmoud | Feng, Baoyu
Article Type: Research Article
Abstract: As environmental contamination becomes more and more severe, enterprises need to consider optimizing environmental criteria while optimizing production criteria. In this study, a multi-objective green flexible job shop scheduling problem (MO_GFJSP) is established with two objective functions: the makespan and the carbon emission. To effectively solve the MO_GFJSP, an improved chimp optimization algorithm (IChOA) is designed. The proposed IChOA has four main innovative aspects: 1) the fast non-dominated sorting (FDS) method is introduced to compare the individuals with multiple objectives and strengthen the solution accuracy. 2) a dynamic convergence factor (DCF) is introduced to strengthen the capabilities of exploration and …exploitation. 3) the position weight (PW) is used in the individual position updating to enhance the search efficiency. 4) the variable neighborhood search (VNS) is developed to strengthen the capacity to escape the local optimum. By executing abundant experiments using 20 benchmark instances, it was demonstrated that the developed IChOA is efficient to solve the MO_GFJSP and effective for reducing carbon emission in the flexible job shop. Show more
Keywords: Multi-objective green flexible job shop scheduling, meta-heuristics, improved chimp optimization algorithm, variable neighborhood search
DOI: 10.3233/JIFS-236157
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7697-7710, 2024
Authors: Xiao, Yongxia | Tang, Xiao
Article Type: Research Article
Abstract: In the interval-valued intuitionistic fuzzy environment, a new multi-attribute three-way decision-making model is proposed to address the problems that the relative loss function in the existing multi-attribute three-way decision-making model does not consider the degree of hesitancy, and the alternative conditional probabilities are given subjectively by the authors, which lacks objectivity. First, three types of ideal solutions are introduced, and the correlation coefficients between the evaluated values and ideal solutions are utilized to construct alternative relative loss functions. Second, the ELECTRE-I method is generalized to the interval-valued intuitionistic fuzzy environment to establish the outranking relation and a method for estimating …the conditional probability of alternatives is given. Finally, the model is used to experimentally analyze examples to illustrate the effectiveness and rationality of the model. Show more
Keywords: Interval-valued intuitionistic fuzzy sets, multi-attribute decision-making, three-way decision, correlation coefficient, outranking relation
DOI: 10.3233/JIFS-236356
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7711-7725, 2024
Authors: Wang, Zhongan | Li, Honghai | Pang, Minghao | Wu, Yingna | Yang, Rui | Wu, Zhiwei | Cai, Guoshuang
Article Type: Research Article
Abstract: Detection and classification methods for the melt pool state in laser direct energy deposition (L-DED) can significantly help predict defects and mechanical properties of L-DED metal parts. Although traditional machine learning algorithms based on physical modeling methods and convolutional neural networks have recently been introduced into melt pool state identification, these methods rely on complex artificially designed features or cannot simultaneously detect defects in multiple dimensions. In this paper, a novel bilateral stream neural network was designed for melt pool identification, which performs defect identification in two label dimensions simultaneously. Two sets of single-channel experiments were designed to collect the …dataset captured by a high-speed camera. By cutting the metal parts and marking them with professional equipment operated by professionals, the dataset was labeled according to the bonding condition and dilution rate criteria. Without an additive model structure, the model achieved 95.2% accuracy in identifying defects in the bonding condition and 92.8% in determining deficiencies in the dilution rate. In order to explain the identification mechanism of the model, the CAM method was utilized for the visual display of the model recognition process, which provides a potential application solution for the online monitoring method of the L-DED. Show more
Keywords: Laser direct energy deposition, melt pool state, bilateral stream neural network
DOI: 10.3233/JIFS-236589
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7727-7738, 2024
Authors: Deng, Xiangyu | Hu, Yiman | Yang, Yahan
Article Type: Research Article
Abstract: With the development of artificial intelligence technology, the digital transformation of student-oriented education becomes particularly important. How to promote real-time interaction between teachers and students in the classroom is an urgent issue which is needed to pay attention to. Based on the facial expression features of students in a classroom, this paper analyzes the changes in angles between facial expression feature points using Dlib. Additionally, this paper proposes a novel algorithm for extracting variable scale template edge trend features. The algorithm adaptively processes the template based on the edge trend features of expression feature points, and use the proposed template …slope normalization algorithm to achieve multi-scale template edge trend extraction. Then, DNN are used to recognize different listening expressions. The experimental results show that the proposed algorithm has faster recognition speed and better robustness when applied to classroom expression recognition. By identifying students’ class status to remind teachers to adjust their class progress, the goal of improving classroom learning effectiveness is achieved Show more
Keywords: Dlib face recognition, learning effectiveness, expression recognition, DNN prediction, feature extraction
DOI: 10.3233/JIFS-237143
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7739-7750, 2024
Authors: Wan, Yifei | Huang, Qi | Wu, Yin | Li, Songling
Article Type: Research Article
Abstract: By designing a digital power grid multi-source data security collaborative management platform, the system configuration problem of the OMS system and the power grid management platform for the main distribution network of the power grid is solved. A design method for the digital power grid multi-source data security collaborative management platform based on discrete particle swarm optimization algorithm is proposed. Based on the design concept of SOA, realize the overall design framework of the platform according to the design method of multi-layer technical system in the business presentation layer, business process and composition layer, service layer, component layer and resource …layer, realize the basic layer design of the system management platform through the basic application platform design scheme of XML configuration, implement the query, processing and output representation of the grid’s multivariate data using B/S architecture protocol, and use the Spring Framework The platform software architecture is implemented using J2EE technology and multi module component design scheme. The discrete particle swarm optimization algorithm is used for the fusion and scheduling of multi-source data in the digital power grid. The interface design and functional construction of the power grid management platform are implemented in the OMS system of the power grid main distribution network, and the logical model of the transformation project is constructed to achieve platform optimization and construction. Tests have shown that the designed digital power grid multi-source data security collaborative management platform has good human-machine interaction, strong data fusion scheduling ability, reduced resource and subsystem coupling, and supports the flexibility of physical deployment and maintenance. Show more
