Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2023: 2
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Mohan, M. | Tamizhazhagan, V. | Balaji, S.
Article Type: Research Article
Abstract: Cloud computing is a new technology that provides services to customers anywhere, anytime, under varying conditions and managed by a third-party cloud provider. Even though cloud computing has progressed a lot, some attacks still happen. The recent anomalous and signature attacks use clever strategies such as low-rate attacks and attacking as an authenticated user. In this paper, a novel Attack Detection and Prevention (ADAPT) method is proposed to overcome this issue. The proposed system consists of three stages. An Intrusion Detection System is initially used to check whether there is an attack or not by comparing the IP address in …the Blacklist IP Database. If an attack occurs, the IP address will be added to the Blacklist IP database and blocked. The second stage uses Bi-directional LSTM and Bi-directional GRU to check the anomalous and signature attack. In the third stage, classified output is sent to reinforcement learning, if any attack occurs the IP address is added to the blacklist IP database otherwise the packets are forwarded to the user. The proposed ADAPT technique achieves a higher accuracy range than existing techniques. Show more
Keywords: Cloud computing, Bi-directional LSTM, Bi-directional GRU, IP address, and reinforcement learning
DOI: 10.3233/JIFS-236371
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Article Type: Research Article
Abstract: A consistency fuzzy set is composed of mean values and consistency degrees of fuzzy sequences in the transformation process of a fuzzy multiset (FM), but lacks confidence intervals in relation to a confidence level of fuzzy sequences, which shows its deficiency. To solve this deficiency, this paper aims to propose an improved transformation approach from FM to a confidence consistency fuzzy cubic set (CCFCS) and to develop an exponential similarity measure of CCFCSs for modeling piano performance evaluation (PPE) in a FM scenario. Consequently, this study includes the following context. First, a transformation approach from FM to CCFCS is proposed …in terms of mean values, consistency degrees (the complement of standard deviation), and confidence intervals of fuzzy sequences subject to a confidence level and normal distribution. Second, the exponential similarity measure of CCFCSs is proposed in the scenario of FMs. Third, a PPE model is developed based on the proposed similarity measure of CCFCSs in the FM scenario. Finally, the developed model is applied to a piano performance competition organized by Shaoxing University in China as an actual evaluation example, and then the rationality and validity of the proposed model in the scenario of FMs are verified through sensitivity and comparison analysis. Show more
Keywords: Fuzzy multiset, confidence consistency fuzzy cubic set, exponential similarity measure, confidence level, piano performance evaluation
DOI: 10.3233/JIFS-235084
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Zakaria, Aliya Syaffa | Shafi, Muhammad Ammar | Mohd Zim, Mohd Arif | Musa, Aisya Natasya
Article Type: Research Article
Abstract: Lung cancer constituted 12.2% of newly diagnosed cancer cases globally in 2020. The high fatality rate of the condition is attributed to delayed diagnosis and inadequate symptom recognition. In Malaysia, the incidence of lung cancer is estimated to be 1 in 60 males and 1 in 138 females, with a median age of 70 years or above. Most lung cancer cases were detected during advanced stages, specifically stages III and IV, with a prevalence exceeding 90% for both genders. In Malaysia, most patients are diagnosed in stages III and IV, which are associated with a lower likelihood of long-term survival. …Many cases are identified at a late stage, characterized by significant tumor expansion or the spread of cancer cells to areas that cannot be treated surgically. Malaysians are unaware of cancer symptoms; hence the situation is common. To improve survival and reduce mortality, Malaysians must recognize the symptoms of lung cancer. Fuzzy linear regression and multiple linear regression models have been compared to predict high-risk lung cancer symptoms in Malaysia. The fuzzy linear regression model analyses secondary data, eliminates irrelevant information and enhances precision in the results. Lung cancer patients at Al-Sultan Abdullah Hospital (UiTM Hospital) in Selangor provided data for this study. Data from 124 lung cancer patients were analyzed using Microsoft Excel, SPSS, and MATLAB. To improve data accuracy, the study used cross-validation measurement error (MSE and RMSE). According to data analysis, hemoptysis and chest pain are high-risk symptoms with MSE and RMSE values of 1.549 and 1.245, respectively. Show more
Keywords: Lung cancer, symptoms of lung cancer, fuzzy linear regression, prediction data, statistical error
DOI: 10.3233/JIFS-233714
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Tian, Huaqiang | Yu, Long | Tian, Shengwei | Long, Jun | Zhou, Tiejun | Wang, Bo | Li, Yuhuan
Article Type: Research Article
Abstract: A spect-B ased S entiment A nalysis (ABSA ) has been the focus of increasing study in recent years. Previous research has demonstrated that incorporating syntactic information, such as dependency trees, can enhance ABSA performance. Despite the widespread use of metaphors in daily life to express emotions more vividly, few studies have integrated this literary device into ABSA. In this paper, we propose a novel ABSA model that utilizes M etaphor I dentification P rocedure (MIP ) to encode both the sentence and aspect word as a single unit, thereby overcoming these limitations. Our experimental results demonstrate that our …model achieves competitive performance in ABSA. Show more
Keywords: Aspect-based sentiment analysis, metaphorical sentiment analysis, transformer, deep learning
DOI: 10.3233/JIFS-233077
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Yuan, Weijin | Deng, Yunfeng
Article Type: Research Article
Abstract: This paper improves the visual change-based personnel evacuation model by considering the evacuees’ gravity. Specifically, first, the new model incorporates the gravity formula in the model’s mechanic part to consider the influence of gravity. Second, the new model involves rules for determining the visual range of personnel moving in the stairwell. Third, the proposed model investigates the influence of the angle and width of the stairwell, the number of people, and other factors during personnel evacuation under the influence of gravity. The model is developed in Python and is compared with actual results, revealing that the proposed model is more …realistic considering the evacuation time compared to current models. Indeed, under a fixed number of people, when the stairwell angle is less than 34°, the evacuation time decreases as the angle increases, and when the stairwell angle exceeds 34°, the evacuation time is almost unchanged. Additionally, under a fixed number of evacuees, the evacuation time decreases as the width of the stairwell increases, and due to stairwell width space redundancy, the evacuation time tends to stabilize. The results of the new model research provide reference for the design of building safety evacuation, thereby improving the safety of buildings. Show more
Keywords: Stair angle, stair width, view, pedestrian evacuation
DOI: 10.3233/JIFS-236008
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Li, Yaqin | Zhang, Ziyi | Yuan, Cao | Hu, Jing
Article Type: Research Article
Abstract: Traffic sign detection technology plays an important role in driver assistance systems and automated driving systems. This paper proposes DeployEase-YOLO, a real-time high-precision detection scheme based on an adaptive scaling channel pruning strategy, to facilitate the deployment of detectors on edge devices.More specifically, based on the characteristics of small traffic signs and complex background, this paper first of all adds a small target detection layer to the basic architecture of YOLOv5 in order to improve the detection accuracy of small traffic signs.Then, when capturing specific scenes with large fields of view, higher resolution and richer pixel information are preserved instead …of directly scaling the image size.Finally, the network structure is pruned and compressed using an adaptive scaling channel pruning strategy, and the pruned network is subjected to a secondary sparse pruning operation. The number of parameters and computations is greatly reduced without increasing the depth of the network structure or the influence of the input image size, thus compressing the model to the minimum within the compressible range.Experimental results show that the model trained by Experimental results show that the model trained by DeployEase-YOLO achieves higher accuracy and a smaller size on TT100k, a challenging traffic sign detection dataset.Compared to existing methods, DeployEase-YOLO achieves an average accuracy of 93.3%, representing a 1.3% improvement over the state-of-the-art YOLOv7 network, while reducing the number of parameters and computations to 41.69% and 59.98% of the original, respectively, with a compressed volume of 53.22% of the previous one.This proves that the DeployEase-YOLO has a great deal of potential for use in the area of small traffic sign detection.The algorithm outperforms existing methods in terms of accuracy and speed, and has the advantage of a compressed network structure that facilitates deployment of the model on resource-limited devices. Show more
Keywords: Small target, deep learning, model compression, traffic sign detection
DOI: 10.3233/JIFS-235135
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Özlü, Şerif | Al-Quran, Ashraf | Riaz, Muhammad
Article Type: Research Article
Abstract: This paper aims to present Bipolar valued probabilistic hesitant fuzzy sets (BVPHFSs) by combining bipolar fuzzy sets and probabilistic hesitant fuzzy sets (PHFSs). PHFSs are a strong version of hesitant fuzzy sets (HFSs) in terms of evaluated as probabilistic of each element. Probabilistic hesitant fuzzy sets (PHFSs) are a set structure that argues that each alternative should be evaluated probabilistically. In this framework, the proposed cluster allows probabilistic evaluation of decision- makers’ opinions as negative. Thus, this case proposes flexibility about selection of an element and aids to overcome with noise channels. Furthermore, some new aggregation operators are discussed called …bipolar valued probabilistic hesitant fuzzy weighted average operator (BVPHFWA), Generalized bipolar valued probabilistic hesitant fuzzy weighted average operator (GBVPHFWA), bipolar valued probabilistic hesitant fuzzy weighted geometric operator (BVPHFWG), Generalized bipolar valued probabilistic hesitant fuzzy weighted geometric operator (GBVPHFWG), bipolar valued probabilistic hesitant fuzzy hybrid weighted arithmetic and geometric operator (BVPHFHWAG) and Generalized bipolar valued probabilistic hesitant fuzzy hybrid weighted arithmetic and geometric (GBVPHFHWAG) and some basic properties are presented. A score function is defined ranking alternatives. Moreover, two different algorithms are put forward with helping to TOPSIS method and by using aggregation operators over BVPHFSs. The validity of proposed operators are analyzed with an example and results are compared in their own. Show more
Keywords: Probabilistic hesitant fuzzy sets, bipolar valued probabilistic hesitant fuzzy sets, generalized hybrid operators, decision-making
DOI: 10.3233/JIFS-238331
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2024
Authors: Wang, Chishe | Li, Jun | Wang, Jie | Zhao, Weikang
Article Type: Research Article
Abstract: Rapid urbanization has made road construction and maintenance imperative, but detecting road diseases has been time-consuming with limited accuracy. To overcome these challenges, we propose an efficient YOLOv7 road disease detection model. Our approach involves integrating MobilieNetV3 as the backbone feature extraction network to reduce the network’s parameters and computational requirements. Additionally, we introduce the BRA attention module into the spatial pyramid pooling module to eliminate redundant information and enhance the network’s feature representation capability. Moreover, we utilize the F-ReLU activation function in the backbone network, expanding the convolutional layers’ receptive field range. To optimize the model’s boundary loss, we …employ the Wise-IoU loss function, which places more emphasis on the quality of ordinary samples and enhances the overall performance and generalization ability of the network. Experimental results demonstrate that our improved detection algorithm achieves a higher recall rate and mean average precision (mAP) on the public dataset (RDD) and the NJdata dataset in Nanjing’s urban area. Specifically, compared to YOLOv7, our model increases the recall rate and mAP on RDD by 3.3% and 2.6%, respectively. On the NJdata dataset, our model improves the recall rate and mAP by 1.9% and 1.3%, respectively. Furthermore, our model reduces parameter and computational requirements by 30% and 22.5%, respectively, striking a balance between detection accuracy and speed. In conclusion, our road disease detection model presents an effective solution to address the challenges associated with road disease detection in urban areas. It offers improved accuracy, efficiency, and generalization capabilities compared to existing models. Show more
Keywords: Yolov7, lightweight, MobilieNetV3, BRA, F-ReLU, Wise-IoU
DOI: 10.3233/JIFS-239289
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Ratmele, Ankur | Thakur, Ramesh
Article Type: Research Article
Abstract: As more people express their thoughts on products on various online shopping platforms, the feelings expressed in these opinions are becoming a significant source of information for marketers and buyers. These opinions have a big impact on consumers’ decision to buy the best quality product. When there are too many features or a small number of records to analyze, the decision-making process gets difficult. A recent stream of study has used the conventional quantitative star score ratings and textual content reviews in this context. In this research, a decision-making framework is proposed that relies on feature-based opinions to analyze the …textual content of reviews and classify buyer’s opinions, thereby assisting consumers in making long-term purchases. The framework is proposed in this paper for product purchase decision making based on feature-based opinions and deep learning. Framework consists of four components: i) Pre-processing, ii) Feature extraction, iii) Feature-based opinion classification, and iv) Decision-making. Web scraping is used to obtain the dataset of Smartphone reviews, which is subsequently clean and pre-processed using tokenization and POS tagging. From the tagged dataset, noun labeled words are retrieved, and then the probable product’s features are extracted. These feature-based sentences or reviews are processed using a word embedding to generate review vectors that identify contextual information. These word vectors are used to construct hidden vectors at the word and sentence levels using a hierarchical attention method. With respect to each feature, reviews are divided into five classes: extremely positive, positive, extremely negative, negative, and neutral. The proposed method may readily detect a customer’s opinion on the quality of a product based on a certain attribute, which is beneficial in making a purchase choice. Show more
Keywords: Opinions, Opinion Extraction (OE), product features, decision making, hierarchical attention mechanism, GloVe
DOI: 10.3233/JIFS-235389
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Ding, Yahui | Wang, Hongjuan | Liu, Nan | Li, Tong
Article Type: Research Article
Abstract: Traditional Chinese painting (TCP), culturally significant, reflects China’s rich history and aesthetics. In recent years, TCP classification has shown impressive performance, but obtaining accurate annotations for these tasks is time-consuming and expensive, involving professional art experts. To address this challenge, we present a semi-supervised learning (SSL) method for traditional painting classification, achieving exceptional results even with a limited number of labels. To improve global representation learning, we employ the self-attention-based MobileVit model as the backbone network. Furthermore, We present a data augmentation strategy, Random Brushwork Augment (RBA), which integrates brushwork to enhance the performance. Comparative experiments confirm the effectiveness of …TCP-RBA in Chinese painting classification, demonstrating outstanding accuracy of 88.27% on the test dataset, even with only 10 labels, each representing a single class. Show more
Keywords: Traditional chinese paintings, brushwork, semi-supervised learning, image classification
DOI: 10.3233/JIFS-236533
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: You, Miaona | Zhuang, Sumei | Luo, Ruxue
Article Type: Research Article
Abstract: This study proposes a weighted composite approach for grey relational analysis (GRA) that utilizes a numerical weather prediction (NWP) and support vector machine (SVM). The approach is optimized using an improved grey wolf optimization (IGWO) algorithm. Initially, the dimension of NWP data is decreased by t-distributed stochastic neighbor embedding (t-SNE), then the weight of sample coefficients is calculated by entropy-weight method (EWM), and the weighted grey relational of data points is calculated for different weather numerical time series data. At the same time, a new weighted composite grey relational degree is formed by combining the weighted cosine similarity of NWP …values of the historical day and to be measured day. The SVM’s regression power prediction model is constructed by the time series data. To improve the accuracy of the system’s predictions, the grey relational time series data is chosen as the input variable for the SVM, and the influence parameters of the ideal SVM are discovered using the IGWO technique. According to the simulated prediction and analysis based on NWP, it can be observed that the proposed method in this study significantly improves the prediction accuracy of the data. Specifically, evaluation metrics such as root mean squared error (RMSE), regression correlation coefficient (r 2 ), mean absolute error (MAE) and mean absolute percent error (MAPE) all show corresponding enhancements, while the computational burden remains relatively low. Show more
Keywords: t-SNE, power forecasting, IGWO, NWP
DOI: 10.3233/JIFS-237333
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Amsaprabhaa, M.
Article Type: Research Article
Abstract: Human pose recognition from videotapes has become an emerging research topic for tracking human movements. The objective of this work is to develop a deep multimodal Spatio-Temporal Harris Hawk Optimized Pose Recognition (STHHO-PR) framework for self-learning fitness exercises. The presented STHHO-PR framework uses audio modality and visual modality to classify the different poses. In audio modality, the VGG-16 network paradigm is used to extract the audio traits for fitness pose recognition. In visual modality, Harris Hawks Optimization (HHO) along with the Minimum Cross Entropy (MCE) method is employed to find out the optimum threshold values for body parts segmentation. These …segmented body parts highlight the human joint points that are connected through the skeletonization process to extract the skeletal information. The extracted spatio-temporal features from audio modality and visual modality are optimally fused and used in the classification process. Weighted Majority Voting Ensemble (WMVE) classifier is adopted to build the classification model. This work is experimented with yoga videos acquired from publicly available datasets. The results show that the presented STHHO-PR framework outperforms other state-of-art procedures in terms of prediction accuracy. Show more
Keywords: Harris Hawks Optimization, Minimum Cross Entropy, Weighted Majority Voting Ensemble classifier, yoga video, yoga poses classification
DOI: 10.3233/JIFS-233286
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-23, 2024
Authors: Li, Zheming | Chen, Yidan | Yang, Bo | Li, Chenwei | Zhang, Shihua | Li, Wei | Zhang, Hengwei
Article Type: Research Article
Abstract: Abstract Adversarial examples are often used to test and evaluate the security and robustness of image classification models. Though adversarial attacks under white-box setting can achieve a high attack success rate, due to overfitting, the success rate of black-box attacks is relatively low. To this end, this paper proposes diversified input strategies to improve the transferability of adversarial examples. In this method, various transformation methods are applied to randomly transform the original image multiple times, thereby generating a batch of transformed images. Then, in the process of back-propagation, the loss function gradient of the transformed images is calculated, and a weighted …average of the obtained gradient values is performed to generate adversarial perturbation, which is iteratively added to the original image to generate adversarial examples. Meanwhile, by increasing the variety of data augmentation transformation types and the number of input images, the proposed method effectively alleviates overfitting and improves the transferability of adversarial examples. Extensive experiments on the ImageNet dataset indicate that the proposed method can perform black-box attacks better than benchmark methods, with an average of 97.2% success rate attacking multiple models simultaneously. Show more
Keywords: Deep neural network, image classification, adversarial examples, black-box attacks, diversified input
DOI: 10.3233/JIFS-223584
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Lan, Zhiqiang | Wu, Guoyao | Wu, Jiacheng | Li, Jiaqi | Pan, Fan
Article Type: Research Article
Abstract: In the application of new energy consumption system engineering, in order to evaluate the contribution of electric power industry expansion, an evaluation model of electric power industry expansion contribution considering the influencing factors of new energy consumption is constructed. In the process of power industry expansion, the growth of new energy installed capacity, power system regulation ability, power grid interconnection and electricity demand are the core factors that affect the change of power contribution to power industry expansion. Using the characteristic extraction method of power consumption behavior of users with industrial expansion, after extracting two characteristics, namely, the utilization hours …of user’s industrial expansion capacity and the proportion of new energy load put into operation under the change of four major factors, the monthly industrial expansion power consumption of typical users is predicted by the monthly industrial expansion power consumption forecasting method of users considering industrial expansion capacity, and then the growth curve of user’s industrial expansion power consumption is drawn. Based on the forecast method of monthly industry expansion electricity generated by industry expansion quantity, the industry expansion quantity of typical individual users is calculated, and the industry expansion quantity is input into RBF network model trained by particle swarm optimization algorithm to complete the forecast of monthly industry expansion electricity; Finally, the contribution ratio of each influencing factor is calculated, and the evaluation of power industry expansion contribution considering the influencing factors of new energy consumption is completed. After testing, this model can be used as an available model for evaluating the contribution of electric power industry under the condition of considering the influencing factors of new energy consumption. Show more
Keywords: New energy consumption, influencing factors, power industry expansion, contribute electricity, evaluation model, industry expansion capacity
DOI: 10.3233/JIFS-236907
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Song, Can
Article Type: Research Article
Abstract: The development and utilization of network big data is also accompanied by data theft and destruction, so the monitoring of network security is particularly important. Based on this, the study applies the fuzzy C-mean clustering algorithm to the network security model, however, the algorithm has major defects in discrete data processing and the influence of feature weights. Therefore, the study introduces the concept of local density and optimizes the initial clustering center to solve its sensitive defects as well as empirical limitations; at the same time, the study introduces the adaptive methods of fuzzy indicators and feature weighting, and uses …the concepts such as fuzzy center-of-mass distribution to avoid problems such as the model converging too fast and not being able to handle discrete data. Finally, the study does a simulation analysis of the performance of each module, and the comparison of the overall algorithm with the rest of the models. The experimental results show that in the comparison of the overall algorithm, its false detection rate decreases by 8.57% in the IDS Dataset dataset, compared to the particle swarm algorithm. Therefore, the adaptive weighted fuzzy C-Means algorithm based on local density proposed in the study can effectively improve the network intrusion detection performance. Show more
Keywords: Local density, fuzzy clustering, adaptive, hybrid weighting, network security
DOI: 10.3233/JIFS-235082
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Duan, Chunyan | Zhu, Mengshan | Wang, Kangfan
Article Type: Research Article
Abstract: Along with the booming of intelligent manufacturing, the reliability management of intelligent manufacturing systems appears to be becoming more significant. Failure mode and effects analysis (FMEA) is a prospective reliability management instrument extensively utilized to manage failure modes of systems, products, processes, and services in various industries. However, the conventional FMEA method has been criticized for its inherent limitations. Machine learning can handle large amounts of data and has merits in reliability analysis and prediction, which can help in failure mode classification and risk management under limited resources. Therefore, this paper devises a method for complex systems based on an …improved FMEA model combined with machine learning and applies it to the reliability management of intelligent manufacturing systems. First, the structured network of failure modes is constructed based on the knowledge graph for intelligent manufacturing systems. Then, the grey relation analysis (GRA) is applied to determine the risk prioritization of failure modes. Hereafter, the k-means algorithm in unsupervised machine learning is employed to cluster failure modes into priority classes. Finally, a case study and further comparative analysis are implemented. The results demonstrate that failure modes in system security, production quality, and information integration are high-risk and require more resources for prevention. In addition, recommendations for risk prevention and monitoring of intelligent manufacturing systems were given based on the clustering results. In comparison to the conventional FMEA method, the proposed method can more precisely capture the coupling relationship between the failure modes compared with. This research provides significant support for the reliability and risk management of complex systems such as intelligent manufacturing systems. Show more
Keywords: Failure mode and effects analysis, reliability analysis, intelligent manufacturing systems, machine learning
DOI: 10.3233/JIFS-232712
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Cui, Hongzhen | Zhang, Longhao | Zhu, Xiaoyue | Guo, Xiuping | Peng, Yunfeng
Article Type: Research Article
Abstract: Extracting and digitizing drug attributes from medical literature is the first step to build a knowledge computing system for precision disease treatment. In order to build a cardiovascular drug knowledge base, this paper proposes a multi-label text classification method for cardiovascular drug attributes from the Chinese drug guideline. The drug attributes are characterized by a BERT pre-trained model, and a dual-feature extraction structure is proposed based on the BiGRU neural network to capture high-level semantic information. Label categorization of cardiovascular drug attributes, such as indications and mode of administration, is accomplished. The F1 score of 0.8431 was obtained using 5-fold …cross-validation. Comparing KNN and Naïve bayes, and conducting CNN and BiGRU control experiments on the basis of Word2Vec characterization of medication guidelines, the proposed multi-label text classification method is effective and the F1 value is significantly improved. Proved by analysis of ablation and crossover experiments, the proposed method can achieve a high accuracy rate averaged at 0.8339. Show more
Keywords: Multi-label text classification, cardiovascular drug attributes, BERT, BiGRU, dual feature extraction
DOI: 10.3233/JIFS-236115
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Zhang, Bei | Cao, Yuan | Wang, Changqing | Wang, Meng
Article Type: Research Article
Abstract: To address the challenges of dense scenarios with densely distributed small-scale faces, severe occlusions, and unclear features leading to inaccurate detection and high miss rates, we propose a lightweight small-scale face detection algorithm based on YOLOv5. The aim is to enhance the accuracy and precision of target detection. Firstly, we introduce the Convolutional Block Attention Module (CBAM) into the existing backbone network, obtaining more detailed features by comprehensively considering both spatial and channel dimensions. Next, in the Neck network, we embed involution to enhance channel information and weight distribution. Finally, a new feature fusion layer is added to improve the …capture capability of feature information for smaller pixels and smaller targets in visible areas by integrating deep semantic information with shallow semantic information. The experimental results demonstrate that the improved model exhibits an increase in the average precision across all three subsets of the public WIDER FACE dataset, with improvements of 3.2%, 3.4%, and 2.6% respectively. The detection frame rate reaches 87 frames per second (FPS), significantly enhancing the detection performance of facial targets. This improvement meets the accuracy and real-time requirements for detecting small-scale facial targets in dense scenarios. Show more
Keywords: Dense scenarios, small-scale faces, CBAM, involution, feature fusion layer
DOI: 10.3233/JIFS-238575
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Maddali, Deepika
Article Type: Research Article
Abstract: A rising number of edge devices, like controllers, sensors, and robots, are crucial for Industrial Internet of Things (IIoT) networks for collecting data for communication, storage, and processing. The security of the IIoT could be compromised by any malicious or unusual behavior on the part of any of these devices. They may also make it possible for malicious software placed on end nodes to enter the network and perform unauthorized activities. Existing anomaly detection techniques are less effective due to the increasing diversity of the network and the complexity of cyberattacks. In addition, most strategies are ineffective for devices with …limited resources. Therefore, this work presents an effective deep learning based Malware Detection framework to make the edge based IIoT network more secure. This multi-stage system begins with the Deep Convolutional Generative Adversarial Networks (DCGAN) based data augmentation method to overcome the issue of data imbalance. Next, a ConvNeXt-based method extracts the features from the input data. Finally, an optimized Enhanced Elman Spike Neural Network (EESNN) based deep learning is utilized for malware recognition and classification. Using two distinct datasets— MaleVis and Malimg— the generalizability of the suggested model is clearly demonstrated. With an accuracy of 99.24% for MaleVis and 99.31% for the Malimg dataset, the suggested strategy demonstrated excellent results and surpassed all other existing methods. It illustrates how the suggested strategy outperforms alternative models and offers numerous benefits. Show more
Keywords: IIoT, deep learning, ConvNeXt, Malimg, EESNN, DCGAN, MaleVis
DOI: 10.3233/JIFS-234897
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Mi, Xiaodong | Luo, Qifang | Zhou, Yongquan
Article Type: Research Article
Abstract: Panchromatic and multi-spectral image fusion, called panchromatic sharpening, is the process of combining the spatial and spectral information of the source image into the fused image to give the image a higher spatial and spectral resolution. In order to improve the spatial resolution and spectral information quality of the image, an adaptive multi-spectral image fusion method based on an improved arithmetic optimization algorithm is proposed. This paper proposed improved arithmetic optimization algorithm, which uses dynamic stochastic search technique and oppositional learning operator, to perform local search and behavioral complementation of population individuals, and to improve the ability of population individuals …to jump out of the local optimum. The method combines adaptive methods to calculate the weights of linear combinations of panchromatic and multi-spectral gradients to improve the quality of fused images. This study not only improves the quality and effect of image fusion, but also focuses on optimizing the operation efficiency of the algorithm to have real-time and high efficiency. Experimental results show that the proposed method exhibits strong performance on different datasets, improves the spatial resolution and spectral information quality of the fused images, and has good adaptability and robustness. The source code is available at: https://github.com/starboot/IAOA-For-Image-Fusion . Show more
Keywords: Image fusion, multi-spectral image, panchromatic image, oppositional learning operator, arithmetic optimization algorithm, meta-heuristic
DOI: 10.3233/JIFS-235607
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-33, 2024
Authors: Premalatha, G. | Chandramani, Premanand V. | Panimalar, K.
Article Type: Research Article
Abstract: Gait analysis is a widely used technique for passive human identification and tracking, with potential applications in security and surveillance systems. However, existing gait recognition methods face challenges in handling changing angles and uncertain features. In this paper, we propose a novel gait recognition approach that leverages real-time spatio-temporal gait features, including step length, gait cycle, height, cadence, swing ratio, and foot length. We apply the Extreme Learning Machines (ELM) algorithm for classification, which has been shown to be effective in various applications due to its fast-learning speed and good generalization performance. To further enhance the recognition rate, we introduce …an evolutionary BAT-optimized ELM algorithm that addresses the instability issue in ELM. The proposed BAT-ELM algorithm can optimize the hidden nodes and weights of ELM, which leads to improved efficiency in recognizing gait from multiple view angles ranging from 0° to 180°. Our comprehensive analysis of the proposed approach indicates that it outperforms other reported algorithms in terms of recognition rate and efficiency. Our work demonstrates the effectiveness of combining real-time spatio-temporal gait features with the BAT-ELM algorithm for gait recognition. The proposed approach has potential applications in various fields, including security and surveillance systems, healthcare, and robotics. Our findings highlight the importance of leveraging evolutionary algorithms to optimize machine learning models and achieve better performance in complex recognition tasks. Show more
Keywords: Spatio-temporal feature, BAT, extreme learning machines, gait cycle
DOI: 10.3233/JIFS-210522
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Ren, Yonghui | Shi, Yan | Li, Chenglin | Jin, Yanxu
Article Type: Research Article
Abstract: Robots can help people complete repetitive and high-risk tasks, such as industrial production, medical care, environmental monitoring, etc. The control system of robots is the key to their ability to complete tasks, and studying robot control systems is of great significance. This article used Convolutional Neural Network (CNN) and Robotic Process Automation (RPA) technologies to optimize and train the robot control system and constructed a robot control system. This article conducts perception and decision-making experiments and execution experiments in the experimental section. According to the experimental results, it can be concluded that the average image recognition accuracy of the robot …control system in perception and decision-making experiments was 94.62% . The average decision accuracy was 87.5%, and the average time efficiency was 176 seconds. During the execution of the experiment, the deviation of the motion trajectory shall not exceed 5 cm, and the oscillation amplitude shall not exceed 6°; the distance from the obstacle shall not exceed 20 cm, and the movement speed shall not exceed 0.6 m/s; the operating time shall not exceed 25 hours, and the number of faults shall not exceed 0.2 times per hour, all within the normal range. The robot control system based on Deep Learning (DL) and RPA has broad application prospects and research value, which would bring new opportunities and challenges to the development and application of robot technology. Show more
Keywords: Robot control system, Robotic Process Automation (RPA), Convolutional Neural Network (CNN), Deep Learning (DL)
DOI: 10.3233/JIFS-233056
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Fan, Lin | Wang, Wenli
Article Type: Research Article
Abstract: The ability, interest, and prior accomplishments of students with varying proficiency levels all impact how they learn English. Exact validation is essential for facilitating efficient evaluation and training models. The research’s innovative significance resides in incorporating personal attributes, progressive appraisal, and Fuzzy Logic-based appraisal in English language learning. The PA2M model, which addresses the shortcomings of existing models, offers a thorough and accurate assessment, enabling personalized recommendations and enhanced teaching tactics for students with varied skill levels. This research proposes the Fuzzy Logic System (FLS)-based Persistent Appraisal Assessment Model (PA2M). Based on the students’ evolving performance and accumulated data, this …model evaluates the students’ English learning capabilities. The model assesses the student’s ability using fuzzification approaches to reduce variations in appraisal verification by linking personal attributes with performance. Mamdani FIS offers a clear and thorough evaluation of student’s English learning capacity within the framework of the appraisal methodology. The inputs are updated utilizing performance and accumulated ability data to improve validation consistently and reduce converge errors. During the fuzzification process, pre-convergence from unavailable appraisal sequences is eliminated. The PA2M approach determines precise improvements and evaluations depending on student ability by merging prior and current data. Several appraisal validations and verifications result in clear fresh suggestions. According to experimental data, the suggested model enhances 9.79% of recommendation rates, 8.79% of appraisal verification, 8.25% of convergence factor, 12.56% error ratio, and verification time with 8.77% over a range of inputs. The PA2M model provides a fresh and useful way to evaluate English learning potential, filling in some gaps in the body of knowledge and practice. Show more
Keywords: Big data, English learning, fuzzy logic system, student ability
DOI: 10.3233/JIFS-232619
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Zou, Yu | Fu, Deyu | Mo, Honghuai | Chen, Henglong | Wang, Deyin
Article Type: Research Article
Abstract: Foreign objects identification in the distribution network is an important link in the security of electric power, and is of great significance to the normal transportation of electric power. At present, a lot of equipment in the distribution network is in the open air environment, facing a large number of foreign interference. These foreign objects not only bring potential safety hazards to the distribution network, but also easily lead to short circuit, causing power supply difficulties within the region. Therefore, the research first constructs an optimized triplet feature learning model. On this basis, the HOG-SVM depth feature recognition model is …proposed. In HOG-SVM, AM is introduced to improve recognition accuracy. In addition, the research enhances the night vision ability of the model by standardizing the features in the image region block. The results show that the AP of the model is stable at more than 90.54%, the average FPR is 2.21%, and the average FNR is 3.17% . The performance of HOG-SVM is significantly better than that of traditional SVM. It verifies the contribution of this research in the field of foreign object recognition and application value in ensuring the security of distribution network. Show more
Keywords: Distribution network, foreign objects, depth characteristics, attention
DOI: 10.3233/JIFS-237868
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Yi, Lingzhi | Peng, Xinlong | Fan, Chaodong | Wang, Yahui | Li, Yunfan | Liu, Jiangyong
Article Type: Research Article
Abstract: Reliable and accurate short-term forecasting of residential load plays an important role in DSM. However, the high uncertainty inherent in single-user loads makes them difficult to forecast accurately. Various traditional methods have been used to address the problem of residential load forecasting. A single load forecast model in the traditional method does not allow for comprehensive learning of data characteristics for residential loads, and utilizing RNNs faces the problem of long-term memory with vanishing or exploding gradients in backpropagation. Therefore, a gated GRU combined model based on multi-objective optimization is proposed to improve the short-term residential load forecasting accuracy in …this paper. In order to demonstrate the effectiveness, GRUCC-MOP is first experimentally tested with the unimproved model to verify the model performance and forecasting effectiveness. Secondly the method is evaluated experimentally with other excellent forecasting methods: models such as DBN, LSTM, GRU, EMD-DBN and EMD-MODBN. By comparing simulation experiments, the proposed GRU combined model can get better results in terms of MAPE on January, April, July, and November load data, so this proposed method has better performance than other research methods in short-term residential load forecasting. Show more
Keywords: Short-term residential load forecasting, gate recurrent unit, multi-objective optimization algorithm, deep learning
DOI: 10.3233/JIFS-237189
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Zhang, Jianhua | Liu, Chan | Geng, Na | Zhang, Yixuan | Yang, Liqiang
Article Type: Research Article
Abstract: An improved Ant Colony Optimization (ACO) algorithm, named IACO, is proposed to address the inherent limitation of slow convergence, susceptibility to local optima and excessive number of inflection in traditional ACO when solving path planning problems. To this end, firstly, the search direction number is expanded from 4 or 8 into 32; Secondly, the distance heuristic information is replaced by an area heuristic function, which deviated from the traditional approach that only considers pheromone information between two points; Then, the influence of path angle and number of turns is taken into account in the local pheromone update. Additionally, a reward …and punishment mechanism is employed in the global pheromone update to adjust the pheromone concentrations of different paths; Furthermore, an adaptive update strategy for pheromone volatility factor adaptive is proposed to expand the search range of the algorithm. Finally, simulation experiments are conducted under various scenarios to verify the superiority and effectiveness of the proposed algorithm. Show more
Keywords: Ant colony optimization, mobile robot, path planning, search direction, area-inspired, grid map
DOI: 10.3233/JIFS-238095
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Sangeetha, M. | Nimala, K.
Article Type: Research Article
Abstract: NLP, or natural language processing, is a subfield of AI that aims to equip computers with the ability to understand and analyze human language. Sentiment analysis is a widely used application of NLP, particularly for examining attitudes expressed in online conversations. Nevertheless, many social media comments are written in languages that are not native to the authors, making sentiment analysis more difficult, especially for languages with limited resources, such as Tamil. To tackle this issue, a code-mixed and sentiment-annotated corpus in Tamil and English was created. This article will explain how the corpus was established, including the process of data …collection and the assignment of polarities. The article will also explore the agreement between annotators and the results of sentiment analysis performed on the corpus. This work signifies various performance metrics such as precision, recall, support, and F1-score for the transformer-based model such as BERT, RoBerta, and XLM-RoBerta. Among the various models, XLM-Robert shows slightly significant positive results on the code-mixed corpus when compared to the state of art models. Show more
Keywords: Sentiment analysis, Tamil-English Code-mix, natural language processing, corpus, grammar rule
DOI: 10.3233/JIFS-236971
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Yang, Jingling | Chen, Liren | Chen, Huayou | Liu, Jinpei | Han, Bing
Article Type: Research Article
Abstract: The conventional approaches to constructing Prediction Intervals (PIs) always follow the principle of ‘high coverage and narrow width’. However, the deviation information has been largely neglected, making the PIs unsatisfactory. For high-risk forecasting tasks, the cost of forecast failure may be prohibitive. To address this, this work introduces a multi-objective loss function that includes Prediction Interval Accumulation Deviation (PIAD) within the Lower Upper Bound Estimation (LUBE) framework. The proposed model can achieve the goal of ‘high coverage, narrow width, and small bias’ in PIs, thus minimizing costs even in cases of prediction failure. A salient feature of the LUBE framework …is its ability to discern uncertainty without explicit uncertainty labels, where the data uncertainty and model uncertainty are learned by Deep Neural Networks (DNN) and a model ensemble, respectively. The validity of the proposed method is demonstrated through its application to the prediction of carbon prices in China. Compared with conventional uncertainty quantification methods, the improved interval optimization method can achieve narrower PI widths. Show more
Keywords: Prediction interval, uncertainty prediction, deep neural networks, carbon price
DOI: 10.3233/JIFS-237524
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Shakkeera, L. | Dhiyanesh, B. | Asha, A. | Kiruthiga, G.
Article Type: Research Article
Abstract: To address this storage issue, we propose a Content-Aware Deduplication Clustering Analysis for Cloud Storage Optimization (CADC-FPRLE) based on a file partitioning running length encoder. At first, preprocessing was done by indexing, counting terms, cleansing, and tokenizing. Further multi-objective clustering points are analysed based on the bisecting divisible partition block, which divides a set of documents. The count terms are filtered from the divisible blocks and make up the count terms content block. Using Content-Aware Multi-Hash Ensemble Clustering (CAMH-EC) to group the similar blocks into clusters. This creates a high-dimensional Euclidean interval to create the number of clusters, and points …are performed randomly to set the initial collection. Then, the Magnitude Vector Space Rate (MVSR) estimates the similarity distance between the groups to select the highest scatter value content for indexing. Finally, the Running Block Parity Encoder (RBPE) generates similarity parity in order to reduce the content to a redundant, singularized file in order to optimise storage. This implementation proves a higher level of storage optimization compared to the previous system than other methods. Show more
Keywords: Data deduplication, semantic analysis, cloud storage, magnitude vector space, cluster analysis, running length encoder
DOI: 10.3233/JIFS-231223
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Saichand, N. Venkata | Naik, S. Gopiya
Article Type: Research Article
Abstract: Epilepsy is considered a most general neurological disorder related to brain activity disruption. In epileptic seizures detection and classification, EEG (Electroencephalogram) measurements that record the brain’s electrical activities are used frequently. Generally, physicians investigate the abnormalities in the brain. However, this technique is time-consuming, faced complexity in seizure detection, and poor consistency because of data imbalance. To overcome these difficulties, Improved Empirical Mode Decomposition for feature extraction and Improved Weight Updated KNN (K-Nearest Neighbor) algorithm for classification are proposed. In the case of pre-processing, a rule-based filter, namely a wiener scalar filter with integer wavelet transform is used for multiple …channels conversion and further signal to noise ratio is increased. Further in feature extraction, better features are extracted using an improved empirical mode decomposition-based bandpass filter. By using the Improved Weight updated KNN, feature extracted samples are classified incorrect manner, avoiding data imbalance issues. Feature vectors’ effective classification is performed attains higher computational speed and sensitivity. The EEG input signal of the proposed study utilizing the BONN dataset and different performance metrics such as accuracy, sensitivity, specificity, recall, f-score, and error values were performed and compared with various existing studies. From the results, it is clear that the proposed method provides effective detection for seizure and non-seizure patients compared with existing studies. Show more
Keywords: Seizure detection, bandpass filter, rule-based filter, improved empirical mode decomposition, improved weight updated KNN
DOI: 10.3233/JIFS-222960
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Guo, Sheng | Tan, Mian | Cai, Shan | Zhang, Zaijun | Liang, Yihui | Feng, Hongxi | Zou, Xue | Wang, Lin
Article Type: Research Article
Abstract: Although facial expression recognition (FER) has a wide range of applications, it may be difficult to achieve under local occlusion conditions which may result in the loss of valuable expression features. This issue has motivated the present study, as a part of which an effective multi-feature cross-attention network (MFCA-Net) is proposed. The MFCA-Net consists of a two-branch network comprising a multi-feature convolution module and a local cross-attention module. Thus, it enables decomposition of facial features into multiple sub-features by the multi-feature convolution module to reduce the impact of local occlusion on facial expression feature extraction. In the next step, the …local cross-attention module distinguishes between occluded and unoccluded sub-features and focuses on the latter to facilitate FER. When the MFCA-Net performance is evaluated by applying it to three public large-scale datasets (RAF-DB, FERPlus, and AffectNet), the experimental results confirm its good robustness. Further validation is performed on a real FER dataset with local occlusion of the face. Show more
Keywords: Facial expression recognition, deep convolution, multi-feature convolution module, local cross-attention module
DOI: 10.3233/JIFS-233748
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Wang, Lai-Wang | Hung, Chen-Chih
Article Type: Research Article
Abstract: In response to the low efficiency and poor quality of current seed optimization algorithms for multi-threshold image segmentation, this paper proposes the utilization of the normal distribution in the cluster distribution mathematical model, the Levy flight mechanism, and the differential evolution algorithm to address the deficiencies of the seed optimization algorithm. The main innovation lies in applying the BBO algorithm to image multi threshold segmentation, providing a new perspective and method for image segmentation tasks. The second significant progress is the combination of Levy flight dynamics and differential evolution algorithm (DEA) to improve the BBO algorithm, thereby enhancing its performance …and image segmentation quality. Therefore, a multi-threshold image segmentation model based on the optimized seed optimization algorithm is developed. The experimental results showed that on the function f1, the iteration of the improved seed optimization algorithm was 53, the Generational Distance value was 0.0020, the Inverted Generational Distance value was 0.098, and the Spacing value was 0.051. Compared with the other two algorithms, the improved seed optimization algorithm has better image segmentation performance and clearer image segmentation details. In summary, compared with existing multi-threshold image segmentation methods, the proposed multi-threshold image segmentation model based on the improved seed optimization algorithm has a better image segmentation effect and higher efficiency, can significantly improve the quality of image segmentation, has positive significance for the development of image processing technology, and also provides references for the improvement and application of optimization algorithms. Show more
Keywords: Seed optimization algorithm, differential evolution algorithm, image segmentation, levy flight mechanism
DOI: 10.3233/JIFS-237994
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-22, 2024
Authors: Duan, Wenbiao | Yang, Mingjin | Sun, Weiliang | Xia, Mingmin | Zhu, Hui | Gu, Chijiang | Zhang, Haiqiang
Article Type: Research Article
Abstract: OBJECTIVE: A comprehensive evaluation of studies using DNA microarray datasets for screening and identifying key genes in gastric cancer is the goal of this systematic review and meta-analysis. To better understand the molecular environment associated with stomach cancer, this study aims to provide a quantitative synthesis of findings. PURPOSE: Using DNA microarray databases in a systematic manner, this study aims to analyze gastric cancer (GC) screening and gene identification efforts. Through a literature review spanning 2002–2022, this research aims to identify key genes associated with GC and develop strategies for screening and prognosis based on these …findings. METHODS: The following databases were searched extensively: Science Direct, NCKI, Web of Science, Springer, and PubMed. Fifteen studies met the inclusion and exclusion criteria; 10,134 tissues served as controls and 11,724 as GCs. The levels of critical genes, including COL1A1, COL1A2, THBS2, SPP1, SPARC, COL6A3, and COL3A1, were compared in normal and GC tissues. Rev Man 5.3 was used to do the meta-analysis. While applying models with fixed or random effects, 95% confidence intervals and weighted mean differences were computed. RESULTS According to the meta-analysis, GC tissues exhibited substantially elevated levels of important genes when contrasted with the control group. In particular, there were statistically significant increases in COL1A1 (MD = 2.43, 95% CI: 1.84–3.02), COL1A2 (MD = 2.75, 95% CI: 1.09–4.41), THBS2 (MD = 2.54, 95% CI: 1.66–3.41), SPP1 (MD = 3.64, 95% CI: 3.40–3.88), SPARC (MD = 1.57, 95% CI: 0.37–2.77), COL6A3 (MD = 2.31, 95% CI: 2.02–2.60), and COL3A1 (MD = 2.21, 95% CI: 1.59–2.82). CONCLUSIONS: The COL1A1, THBS2, SPP1, COL6A3, and COL3A1 genes were shown to have potential use in germ cell cancer screening and prognosis, according to this research. Clinical assessment and prognosis of heart failure patients may be theoretically supported by the results of this study. Show more
Keywords: DNA microarray database, gastric cancer, key genes, meta-analysis
DOI: 10.3233/JIFS-236416
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Li, Tao | Zhang, Zhongyu | Tao, Zhigang | Jia, Xinyu | Wang, Xiaolong | Wang, Jian
Article Type: Research Article
Abstract: Rock crack is one of the main factors responsible for rock failure. Uniaxial compression creep tests are performed using acoustic emission techniques, a high-sensitivity, non-radiative, non-destructive testing method to understand the influence of crack number on the precursor characteristics of short-term creep damage in the fractured rock mass. Based on the Grassberger-Procaccia (G-P) algorithm, the calculation step size for the correlation dimension value (D 2 ) of the acoustic emission ringing count rate is consistent with that for the acoustic emission b -value. The influence of the number of pre-cracks on the Acoustic emission precursor characteristics of red sandstone …creep is analyzed. The results show that near the destabilization of the specimen, the Acoustic emission accumulative ringing count surges in a stepwise manner, the Acoustic emission b -value decreases, the D 2 -value increases, the Acoustic emission amplitude shows high intensity and high frequency, and the ringing count increases sharply, all with the characteristics of failure precursors. During the accelerated creep stage of the specimens, with the increase of pre-cracks number, the precursory time points of acoustic emission b -value and D 2 -value advance, and their acoustic emission ringing counts increase sharply. Show more
Keywords: Acoustic emission, b-value, correlation dimension value (D2), precursor information, pre-cracks
DOI: 10.3233/JIFS-238964
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Hou, Xiaoyu | Luo, Chao | Gao, Baozhong
Article Type: Research Article
Abstract: Candlesticks are widely used as an effective technical analysis tool in financial markets. Traditionally, different combinations of candlesticks have formed specific bullish/bearish patterns providing investors with increased opportunities for profitable trades. However, most patterns derived from subjective expertise without quantitative analysis. In this article, combining bullish/bearish patterns with ensemble learning, we present an intelligent system for making stock trading decisions. The Ensemble Classifier through Multimodal Perturbation (ECMP) is designed to generate a diverse set of precise base classifiers to further determine the candlestick patterns. It achieves this by: first, introducing perturbations to the sample space through bootstrap sampling; second, employing …an attribute reduction algorithm based on neighborhood rough set theory to select relevant features; third, perturbing the feature space through random subspace selection. Ultimately, the trading decisions are guided by the classification outcomes of this procedure. To evaluate the proposed model, we apply it to empirical investigations within the context of the Chinese stock market. The results obtained from our experiments clearly demonstrate the effectiveness of the approach. Show more
Keywords: Trading system, ensemble learning, multimodal perturbation method, neighborhood rough set theory
DOI: 10.3233/JIFS-237087
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-19, 2024
Authors: Zhao, Bin | Cao, Wei | Zhang, Jiqun | Gao, Yilong | Li, Bin | Chen, Fengmei
Article Type: Research Article
Abstract: Aiming at the issue that the current click-through rate prediction methods ignore the varying impacts of different input features on prediction accuracy and exhibit low accuracy when dealing with large-scale data, a click-through rate prediction method (GBIFM) which combines Gradient Boosting Decision Tree (GBDT) and Input-aware Factorization Machine (IFM) is proposed in this paper. The proposed GBIFM method employs GBDT for data processing, which can flexibly handle various types of data without the need for one-hot encoding of discrete features. An Input-aware strategy is introduced to refine the weight vector and embedding vector of each feature for different instances, adaptively …learning the impact of each input vector on feature representation. Furthermore, a fully connected network is incorporated to capture high-order features in a non-linear manner, enhancing the method’s ability to express and generalize complex structured data. A comprehensive experiment is conducted on the Criteo and Avazu datasets, the results show that compared to typical methods such as DeepFM, AFM, and IFM, the proposed method GBIFM can increase the AUC value by 10% –12% and decrease the Logloss value by 6% –20%, effectively improving the accuracy of click-through rate prediction. Show more
Keywords: Click-through rate estimation, GBIFM, GBDT, IFM
DOI: 10.3233/JIFS-234713
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Wang, Shuo | Yang, Jing | Yang, Yue
Article Type: Research Article
Abstract: Personalized recommendation systems fundamentally assess user preferences as a reflection of their emotional responses to items. Traditional recommendation algorithms, focusing primarily on numerical processing, often overlook emotional factors, leading to reduced accuracy and limited application scenarios. This paper introduces a collaborative filtering recommendation method that integrates features of facial information, derived from emotions extracted from such data. Upon user authorization for camera usage, the system captures facial information features. Owing to the diversity in facial information, deep learning methods classify these features, employing the classification results as emotional labels. This approach calculates the similarity between emotional and item labels, reducing …the ambiguity inherent in facial information features. The fusion process of facial information takes into account the user’s emotional state prior to item interaction, which might influence the emotions generated during the interaction. Variance is utilized to measure emotional fluctuations, thereby circumventing misjudgments caused by sustained non-interactive emotions. In selecting the nearest neighboring users, the method considers not only the similarity in user ratings but also in their emotional responses. Tests conducted using the Movielens dataset reveal that the proposed method, modeling facial features, more effectively aligns recommendations with user preferences and significantly enhances the algorithm’s performance. Show more
Keywords: Collaborative filtering algorithm, facial information features, emotional factors, non-interactive emotion
DOI: 10.3233/JIFS-232718
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2024
Authors: Zhai, Shanshan | Fan, Jianping | Liu, Lin
Article Type: Research Article
Abstract: Neutrosophic cubic set (NCS) can process complex information by choosing both interval value and single value membership and indeterminacy and falsehood components. The aggregation operators based on Aczel-Alsina t-norm and t-corm are quite effective for evaluating the interrelationship among attributes. The purpose of this paper is to diagnose the interrelationship among attributes with neutrosophic cubic information, and propose a multi-attribute decision-making(MADM) method for supplier selection problem with unknown weight under neutrosophic cubic environment. We defined neutrosophic cubic Aczel-Alsina (NC-AA) operator and neutrosophic cubic Aczel–Alsina weighted arithmetic average (NCAAWAA) operator, then we discussed various important results and some properties of the …proposed operators. Additionally, we proposed a MADM method under the presence of the NC-AAWAA operator. When the weights of attributes are unknown, we use the MEREC method to determine the weights. Later, the NC-AAWAA operator and MEREC method are applied to address the supplier selection problem. Finally, a sensitivity analysis and a comparative analysis are conducted to illustrate the stability and superiority of the proposed method. The results show the NC-AAWAA operator can handle the interrelationship among complex information more effectively, and MEREC method can weight the attributes based on the removal effect of a neutrosophic cubic attribute. Show more
Keywords: Multi-attribute decision-making (MADM), neutrosophic cubic set (NCS), Aczel-Alsina aggregation operators, MEREC method
DOI: 10.3233/JIFS-235274
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-22, 2024
Authors: Hong, Yuntao
Article Type: Research Article
Abstract: Obsessive-compulsive disorder (OCD) is a chronic disease and psychosocial disorder that significantly reduces the quality of life of patients and affects their personal and social relationships. Therefore, early diagnosis of this disorder is of particular importance and has attracted the attention of researchers. In this research, new statistical differential features are used, which are suitable for EEG signals and have little computational load. Hilbert-Huang transform was applied to EEGs recorded from 26 OCD patients and 30 healthy subjects to extract instant amplitude and phase. Then, modified mean, variance, median, kurtosis and skewness were calculated from amplitude and phase data. Next, …the difference of these statistical features between various pairs of EEG channels was calculated. Finally, different scenarios of feature classification were examined using the sparse nonnegative least squares classifier. The results showed that the modified mean feature calculated from the amplitude and phase of the interhemispheric channel pairs produces a high accuracy of 95.37%. The frontal lobe of the brain also created the most distinction between the two groups among other brain lobes by producing 90.52% accuracy. In addition, the features extracted from the frontal-parietal network produced the best classification accuracy (93.42%) compared to the other brain networks examined. The method proposed in this paper dramatically improves the accuracy of EEG classification of OCD patients from healthy individuals and produces much better results compared to previous machine learning techniques. Show more
Keywords: Obsessive-compulsive disorder (OCD), Electroencephalogram (EEG), Hilbert-Huang transform, statistical features, classification
DOI: 10.3233/JIFS-237946
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Zhao, Xixi | Gu, Liang | Duan, Xiaorong | Wang, Liguo | Li, Zhenxi
Article Type: Research Article
Abstract: Cloud storage attribute libraries usually store a large amount of sensitive data such as personal information and trade secrets. Attackers adopt diverse and complex attack methods to target the cloud storage attribute database, which makes the defense work more challenging. In order to realize the secure storage of information, an attribute based cloud storage anti-attack algorithm based on dynamic authorization access is proposed. According to the characteristic variables of the sample, the data correlation matrix is calculated, and the principal component analysis method is adopted to reduce the dimension of the data, build the anti-attack code model, simulate the dynamic …authorization access rights, and calculate the packet loss rate according to the anti-attack flow. Design the initialization stage, cluster stage and cluster center update stage to realize the attack prevention of cloud storage attribute database. The experimental results show that the proposed algorithm can accurately classify the anti-attack code, has good packet processing ability, relatively short page request time, and anti-attack success rate is higher than 90%, which can effectively ensure the stability of the algorithm. Show more
Keywords: Dynamic authorization access, cloud storage attributes, basic anti-attack algorithm, anti-attack code model, access permissions
DOI: 10.3233/JIFS-237409
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Mahendran, S. | Gomathy, B.
Article Type: Research Article
Abstract: This study addresses the escalating energy demands faced by global industries, exerting pressure on power grids to maintain equilibrium between supply and demand. Smart grids play a pivotal role in achieving this balance by facilitating bidirectional energy flow between end users and utilities. Unlike traditional grids, smart grids incorporate advanced sensors and controls to mitigate peak loads and balance overall energy consumption. The proposed work introduces an innovative deep learning strategy utilizing bi-directional Long Short Term Memory (b-LSTM) and advanced decomposition algorithms for processing and analyzing smart grid sensor data. The application of b-LSTM and higher-order decomposition in the analysis …of time-series data results in a reduction of Mean Absolute Percentage Error (MAPE) and Minimal Root Mean Square (RMSE). Experimental outcomes, compared with current methodologies, demonstrate the model’s superior performance, particularly evident in a case study focusing on hourly PV cell energy patterns. The findings underscore the efficacy of the proposed model in providing more accurate predictions, thereby contributing to enhanced management of power grid challenges. Show more
Keywords: Smart grids, deep learning, PV cells, error rate and absolute error, prediction
DOI: 10.3233/JIFS-238850
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Ning, Yi | Liu, Meiyu | Guo, Xifeng | Liu, Zhiyong | Wang, Xinlu
Article Type: Research Article
Abstract: Accurate load forecasting is an important issue for safe and economic operation of power system. However, load data often has strong non-stationarity, nonlinearity and randomness, which increases the difficulty of load forecasting. To improve the prediction accuracy, a hybrid short-term load forecasting method using load feature extraction based on complete ensemble empirical mode decomposition with adaptive noise (CEEMDAN) and refined composite multi-scale entropy (RCMSE) and improved bidirectional long short time memory (BiLSTM) error correction is proposed. Firstly, CEEMDAN is used to separate the detailed information and trend information of the original load series, RCMSE is used to reconstruct the feature …information, and Spearman is used to screen the features. Secondly, an improved butterfly optimization algorithm (IBOA) is proposed to optimize BiLSTM, and the reconstructed components are predicted respectively. Finally, an error correction model is constructed to mine the hidden information contained in error sequence. The experimental results show that the MAE, MAPE and RMSE of the proposed method are 645 kW, 0.96% and 827.3 kW respectively, and MAPE is improved by about 10% compared with other hybrid models. Therefore, the proposed method can overcome the problem of inaccurate prediction caused by data and inherent defects of models and improve the prediction accuracy. Show more
Keywords: Short-term load forecasting, complete ensemble empirical mode decomposition with adaptivenoise, refined composite multi-scale entropy, improved butterfly optimization algorithm, bidirectional long short time memory neural network
DOI: 10.3233/JIFS-237993
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Arulmurugan, A. | Jose Moses, G. | Gandhi, Ongole | Sheshikala, M. | Arthie, A.
Article Type: Research Article
Abstract: In the current scenario, feature selection (FS) remains one of the very important functions in machine learning. Decreasing the feature set (FSt) assists in enhancing the classifier’s accuracy. Because of the existence of a huge quantity of data within the dataset (DS), it remains a colossal procedure for choosing the requisite features out of the DS. Hence, for resolving this issue, a new Chaos Quasi-Oppositional-based Flamingo Search Algorithm with Simulated Annealing Algorithm (CQOFSASAA) has been proffered for FS and for choosing the optimum FSt out of the DSs, and, hence, this lessens the DS’ dimension. The FSA technique can be …employed for selecting the optimal feature subset out of the DS. Generalized Ring Crossover has been as well embraced for selecting the very pertinent features out of the DS. Lastly, the Kernel Extreme Learning Machine (KELM) classifier authenticates the chosen features. This proffered paradigm’s execution has been tested by standard DSs and the results have been correlated with the rest of the paradigms. From the experimental results, it has been confirmed that this proffered CQOFSASAA attains 93.74% of accuracy, 92% of sensitivity, and 92.1% of specificity. Show more
Keywords: Quasi-oppositional, feature selection, Flamingo Search Algorithm, Simulated Annealing, convergence rate
DOI: 10.3233/JIFS-233557
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2023
Authors: Harikumar, Yedhu | Muthumeenakshi, M.
Article Type: Research Article
Abstract: The Indian stock market is a dynamic, complicated system that is impacted by many different variables, making it difficult to anticipate its future. The utilization of deep learning and optimization techniques to forecast stock market movements has gained popularity in recent years. To foresee the Indian stock market, an innovative approach is presented in this study that combines the Grey Wolf Optimization algorithm with a hybrid Convolutional Neural Network (CNN) and Bi-Directional Long-Short Term Memory (Bi-LSTM) framework. The stock market information is first pre-processed utilizing a CNN to extract pertinent features. The Bi-LSTM system, that is intended to capture the …long-term dependencies and temporal correlations of the stock market statistics, is then fed the CNN’s outcome. The model parameters are then optimized utilizing the Grey Wolf Optimization (GWO) technique, which also increases forecasting accuracy. The findings demonstrate that, in terms of forecasting accuracy, the suggested method outperforms a number of contemporary methods, including conventional time series models, neural networks, and evolutionary algorithms. Thus, the suggested methodology provides an effective way to forecast the Indian stock market by combining deep learning and optimization approaches. Show more
Keywords: Indian stock market, grey wolf optimization, deep learning approach, bi-directional long-short term memory, convolutional neural network
DOI: 10.3233/JIFS-233716
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2023
Authors: Li, Xiaoli | Du, Linhui | Yu, Xiaowei | Wang, Kang | Hu, Yongkang
Article Type: Research Article
Abstract: During the operation of HVAC (Heating, Ventilation, and Air-Conditioning) systems, precise energy consumption prediction plays an important role in achieving energy savings and optimizing system performance. However, the HVAC system is a complex and dynamic system characterized by a large number of variables that exhibit significant changes over time. Therefore, it is inadequate to rely on a fixed offline model to adapt to the dynamic changes in the system that consume tremendous computation time. To solve this problem, a deep neural network (DNN) model based on Just-in-Time learning with hyperparameter R (RJITL) is proposed in this paper to predict …HVAC energy consumption. Firstly, relevant samples are selected using Euclidean distance weighted by Spearman coefficients. Subsequently, local models are constructed using deep neural networks supplemented with optimization techniques to enable real-time rolling energy consumption prediction. Then, the ensemble JITL model mitigates the influence of local features, and improves prediction accuracy. Finally, the local models can be adaptively updated to reduce the training time of the overall model by defining the update rule (hyperparameter R ) for the JITL model. Experimental results on energy consumption prediction for the HVAC system show that the proposed DNN-RJITL method achieves an average improvement of 5.17% in accuracy and 41.72% in speed compared to traditional methods. Show more
Keywords: HVAC, energy consumption, weighted similarity measure, deep neural network, Just-in-Time learning
DOI: 10.3233/JIFS-233544
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Maleki, Monavareh | Ebrahimi, Mohamad | Davvaz, B.
Article Type: Research Article
Abstract: The concept of entropy and information gain of BE-algebras in scientific disciplines such as information theory, data science, supply chain and machine learning assists us to calculate the uncertanity of the scientific processes of phenomena. In this respect the notion of filter entropy for a transitive BE-algebra is introduced and its properties are investigated. The notion of a dynamical system on a transitive BE-algebra is introduced. The concept of the entropy for a transitive BE-algebra dynamical system is developed and, its characteristics are considered. The notion of equivalent transitive BE-algebra dynamical systems is defined, and it is proved the fact …that two equivalent BE-algebra dynamical systems have the same entropy. Theorems to help calculate the entropy are given. Specifically, a new version of Kolmogorov– Sinai Theorem has been proved. The study introduces the concept of information gain of a transitive BE-algebra with respect to its filters and investigates its properties. This study proposes the use of filter entropy to approximate the level of risk introduced by a BE-algebra dynamical system. This aim is reached by defining the information gain with respect to the filters of a BE-algebra. This methodology is well developed for use in engineering, especially in industrial networks. This paper proposes a novel approach to assess the quantity of uncertainty, and the impact of information gain of a BE-algebra dynamical system. Show more
Keywords: Generator, transitive BE-algebra, dynamical system, entropy, information gain
DOI: 10.3233/JIFS-232363
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Yang, Jiyun | Gui, Can
Article Type: Research Article
Abstract: Malware attack is a growing problem on the Android mobile platform due to its popularity and openness. Although numerous malware detection approaches have been proposed, it still remains challenging for malware detection due to a large amount of constantly mutating apps. The opcode, as the most fundamental part of Android app, possesses good resistance against obfuscation and Android version updates. Due to the large number of opcodes, most opcode-based methods employ statistical-based feature selection, which disrupts the correlation and semantic information among opcodes. In this paper, we propose an Android malware detection framework based on sensitive opcodes and deep reinforcement …learning. Firstly, we extract sensitive opcode fragments based on sensitive elements and then encode the features using n -gram. Next, we use deep reinforcement learning to select the optimal subset of features. During the process of handling opcodes, we focus on preserving semantic information and the correlation among opcodes. Finally, our experimental results show an accuracy of 0.9670 by using the 25 opcode features we obtained. Show more
Keywords: Android malware, deep reinforcement learning, feature selection, machine learning
DOI: 10.3233/JIFS-235767
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Badshah, Noor | Begum, Nasra | Rada, Lavdie | Ashfaq, Muniba | Atta, Hadia
Article Type: Research Article
Abstract: Joint segmentation and registration of images is a focused area of research nowadays. Jointly segmenting and registering noisy images and images having weak boundaries/intensity inhomogeneity is a challenging task. In medical image processing, joint segmentation and registration are essential methods that aid in distinguishing structures and aligning images for precise diagnosis and therapy. However, these methods encounter challenges, such as computational complexity and sensitivity to variations in image quality, which may reduce their effectiveness in real-world applications. Another major issue is still attaining effective joint segmentation and registration in the presence of artifacts or anatomical deformations. In this paper, a …new nonparametric joint model is proposed for the segmentation and registration of multi-modality images having weak boundaries/noise. For segmentation purposes, the model will be utilizing local binary fitting data term and for registration, it is utilizing conditional mutual information. For regularization of the model, we are using linear curvature. The new proposed model is more efficient to segmenting and registering multi-modality images having intensity inhomogeneity, noise and/or weak boundaries. The proposed model is also tested on the images obtained from the freely available CHOAS dataset and compare the results of the proposed model with the other existing models using statistical measures such as the Jaccard similarity index, relative reduction, Dice similarity coefficient and Hausdorff distance. It can be seen that the proposed model outperforms the other existing models in terms of quantitatively and qualitatively. Show more
Keywords: Image segmentation, image registration, linear curvature (LC), conditional mutual information (CMI), Jaccard similarity index (JSI)
DOI: 10.3233/JIFS-233306
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Wang, Tianxiong | Xu, Mengmeng | Yang, Liu | Zhou, Meiyu | Sun, Xin
Article Type: Research Article
Abstract: Kansei Engineering (KE) is a product design method that aims to develop products to meet users’ emotional preferences. However, traditional KE faces the problem that the acquisition of Kansei factors does not represent the real consumers demands based on manual and reports, and using tradition methods to calculate relationship between Kansei factors and specific design elements, which can lead to the omission of key information. To address these problems, this study adopts text mining and backward propagation neural networks (BPNN) to propose a product form design method from a multi-objective optimization perspective. Firstly, Term Frequency-Inverse Document Frequency (TF-IDF) and WordNet …are used to extract key user Kansei requirements from online review texts to obtain more accurate Kansei knowledge. Secondly, the BPNN is used to establish the non-linear relationship between product Kansei factors and specific design elements, and a preference mapping prediction model is constructed. Finally, BPNN is transformed into an iterative prediction value of non-dominated sorting genetic algorithm-II (NSGA-II), and the model is solved through multi-objective evolutionary algorithm (MOEA) to obtain the Pareto optimal solution set that satisfies the user’s multiple emotional needs, and the fuzzy Delphi method is used to obtain the best product form design scheme that meets the user’s multiple emotional images. Using the example of electric bicycle form design show that this proposed method can effectively complete multi-objective product solutions innovation design. Show more
Keywords: Text mining, Back propagation neural network (BPNN), Multi-objective evolutionary algorithm (MOEA), Non-dominated sorting genetic algorithm-II (NSGA-II), Kansei engineering
DOI: 10.3233/JIFS-230668
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-21, 2024
Authors: Jianping, Liu | Yingfei, Wang | Jian, Wang | Meng, Wang | Xintao, Chu
Article Type: Research Article
Abstract: To better understand users’ behavior patterns in web search, numerous click models are proposed to extract the implicit interaction feedback. Most existing click models are heavily based on the implicit information to model user behaviors, ignoring the impact of explicit information between queries and documents in search sessions. In this paper, we fully consider the topic relevance between queries and documents in search sessions and propose a novel topic relevance-aware click model (TRA-CM) for web search. TRA-CM consists of a relevance estimator and an examination predictor. The relevance estimator consists of a topic relevance predictor and a click context encoder. …In the topic relevance predictor, we utilize the pre-trained BERT model to model the content information of queries and documents in search sessions. Meanwhile, we use transformer to encode users’ click behaviors in the click context encoder. We further apply a two-stage fusion strategy to obtain the final relevance scores. The examination predictor estimates the examination probability of each document. We further utilize learnable filters to attenuate log noise and obtain purer input features in both relevance estimator and examination predictor, and investigate different combination functions to integrate relevance scores and examination probabilities into click prediction. Extensive experiment results on two real-world session datasets prove that TRA-CM outperforms existing click models in both click prediction and relevance estimation tasks. Show more
Keywords: BERT, click model, click prediction, deep learning, web search
DOI: 10.3233/JIFS-236894
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Lizhu, Yue | Qian, Wang
Article Type: Research Article
Abstract: With the rapid development of big data and continuous optimization of online shopping platforms, personalized recommendation has become a standard feature of recommendation methods. In order to effectively provide personalized recommendations to customers, improve recommendation accuracy, and customer satisfaction, it is necessary to consider customers’ preferences for multiple product attributes when making product recommendations. However, existing recommendation methods require precise calculation of product attribute weights, which is computationally expensive, complex, and often results in unstable weight values. This paper proposes a multi-attribute recommendation method based on consumer decision preference information that overcomes the need for weights and reflects personalized customer …preferences. Based on the acquisition of customer product attribute preference sequences, a partial order relation for recommended products is constructed using partial order set theory. Finally, the recommended products are determined through the partial order Hasse diagram, where the top layer elements of the Hasse diagram represent the recommended product set. This method addresses challenges that traditional content-based recommendations cannot overcome. The experiment in this paper uses a dataset of 30,000 records from Beeradvocate beer reviews. The experimental results show that, compared to traditional multi-attribute recommendation methods, this method only requires decision-maker preference information to complete product recommendations, requiring less information and having lower computational costs, resulting in more robust results. Show more
Keywords: Multi-attribute recommendation, partial order set, decision preference, hasse diagram, personalization
DOI: 10.3233/JIFS-231724
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Huang, Mengtao | Wang, Jiaxuan
Article Type: Research Article
Abstract: Pedestrian trajectory prediction plays a crucial role in autonomous driving, as its accuracy directly affects the autonomous driving system’s comprehension of the environment and subsequent decision-making processes. Current trajectory prediction methods tend to oversimplify pedestrians to mere point coordinates, utilizing positional information to infer interactions among individuals while overlooking the temporal correlations between them, thereby excessively simplifying pedestrian characteristics. To address the aforementioned issues, this paper proposes a trajectory prediction model for autonomous driving applications, that takes into account both pedestrian motion characteristics and scene interaction. The model optimizes the LSTM unit structure twice, serving to learn correlations among long …trajectories of pedestrians and to integrate multiple forms of information into the neighborhood interaction module. Furthermore, our model introduces dual attention mechanisms for individuals and scenes, focusing on the key motion points of individual pedestrians and their interactive behavior with others in busy scenarios. The efficacy of the model was validated on the MOT16 pedestrian dataset and the Daimler pedestrian path prediction dataset, outperforming mainstream methods with 8% and 10% reductions in Average Displacement Error and Final Displacement Error respectively. Show more
Keywords: Trajectory prediction, automated driving, CNN-LSTM, deep learning
DOI: 10.3233/JIFS-236271
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2024
Authors: Yu, Xingping | Yang, Yang
Article Type: Research Article
Abstract: The rapid advancement of communication and information technology has led to the expansion and blossoming of digital music. Recently, music feature extraction and classification have emerged as a research hotspot due to the difficulty of quickly and accurately retrieving the music that consumers are looking for from a large volume of music repositories. Traditional approaches to music classification rely heavily on a wide variety of synthetically produced aural features. In this research, we propose a novel approach to selecting the musical genre from user playlists by using a classification and feature selection machine learning model. To filter, normalise, and eliminate …missing variables, we collect information on the playlist’s music genre and user history. The characteristics of this data are then selected using a convolutional belief transfer Gaussian model (CBTG) and a fuzzy recurrent adversarial encoder neural network (FRAENN). The experimental examination of a number of music genre selection datasets includes measures of training accuracy, mean average precision, F-1 score, root mean squared error (RMSE), and area under the curve (AUC). Results show that this model can both create a respectable classification result and extract valuable feature representation of songs using a wide variety of criteria. Show more
Keywords: Music genre selection, user playlists, machine learning, classification, feature selection
DOI: 10.3233/JIFS-235478
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Gul, Rimsha | Bashir, Maryam
Article Type: Research Article
Abstract: As the volume of data continues to grow, the significance of text classification is on the rise. This vast amount of data majorly exists in the form of texts. Effective data preparation is essential to extract sentiment data from this vast amount of text, as irrelevant and redundant information can impede valuable insights. Feature selection is an important step in the data preparation phase as it eliminates irrelevant and insignificant features from the huge features set. There exist a large body of work related to feature selection for image processing but limited research is done for text data. While some …studies recognize the significance of feature selection in text classification, but there is still need for more efficient sentiment analysis models that optimize feature selection and reduce computational. This manuscript aims to bridge these gaps by introducing a hybrid multi-objective evolutionary algorithm as a feature selection mechanism, combining the power of multiple objectives and evolutionary processes. The approach combines two feature selection techniques within a binary classification model: a filter method, Information Gain (IG), and an evolutionary wrapper method, Binary Multi-Objective Grey Wolf Optimizer (BMOGWO). Experimental evaluations are conducted across six diverse datasets. It achieves a reduction of over 90 percent in feature size while improving accuracy by nearly nine percent. These results showcase the model’s efficiency in terms of computational time and its efficacy in terms of higher classification accuracy which improves sentiment analysis performance. This improvement can be beneficial for various applications, including recommendation systems, reviews analysis, and public opinion observation. However, it’s crucial to acknowledge certain limitations of this study. These encompass the need for broader classifier evaluation, and scalability considerations with larger datasets. These identified limitations serve as directions for future research and the enhancement of the proposed approach. Show more
Keywords: Feature selection, sentiment analysis, multi-objective optimization, evolutionary algorithms
DOI: 10.3233/JIFS-234615
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Zhao, Xiaoqing | Xu, Miaomiao | Li, Yanbing | Huang, Hao | Silamu, Wushour
Article Type: Research Article
Abstract: This research focuses on Scene Text Recognition (STR), a crucial component in various applications of artificial intelligence such as image retrieval, office automation, and intelligent traffic systems. Recent studies have shown that semantic-aware approaches significantly improve the performance of STR tasks, with context-aware STR methods becoming mainstream. Among these, the fusion of visual and language models has shown remarkable effectiveness. We propose a novel method (PABINet) that incorporates three key components: a Visual-Language Decoder, a Language Model, and a Fusion Model. First, during training, the Visual-Language Decoder masks the original labels in the Transformer decoder using permutation masks, with each …mask being unique. This enhances word memorization and learning through contextual semantic information, resulting in robust semantic knowledge. During the inference stage, the Visual-Language Decoder employs autonomous Autoregressive model (AR) inference to generate results. Subsequently, the Language Model scrutinizes and corrects the output of the Visual-Language Encoder using a cloze mask approach, achieving context-aware, autonomous, bidirectional inference. Finally, the Fusion Model concatenates and refines the outputs of both models through iterative layers.Experimental results demonstrate that our PABINet performs exceptionally well when handling various quality images. When trained with synthetic data, PABINet achieves a new STR benchmark (average accuracy of 92.41%), and when trained with real data, it establishes new state-of-the-art results (average accuracy of 96.28%). Show more
Keywords: Scene text recognition, language model, visual-language decoder
DOI: 10.3233/JIFS-237135
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Chen, Hongan | Zhang, Zongfu | Luo, Qingjia | Chen, Rongbin | Zhao, Yang
Article Type: Research Article
Abstract: Existing methods for recognizing partial discharge patterns in power cables do not utilize fuzzy clustering of the discharge signals, resulting in poor quality and low recall and precision of the pattern recognition. To address this, we propose a new approach for partial discharge pattern recognition in cables using Gustafson-Kessel(GK) Fuzzy Clustering. The method involves acquiring signals from a power cable partial discharge monitoring system and then processing the signals with GK fuzzy clustering. The clustered discharge signals are filtered with wavelet packet transforms before input into an improved adaptive resonance theory(ART) neural network for final pattern recognition. Experiments demonstrate the …new technique achieves up to 98.7% recall and 85.6% precision for discharge pattern recognition, with discharge signal Signal Noise Ratio(SNR) between 55 dB and 62 dB and maximum recognition accuracy reaching 98%. The proposed fuzzy clustering-based pattern recognition approach significantly enhances partial discharge diagnostics for power cable monitoring. Show more
Keywords: Gustafson-Kessel(GK) fuzzy clustering, power cable, partial discharge, pattern recognition, wavelet packet transform
DOI: 10.3233/JIFS-235945
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Sharma, Itika | Gupta, Sachin Kumar
Article Type: Research Article
Abstract: UAVs or Drones can be used to support wireless communication by acting as flying or mobile Base Stations for the accumulation of the different types of data to train the models. However, in traditional or DL-based UAVs, the raw data is sent from the devices to the centralized server, which causes problems in terms of the privacy of the devices and the UAVs’ communication resources or limited processing. Therefore, the issue with DL-based UAVs is that sending the original data to the centralized body raises questions about security and privacy. The transmission of distributed, unprocessed data from the drones to …the cloud, including interactive media information data types, requires a significant amount of network bandwidth and more energy, which has an enormous effect on several trade-offs, including communication rates and computation latencies. Data packet loss caused by asynchronous transmission, which doesn’t prevent peer-to-peer communication, is a concern with AFL-based UAVs. Therefore, in order to address the aforementioned issues, we have introduced SFL-based UAVs that focus on creating algorithms in which the models simultaneously update the server as they wait for all of the chosen devices to communicate. The proposed framework enables a variety of devices, including mobile and UAV devices, to train or learn their algorithms for machine learning before updating the models and parameters simultaneously to servers or manned aerial data centers for model buildup without transferring their original private information. This decreases packet loss and privacy threats while also enhancing round effectiveness as well as model accuracy. The comparative analysis of AFL and SFL techniques in terms of accuracy, global rounds, and communication rounds are offered. Simulation findings suggest that the proposed methodology improves in terms of global rounds and accuracy. Show more
Keywords: UAV, training, raw data, FL, AFL, SFL etc
DOI: 10.3233/JIFS-235275
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2024
Authors: Guo, Hong | Yang, Jin | Yang, Jun
Article Type: Research Article
Abstract: This paper proposes a method of using machine learning and an evolutionary algorithm to solve the flexible job shop problem (FJSP). Specifically, a back propagation (BP) neural network is used as the machine learning method, the most widely used genetic algorithm (GA) is employed as the optimized object to address the machine-selection sub-problem of the FJSP, and particle swarm optimization (PSO) is utilized to solve the operation-order sub-problem of the FJSP. At present, evolutionary algorithms such as the GA, PSO, ant colony algorithm, simulated annealing algorithm, and their optimization algorithms are widely used to solve the FJSP; however, none of …them optimizes the initial solutions. Because each of these algorithms only focuses on solving a single FJSP, they can only use randomly generated initial solutions and cannot determine whether the initial solutions are good or bad. Based on these standard evolutionary algorithms and their optimized versions, the JSON object was introduced in this study to cluster and reconstruct FJSPs such that the machine learning strategies can be used to optimize the initial solutions. Specifically, the BP neural networks are trained so that the generalization of BP neural networks can be used to judge whether the initial solutions of the FJSPs are good or bad. This approach enables the bad solutions to be filtered out and the good solutions to be maintained as the initial solutions. Extensive experiments were performed to test the proposed algorithm. They demonstrated that it was feasible and effective. The contribution of this approach consists of reconstructing the mathematical model of the FJSP so that machine learning strategies can be introduced to optimize the algorithms for the FJSP. This approach seems to be a new direction for introducing more interesting machine learning methodologies to solve the FJSP. Show more
Keywords: Flexible job shop scheduling problem, mechanical engineering, evolutionary algorithms, machine learning
DOI: 10.3233/JIFS-224021
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-19, 2024
Authors: Tomy, Navin | Johnson, T.P.
Article Type: Research Article
Abstract: This paper deals with lattice isomorphic L -topological spaces. We are concerned with a question: Under what conditions will a lattice isomorphic L -topological spaces be L -homeomorphic. We give contributions to this question in three different ways.
Keywords: L-homeomorphism, quasi L-homeomorphism, lattice isomorphism, pL-homeomorphism
DOI: 10.3233/JIFS-234375
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Chen, Junzhuo | Lu, Zonghan | Kang, Shitong
Article Type: Research Article
Abstract: In the wake of the global spread of monkeypox, accurate disease recognition has become crucial. This study introduces an improved SE-InceptionV3 model, embedding the SENet module and incorporating L2 regularization into the InceptionV3 framework to enhance monkeypox disease detection. Utilizing the Kaggle monkeypox dataset, which includes images of monkeypox and similar skin conditions, our model demonstrates a noteworthy accuracy of 96.71% on the test set, outperforming conventional methods and deep learning models. The SENet module’s channel attention mechanism significantly elevates feature representation, while L2 regularization ensures robust generalization. Extensive experiments validate the model’s superiority in precision, recall, and F1 score, …highlighting its effectiveness in differentiating monkeypox lesions in diverse and complex cases. The study not only provides insights into the application of advanced CNN architectures in medical diagnostics but also opens avenues for further research in model optimization and hyperparameter tuning for enhanced disease recognition. Show more
Keywords: CNN, InceptionV3, SENet, L2 regularization, monkeypox disease, deep learning
DOI: 10.3233/JIFS-237232
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Pandey, Vibha | Choubey, Siddhartha | Patra, Jyotiprakash | Mall, Shachi | Choubey, Abha
Article Type: Research Article
Abstract: Automated reading of license plate and its detection is a crucial component of the competent transportation system. Toll payment and parking management e-payment systems may benefit from this software’s features. License plate detection and identification algorithms abound, and each has its own set of strengths and weaknesses. Computer vision has advanced rapidly in terms of new breakthroughs and techniques thanks to the emergence and proliferation of deep learning principles across several branches of AI. The practice of automating the monitoring process in traffic management, parking management, and police surveillance has become much more effective thanks to the development of Automatic …License Plate Recognition (ALPR). Even though license plate recognition (LPR) is a technology that is extensively utilized and has been developed, there is still a significant amount of work to be done before it can achieve its full potential. In the last several years, there have been substantial advancements in both the scientific community’s methodology and its level of efficiency. In this era of deep learning, there have been numerous developments and techniques established for LPR, and the purpose of this research is to review and examine those developments and approaches. In light of this, the authors of this study suggest a four-stage technique to automated license plate detection and identification (ALPDR), which includes, image pre-processing, license plate extraction, character segmentation, and character recognition. And the first three phases are known as “extraction,” “pre-processing,” and “segmentation,” and each of these processes has been shown to benefit from its own unique technique. In light of the fact that character recognition is an essential component of license plate identification and detection, the Convolution Neural Network (CNN), MobileNet, Inception V3, and ResNet 50 have all been put through their paces in this regard. Show more
Keywords: Data security, secure image analysis, automatic license plate recognition, segmentation, image classification, convolution neural network, character recognition
DOI: 10.3233/JIFS-235400
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-23, 2024
Authors: Wu, Chengding | Xu, Zhaoping | Liu, Liang | Yang, Tao
Article Type: Research Article
Abstract: There are limitations of personalization in Advanced Driver Assistance Systems (ADAS) that have a serious impact on driver acceptance and satisfaction. This study investigates driving style recognition method to achieve personalization of longitudinal driving behavior. Currently, driving style recognition algorithms for Personalized Adaptive Cruise Control (PACC) rely on integrated recognition. However, disturbances in the driving cycle may lead to changes in a driver’s integrated driving style. Therefore, the integrated driving style cannot accurately and comprehensively reflect the driver’s driving style. To solve this problem, a new driving style recognition method for PACC is proposed, which considers integrated driving style and …driving cycle. Firstly, the method calculates the constructed feature parameters of driving cycle and style, and then reduces the dimensionality of the feature parameter matrix by principal component analysis (PCA). Secondly, a two-stage clustering algorithm with self-organizing mapping networks and K-means clustering (SOM-K-means) is used to obtain the type labels. Then, a transient recognition model based on random forest (RF) is established and the hyperparameters of this model are optimized by sparrow search algorithm (SSA). Based on this, a comprehensive driving style recognition model is established using analytic hierarchy process (AHP). Finally, the validity of the proposed method is verified by a natural dataset. The method incorporates the driving cycle into driving style recognition and provides guidance for improving the personalization of adaptive cruise control system. Show more
Keywords: Personalized adaptive cruise control, SOM-K-means two-stage clustering, random forest (RF), sparrow search algorithm (SSA), driving style recognition
DOI: 10.3233/JIFS-235045
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Atef, Shimaa | El-Seidy, Essam | Reda, Naglaa M.
Article Type: Research Article
Abstract: Decisions in many dilemmas are based on a combination of factors, including as incentive, punishment, reputation, and memory. The impact of memory information on cooperative evolution in multi-round games is a decision-making process in group evolution. The iterated prisoner’s dilemma is an excellent model for the development of cooperation amongst the payoff-maximizing individuals. Since tit-for-tat proved successful in Axelrod’s repeated prisoner’s dilemma tournaments, there has been a great deal of interest in creating new strategies. Every iterative prisoner’s dilemma method bases its decision-making on a specific duration of past contacts with the opponent, which is referred to as the memory’s …size. This study examines the impact of strategy memory size on the evolutionary stability of n-person iterated prisoner’s dilemma strategies. In this paper, we address the role that memory plays in decision-making. We interested in the model of the Iterated Prisoner’s Dilemma game for three players with memory two, and we will look at strategies with similar behavior, such as Tit-For-Tat (TFT) strategies as well as Win Stay-Lose Shift (WSLS) strategies. As a result of this paper, we have shown that the effect of memory length is almost non-existent in the competitions of strategies that we studied. Show more
Keywords: Memory-Two, Tit-For-Tat strategies (TFT), three-players iterated prisoner’s dilemma game (3P-IPD), transition matrix, Win Stay-Lose Shift strategies (WSLS)
DOI: 10.3233/JIFS-233690
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Chen, Zhipeng | Liu, Xiao | Qin, Jianhua
Article Type: Research Article
Abstract: To solve the problem that the walking jitter of quadruped robots leads to the degradation of clarity of visual imaging, a quadruped robot visual imaging jitter compensation algorithm based on the theory of walking jitter is proposed. The D-H coordinate transformation method is used to establish the coordinate system of each joint of the leg. The kinetic equations of the leg are derived from the relationship between the rotational velocity and the moment of the leg joint, and the kinetic equilibrium equations of the quadruped robot body are established based on the spatial moment equilibrium theorem; the spring-mass model of …the leg of the quadruped robot is used to construct the kinetic equations of the leg jittering, and the kinetic equations of the body jittering are derived using the moment equilibrium condition of the body center of gravity position and under the effect of the leg and body jitter to obtain the visual imaging device jitter quantity; finally, the tremor quantity is combined with the jitter quantity and rotation matrix to derive the walking jitter mathematical model of the quadruped robot visual imager, and the jitter compensation algorithm of quadruped robot visual imager is verified. The experimental results show that compared with the traditional Wiener filter algorithm for jitter compensation and the BP neural network jitter compensation algorithm, this algorithm improves the visual imaging by 10.8% and 3.3% in the two evaluation indexes of peak signal-to-noise ratio and structural similarity, respectively, and the de-jittering effect is better. Show more
Keywords: Quadruped robot, visual imaging, walking jitter, compensation algorithm
DOI: 10.3233/JIFS-235345
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Liu, Gan | Qi, Guirong | Wan, Sanyu
Article Type: Research Article
Abstract: Imbalanced data is a serious binary classification difficulty in forecasting the well-being of the elderly. This paper improves the Smote algorithm from the algorithm and sample dimensions to tackle the issue of imbalanced distribution of questionnaire data. The k-means Smote is combined with RBFNN as K-RBFNN Smote in the algorithm dimension and add FCM link to resample the minority set in the sample dimension as FCM K-RBFNN Smote. In order to improve the generalization of models, the RUS module is added to the algorithm. Experiments are carried out on four improved Smote technologies and two existing Smote technologies combined with …XGBoost, which is superior than the other five conventional classification models. The experimental results indicate that the performance order is RUS FCM K-RBFNN Smote > K-RBFNN Smote > FCM K-RBFNN Smote > RUS K-RBFNN Smote > K-Means Smote > FCM Smote. The RUS FCM K-RBFNN method has been identified as the optimal approach for enhancing performance, resulting in a 98.58% accuracy rate. In conclusion, Smote algorithm undergoes the implementation of K-RBFNN shows greater performance and the enhancement of FCM and RUS relies on the structure of sampling. Show more
Keywords: RUS FCM K-RBFNN Smote, XGBoost, imbalanced data, elderly well-being classification
DOI: 10.3233/JIFS-235213
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2024
Authors: Allouche, Moez | Dahech, Karim | Gaubert, Jean-Paul
Article Type: Research Article
Abstract: This paper proposes a multi-objective H2 /H ∞ maximum power tracking control of a variable speed wind turbine to minimize the H2 tracking error and ensure the H ∞ model reference-tracking performance, simultaneously. The optimal condition is obtained via a boost converter use, which adapts the load impedance to the wind turbine generator. Thus, based on the fuzzy T-S model, a multi-objective Maximum Power Point Tracking (MPPT) controller is developed, ensuring maximum power transfer, despite wind speed variation and system uncertainty. To specify the optimal trajectory to follow, a TS reference model is proposed taking as input the optimal …rectified DC current. The conditions of stability and stabilization are expressed in terms of linear matrix inequality (LMI) for uncertain and disturbed T-S models leading to determining the controller gains. Finally, an example of MPP tracking applied to a Wind Energy Conversion System (WECS) illustrates the effectiveness of the proposed fuzzy control law. Show more
Keywords: Multi-objective fuzzy tracking control, maximum power point tracking (MPPT), linear matrix inequalities (LMIs), robust control, T-S fuzzy model
DOI: 10.3233/JIFS-222887
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Xiong, Haoyu | Yang, Leixin | Fang, Gang | Li, Junwei | Xiang, Yu | Zhang, Yaping
Article Type: Research Article
Abstract: Test-time augmentation (TTA) has become a widely adopted technique in the computer vision field, which can improve the prediction performance of models by aggregating the predictions of multiple augmented test samples without additional training or hyperparameter tuning. While previous research has demonstrated the effectiveness of TTA in visual tasks, its application in natural language processing (NLP) tasks remains challenging due to complexities such as varying text lengths, discretization of word elements, and missing word elements. These unfavorable factors make it difficult to preserve the label invariance of the standard TTA method for augmented text samples. Therefore, this paper proposes a …novel TTA technique called Defy, which combines nearest-neighbor anomaly detection algorithm and an adaptive weighting network architecture with a bidirectional KL divergence entropy regularization term between the original sample and the aggregated sample, to encourage the model to make more consistent and reliable predictions for various augmented samples. Additionally, by comparing with Defy, the paper further explores the problem that common TTA methods may impair the semantic meaning of the text during augmentation, leading to a shift in the model’s prediction results from correct to corrupt. Extensive experimental results demonstrate that Defy consistently outperforms existing TTA methods in various text classification tasks and brings consistent improvements across different mainstream models. Show more
Keywords: Test-time augmentation, test-time robustification, text classification, language model, anomaly detection
DOI: 10.3233/JIFS-236010
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Shengbin, Liang | Haoran, Sun | Fuqi, Sun | Hongjian, Wu | Wencai, Du
Article Type: Research Article
Abstract: Mild cognitive impairment (MCI) is a syndrome that occurs in the preclinical stage of Alzheimer’s disease (AD) and is also an early signal of the onset of AD. Early detection and accurate differentiation between MCI and AD populations, and providing them with effective intervention and treatment, are of great significance for preventing or delaying the onset of AD. In this paper, we propose a deep learning model, SE-DenseNet, that combines channel attention and dense connectivity networks and apply it to the field of magnetic resonance imaging (MRI) data recognition for the diagnosis of AD and MCI. First, to extract MRI …features with high quality, a slicing algorithm based on two-dimensional image information entropy is proposed to obtain AD brain lesion features with stronger representation ability. Second, in terms of model structure, SENet is introduced as a channel attention module and redistribute the weight of image features in the channel dimension; use DenseNet as the main architecture to maximize information flow, and each layer is directly interconnected with subsequent layers. It enables the network to learn and extract relevant features from the input data and improve the classification ability of the network. Finally, our proposed model is validated on the Alzheimer’s Disease Neuroimaging Initiative (ADNI) dataset, the results have shown that the accuracy for the four classification tasks of AD-NC, AD-MCI, NC-MCI, and AD-NC-MCI can reach 98.12%, 97.42%, 97.42%, and 95.24%, respectively. At the same time, the sensitivity and specificity have also achieved satisfactory results, exhibited a high performance in comparison with the classic machine learning algorithm and several existing state-of-the-art deep learning methods, demonstrating the proposed method is a powerful tool for the early diagnosis and detection of AD. Show more
Keywords: Alzheimer’s disease classification, computer aided diagnosis, medical image processing, megnetic resonance imaging, deep learning
DOI: 10.3233/JIFS-236542
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-21, 2024
Authors: Karthika, K. | Rangasamy, Devi Priya
Article Type: Research Article
Abstract: In today’s digital era, the security of sensitive data such as Aadhaar data is of utmost importance. To ensure the privacy and integrity of this data, a conceptual framework is proposed that employs the Diffie-Hellman key exchange protocol and Hash-based Message Authentication Code (HMAC) to enhance the security. The proposed system begins with the preprocessing phase, which includes removing noise, standardizing formats and validating the integrity of the data. Next, the data is segmented into appropriate sections to enable efficient storage and retrieval in the cloud. Each segment is further processed to extract meaningful features, ensuring that the relevant information …is preserved while reducing the risk of unauthorized access. For safeguarding the stored Aadhaar data, the system employs the Diffie-Hellman key exchange protocol which allows the data owner and the cloud service provider to establish a shared secret key without exposing it to potential attackers. Additionally, HMAC is implemented to verify the identity of users during the login process. HMAC enhances security by leveraging cryptographic hash functions and a shared secret key to produce a distinct code for each login attempt. This mechanism effectively protects the confidentiality and integrity of stored data. The combination of Diffie-Hellman key exchange and HMAC authentication provides a robust security framework for Aadhaar data. It ensures that the data remains encrypted and inaccessible without the secret key, while also verifying the identity of users during the login process. This comprehensive approach helps preventing unauthorized access thereby protecting against potential attacks, instilling trust and confidence in the security of Aadhaar data stored in the cloud. Results of the article depict that the proposed scheme achieve 0.19 s of encryption time and 0.05 s of decryption time. Show more
Keywords: Hash based message authentication code (HMAC), cryptographic hash functions, Diffie Hellman, communications
DOI: 10.3233/JIFS-234641
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2024
Authors: Vijaya Lakshmi, A. | Vaitheki, K. | Suresh Joseph, K.
Article Type: Research Article
Abstract: Over the years, numerous optimization problems have been addressed utilizing meta-heuristic algorithms. Continuing initiatives have always been to create and develop new, practical algorithms. This work proposes a novel meta-heuristic approach employing the slender Loris optimization algorithm (SLOA), miming slender Loris behavior. The behavior includes foraging, hunting, migration and communication with each other. The ultimate goal of the devised algorithm is to replicate the food-foraging behaviour of Slender Loris (SL) and the quick movement of SL when threatened (i.e.) their escape from predators and also mathematically modelled the special communication techniques of SL using their urine scent smell. SLOA modelled …SL’s slow food foraging behaviour as the exploitation phase, and moving between the tree and escaping from a predator is modelled as the exploration phase. The Eyesight of slender Loris plays a vital role in food foraging during nighttime in dim light. The operator’s Eyesight is modelled based on the angle of inclination of SL. The urine scent intensity is used here to be instrumental in preventing already exploited territory activities, which improves algorithm performance. The suggested algorithm is assessed and tested against nineteen benchmark test operations and evaluated for effectiveness with standard widely recognized meta-heuristics algorithms. The result shows SLOA performing better and achieving near-optimal solutions and dominance in exploration–exploitation balance in most cases than the existing state-of-the-art algorithms. Show more
Keywords: Slender loris optimization algorithm, exploitation and exploration, optimization problems, swarm intelligence algorithm, metaheuristic
DOI: 10.3233/JIFS-236737
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Dai, Songsong
Article Type: Research Article
Abstract: The well-known iterative boolean-like law a →(a → b ) = a → b can be generalized to the functional equation I (x , I (x , y )) = I (x , y ), where I is a fuzzy implication. In this paper, we discuss an approximation of the equation, I (x , I (x , y )) ≈ I (x , y ), i.e., the law is approximately valid. Furthermore, we study the property of approximation preserving with respect to compositions of fuzzy implications. Finally, we give a necessary condition and a sufficient condition for the approximate equation of (S , N )-implications.
Keywords: Functional equation, iterative boolean-like law, fuzzy implication, (S, N)-implication
DOI: 10.3233/JIFS-233435
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-8, 2024
Authors: Zhou, Yinwei | Hu, Jun
Article Type: Research Article
Abstract: The rough set model has been extended to interval rough number decision systems, but the existing studies do not consider interval rough number decision systems with missing values. To this end, a rough set model of incomplete interval rough number decision systems (IIRNDSs) is proposed, and its uncertainty measures are investigated. Firstly, the similarity of two incomplete interval rough numbers (IIRNs) are defined by calculating their optimistic and pessimistic distances of the lower and upper approximation intervals of IIRNs. Then, the rough sets in IIRNDSs are constructed by the induced similarity relation. Next, four uncertainty measures, including approximation accuracy, approximation …roughness, conditional entropy, and decision rough entropy are given, which exhibit a monotonic variation with changes in the size of attribute sets, α, and θ. Finally, the experimental results demonstrate the proposed rough set model of IIRNDSs is feasible and effective. Show more
Keywords: Incomplete interval rough number decision systems, interval rough number, similarity relation, uncertainty measure, rough sets
DOI: 10.3233/JIFS-237320
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Wan, Huanyu | Qiu, Dong
Article Type: Research Article
Abstract: In order to explore effective management strategies in the context of epidemics, this study introduces a novel concept: Trapezoidal type-2 fuzzy linguistic intuitionistic fuzzy set (TrT2FLIFS) and proposes a trapezoidal type-2 fuzzy linguistic intuitionistic fuzzy matrix game (TrT2FLIFMG). Subsequently, employing sentiment analysis based on the BosonNLP sentiment lexicon, the study extracts comment data from Weibo related to epidemics made by users and calculates their textual scores. These two methods are integrated and applied to policy selection in epidemic management, along with the introduction of a new ranking function to compare the importance of alternative policies. Finally, a comparative analysis with …existing methods is conducted to validate the effectiveness of the proposed approach. Show more
Keywords: Matrix game, sentiment analysis, trapezoidal type-2 fuzzy linguistic intuitionistic fuzzy number, ranking function, pandemic management
DOI: 10.3233/JIFS-237319
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-19, 2024
Authors: Mohammed Mustafa, M. | Kalpana Devi, S. | Althaf Ali, A. | Gunavathie, M.A.
Article Type: Research Article
Abstract: Wireless body sensor networks have gained significant importance across diverse fields, including environmental monitoring, healthcare, and sports. This research is concentrated on sports applications, specifically exploring the viability of a wireless body area network tailored for high-performing athletes. The paper is divided into three sections. First, the design of the node location that is used for real-time monitoring of a sportsperson in which the node position, such as the human thigh, foot, arm, wrist, and chest, was estimated and the best position was selected. Second, the accuracy of an application when related to the other schemes such as TDMA with …ZigBee and RA-TDMA & PA-TDMA was done. The reliability using RA-TDMA performed well and showed approximately 98% reliability. Finally, the features of wireless communiqués that affect the presentation of the network for RA-TDMA were estimated, such as delay and jitter. These findings collectively contribute to advancing the understanding of optimizing wireless body sensor networks for sports applications, with notable achievements including the identification of the arm as the optimal sensor placement, achieving a 98% success rate, and surpassing alternative techniques in network performance parameters like packet delivery rate. Show more
Keywords: Location points, real time scheduling, RATDMA, BSN
DOI: 10.3233/JIFS-234275
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Qu, Ying | Wang, Xuming
Article Type: Research Article
Abstract: In order to effectively prevent and control accidents, it is essential to trace back the causes of gas explosions in cities. The DT-AR(decision tree-association rule) algorithm is proposed as a quantitative analysis of gas accident features and causality. First, 210 gas explosion accident investigation reports were taken as samples. The gas accident causation system is divided into three aspects, including environmental factors, management factors and physical factors. Management factors were sorted into organizational-level and individual-level factors from the investigation reports. Second, the CART decision tree model was used to compare location features, organizational causality features, and individual causality features of …the piped and bottled gas accidents, and a decision tree model with the gas system fault site as the root node was built to filter the key feature variables. In order to reveal factor correlations and deep-level causation, the Apriori algorithm is used to mine accident association rules. The combinations on the branches of the decision tree are used as constraints to filter the critical causality rule, which improves the efficiency of association rule screening and enhances prediction accuracy. The results demonstrate that the DT-AR algorithm can evaluate the importance of variables, quickly locate effective combinations of factors, and mine the complete causal chain. The association rule is screened based on the constraint of the key element combination of the decision tree, which compensates for the low efficiency of the Apriori algorithm for association rule mining. In addition, the accident-caused excavation results provide an effective path for gas companies, outsourced service companies and administrative departments to implement gas safety chain supervision, which can address the problem of gas accident safety management failures and provide decision support for accident prevention. Show more
Keywords: 24model, decision tree model, association rule, gas explosion
DOI: 10.3233/JIFS-234372
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Singh, Surender | Sharma, Sonam
Article Type: Research Article
Abstract: A Single-valued neutrosophic set (SVNS) has recently been explored as a comprehensive tool to assess uncertain information due to varied human cognition. This notion stretches the domain of application of the classical fuzzy set and its extended versions. Various comparison measures based on SVNSs like distance measure, similarity measure, and, divergence measure have practical significance in the study of clustering analysis, pattern recognition, machine learning, and computer vision-related problems. Existing measures have some drawbacks in terms of precision and exclusion of information and produce unreasonable results in categorization problems. In this paper, we propose a generic method to define new …divergence measures based on common aggregation operators and discuss some algebraic properties of the proposed divergence measures. To further appreciate the proposed divergence measures, their application to pattern recognition has been investigated in conjunction with the prominent existing comparison measures based on SVNSs. The comparative assessment sensitivity analysis of the proposed measures establishes their edge over the existing ones because of appropriate classification results. Show more
Keywords: Single-valued neutrosophic set, aggregation operator, pattern recognition, divergence measure
DOI: 10.3233/JIFS-232369
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Sakthimohan, M. | Deny, J. | Rani, G. Elizabeth
Article Type: Research Article
Abstract: In general, wireless sensor networks are used in various industries, including environmental monitoring, military applications, and queue tracking. To support vital applications, it is crucial to ensure effectiveness and security. To prolong the network lifetime, most current works either introduce energy-preserving and dynamic clustering strategies to maintain the optimal energy level or attempt to address intrusion detection to fix attacks. In addition, some strategies use routing algorithms to secure the network from one or two attacks to meet this requirement, but many fewer solutions can withstand multiple types of attacks. So, this paper proposes a secure deep learning-based energy-efficient routing …(SDLEER) mechanism for WSNs that comes with an intrusion detection system for detecting attacks in the network. The proposed system overcomes the existing solutions’ drawbacks by including energy-efficient intrusion detection and prevention mechanisms in a single network. The system transfers the network’s data in an energy-aware manner and detects various kinds of network attacks in WSNs. The proposed system mainly comprises two phases, such as optimal cluster-based energy-aware routing and deep learning-based intrusion detection system. Initially, the cluster of sensor nodes is formed using the density peak k-mean clustering algorithm. After that, the proposed system applies an improved pelican optimization approach to select the cluster heads optimally. The data are transmitted to the base station via the chosen optimal cluster heads. Next, in the attack detection phase, the preprocessing operations, such as missing value imputation and normalization, are done on the gathered dataset. Next, the proposed system applies principal component analysis to reduce the dimensionality of the dataset. Finally, intrusion classification is performed by Smish activation included recurrent neural networks. The proposed system uses the NSL-KDD dataset to train and test it. The proposed one consumes a minimum energy of 49.67 mJ, achieves a better delivery rate of 99.92%, takes less lifetime of 5902 rounds, 0.057 s delay, and achieves a higher throughput of 0.99 Mbps when considering a maximum of 500 nodes in the network. Also, the proposed one achieves 99.76% accuracy for the intrusion detection. Thus, the simulation outcomes prove the superiority of the proposed SDLEER system over the existing schemes for routing and attack detection. Show more
Keywords: Wireless sensor networks, optimal cluster-based energy aware routing, intrusion detection system, cluster head selection, routing, dimensionality reduction, and deep learning
DOI: 10.3233/JIFS-235512
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Liu, Jianping | Chu, Xintao | Wang, Jian | Wang, Meng | Wang, Yingfei
Article Type: Research Article
Abstract: Due to the polysemy and complexity of the Chinese language, Chinese machine reading comprehension has always been a challenging task. To improve the semantic understanding and robustness of Chinese machine reading comprehension models, we propose a model that utilizes adversarial training algorithms and Permuted Language Model (PERT). Firstly, we employ the PERT pre-training model to embed paragraphs and questions into vector space to obtain corresponding sequential representations. Secondly, we use a multi-head self-attention mechanism to extract key textual information from the sequence and employ a Bi-GRU network to semantically fuse the output feature vectors, aiming to learn deep semantic representations …in the text. Finally, we introduce perturbations into the model training process. We achieve this by utilizing adversarial training algorithms such as Fast Gradient Method (FGM) and Projected Gradient Descent (PGD). These algorithms generate adversarial samples to enhance the model’s robustness and stability when facing diverse inputs. We conducted comparative experiments on the publicly available Chinese reading comprehension datasets CMRC2018 and DRCD. The experimental results show that our proposed model has achieved significant improvements in both EM and F1-Score compared to the baseline model. To validate the model’s generalization and robustness, we utilized ChatGPT to construct a scientific dataset that includes a large number of domain-specific terms, sentences with mixed Chinese and English, and complex comprehension tasks. Our model also performed remarkably well on the self-built dataset. In conclusion, the proposed model not only effectively enhances the understanding of semantic information in Chinese text but also demonstrates a certain level of generalization capability. Show more
Keywords: Machine reading comprehension, pre-trained model, adversarial training, Bi-GRU, multi-head self-attention mechanism
DOI: 10.3233/JIFS-234417
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Xiao, Yan | Liang, Jinqian
Article Type: Research Article
Abstract: In many real production scenarios, departmental organizations often exhibit a hierarchical structure, where departments cooperate with subordinate departments to optimize resource allocation and maximize their respective benefits. However, due to a lack of information or data, many model parameters in the allocation process cannot be precisely defined. In response to this challenge, an interval n -person hierarchical resource allocation model is proposed to achieve maximum economic benefit in uncertain environments. Based on the concepts of satisfactory degrees of comparing intervals and interval-valued cores of interval-valued n -person cooperative games, an auxiliary nonlinear programming model and method are developed to solve …the interval-valued cores of such cooperative games. The approach explicitly considers the inclusion and/or overlap relations between intervals, whereas the traditional interval ranking method may not guarantee the existence of interval-valued cores. The proposed method offers cooperative opportunities under uncertain conditions. Finally, the feasibility and applicability of the models and methods are demonstrated through a numerical example and comparison with other methods. Show more
Keywords: Hierarchical structure, resource allocation, uncertain environment, interval n-person cooperative game, nonlinear programming model
DOI: 10.3233/JIFS-191941
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Yu, Dan | Wu, Jun | He, Yongling
Article Type: Research Article
Abstract: The distributed robust optimal allocation method for multi-microgrid interconnected systems usually involves a large number of variables and constraints, and the computational complexity is high in practical applications, which makes it difficult to solve the problem. Therefore, a distributed robust optimal allocation method for multi-microgrid interconnection systems based on multi-objective swarm algorithm is proposed. A distributed robust optimization configuration constraint index model for multi-microgrid interconnection system is established. Considering the influence of energy storage technology operation characteristics on its service life, a micro-grid hybrid energy storage capacity optimization configuration model with the minimum annual comprehensive energy storage cost as the …objective function is established with charge and discharge power and residual power as the constraint conditions. The multi-objective swarm algorithm is used to realize the optimization model of distributed robust configuration microgrid interconnection system. By determining the power capacity configuration of the optimal energy storage system and the corresponding frequency dividing points, the power capacity configuration of the optimal energy storage system and the corresponding frequency dividing points are determined. The hybrid energy storage configuration model of multi-microgrid interconnection system is established with the minimum alternative operating cost as the objective function, so as to realize the distributed robust optimal configuration of multi-microgrid interconnection system. The simulation results show that the distributed configuration of multi-microgrid interconnection system with the proposed method has good robustness and strong optimization control ability. Show more
Keywords: Multi-objective bee colony algorithm, multi-microgrid, interconnection system, robust allocation
DOI: 10.3233/JIFS-235092
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Li, Guofa | Wang, Jinfu | He, Jialong | Wang, Jili | Hou, Tianwei
Article Type: Research Article
Abstract: The reliability of machine tool components, particularly the tool magazine manipulator, significantly affects the overall performance of the machine tool. To address the challenge of accurately evaluating the manipulator’s health status using a single performance indicator, this study proposes a method that combines Fuzzy Comprehensive Evaluation (FCE) and a Combined Weighting Method (CWM). By considering both subjective and objective factors, this method provides a comprehensive evaluation of the manipulator’s health status, enhancing the accuracy and reliability of the assessment. The method utilizes fuzzy distribution to construct membership matrices for different health levels and adopts the CWM that combines the Entropy …Weight Method (EWM) and Analytic Hierarchy Process (AHP) to determine the combined weights of the health evaluation indices. This approach improves the accuracy and reliability by considering multiple indicators and objectively weighting them based on their importance. The current health status of the manipulator is evaluated using the fuzzy weighted average operator and the maximum membership principle. Moreover, a fault prediction method based on Particle Swarm Optimization (PSO) and GM(1,1) is proposed to overcome the information gap and small sample problems. The proposed model’s prediction accuracy is verified by comparing it with other models, demonstrating its effectiveness and reliability. Show more
Keywords: Health status evaluation, fault prediction, fuzzy comprehensive evaluation, grey model, particle swarm optimization
DOI: 10.3233/JIFS-233028
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Ajitha Gladis, K.P. | Srinivasan, R. | Sugashini, T. | Ananda Raj, S.P.
Article Type: Research Article
Abstract: Visual impairment people have many difficulties in everyday life, including communicating and getting information, as well as navigating independently and safely. Using auditory alerts, our study hopes to improve the lives of visually impaired individuals by alerting them to items in their path. In this research, a Video-based Smart object detection model named Smart YOLO Glass has been proposed for visually impaired persons. A Paddling - Paddling Squeeze and Attention YOLO Network model is trained with multiple images to detect outdoor objects to assist visually impaired people. In order to calculate the distance between a blind person and obstacles when …moving from one location to another, the proposed method additionally included a distance-measuring sensor. The visually impaired will benefit from this system’s information about around objects and assistance with independent navigation. Recall, accuracy, specificity, precision, and F-measure were among the metrics used to evaluate the proposed strategy. Because there is less time complexity, the user can see the surrounding environment in real time. When comparing the proposed technique to Med glasses, DL smart glass, and DL-FDS, the total accuracy is improved by 7.6%, 4.8%, and 3.1%, respectively. Show more
Keywords: Visual impairment, deep learning, outdoor object detection, wearable system, YOLO network
DOI: 10.3233/JIFS-234453
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Zhu, Meng-Meng | Mao, Jun-Jun | Xu, Wei
Article Type: Research Article
Abstract: Linguistic preference relations with self-confidence (LPRs-SC) are the preference relation that can reflect the decision maker’s (DM) confidence psychology and has received widespread attention for their simple form and multiple information. Currently, arithmetic studies of LPRs-SC are conducted separately for preference relations and self-confidence. In addition, personalized individual semantics (PIS) is an important tool in large-scale decision-making to reflect the differences in the semantic understanding of DMs. However, the confidence level in LPRs-SC limits the preference relation to a certain extent and the linguistic representations of these two components are usually different. This means that it is not only necessary …to propose an arithmetic rule that can express the restrictive relationship between the two but also to construct a model that can extract the PIS of preference relation and confidence respectively. Besides, we constructed a two-stage consensus reaching process (CRP) based on the specificity of the LPRs-SC structure when enhancing group harmony. The process takes self-confidence as an independent source of information, delineates the adjusted categories in detail, and builds an adjustment model accordingly. Finally, the example and comparative analyses verify the merits of the proposed PIS in terms of consistency enhancement and CRP in terms of speed and accuracy harmonization. Show more
Keywords: Personalized individual semantics, linguistic preference relations with self-confidence, consensus reaching process, large scale decision making
DOI: 10.3233/JIFS-236552
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-19, 2024
Authors: Prabu Sankar, N. | Usha, D.
Article Type: Research Article
Abstract: This research paper presents a novel approach to improving healthcare services in rural areas by leveraging the potential of Fuzzy Intelligence Systems, Internet of Bodies (IoB) devices, and Blockchain technology. It begins by exploring the design and development of a Blockchain-based Patients Record System (BPRS), which ensures secure, transparent, and tamper-proof storage of patient medical records. The paper then delves into the fabrication of advanced IoB devices, specifically designed to study and monitor the health of rural populations. These devices, integrated with Fuzzy Intelligence Systems, provide efficient and reliable data capture, interpretation, and decision-making support. The highlight of the study …is the innovative integration of the IoB enabled Patient Monitoring System with the BPRS, which ensures real-time data synchronization and secure access to patient data for authorized personnel. The system collectively promotes efficient healthcare delivery, data privacy, and patient safety in rural areas. Show more
Keywords: Fuzzy intelligence systems, blockchain-based patients record system, internet of bodies devices, rural health monitoring, integrated healthcare system
DOI: 10.3233/JIFS-233752
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-9, 2024
Authors: Kahraman, Cengiz
Article Type: Research Article
Abstract: Intuitionistic fuzzy sets aims at taking the hesitancy of an expert into account in assigning a membership degree or a non-membership degree. The direct assignment of decimal numbers for membership and non-membership degrees of an element in intuitionistic fuzzy sets is not practical. Besides, the assigned degrees are generally composed of one digit or at most two digits after dot. This problem has not been addressed as much as it deserves in the literature. The hypothesis of the paper is that the determination of proportional relationships between membership and non-membership degrees is more appropriate than the direct assignment to obtain …the degrees. Proportional intuitionistic fuzzy (PIF) sets require only the proportion relations between an intuitionistic fuzzy set’s parameters. The accuracy of the results obtained with multi-criteria decision-making models definitely depends on how accurately the membership degrees are determined. In this paper, we extend Combinative distance-based assessment (CODAS) method by using single-valued proportional intuitionistic fuzzy sets. We compare the proposed PIF CODAS method with ordinary fuzzy CODAS method. A cloud service provider selection problem is handled to show the validity of the proposed PIF CODAS method. Additionally, a comparative analysis and a sensitivity analysis together with a discussion are presented. Show more
Keywords: Proportional intuitionistic fuzzy sets, aggregation operators, multi-criteria decision making, CODAS, Cloud service provider selection
DOI: 10.3233/JIFS-237389
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-19, 2024
Authors: Zhan, Qiuyan | Saeid, A. Borumand | Davvaz, Bijan
Article Type: Research Article
Abstract: The aim of this paper is to investigate several operators on L -algebras. At first, closure (interior) operators on L -algebras are defined and some properties of them are obtained. Then, existential operators and universal operators on L -algebras are studied, a one-to-one correspondence between the set of all quantifier operators and the set of all relative complete subalgebras of CKL -algebras is constructed. Furthermore, very true operators on L -algebras are investigated and by giving a very true ideal of a very true L -algebra, quotient structures on very true L -algebras are established.
Keywords: L-algebra, closure (interior) operator, existential (universal) operator, very true operator
DOI: 10.3233/JIFS-234370
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Mohan, Prakash | Aishwarya, S.
Article Type: Research Article
Abstract: Price changes in construction materials have a significant impact on building construction projects. Such price variations occur at random and at varying rates over time. A system that can estimate the magnitude and quantity of the change in material prices with reasonable accuracy is required. The primary goal is to create a machine-learning model that can predict the type of building material chosen based on environmental factors. The compressive strength of concrete is critical in defining its mechanical qualities. Long laboratory testing is needed to determine the compressive strength of concrete. The capacity of powerful machine learning algorithms to forecast …concrete compressive strength speeds up these lengthy experimental methods while also lowering expenses. This study provides abilities to precisely anticipate and categorize numerous qualities and traits of distinct materials. The framework includes a broad dataset that details materials, composition, and performance characteristics. Machine learning algorithms such as logistic regression (LR), decision trees (DT), and random forests (RF) train models on the training data. The models are hyper-parameter tweaked and feature developed to achieve the most outstanding performance. The k-fold method is used throughout the training and assessment phase to guarantee robustness and reduce bias. The F1 score and Receiver Operating Characteristic-Area Under Curve (ROC-AUC) curve are two performance measures used to measure how accurate and predictive the trained models are. The study findings provide insights into the qualities of the materials, facilitating improved material selection, quality assurance, and decision-making in the building sector. In the analyses, the best accuracy value was 99.92%, and the precision value was 88.83% using the LR algorithm. As a result, it was determined that the LR algorithm had the least execution 57.826 ms, and is thus the most suitable for use in concrete compressive strength estimation. Show more
Keywords: Building materials, machine learning algorithms, feature selection, model training, K-fold, performance evaluation
DOI: 10.3233/JIFS-236111
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Lin, Guangbo | Duan, Ninggui
Article Type: Research Article
Abstract: Integrating the E-commerce system with an enterprise resource planning tool can help the firm improve performance, maintain customers, and increase sales. In Enterprise Resource Planning, integration features can be provided either as developed features or as separate assignments and contributions. Problems with the online platform, improper addresses, rejected payments, and especially apparent transactions are frequent problems for online buyers. The enhanced Adaptive Ant Colony Optimization is utilized to optimize the rural E-commerce express of transportation. Several innovative routes can lower the downlink transportation cost and reach all collecting places with a fast delivery route. Convolutional Neural Networks were utilized to …increase the collective innovation of the E-commerce platform and simplify network communication. E-commerce is a mechanism used to market information services and products. Hence, ERP-AACO-CNN has been designed to integrate Enterprise Resource Planning and E-commerce, and business operations can stream smoothly from the front to the back of the business. Statistics on sales orders, customers, stock levels, price, and essential performance measurement systems. The automated invoices, frequent communications, financial report preparation, product and service delivery, and material requirements planning. The most significant results will likely finance businesses that employ it as a stimulant for a wide-ranging process improvement. In addition, E-commerce is a valuable innovation that connects buyers and sellers in various corners of the globe. Customer satisfaction is projected to be more significant than fault detection at 95.2 % accuracy for the proposed method’s E-commerce system with the superior value. According to client demand, an E-commerce system is the most accurate development at a given input level, and a future ERP is 64.9% efficient. The proposed approach has a 24.5% random error rate and a 13.2% mean square error rate. A comparison of E-commerce and enterprise ERP precision to the proposed technique yields 83.8% better results. Show more
Keywords: Adaptive ant colony optimization, enterprise resource planning, convolutional neural networks, E-commerce system
DOI: 10.3233/JIFS-237998
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: He, Fuyun | Feng, Huiling | Tang, Xiaohu
Article Type: Research Article
Abstract: The segmentation of neuronal morphology in electron microscopy images is crucial for the analysis and understanding of neuronal function. However, most of the existing segmentation methods are not suitable for challenging datasets where the neuronal structure is contaminated by noise or has interrupted parts. In this paper, we propose a segmentation method based on deep learning to determine the location information of neurons and reduce the influence of image noise in the data. Specifically, we adapt our neuron dataset based on UNet by using convolution with BN fusion and multi-input feature fusion. The method is named REDAFNet. The model simplifies …the model structure and enhances the generalization ability by fusing the convolution layer and BN layer. The noise interference in the data was reduced by multi-input feature fusion, and the ability to understand and express the data was enhanced. The method takes a neuron image as input and its pixel segmentation map as output. Experimental results show that the segmentation accuracy of the proposed method is 91.96%, 93.86% and 80.25% on the ISBI2012 dataset, U-RISC retinal neuron dataset and N2DH-GOWT1 stem cell dataset, respectively. Compared with the existing segmentation methods, the proposed method can extract more complete feature information and achieve more accurate segmentation. Show more
Keywords: Image segmentation, convolutional neural network, UNet, neuron image
DOI: 10.3233/JIFS-236286
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Du, Xueke | Li, Wenli | Wei, Xiaowen
Article Type: Research Article
Abstract: The fees of different certification services are charged in different ways: For example, T-mall.com (one of the leading e-commerce platforms in China) uses a total certification service , where each type of seller participating in the platform must purchase certification services; Pinduoduo.com (another Chinese e-commerce platform) uses an alternative certification service , where after paying a transaction fee, each seller participating in the platform can choose whether to purchase certification services. This paper studies how the choice of certification services affects the participation decisions of both sellers and buyers, as well as the revenue and quality level (the proportion of …high-quality sellers of all participating sellers) of a platform. According to previous research, network externalities also affect sellers’ and buyers’ participation strategies. Studies on the effectiveness of different certification services for e-commerce platforms have rarely considered both positive and negative network externalities. The results of constructed game-theoretic models show that both the certification capability and the certification cost play critical roles in determining which certification services can generate more revenue. If a platform provides certification services, the total certification service always generates a higher quality level than the alternative certification service. Furthermore, the applicable scope of certification services (defined as the certification strategy space), can be broadened by increasing both the profit ratio (the ratio between the profit of H-type sellers and L-type sellers) and the value ratio (the ratio between the value of H-type sellers and L-type sellers). Counterintuitively, a higher certification capability does not always yield a higher certification fee. Show more
Keywords: Certification services, E-commerce platforms, information asymmetries, network externalities, certification capability
DOI: 10.3233/JIFS-234621
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2024
Authors: Wang, Hanpeng | Xiong, Hengen
Article Type: Research Article
Abstract: An improved genetic algorithm is proposed for the Job Shop Scheduling Problem with Minimum Total Weight Tardiness (JSSP/TWT). In the proposed improved genetic algorithm, a decoding method based on the Minimum Local Tardiness (MLT) rule of the job is proposed by using the commonly used chromosome coding method of job numbering, and a chromosome recombination operator based on the decoding of the MLT rule is added to the basic genetic algorithm flow. As a way to enhance the quality of the initialized population, a non-delay scheduling combined with heuristic rules for population initialization. and a PiMX (Precedence in Machine crossover) …crossover operator based on the priority of processing on the machine is designed. Comparison experiments of simulation scheduling under different algorithm configurations are conducted for randomly generated larger scale JSSP/TWT. Statistical analysis of the experimental evidence indicates that the genetic algorithm based on the above three improvements exhibits significantly superior performance for JSSP/TWT solving: faster convergence and better scheduling solutions can be obtained. Show more
Keywords: Improved genetic algorithm, total weight tardiness, minimum local tardiness, PiMX
DOI: 10.3233/JIFS-236712
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Zhang, Dabin | Yu, Zehui | Ling, Liwen | Hu, Huanling | Lin, Ruibin
Article Type: Research Article
Abstract: As CO2 emissions continue to rise, the problem of global warming is becoming increasingly serious. It is important to provide a robust management decision-making basis for the reductions of carbon emissions worldwide by predicting carbon emissions accurately. However, affected by various factors, the prediction of carbon emissions is challenging due to its nonlinear and nonstationary characteristics. Thus, we propose a combination forecast model, named CEEMDAN-GWO-SVR, which incorporates multiple features to predict trends in China’s carbon emissions. First, the impact of online search attention and public health emergencies are considered in carbon emissions prediction. Since the impact of different variables …on carbon emissions is lagged, the grey relational degree is used to identify the appropriate lag series. Second, irrelevant features are eliminated through RFECV. To address the issue of feature redundancy of online search attention, we propose a dimensionality reduction method based on keyword classification. Finally, to evaluate the features of the proposed framework, four evaluation indicators are tested in multiple machine learning models. The best-performed model (SVR) is optimized by CEEMDAN and GWO to enhance prediction accuracy. The empirical results indicate that the proposed framework maintains good performance in both multi-scenario and multi-step prediction. Show more
Keywords: Carbon emissions prediction, online search attention, machine learning, time series forecasting
DOI: 10.3233/JIFS-236451
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Luo, Zhenrong | Jiang, Lei
Article Type: Research Article
Abstract: In order to construct an evaluation index system suitable for tourism management classroom teaching, this article evaluates the teaching effectiveness of teachers and improves the teaching quality of tourism management courses. This article is based on developmental evaluation theory, using Analytic Hierarchy Process, Project Response Theory, and CIPP model to construct an indicator system suitable for tourism management classroom teaching. Then, based on the collected data of 5763 students, the reliability and effectiveness of the tool and indicator system were first verified. Then, the variable of teacher teaching style was introduced to construct an OLS regression model for empirical research. …The research will summarize teacher and student data collected through the platform and conduct reliability analysis in SPSS 22.0 software, using Cronbach α The credibility of coefficient testing and evaluation tools. Cronbach in Environmental Fundamentals α The cβoefficient value is 0.8350. Cronbach for resource allocation α The coefficient is 0.735, and the Cronbah of the implementation process α Cronb Bach with a coefficient of 0.7 47 for teaching performance α The coefficient is 0.7240, indicating that rat ings has high reliability. Research has found that among the four specific types, the holistic type has the greatest impact on the specific situation, the holistic type has the greatest impact on the environmental foundation and resource allocation, and the legislative type has the greatest impact on the implementation process and teaching performance. Show more
Keywords: Tourism management, AHP method, CIPP model, teaching style
DOI: 10.3233/JIFS-235844
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Vaikunta Pai, T. | Singh, Manmohan | Shaik, Nazeer | Ashokkumar, C. | Anuradha, D. | Gangopadhyay, Amit | Rao, Goda Srinivasa | Reddy, T.Sunilkumar | Nagaraju, D.
Article Type: Research Article
Abstract: As the demand for energy in India continues to surge, accurate forecasting becomes paramount for efficient resource allocation and sustainable development. This study proposes an innovative approach to forecasting Indian primary energy demand by integrating Artificial Intelligence (AI) techniques with Fuzzy Auto-regressive Distributed Lag (FADL) models. FADL models, incorporating fuzzy logic, allow for a nuanced representation of uncertainties and complexities within the energy demand dynamics. In this research, historical energy consumption data is analysed using FADL models with both symmetric and non-symmetric triangular coefficients, enhancing the model’s adaptability to the inherent uncertainties associated with energy forecasting. This study addresses the …urgent need for enhanced energy planning models in the context of sustainable development. Our research aims to provide a comprehensive framework for predicting future Total Final Consumption (TFC) in alignment with the Indian National Energy Plan’s net-zero emissions target by 2035. Recognizing the limitations of current models, our research introduces a novel approach that integrates advanced algorithms and methodologies, offering a more flexible and realistic assessment of TFC trends. The primary objective of this study is to develop an improved energy planning model that surpasses existing projections by incorporating sophisticated algorithms. We aim to refine Show more
Keywords: Auto-regressive, distributed lag, energy consumption, forecast, triangular coefficient
DOI: 10.3233/JIFS-240729
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Ma, Chengfei | Yang, Xiaolei | Lu, Heng | He, Siyuan | Liu, Yongshan
Article Type: Research Article
Abstract: When calculating participants’ contribution to federated learning, addressing issues such as the inability to collect complete test data and the impact of malicious and dishonest participants on the global model is necessary. This article proposes a federated aggregation method based on cosine similarity approximation Shapley value method contribution degree. Firstly, a participant contribution calculation model combining cosine similarity and the approximate Shapley value method was designed to obtain the contribution values of the participants. Then, based on the calculation model of participant contribution, a federated aggregation algorithm is proposed, and the aggregation weights of each participant in the federated aggregation …process are calculated by their contribution values. Finally, the gradient parameters of the global model were determined and propagated to all participants to update the local model. Experiments were conducted under different privacy protection parameters, data noise parameters, and the proportion of malicious participants. The results showed that the accuracy of the algorithm model can be maintained at 90% and 65% on the MNIST and CIFAR-10 datasets, respectively. This method can reasonably and accurately calculate the contribution of participants without a complete test dataset, reducing computational costs to a certain extent and can resist the influence of the aforementioned participants. Show more
Keywords: Federated aggregation algorithm, contribution assessment, cosine similarity, Shapley value, equitable distribution
DOI: 10.3233/JIFS-236977
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Pandey, Sakshi Dev | Ranadive, A.S. | Samanta, Sovan | Dubey, Vivek Kumar
Article Type: Research Article
Abstract: Several methodologies have been proposed in the literature of graph theory for depicting collaboration among entities. However, in these studies, the measure of collaboration is taken based on the crisp graphical properties and discusses only its positive effects. In this manuscript, we discuss the simultaneous collaboration and competition that are observed among individuals, organizations, countries, communities and many others. The notion of bipolar fuzzy bunch graph (BFBG) is introduced in this study to effectively capture the positive and negative effects of both the terms collaboration and competition, which is jointly called coopetition. The goal of this paper is to introduce …an improved representation and analytical measure for coopetition. To further enrich the literature on competition graphs, the notion of survival and winning competition among species has been introduced and also provides its bipolar fuzzy competition degrees. We also introduce two types of coopetition measures to understand the ranking structure of entities (i.e. which node batter collaborates and competes with other nodes) in the network: a) bipolar fuzzy coopetition degree and b) bipolar fuzzy coopatition index. In the form of a bipolar fuzzy coopetition graph, we find evidence to validate our framework and computations. We gathered research articles on COVID-19 and their citations over a specific time period from a specific journal. To demonstrate our approach, we displayed bipolar fuzzy collaboration and competition of various countries on COVID-19 and classified their rankings based on their positive and negative coopetition indices. Show more
Keywords: Bipolar fuzzy bunch degree, communication potential effect (CPE), bipolar fuzzy mixed graph, winning and survival competition, coopetition degree, coopetition index
DOI: 10.3233/JIFS-234061
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2024
Authors: Ding, Xiaomei | Ding, Huaibao | Zhou, Fei
Article Type: Research Article
Abstract: Given that cloud computing is a relatively new field of study, there is an urgent need for comprehensive approaches to resource provisioning and the allocation of Internet of Things (IoT) services across cloud infrastructure. Other challenging aspects of cloud computing include IoT resource virtualization and disseminating IoT services among available cloud resources. To meet deadlines, optimize application execution times, efficiently use cloud resources, and identify the optimal service location, service placement plays a crucial role in installing services on existing virtual resources within a cloud-based environment. To achieve load balance in the fog computing infrastructure and ensure optimal resource allocation, …this work proposes a meta-heuristic approach based on the cat swarm optimization method. For more clarity in the difference between the work presented in this research and other similar works, we named the proposed technique MH-CSO. The algorithm incorporates a resource check parameter to determine the accessibility and suitability of resources in different situations. This conclusion was drawn after evaluating the proposed solution in the ifogsim environment and comparing it with particle swarm and ant colony optimization techniques. The findings demonstrate that the proposed solution successfully optimizes key parameters, including runtime and energy usage. Show more
Keywords: Load balancing, cat swarm optimization, fog computing, resource allocation and IoT
DOI: 10.3233/JIFS-233418
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Zhou, Ruohan | Chen, Wei | Xie, Congjin
Article Type: Research Article
Abstract: The field of business management involves a large amount of data and information sources, including market data, customer data, supply chain data, etc. In order to quantify and analyze different resources, help enterprises better plan and allocate resources, and improve resource utilization efficiency, a clustering analysis based digital resource integration algorithm for business management is studied. Build a business management digital resource integration framework, including data layer, integration layer, and storage layer, to integrate and store data from different sources of business management databases, thereby facilitating unified management and utilization of digital resources by enterprises. The data layer collects data …from different business management databases and stores it in the database according to different sources; The integration layer preprocesses the collected data, simply fixes errors and missing information in the data, and improves data quality. Adopting a feature extraction method based on the projection direction uncorrelation strategy of the labeled power set conversion method, the useful feature information of digital resources in enterprise management can be effectively extracted; Based on the two-step clustering analysis method, business management digital resources are clustered according to similar characteristics to complete the classification and integration of business management digital resources, and improve the efficiency of resource utilization; The storage layer adopts the Security Information Diffusion Algorithm (IDA) storage model to store integrated and classified digital resources managed by enterprises, ensuring data security and effectively preventing data leakage and illegal access. The experimental results show that the digital resource structure of business management integrated by this algorithm is clear, with a data redundancy of less than 8% and a difference of less than 11% . The time consumption for data integration is less than 2.11 minutes, indicating good resource integration ability. Show more
Keywords: Cluster analysis, business administration, digitization, resource integration, data storage, resource sharing
DOI: 10.3233/JIFS-235573
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Rachamadugu, Sandeep Kumar | Pushphavathi, T.P.
Article Type: Research Article
Abstract: This paper introduces an innovative approach, the LS-SLM (Local Search with Smart Local Moving) technique, for enhancing the efficiency of article recommendation systems based on community detection and topic modeling. The methodology undergoes rigorous evaluation using a comprehensive dataset extracted from the “dblp. v12.json” citation network. Experimental results presented herein provide a clear depiction of the superior performance of the LS-SLM technique when compared to established algorithms, namely the Louvain Algorithm (LA), Stochastic Block Model (SBM), Fast Greedy Algorithm (FGA), and Smart Local Moving (SLM). The evaluation metrics include accuracy, precision, specificity, recall, F-Score, modularity, Normalized Mutual Information (NMI), betweenness …centrality (BTC), and community detection time. Notably, the LS-SLM technique outperforms existing solutions across all metrics. For instance, the proposed methodology achieves an accuracy of 96.32%, surpassing LA by 16% and demonstrating a 10.6% improvement over SBM. Precision, a critical measure of relevance, stands at 96.32%, showcasing a significant advancement over GCR-GAN (61.7%) and CR-HBNE (45.9%). Additionally, sensitivity analysis reveals that the LS-SLM technique achieves the highest sensitivity value of 96.5487%, outperforming LA by 14.2%. The LS-SLM also demonstrates superior specificity and recall, with values of 96.5478% and 96.5487%, respectively. The modularity performance is exceptional, with LS-SLM obtaining 95.6119%, significantly outpacing SLM, FGA, SBM, and LA. Furthermore, the LS-SLM technique excels in community detection time, completing the process in 38,652 ms, showcasing efficiency gains over existing techniques. The BTC analysis indicates that LS-SLM achieves a value of 94.6650%, demonstrating its proficiency in controlling information flow within the network. Show more
Keywords: Recommender Systems (RS), BagofWords (BoW), Pearson Correlation Co-efficient based Latent Dirichlet Allocation (PCC-LDA), Linear Scaling based Smart Local Moving (LS-SLM), Time Frequency and Inverse Document Frequency (TF-IDF), Community detection
DOI: 10.3233/JIFS-233851
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Zhang, Yonghong | Li, Shouwei | Li, Jingwei | Tang, Xiaoyu
Article Type: Research Article
Abstract: Electricity market violations affect the overall operations of the electricity market. This paper explores the evolutionary stability strategies of electricity generation enterprises and electricity consumers under two modes: traditional regulation and blockchain regulation to analyze blockchain technology’s mechanism and conditions in solving electricity market violations. The experimental results indicate that the likelihood of consumers accepting electricity and the regulatory capacity of regulatory agencies play a crucial role in determining the violation approach adopted by electricity generation enterprises. Under traditional regulatory models, due to information asymmetry, regulatory agencies may not be able to detect violations promptly. Meanwhile, electricity consumers may choose …to accept violations by power generation companies due to high appeal costs. Blockchain technology enables regulatory agencies to improve their regulatory capabilities by eliminating information asymmetry, reducing the cost of complaints from electricity consumers, thereby elevating the risk for enterprises engaging in market violations and optimizing the evolutionary game towards an optimum state. Show more
Keywords: Blockchain technology, electricity market, violation regulation, evolutionary game
DOI: 10.3233/JIFS-238041
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl