Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2024: 1.7
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Kiliroor, Cinu C. | Valliyammai, C.
Article Type: Research Article
Abstract: Nowadays Electronic communication is an important medium and an inevitable way for official communication. So, the email classification into spam or ham gains a lot of importance. Commonly used approaches are text-based or collaborative methods for spam detection. However, not only choosing the right classifier is very difficult but, handling poison attacks and impersonation attacks are also very important. The proposed model considers a powerful spam filtering technique which includes both social network and email factors in addition to the email data analysis for spam classification. The incoming emails are subjected to header parsing for finding the trust and reputation …of senders with respect to the receivers and keyword parsing is applied to find the topic of interest using LDA with Gibbs Sampling method. Optical Character Recognition (OCR) method is applied to find the image spam e-mails. Degree and strength of the connection between the users from the social networks are also considered along with the email data factors for better message classification. Logistic Regression is used to combine all the independent input features to get an effective result. The experimental results and comparisons with the existing models vividly show the significant performance of the proposed classifier. Show more
Keywords: E-mail spam filtering, social networks, neural network, support vector machine, naïve bayes, machine learning, e-mail network factors, logistic regression
DOI: 10.3233/JIFS-169964
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4037-4048, 2019
Authors: Balaji, A. Jayanth | Harish Ram, D.S. | Nair, Binoy B.
Article Type: Research Article
Abstract: Automated metering Infrastructure (AMI) is an integral part of a smart grid. Employing the data collected by the AMI from the consumers to generate accurate electricity consumption forecasts can help the utility in significantly improving the quality of service delivered to the consumer. Design and empirical validation of machine learning based electric energy consumption forecasting systems, is presented in the present study. Convolutional Neural Networks (CNN), Long Short-Term Memory (LSTM), Gated Recurrent Unit (GRU) and Extreme Learning Machines (ELM) based models are designed and evaluated. One of the major aspects of the work is that the proposed consumption forecasting systems …are designed as generalized models, i.e. one single model can be used to generate forecasts for any of the consumers considered, as opposed to the conventional technique of generating a separate model for each consumer. The forecasting systems are designed to generate half-hour-ahead and two-hour-ahead electric energy consumption forecasts. The proposed systems are validated on data for 485 Small and Medium Enterprise (SME) consumers in the CER electric energy consumption dataset. Results indicate that the models proposed in the present study result in good consumption forecast accuracy are hence, well suited for generating electric energy consumption forecast models. Show more
Keywords: CNN, electric energy consumption forecast, ELM, GRU, LSTM, machine learning
DOI: 10.3233/JIFS-169965
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4049-4055, 2019
Authors: Poongodi, M. | Vijayakumar, V. | Rawal, Bharat | Bhardwaj, Vaibhav | Agarwal, Tanay | Jain, Ankit | Ramanathan, L. | Sriram, V.P.
Article Type: Research Article
Abstract: Nowadays, the purchase of every product involves a lot of critical thinking. Every buyer goes through a lot of user reviews and rating before finalizing his purchase. They do this to ensure that the product they purchase is of good quality at minimum price possible. It is evident now that online reviews are not that reliable because of fake reviews and review bots. Now you can even pay certain social media groups to give your product a fake good rating. Hence going just with the reviews of some stranger whom you do not know is not intelligent. So we propose …a recommendation model based on the Trust Relations (TR) and User Credibility (UC) because it is human nature that a person feels more comfortable when he gets a review from a person he knows on a first name basis. Also, the credibility of the reviewer is an important factor while providing importance to the reviews because every person is different from other and can have different expertise. Our model takes into account the effect of credibility which is not used by any other recommendations models which increases the precision of the results of our model. We also propose the algorithm to calculate the credibility of any node in the network. The results are validated using a dataset and applying our proposed model and traditional average rating model which shows that our model performs better and gives precise results. Show more
Keywords: Recommendation, trust relations, social network, user credibility
DOI: 10.3233/JIFS-169966
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4057-4064, 2019
Authors: Selvan, N. Senthil | Vairavasundaram, Subramaniyaswamy | Ravi, Logesh
Article Type: Research Article
Abstract: Increase in chronic diseases among people gives the health care industry a challenging problem. Healthcare industry is using the Internet-of-Things (IoT) to create systems that monitor patients. The ultimate task of the system is to minimize manual efforts made to recommend food and drugs for chronic patients. However, many uncertain factors are involved with chronic patients, and existing models unable to handle it efficiently often lead to poor results. Medical records gathered from diverse devices, such as mobile and IoT devices that are raw in nature or in different formats cannot be utilized for further analysis. Since patient records grow …rapidly, it is difficult for health care systems to manage and control. To overcome these limitations, the proposed system develops a fuzzy ontology-based recommender system using Type-2 fuzzy logic to recommend foods and drugs for chronic (diabetic) patient. Extraction of risk factors for chronic patients is achieved via wearable sensors and IoT-based electronic medical records are linked with linked open data (LOD) to create a knowledge base. Since, patient data sets are huge; cloud services are used to store and retrieve data for further analysis. An experiment is conducted on patient datasets and the results illustrate that the proposed work is efficient for patient data enrichment, risk factor extraction and appropriate medical advice for chronic patients. Show more
Keywords: Internet of things (IoT), linked open data (LOD), fuzzy ontology, recommender system, cloud computing and health care system
DOI: 10.3233/JIFS-169967
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4065-4075, 2019
Authors: Sharma, Ashutosh | Kumar, Rajiv
Article Type: Research Article
Abstract: In this paper, typical application of Cyber Physical System (CPS) has been highlighted for the critical-healthcare data transmission services. Sensors of CPS are providing patient’s health information via a communication network to a medical practitioner at some distant place. Needs of development of dependable routing protocol for such type of applications in healthcare are increased day-by-day. This paper proposes a quickest, critical and energy efficient routing for the CPS based healthcare system. Simulations performed to convey the appropriateness of the quality of data transmission system according to the well-defined Service Level Agreement (SLA) formulation. Proposed energy and SLA cooperation in …data transmission is beneficial for the tele-operated medical service. A medical practitioner is able to monitor a patient in real-time with the help of proposed dependable and energy efficient data transmission. The results shows that CPS with consideration of different constraints such as energy and SLAs have a severe effect on its performance parameters such as mean number of QSS s -t paths, average hop counts and average energy efficiency. In addition to this comparison with existing algorithms shows the improvement in consideration with all performance components. Show more
Keywords: Quickest services, critical-healthcare services, green energy, service level agreement, cyber physical system
DOI: 10.3233/JIFS-169968
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4077-4089, 2019
Authors: Ali, Syed Sadaf | Ganapathi, Iyyakuti Iyappan | Prakash, Surya
Article Type: Research Article
Abstract: Authentication based on utilization of fingerprint has become highly popular. Generally, minutiae points information obtained from the fingerprints is stored into the database. Various research works depict that by utilizing minutiae points information, original fingerprints reconstruction is possible. Adversary can obtain the user template through an attack on the database. If minutiae template of a user is compromised, then the adversary can construct original fingerprint of the user. In order to avoid this, it is essential to secure the fingerprint information. To achieve this, a technique called 3-Dimensional Secured Fingerprint Shell has been presented by Ali and Prakash, in …this technique they generate a 3-dimensional spiral curve, however, ridge counts between singular and minutiae points are not secure in this technique. In the proposed technique we construct an extremely secure and efficient template for a user, by securing all features of the fingerprint used for template generation. The proposed technique is robust against the effects of rotation as well as translation and meets the essential requirements of an efficient authentication system. We evaluated the proposed technique by utilizing FVC2000, FVC2002, FVC2004, and IIT Kanpur fingerprint databases. The results obtained for the proposed technique are highly encouraging, that shows its robustness. Show more
Keywords: Biometrics, template security, fingerprint, revocability, diversity, minutiae
DOI: 10.3233/JIFS-169969
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4091-4104, 2019
Authors: Ezhilarasie, R. | Reddy, Mandi Sushmanth | Umamakeswari, A.
Article Type: Research Article
Abstract: Edge computing offers potential benefits to applications working in IoT (Internet of Things) and CPS (Cyber Physical Systems) environments by bringing the power of computing proximate to the devices, which demand high computational resources. As computational capabilities are currently untapped in edge devices like the IoT gateway, the computational intensive part of an application like a thread, a module or a task can be offloaded to the edge devices rather than to the cloud by the end devices. In this paper, an approach that employs Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) is used to determine the near optimal …solution for scheduling offloadable components in an application, with the intent of significantly reducing the execution time of an application and energy consumption of the smart devices. With a new inertial weight equation, an Adaptive Genetic Algorithm – Particle Swarm Optimization (AGA-PSO) algorithm is proposed which uses GA’s ability in exploration and PSO’s ability in exploitation to make the offloading optimized without violating the deadline constraint of an application. Show more
Keywords: Internet of things (IoT), edge computing, computation offloading, application partitioning, particle swarmoptimization, genetic algorithm
DOI: 10.3233/JIFS-169970
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4105-4113, 2019
Authors: Kumar, N. Kirn | Gandhi, V. Indra
Article Type: Research Article
Abstract: The natural activities and human thinking forms the basis for fuzzy logic which presents based on different application perspectives. The performance of various energy storage systems life time can be improved by utilizing fuzzy logic controllers and back up in a hybrid power system especiallywhile usingrenewable sources. The Load Frequency Controllers (LFC) using classical control techniques are tuned based on trial and error methods.Also, when system complexity increases controller gives slow response, by considering the fuzzy intelligent control these system performances are improved. A soft computing fuzzy technique is employed to maximize the efficiency from solar panel to give maximumpower …output.The various applications in power systems relating to energy storage system performance for energy management, controller for controlling the load-frequency in multi-area power system and for solar systems by considering the tracking efficiency which are utilized for synchronization into the grid.The fuzzy logic provides better improvement and efficiency when compared to conventional controllers. These controllers do not have any specific or particular procedure to implement in various applications. A brief review to fuzzy logic controllers (FLC) for energy storage systems LFC and PV solar MPPT is presented. Show more
Keywords: Battery Energy Storage System (BESS), Fuzzy Logic Controller (FLC), Maximum Power Point Tracking (MPPT), Particle Swarm Optimization (PSO), Photo Voltaic (PV), Super Conducting Magnetic Energy Storage System (SMES), State of Charge (SOC)
DOI: 10.3233/JIFS-169971
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4115-4126, 2019
Authors: Qiang, Zhang | Junhua, Hu | Jinfu, Feng | An, Liu
Article Type: Research Article
Abstract: In order to accurately assess the threat of air multi-target in the complicated and changeable air combat environment, an assessment method based on improved group generalized intuitionistic fuzzy soft set (I-GGIFSS) is proposed in this paper. Firstly, considering the characteristics of air target and the influence factors of threat assessment, a reasonable threat assessment system is established, and the appropriate assessment index is determined. Secondly, the generalized parameter matrix provided by many experts is introduced into the generalized intuitionistic fuzzy soft set (GIFSS) to form the group generalized intuitionistic fuzzy soft set (GGIFSS) to compensate for the knowledge limitation and …assessment error of a single expert in traditional GIFSS. Finally, subjective weight is determined by group AHP (GAHP) and objective weight is determined by intuitionistic fuzzy entropy (IFE), then subjective weight and objective weight are combined based on relative entropy theory to determine reasonable index weight and expert weight, thus I-GGIFSS is obtained. The validity and superiority of I-GGIFSS are verified by the calculation and comparison of an example. Show more
Keywords: Threat dynamic assessment, group generalized intuitionistic fuzzy soft set, group AHP, intuitionistic fuzzy entropy, relative entropy
DOI: 10.3233/JIFS-169972
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4127-4139, 2019
Authors: Ravi, Logesh | Vairavasundaram, Subramaniyaswamy | Palani, Saravanan | Devarajan, Malathi
Article Type: Research Article
Abstract: With the recent developments in digital technologies, the cultural heritage domain has attracted new researchers to drive technological trends for offering interactive and pleasant experience to users. The emergences of location-based services, recommendation systems, and the internet of things have created a smart research space to support cultural heritage visitors. In this paper, we present an intelligent cultural space through the development of proximity detection method and the deployment of smart sense bricks. The presented intelligent cultural space is supported by the CHXplorer-Information Management System to present multimedia content to the users through our CHXplorer mobile decision-support tool. The CHXplorer …is designed to enhance the satisfaction and enjoyment of the user visiting the cultural heritage sites, and it is capable of generating personalized recommendations to the active target user. The effectiveness and efficiency of the presented CHXplorer are experimentally evaluated and user study made establishes the users’ positive feedback on the system. Show more
Keywords: Cultural heritage, internet of things, intelligent cultural space, social network, personalized recommendations
DOI: 10.3233/JIFS-169973
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4141-4152, 2019
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]