Keywords: Discrete particle swarm optimization algorithm, digital power grid, multi source data, safety, collaborative management platform, main distribution network OMS system of the power grid
DOI: 10.3233/JIFS-237849
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7751-7761, 2024
Authors: Bin, Chenzhong | Liu, Wenqiang | Ding, Hantao | Wen, Yimin
Article Type: Research Article
Abstract: Existing POI recommendation methods often fail to capture the fine-grained preferences of users and face the challenge of modeling multiple relationships. Moreover, knowledge graph-based recommendation methods are limited in storing dynamic user trajectories, making them unsuitable for POI recommendation scenarios. In this paper, we propose a Multi-View Heterogeneous Knowledge learning model that utilizes techniques for heterogeneous knowledge representation learning and multi-view context modeling. Our model comprehensively models user preferences and the relationships between users and POIs by utilizing information from users’ visiting sequences and POI attributes knowledge graph. Specifically, we design a heterogeneous knowledge embedding method to learn the representation …of users and POIs using POI attribute knowledge and users’ visiting sequences. Additionally, we constructed a user trajectory similarity graph and a POI attribute similarity graph to explore potential relations between users and between POIs. The former measures the similarity of user behaviors based on user visit sequences, and the latter quantifies the similarity between different POIs through a novel feature mapping method. Finally, we propose a multi-view hybrid learning method that combines unsupervised and supervised learning paradigms to model complex relationships, improving the overall recommendation performance. Extensive experiments on real-world datasets validate the effectiveness of our method. Show more
Keywords: POI recommendations, heterogeneous knowledge learning, multi-view learning, multiple context modeling, knowledge graph
DOI: 10.3233/JIFS-232792
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7763-7777, 2024
Authors: Huang, Yonggang | Teng, Teng | Li, Yuanyuan | Zhang, Minghao
Article Type: Research Article
Abstract: In order to avoid the risk of patients’ private information leakage, this paper puts forward a research on the protection of medical Internet private information based on double chaotic encryption algorithm. This paper analyzes the quantification of risk indicators for privacy information protection of medical Internet, establishes the risk quantification structure of health care big data according to the quantitative calculation results, and puts forward the strategy of controlling access to health care big data, configuring the risk level, describing the attributes of the system database, and realizing the privacy information protection of medical Internet under the double chaotic encryption …algorithm. The experimental results show that the real identity of patients is protected to a certain extent in the protection of private information of medical internet after applying this method. Moreover, this method has high storage integrity and small storage standard deviation, and the method in this paper can effectively resist network intrusion. Therefore, it shows that this method has a good effect of protecting private information of medical Internet. Show more
Keywords: Double chaotic encryption algorithm, medical internet, private information, information protection.
DOI: 10.3233/JIFS-237670
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7779-7789, 2024
Authors: Salem, Dina Ahmed | Hassan, Nesma AbdelAziz | Hamdy, Razan Mohamed
Article Type: Research Article
Abstract: Smart farming, also known as precision agriculture or digital farming, is an innovative approach to agriculture that utilizes advanced technologies and data-driven techniques to optimize various aspects of farming operations. One smart farming activity, fruit classification, has broad applications and impacts across agriculture, food production, health, research, and environmental conservation. Accurate and reliable fruit classification benefits various stakeholders, from farmers and food producers to consumers and conservationists. In this study, we conduct a comprehensive comparative analysis to assess the performance of a Convolutional Neural Network (CNN) model in conjunction with four transfer learning models: VGG16, ResNet50, MobileNet-V2, and EfficientNet-B0. Models …are trained once on a benchmark dataset called Fruits360 and another time on a reduced version of it to study the effect of data size and image processing on fruit classification performance. The original dataset reported accuracy scores of 95%, 93%, 99.8%, 65%, and 92.6% for these models, respectively. While accuracy increased when trained on the reduced dataset for three of the employed models. This study provides valuable insights into the performance of various deep learning models and dataset versions, offering guidance on model selection and data preprocessing strategies for image classification tasks. Show more
Keywords: Artificial intelligence, convolutional neural network, Fruit360, machine learning, transfer learning
DOI: 10.3233/JIFS-233514
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7791-7803, 2024
Authors: Hoang, Dinh Linh | Luong, Tran Thi
Article Type: Research Article
Abstract: The XOR operator is a simple yet crucial computation in computer science, especially in cryptography. In symmetric cryptographic schemes, particularly in block ciphers, the AddRoundKey transformation is commonly used to XOR an internal state with a round key. One method to enhance the security of block ciphers is to diversify this transformation. In this paper, we propose some straightforward yet highly effective techniques for generating t-bit random XOR tables. One approach is based on the Hadamard matrix, while another draws inspiration from the popular intellectual game Sudoku. Additionally, we introduce algorithms to animate the XOR transformation for generalized block ciphers. …Specifically, we apply our findings to the AES encryption standard to present the key-dependent AES algorithm. Furthermore, we conduct a security analysis and assess the randomness of the proposed key-dependent AES algorithm using NIST SP 800-22, Shannon entropy based on the ENT tool, and min-entropy based on NIST SP 800-90B. Thanks to the key-dependent random XOR tables, the key-dependent AES algorithm have become much more secure than AES, and they also achieve better results in some statistical standards than AES. Show more
Keywords: Random XOR table, AES, key-dependent block cipher, randomness, Shannon entropy
DOI: 10.3233/JIFS-236998
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7805-7821, 2024
Authors: Aljanabi, Abdulqadir Rahomee Ahmed | Ghafour, Karzan Mahdi
Article Type: Research Article
Abstract: Buying decisions are influenced by a variety of factors that can give rise to impulsive, unplanned, or even irrational purchases. Research has examined the motivational factors that foster organic food consumption, but no study has explored the relative weights of these factors and whether their effects vary depending on the type of food. This study adopted the cognitive-affective perspective to examine the antecedents of online impulsive buying of organic food using a sample of 452 consumers living in Baghdad, Iraq. The fuzzy AHP and fuzzy TOPSIS methods were used to rank five organic food alternatives. The results revealed that the …effects of cognitive factors on organic food purchases differ from those of affective factors. Show more
Keywords: Impulsive buying behaviour, AHP, fuzzy TOPSIS, multi-criteria decision-making, organic food
DOI: 10.3233/JIFS-237400
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7823-7838, 2024
Authors: Xie, Wenhao | Lei, Lin | Liu, Xiangyi | Liu, Yuan
Article Type: Research Article
Abstract: Clustering is an essential unsupervised technique when category information is not available. Although K-means and Max-min distance K-means clustering algorithms are widely used, they have some disadvantages such as dependence on the initial centers, sensitivity to outliers caused by using only distance as the clustering criterion. To overcome the problems, this paper proposes SMM-K-means algorithm which overcomes the dependence on the initial cluster centers and the initial number of clusters and the sensitivity to the outliers. First, the initial value K of the optimal cluster number is determined by the elbow method, and K-means is used for initial clustering. A …new inter-cluster separation measure is then constructed based on the idea of q-nearest neighbors, which is constructed by comprehensive considering the separation between clusters and the distribution compactness of clusters themselves. Finally, the two sample points with highest degree of separation are brought into Max-min distance K-means algorithm as new initial centers for clustering. The definite determining method of cluster centers eliminates the complicated iterative calculation, and the construction of inter-cluster separation measure overcomes the sensitivity of clustering results to noise points and isolated points, and has good applicability and generalization. In addition, this algorithm is not limited by the shape and size of the clusters and has better flexibility. The experimental results show that the SMM-K-means algorithm has higher CH values, resulting in a better clustering effect and stability. Show more
Keywords: K-means algorithm, max-min distance K-means algorithm, elbow method, inter-cluster separation measure, CH index
DOI: 10.3233/JIFS-231747
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7839-7857, 2024
Authors: Cao, Heling | Han, Dong | Chu, Yonghe | Tian, Fangchao | Wang, Yun | Liu, Yu | Jia, Junliang | Ge, Haoyang
Article Type: Research Article
Abstract: Automatic program repair (APR) is crucial to improve software quality. Recently, neural machine translation (NMT) based modeling for bug fixes has demonstrated great potential. However, these approaches still have two major challenges. One is that their search space is limited due to the out-of-vocabulary (OOV) problem. The other is that the NMT-based APR models tend to ignore past translation information, which often leads to over-translation and under-translation. To address the above challenges, we propose MNRepair, a new NMT-based APR approach that combines multiple mechanisms to fix bugs in source code. Specifically, we devise an encoder-decoder NMT framework with the attention …mechanism. Our framework combines the copy mechanism to overcome the OOV problem that occurs with source code. To deal with the over-translation and under-translation, we utilize a coverage mechanism to record past translation information. MNRepair is able to capture a wide range of repair operators and fix 26 bugs in Defects4J. Our evaluation shows the effectiveness of multiple mechanisms in the repair process. Show more
Keywords: Automatic program repair, neural machine translation, multiple mechanisms
DOI: 10.3233/JIFS-234037
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7859-7873, 2024
Authors: Zhang, Hongli | Wu, Guangyu | Zhao, Dongfang | Chen, Yesheng | Wei, Dou | Liu, Shulin | Jiang, Lunchang
Article Type: Research Article
Abstract: Mechanical fault diagnosis is currently a highly trending topic, facing two significant challenges. Firstly, the acquisition of an ample number of fault samples proves to be difficult, thereby limiting access to sufficient data samples. Secondly, intricate and non-mathematically describable associations often exist among different faults. Most algorithms treat fault samples as isolated entities, consequently impacting the accuracy of fault diagnosis. This paper proposes a novel machine learning framework called Domain Graph Attention Neural Network (DGAT), which leverages the topological structure of graphs to effectively capture the interrelationships among fault samples. Additionally, this framework incorporates domain information during node updates …to obtain richer embeddings, particularly in scenarios with limited available samples. It effectively overcomes the fixed receptive field limitation of the original Graph Attention Network (GAT). In order to validate the effectiveness of the model, we conducted extensive comparative experiments on diverse datasets, which demonstrated the superior performance of the proposed model. Show more
Keywords: Classification, graph attention neural network, small-sample, mechanical fault diagnosis
DOI: 10.3233/JIFS-234042
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7875-7886, 2024
Article Type: Research Article
Abstract: A consistency fuzzy set is composed of mean values and consistency degrees of fuzzy sequences in the transformation process of a fuzzy multiset (FM), but lacks confidence intervals in relation to a confidence level of fuzzy sequences, which shows its deficiency. To solve this deficiency, this paper aims to propose an improved transformation approach from FM to a confidence consistency fuzzy cubic set (CCFCS) and to develop an exponential similarity measure of CCFCSs for modeling piano performance evaluation (PPE) in a FM scenario. Consequently, this study includes the following context. First, a transformation approach from FM to CCFCS is proposed …in terms of mean values, consistency degrees (the complement of standard deviation), and confidence intervals of fuzzy sequences subject to a confidence level and normal distribution. Second, the exponential similarity measure of CCFCSs is proposed in the scenario of FMs. Third, a PPE model is developed based on the proposed similarity measure of CCFCSs in the FM scenario. Finally, the developed model is applied to a piano performance competition organized by Shaoxing University in China as an actual evaluation example, and then the rationality and validity of the proposed model in the scenario of FMs are verified through sensitivity and comparison analysis. Show more
Keywords: Fuzzy multiset, confidence consistency fuzzy cubic set, exponential similarity measure, confidence level, piano performance evaluation
DOI: 10.3233/JIFS-235084
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7887-7896, 2024
Authors: Yang, Lei | Li, Deqing | Zeng, Wenyi | Ma, Rong | Xu, Zeshui | Yu, Xianchuan
Article Type: Research Article
Abstract: Pythagorean fuzzy sets, as a generalization of intuitionistic fuzzy sets, have a wide range of applications in many fields including image recognition, data mining, decision making, etc. However, there is little research on clustering algorithms of Pythagorean fuzzy sets. In this paper, a novel clustering idea under Pythagorean fuzzy environment is presented. Firstly, the concept of feature vector of Pythagorean fuzzy number (PFN) is presented by taking into account five parameters of PFN, and some new methods to compute the similarity measure of PFNs by applying the feature vector are proposed. Furthermore, a fuzzy similarity matrix by utilizing similarity measure …of PFNs is established. Later, the fuzzy similarity matrix is transformed into a fuzzy equivalent matrix which is utilized to establish a novel Pythagorean fuzzy clustering algorithm. Based on the proposed clustering algorithm, a novel multiple attribute decision making (MADM) method under Pythagorean fuzzy environment is presented. To illustrate the effectiveness and feasibility of the proposed technique, an application example is offered. Show more
Keywords: Pythagorean fuzzy number, feature vector, similarity measure, Pythagorean fuzzy clustering analysis, multiple attribute decision making
DOI: 10.3233/JIFS-235488
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7897-7907, 2024
Authors: Guo, Xu
Article Type: Research Article
Abstract: The detection of tomato leaf diseases is crucial for agricultural sustainability, impacting crop health, yield optimization, and global food supply. Despite the advancements in deep learning methods, a pressing challenge persists— achieving consistently high accuracy rates, particularly in the context of rigorous agricultural requirements. This study addresses this problem directly, introducing a novel approach by employing the Yolov8 architecture in a deep learning model for tomato leaf disease detection. The identified research challenge is precisely targeted, and the model is developed using a meticulously curated custom dataset. Through comprehensive training, validation, and testing phases, the study ensures the robust performance …of the Yolov8 model. The novelty of this research lies in its focused solution to the specific accuracy challenge within deep learning-based tomato leaf disease detection. The proposed methodology is rigorously evaluated through extensive experimentation, showcasing its ability to surpass existing benchmarks and offering a highly effective solution. This innovative approach not only contributes a unique solution to the identified problem but also advances the field by providing a more accurate and reliable method for detecting tomato leaf diseases. Show more
Keywords: Tomato leaf disease detection, deep learning methods, agricultural sector
DOI: 10.3233/JIFS-236905
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7909-7921, 2024
Authors: Kalaimathi, M. | Balamurugan, B.J. | Nagar, Atulya K.
Article Type: Research Article
Abstract: Let G = (V , E ) be a simple graph. A 1-1 function f : V → ℕ , where ℕ is the set of natural numbers, is said to induce a k -Zumkeller graph G if the induced edge function f * : E → ℕ defined by f * (xy ) = f (x ) f (y ) satisfies the following conditions:(i) f * (xy ) is a Zumkeller number for every xy ∈ E . (ii) The total number …of distinct Zumkeller numbers on the edges of G is k . A Mycielski transformation of a graph is a larger graph having more vertices and edges. In this article, the Mycielski transformation of a graphs such as path, cycle and star graphs have been computed and their k -Zumkeller graphs have been investigated by reducing the number of distinct Zumkeller numbers. AMS Subject Classification: 05C78 f * (xy ) is a Zumkeller number for every xy ∈ E . The total number of distinct Zumkeller numbers on the edges of G is k . Show more
Keywords: Zumkeller numbers, k-Zumkeller graph, Mycielski transformation
DOI: 10.3233/JIFS-231095
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7923-7932, 2024
Authors: Xiao, Yanjun | Pei, Eryue | Shi, Linhan | Peng, Kai | Liu, Weiling
Article Type: Research Article
Abstract: In order to solve the problem that Switched Reluctance Motor (SRM) generates torque pulsation phenomenon during operation, which reduces the stability of loom spindle operation, this paper proposes and designs a multi-algorithm fusion-based SRM control strategy from the point of view of control strategy research. Combined with the operating characteristics of the loom, the causes of SRM torque pulsation are analyzed from the point of view of SRM control strategy, and combined with the spindle control indexes, the voltage chopper control and torque distribution function are introduced to construct the SRM control strategy scheme for the loom. On this basis, …an optimization strategy based on the fusion of fuzzy control algorithm, particle swarm algorithm and simulated annealing algorithm is proposed to optimize the torque distribution function, and the algorithmic process of SRM control strategy is verified through comparative tests. The results show that the control strategy can make its torque pulsation reduced to less than 10%, the speed rise time is less than 0.1 s, and the relative error of the speed is less than 0.05%, which meets the index requirements of the spindle drive. This proves that the SRM torque pulsation can be reduced by the multi-algorithm fusion control strategy without increasing the hardware cost, which provides a useful reference for solving the SRM torque pulsation problem under the requirement of low cost. Show more
Keywords: Rapier loom, switched reluctance motor, torque distribution function, multi-algorithm fusion
DOI: 10.3233/JIFS-233138
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7933-7957, 2024
Authors: Zakaria, Aliya Syaffa | Shafi, Muhammad Ammar | Mohd Zim, Mohd Arif | Musa, Aisya Natasya
Article Type: Research Article
Abstract: Lung cancer constituted 12.2% of newly diagnosed cancer cases globally in 2020. The high fatality rate of the condition is attributed to delayed diagnosis and inadequate symptom recognition. In Malaysia, the incidence of lung cancer is estimated to be 1 in 60 males and 1 in 138 females, with a median age of 70 years or above. Most lung cancer cases were detected during advanced stages, specifically stages III and IV, with a prevalence exceeding 90% for both genders. In Malaysia, most patients are diagnosed in stages III and IV, which are associated with a lower likelihood of long-term survival. …Many cases are identified at a late stage, characterized by significant tumor expansion or the spread of cancer cells to areas that cannot be treated surgically. Malaysians are unaware of cancer symptoms; hence the situation is common. To improve survival and reduce mortality, Malaysians must recognize the symptoms of lung cancer. Fuzzy linear regression and multiple linear regression models have been compared to predict high-risk lung cancer symptoms in Malaysia. The fuzzy linear regression model analyses secondary data, eliminates irrelevant information and enhances precision in the results. Lung cancer patients at Al-Sultan Abdullah Hospital (UiTM Hospital) in Selangor provided data for this study. Data from 124 lung cancer patients were analyzed using Microsoft Excel, SPSS, and MATLAB. To improve data accuracy, the study used cross-validation measurement error (MSE and RMSE). According to data analysis, hemoptysis and chest pain are high-risk symptoms with MSE and RMSE values of 1.549 and 1.245, respectively. Show more
Keywords: Lung cancer, symptoms of lung cancer, fuzzy linear regression, prediction data, statistical error
DOI: 10.3233/JIFS-233714
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7959-7968, 2024
Authors: Xiao, Yanjun | Li, Shifang | Zhang, Kun | Zhang, Yameng | Xiao, Yanchun
Article Type: Research Article
Abstract: Recovering low-quality waste heat using industrial waste heat is challenging, and the reuse technology needs to erupt. Moreover, the gas source of low-quality waste heat is relatively volatile, which makes it challenging to keep the actual working condition of the plant stable. Therefore, it is inspiring to research the robustness of root-waste heat power generation processed measurement and control system to improve the stability of the plant operation. Hence, in this paper, we have applied uncertainty theory to analyze it and formulate the uncertainty model based on the Bode diagram. We also proposed a control method based on the uncertainty …model, which combines robust control and internal model control to make the roots waste heat power generation system operate stably under the effect of external disturbances and changes of internal structure or parameters in actual operation. Experimental results show that the robust internal model control method has a speed deviation of no more than 7.9 r/min compared with the PID control method. The adjustment time to track the set value does not exceed 73.1 seconds within the allowed fluctuation range. The fluctuation variance is 30.95% of that of the PID controller. The dynamic performance is better, with strong anti-interference capability and significantly improved tracking performance. It ensures the stability of the roots-type waste heat utilization system, which is essential for future intelligent grid-connected power generation. Show more
Keywords: Waste heat power generation, uncertain theory, robust internal model control, roots power machine
DOI: 10.3233/JIFS-234416
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7969-7987, 2024
Authors: Lei, Fan | Cai, Qiang | Wei, Guiwu
Article Type: Research Article
Abstract: The development and application of blockchain provides technical support for supply chain technological innovation and industrial innovation. Integrating the decentralized, independent, open, traceable and tamper-proof features of the blockchain into the supply chain can effectively improve the problems of unstable supply chain structure, low security, low privacy, low collaboration ability and high operating costs. Establishing probabilistic double hierarchy linguistic multi-attribute decision-making (PDHL-MADM) model to evaluate the performance of blockchain is an effective measure to optimize blockchain performance and improve supply chain stability. Therefore, this thesis first takes the processing efficiency, cost, security performance, update and improvement ability as evaluation attributes. …Then the IDOCRIW weight method is used to calculate the objective weight of attributes. Based on Aczel-Alsina t-norm (AATN) and Aczel-Alsina t-conorm (AATCN), four operations of probabilistic double hierarchy linguistic term set (PDHLTS) are defined, and PDHLAAWA operator, PDHLAAOWA operator, PDHLAAHA operator, PDHLAAHM operator, PDHLAAWHM operator and their dual operators are proposed, and a series of corresponding PDHL operator models are constructed. In addition, the sensitivity and stability of this series of operator models are analyzed in depth. Finally, the new model proposed in this thesis is compared with the existing model to verify its scientific and superiority. Show more
Keywords: Probabilistic double hierarchy linguistic term set (PDHLTS), Multi-attribute decision-making (MADM), PDHLAAWA operator and PDHLAAWHM operator, evaluate the performance of blockchain
DOI: 10.3233/JIFS-235215
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7989-8024, 2024
Authors: Qiao, Junfeng | Peng, Lin | Zhou, Aihua | Pan, Sen | Yang, Pei | Xu, Min | Shen, Xiaofeng | Chen, Jingde | Gu, Hua
Article Type: Research Article
Abstract: This paper proposes a method of beforehand prediction of electric equipment faults based on chain-linked recurrent neural network algorithm, which takes the operating parameters of power equipment and other relevant environmental factors as inputs, and takes the fault characteristics as output judgment marks, and constructs a machine learning training model to realize the prediction of power equipment faults. The neural network algorithm adopted in this paper adopts a tree structure. Each sub-node can transfer information with its multiple superior nodes, so that the correlation between the data of the front and back nodes can be obtained, which meets the needs …of the equipment fault prediction model. Considering that the occurrence of power transformer faults is sudden and greatly affected by changes in the surrounding environment, the input of prediction algorithms should consider more environmental factors. This method takes the historical data of various parameters including meteorological phenomena, geography data, and temperature of adjacent equipment and facilities as the training sample set, improves the learning model, gives the trend curve of each index, and gives a prompt at its threshold to ensure the prediction accuracy and give the index prediction. Show more
Keywords: Recurrent neural network, power equipment fault prediction, index trend curve, fault feature sample set, power supply reliability
DOI: 10.3233/JIFS-236459
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8025-8035, 2024
Authors: Kamala Devi, K. | Raja Sekar, J.
Article Type: Research Article
Abstract: Breast cancer has been life-threatening for many years as it is the common cause of fatality among women. The challenges of screening such tumors through manual approaches can be overcome by computer-aided diagnosis, which aids radiologists in making precise decisions. The selection of significant features is crucial for the estimation of prediction accuracy. This work proposes a hybrid Genetic Algorithm (GA) and Honey Badger Algorithm (HBA) based Deep Neural Network (DNN), HGAHBA-DNN for the concurrent optimal features selection and parameter optimization; further, the optimal features and parameters extracted are fed into the DNN for the prediction of the breast cancer. …It fuses the benefits of HBA with parallel processing and efficient feedback with GA’s excellent global convergent rate during the processing stages. The aforementioned method is evaluated on the Wisconsin Original Breast Cancer (WOBC), Wisconsin Diagnostic Breast Cancer (WDBC), and the Surveillance, Epidemiology, and End Results (SEER) datasets. Subsequently, the performance is validated using several metrics like accuracy, precision, Recall, and F1-score. The experimental result shows that HGAHBA-DNN obtains accuracy of 99.42%, 99.84%, and 92.44% for the WOBC, WDBC, and SEER datasets respectively, which is much superior to the other state-of-the-art methods. Show more
Keywords: Breast cancer prediction, DNN, feature selection, genetic algorithm, honey badger algorithm, parameter optimization
DOI: 10.3233/JIFS-236577
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8037-8048, 2024
Authors: Hou, Yuntong | Shang, Shuye | Cao, Shengxi | Liu, Zhengjia
Article Type: Research Article
Abstract: A robust muscle fatigue algorithm plays a pivotal role in depicting the degree of muscle fatigue in both time-series EMG signal graphs and spectral graphs, aligning with human perception. While the fuzzy approximate entropy (fApEn ) algorithm has been enhanced from the foundation of approximate entropy (ApEn ) through the incorporation of fuzzy affiliation, concerns persist regarding the threshold value and the algorithm’s application range. This study extracts EMG signals across varied time durations and head-down angles, employing enhanced signal preprocessing techniques and optimizing the fApEn algorithm. Furthermore, real-time fatigue perceptions of subjects were recorded using the rating of …perceived exertion. Experimental outcomes reveal that the EMG signal, post-wavelet analysis preprocessing, demonstrates promising noise reduction capabilities. Notably, the fApEn algorithm exhibits considerable enhancements through the identification of an optimal threshold using the gradient descent algorithm and a machine learning strategy. Show more
Keywords: EMG, muscle fatigue, fuzzy approximate entropy, wavelet transform, machine learning
DOI: 10.3233/JIFS-237293
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8049-8063, 2024
Authors: Tian, Huaqiang | Yu, Long | Tian, Shengwei | Long, Jun | Zhou, Tiejun | Wang, Bo | Li, Yuhuan
Article Type: Research Article
Abstract: A spect-B ased S entiment A nalysis (ABSA ) has been the focus of increasing study in recent years. Previous research has demonstrated that incorporating syntactic information, such as dependency trees, can enhance ABSA performance. Despite the widespread use of metaphors in daily life to express emotions more vividly, few studies have integrated this literary device into ABSA. In this paper, we propose a novel ABSA model that utilizes M etaphor I dentification P rocedure (MIP ) to encode both the sentence and aspect word as a single unit, thereby overcoming these limitations. Our experimental results demonstrate that our model …achieves competitive performance in ABSA. Show more
Keywords: Aspect-based sentiment analysis, metaphorical sentiment analysis, transformer, deep learning
DOI: 10.3233/JIFS-233077
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8065-8074, 2024
Authors: Ding, Huafeng | Shang, Junyan | Zhou, Guohua
Article Type: Research Article
Abstract: Emotional state recognition is an important part of emotional research. Compared to non-physiological signals, the electroencephalogram (EEG) signals can truly and objectively reflect a person’s emotional state. To explore the multi-frequency band emotional information and address the noise problem of EEG signals, this paper proposes a robust multi-frequency band joint dictionary learning with low-rank representation (RMBDLL). Based on the dictionary learning, the technologies of sparse and low-rank representation are jointly integrated to reveal the intrinsic connections and discriminative information of EEG multi-frequency band. RMBDLL consists of robust dictionary learning and intra-class/inter-class local constraint learning. In robust dictionary learning part, RMBDLL …separates complex noise in EEG signals and establishes clean sub-dictionaries on each frequency band to improve the robustness of the model. In this case, different frequency data obtains the same encoding coefficients according to the consistency of emotional state recognition. In intra-class/inter-class local constraint learning part, RMBDLL introduces a regularization term composed of intra-class and inter-class local constraints, which are constructed from the local structural information of dictionary atoms, resulting in intra-class similarity and inter-class difference of EEG multi-frequency bands. The effectiveness of RMBDLL is verified on the SEED dataset with different noises. The experimental results show that the RMBDLL algorithm can maintain the discriminative local structure in the training samples and achieve good recognition performance on noisy EEG emotion datasets. Show more
Keywords: Multi-frequency band, dictionary learning, electroencephalogram, noise data, low-rank representation
DOI: 10.3233/JIFS-233753
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8075-8088, 2024
Authors: Wei, Jiaxin | Yang, Jin | Liu, Xinyang
Article Type: Research Article
Abstract: Due to intensified off-balance sheet disclosure by regulatory authorities, financial reports now contain a substantial amount of information beyond the financial statements. Consequently, the length of footnotes in financial reports exceeds that of the financial statements. This poses a novel challenge for regulators and users of financial reports in efficiently managing this information. Financial reports, with their clear structure, encompass abundant structured information applicable to information extraction, automatic summarization, and information retrieval. Extracting headings and paragraph content from financial reports enables the acquisition of the annual report text’s framework. This paper focuses on extracting the structural framework of annual report …texts and introduces an OpenCV-based method for text framework extraction using computer vision. The proposed method employs morphological image dilation to distinguish headings from the main body of the text. Moreover, this paper combines the proposed method with a traditional, rule-based extraction method that exploits the characteristic features of numbers and symbols at the beginning of headings. This combination results in an optimized framework extraction method, producing a more concise text framework. Show more
Keywords: OpenCV, dilation operation, text structure extraction
DOI: 10.3233/JIFS-234170
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8089-8108, 2024
Authors: Li, Wuke | Wang, Xingzhu | Tang, Minli
Article Type: Research Article
Abstract: Aiming at the problem of inaccurate transformer fault diagnosis in dissolved gas analysis, this paper proposes a novel diagnostic method that integrates an enhanced honey badger algorithm (EHBA) with an ensemble learning-based deep hybrid kernel extreme learning machine (DHKELM). First, kernel principal component analysis (KPCA) was deployed for feature fusion of the gas data, thus extracting more effective features. The DHKELM, combining polynomial and RBF kernel functions, was used as a base learning to build a powerful classifier with Adaboost framework. The EHBA introduces information sharing and firefly perturbation strategies based on HBA. This EHBA was harnessed to optimize the …DHKELM’s critical parameters, establishing the EHBA-DHKELM-Adaboost transformer fault diagnosis model. Finally, the features garnered by KPCA were fed into the model, simulating and validating various fault diagnosis models. The findings reveal that EHBA-DHKELM-Adaboost achieves 98.75% diagnostic accuracy in transformer faults, surpassing other models. Show more
Keywords: Transformer fault diagnosis, dissolved gas analysis, deep hybrid kernel extreme learning machine, adaboost, enhanced honey badger algorithm
DOI: 10.3233/JIFS-235563
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8109-8121, 2024
Authors: Brintha, K. | Joseph Jawhar, S.
Article Type: Research Article
Abstract: Automated railway security systems prevent train collisions with trackside obstructions that cause accidents in high-speed railways. Rail safety is being improved and accident rates reduced through continuous research. A rapid advancement in deep learning has promoted new possibilities for research in this field. In this work, a novel deep learning-based FOD-YOLO net is proposed for detecting the fasteners faults and objects in the railway tracks. There are two basic components in the deep learning-based YOLOv8: the backbone and the head. YOLOv8 utilizes an improved version of the CSPDarknet53 network for detecting objects on the railway track. The head of YOLOv8 …consists of EfficientNet with various convolutional layers with squeeze and excitation blocks for detecting any defect in the track fasteners. These layers are liable for detecting the objectness scores, bounding boxes and class probabilities structured with fully connected layers for the objects and faults in tracks. Based on the results from the Yolo network, the alert message is sent to the loco pilot to avoid accidents using fuzzy logic. The experimental fallouts of proposed FOD-YOLO net achieve higher accuracy and yields better evaluation results with 98.14% accuracy, 98.84% precision and 95.94% recall. From the experimental results, the FOD-YOLO net improves the overall accuracy range by 5.44%, 4.72%, 0.73%, and 13.18% better than Fast RCNN, YOLOv5s-VF, YOLO-GD, and 2D-SSA + Deep network respectively. Show more
Keywords: Railway track, object detection, fault detection, deep learning, Yolo network, fuzzy logic
DOI: 10.3233/JIFS-236445
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8123-8137, 2024
Authors: Zhan, Huawei | Li, Junjie | Wei, Gaoyong | Han, Chengju
Article Type: Research Article
Abstract: Aiming at the existing UAV fire detection system with low small target detection accuracy, a high leakage rate, and a slow rate, an improved YOLOv5 UAV flame detection algorithm is proposed. First, the anchor box clustering is optimized using the K-mean++algorithm to reduce the classification error rate. Second, the original backbone network is enhanced with the CBAM attention mechanism, which scans the whole globe to obtain the target area with a high weighting proportion and needs to be focused on. Replace the PANet network with the BiFPN network in the neck and introduce jump connections when performing feature fusion, which …can better retain the semantic information of high-level and low-level features. Finally, the α-IoU loss function is added to achieve the regression accuracy of different levels of the bounding box by modulating α, which improves the detection accuracy of small datasets and the robustness to noise. According to the experimental results, using a randomly segmented dataset, the modified YOLOv5 algorithm obtains a mAP value of 80.2%, which is 6.7% higher than the original YOLOv5 method, while maintaining an FPS of 64 frames per second. The method helps to improve the accuracy of UAVs for fire monitoring, and the performance is better than the existing flame detection algorithms, which meet the requirements of practical applications. Show more
Keywords: YOLOv5, feature fusion, CBAM, unmanned aerial vehicle (UAV), α-IoU
DOI: 10.3233/JIFS-236836
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8139-8151, 2024
Authors: Achich, Nassira | Ghorbel, Fatma | Hamdi, Fayçal | Métais, Elisabeth | Gargouri, Faiez
Article Type: Research Article
Abstract: Dealing with temporal data imperfection is a crucial issue in several application domains. In fact, failure to handle these imperfections can have significant consequences and lead to incorrect analysis and decision-making. This is particularly true when handling imperfect temporal data inputs in applications for Alzheimer’s patients as a real example. In this context, there is a need for a global ontology that provides a semantic representation of temporal data imperfection. In the literature, there is a big number of ontologies that represent data. Some represent only perfect temporal data. Some others represent imperfect data but not temporal ones. To the …best of our knowledge, there is no ontology that represents temporal data imperfection. In this paper, we represent “TimeOntoImperfection”, a usable global ontology that represents four types of imperfection: imprecision, uncertainty, both uncertainty and imprecision and conflict. We describe the structure of “TimeOntoImperfection”, then we conduct a case a study in which we illustrate the usefulness of our ontology. Finally, we introduce the validation part in the context of CAPTAIN MEMO - an ontology based memory prothesis dedicated to alzheimer patients- and we discuss the encouraging results derived from the evaluation step. Show more
Keywords: Ontology, temporal data imperfection, temporal reasoning, uncertainty, imprecision, conflict, possibilistic ontology, fuzzy ontology, probabilistic ontology, probabilistic ontology
DOI: 10.3233/JIFS-237693
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8153-8168, 2024
Authors: Kang, Chen | Jin, Shuaizhen | Zhong, Zheng | Li, Kunyan | Zeng, Xiaoyu
Article Type: Research Article
Abstract: The quantification of the interplay between student behavior data and classroom teaching effectiveness using quantitative metrics has perennially posed a challenge in the evaluation of classroom instruction. Classroom activity serves as a reflection of student engagement, emotional ambiance, and other pertinent aspects during the pedagogical process. This article presents a methodology for quantifying student head posture during classroom instruction utilizing AI-driven video analysis technology, notably the Classroom Activity Index (CAI). A Classroom Activity Analysis System (CAAS) was designed and developed, integrating a multi-scale classification network based on ECA-ResNet50 and ECA-ResNet18. This network discerns and categorizes various head regions of students …situated in both the frontal and real rows of a lecture-style classroom, irrespective of their dimensions. The classification network attains exceptional performance, boasting F1 score of 0.91 and 0.92 for student head-up and head-nodding. Drawing on the live classroom instruction at a higher vocational college in Wuhan, Hubei Province, China, a comparative experiment was executed. The findings revealed that three factors: teacher-student verbal interaction, teacher body language, and utilization of digital resource, all exert an influence on CAI. Simultaneously, the degree of classroom activity as gauged by FIAS and manual analysis fundamentally aligns with the CAI indicators quantified by CAAS, validating the efficacy of CAI in the quantification of classroom activity. Consequently, the incorporation of CAAS in teaching, research, and oversight scenarios can augment the precision and scientific rigor of classroom teaching assessment. Show more
Keywords: Classroom activity index, multi-scale he.ad posture classification network, classroom activity analysis system, head-up rate, head-nodding rate
DOI: 10.3233/JIFS-237970
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8169-8183, 2024
Authors: Sun, Ping | Song, LinLin | Yuan, Ling | Yu, Haiping | Wei, Yinzhen
Article Type: Research Article
Abstract: News text is an important branch of natural language processing. Compared to ordinary texts, news text has significant economic and scientific value. The characteristics of news text include structural hierarchy, diverse label categories, and limited high-quality annotation samples. Many machine learning and deep learning methods exist to analyze various forms of news text. However, due to label imbalance, hierarchical semantics, and confusing labels, current methods have limitations. Therefore, this paper proposes a news text classification framework based on hierarchical semantics and prior correction (HSPC). Firstly, data augmentation is used to enhance the diversity of the training set and adversarial learning …is employed to improve the resistance of the model with its robustness. Then, a hierarchical feature extraction approach is employed to extract semantic features from different levels of news texts. Consequentially, a feature fusion method is designed to allow the model to focus on relevant hierarchical semantics for label classification. Finally, highly confusing label predictions are corrected to optimize the label prediction of the model and improve confidence. Multiple experiments are performed on four widely used public datasets. The experimental results indicate that HSPC achieves higher classification accuracy compared to other models. On the FCT, AGNews, THUCNews, and Ohsumed datasets, HSPC improves the accuracy by 1.03%, 1.38%, 2.55%, and 1.15%, respectively, compared to state-of-the-art methods. This validates the rationality and effectiveness of the designed mechanisms. Show more
Keywords: Text Categorization, hierarchical semantics, feature fusion, prior distribution, data enhancement
DOI: 10.3233/JIFS-238433
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8185-8203, 2024
Authors: Myithili, K.K. | Beulah, R.D.
Article Type: Research Article
Abstract: The concept of intuitionistic fuzzy soft set is applied to generalize the theory of transversals in hypergraphs. The notion of transversals of an Intuitionistic Fuzzy Soft Hypergraphs (IFSHGs) and locally minimal transversals of IFSHGs are pioneered with some of its specifications. It is also proved that H ˜ is (μ, ν )-tempered IFSHGs if H ˜ is support simple, elementary and simply ordered. Then, an algorithm is developed and proposed to find the minimal transversals of IFSHGs. An application is also identified in selecting appropriate location for the …installation of wind turbines. Finally the proposed algorithm works in finding the suitable place for wind turbine installation. As a result the proposed algorithm is helpful in making decisions. Show more
Keywords: Transversals, locally minimal transversals, (μ, ν)-tempered IFSHGs
DOI: 10.3233/JIFS-222714
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8205-8212, 2024
Authors: Diao, Xiu-Li | Zhang, Quan-Lei | Zeng, Qing-Tian | Duan, Hua | Song, Zheng-guo | Zhao, Hua
Article Type: Research Article
Abstract: Knowledge tracing aims to model learners’ knowledge mastery based on their historical interaction records and predict their future performance. Due to its great potential in enabling personalized learning in intelligent tutoring systems, it has received extensive attention. However, most deep learning-based knowledge tracing methods have significant predictive performance. It is difficult to extract meaningful interpretations from the thousands of parameters in neural networks. The interpretability of knowledge tracing refers to the ability of learners to easily understand the predicted results.To address this problem, based on learning factors that influence the learner’s exercise performance, this paper proposes a novel knowledge tracing …model which is named Integrating L earning factors and B ayesian network for interpretable K nowledge T racing (LBKT). Firstly, meaningful learning factors, including knowledge mastery, learning ability, and exercise difficulty, are calculated from learners’ historical interaction records using deep learning and statistical methods. Then, Bayesian network is constructed to capture the causal relation between the three learning factors and exercise response. Finally, the Bayesian network is generated through structure and parameter learning to obtain interpretable prediction of future exercise performance. The proposed model named LBKT is evaluated on three public real-world educational datasets. The experiment results demonstrate that our approach achieves better predictive performance compared to baseline knowledge tracing methods, while also exhibiting significant superiority in model interpretability. Show more
Keywords: Interpretability, knowledge tracing, Bayesian networks, deep learning, personalized learning
DOI: 10.3233/JIFS-232189
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8213-8229, 2024
Authors: Borzooei, Rajab Ali | Ahn, Sun Shin | Jun, Young Bae
Article Type: Research Article
Abstract: Using the notion of the Łukasiewicz fuzzy set, we study the filter theory of Sheffer stroke Hilbert algebras. Here’s what we’re trying to do. 1. We first introduce the Łukasiewicz fuzzy filter of Sheffer stroke Hilbert algebras. 2. We provide an example to illustrates the Łukasiewicz fuzzy filter. 3. We examine the various properties of the Łukasiewicz fuzzy filter. 4. We discuss characterizations of the Łukasiewicz fuzzy filter. 5. We explore the conditions under which Łukasiewicz fuzzy set can be Łukasiewicz fuzzy filter. 6. We discuss the relationship between fuzzy filter and Łukasiewicz fuzzy …filter. 7. We use the given filter to creates a Łukasiewicz fuzzy filter. 8. We present conditions for the three subsets, called ∈-set, q -set and O -set, to be filters. Show more
Keywords: Sheffer stroke Hilbert algebra, Łukasiewicz fuzzy filter, ∈-set, q-set, O-set
DOI: 10.3233/JIFS-233295
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8231-8243, 2024
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl