Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2024: 1.7
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Khan, Munna | Reza, Md Qaiser | Salhan, Ashok Kumar | Sirdeshmukh, Shaila P.S.M.A.
Article Type: Research Article
Abstract: The acoustic resonance spectroscopy is an accurate, precise, inexpensive, and non-destructive method for identification and quantification of materials. The acoustics based inspection methods used for classification of materials in the field of food, security, and healthcare is constrained by expensive instrumentation, complicated transducer coupling, etc. Hence, a simple, inexpensive, and portable system has been devised that acquires data quickly and classifies the materials. It has two piezoelectric transducers glued to both ends of the V-shaped quartz tube, one acting as a transmitter and another as a receiver. The transmitter generates vibration by white noise excitation. The receiver detects the resultant …signal after interaction with samples and recorded the acoustic signal with the help of a laptop and software. From analysis of power spectrum of signals acquired from each of the samples, seven resonant peaks were obtained. PCA analysis was carried out by selecting only two principal components as feature vectors for classification. The overall accuracy of the classifiers: LDA and Naive Bayes were 98.91% and 96.83% respectively. The classification accuracy of LDA for distilled water, sugar solution, and salt solution were found to be 100%, 98.5%, and 98.25% respectively, while the accuracy of the Naive Bayes classifier was 94%, 98.5%, and 98% respectively. The results show that the classification accuracy of LDA is better than Naive Bayes classifier. The datasets of the developed simple system show a significant capability in the classification of materials. Show more
Keywords: Acoustic resonance spectroscopy (ARS), acoustic signature, principal component analysis (PCA), linear discriminant analysis (LDA)
DOI: 10.3233/JIFS-169994
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4389-4397, 2019
Authors: Chhabra, Rishu | Krishna, C. Rama | Verma, Seema
Article Type: Research Article
Abstract: Intelligent Transportation Systems (ITS) aim at reducing the risks associated with the transportation system as road accidents are becoming one of the primary causes of death in developing countries. Monitoring of driver behavior is one of the key areas of ITS and assists in vehicle safety systems. It has gained importance in order to reduce traffic accidents and ensure the safety of all the road users, from the drivers to the pedestrians. In this work, we present a context-aware system that considers the vehicle, driver and the environment for driver behavior classification as a safe or fatigue or unsafe driver …(representing any other unsafe driving behavior like a drunk driver, reckless driver etc.) using a Dynamic Bayesian Network (DBN). We have designed a questionnaire to obtain the influencing factors that decide safe, unsafe and fatigue driving behavior. The collected data has been analyzed using Statistical Package for Social Sciences (SPSS). It has been observed that several techniques in the past have been proposed for driver behavior classification or detection; which either use specialized sensors or hardware devices, inbuilt smartphone sensors (like a gyroscope, accelerometer, magnetometer and GPS etc.), complex sensor fusion algorithms and techniques to detect driver behavior. The novelty of our work lies in designing and developing a context-aware system based on Android smartphone; that considers the complete driving context (driver, vehicle and surrounding environment) and classifies the driver behavior using a DBN. In order to identify driver fatigue, results from the designed questionnaire and previous research studies have been used without the need for special hardware devices. A DBN that combines all the contextual information has been created using GeNIe Modeler. Learning of DBN has been carried out using the Expec-tation–Maximization (EM) algorithm. The real-time data for DBN learning and testing has been collected on Chandigarh-Patiala National Highway, India using an Android smartphone. The proposed system yields an overall classification accuracy of 80–83%.The focus of this paper is to develop a cost-effective context-aware driver behavior classification system, to promote ITS in developing countries. Show more
Keywords: DBN, driving behavior, intelligent transportation systems, sensors, smartphone
DOI: 10.3233/JIFS-169995
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4399-4412, 2019
Authors: Pradhan, Buddhadeb | Vijayakumar, V. | Hui, Nirmal Baran | Sinha Roy, Diptendu
Article Type: Research Article
Abstract: Navigation of multiple robots is a challenging task, particularly for many robots, since individual gains may more often than not adversely affect global gain. This paper investigates the problem of multiple robots moving towards individual goals within a common workspace without colliding amongst themselves. Two solutions for coordination namely Fuzzy Logic Controller (FLC) and Genetic Algorithm based FLC (GA-FLC) have been employed and the efficacy of cooperation strategies have been compared with their non-cooperative counterparts as well as with the fundamental potential field method (PFM). Proposed coordination schemes are verified through simulations. A total of 100 scenarios are considered varying …the number of robots (8, 12, 16 and 20). The obtained results show the efficacy of the proposed schemes. Show more
Keywords: Multi-agent systems, motion planning, coordination
DOI: 10.3233/JIFS-169996
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4413-4423, 2019
Authors: Algredo-Badillo, Ignacio | Morales-Rosales, Luis Alberto | Hernandez-Gracidas, Carlos Arturo | Cruz-Victoria, Juan Crescenciano | Pacheco-Bautista, Daniel | Morales-Sandoval, Miguel
Article Type: Research Article
Abstract: Object detection is a technologically challenging issue, which is useful for safety in outdoor environments, where this object, frequently, represents an obstacle that must be avoided. Although several object detection methods have been developed in recent years, they usually tend to produce poor results in outdoor environments, being mainly affected by sunlight, light intensity, shadows, and limited computational resources. This open problem is the main motivation for exploring the challenge of developing low-cost object detection solutions, with the characteristic of being easily adaptable and having low power requirements, such as the ones needed in on-board obstacle detection systems in automobiles. …In this work, we present a trade-off analysis of several architectures using an FPGA-based design that implements ANNs (FPGA-ANN) for outdoor obstacle detection, focused in road safety. The analyzed FPGA-ANN architectures merge outdoor data gathered by a Kinect sensor, images and infrared data, to construct an outdoor environment model for object detection, which allows to detect if there is an obstacle in the near surroundings of a vehicle. Show more
Keywords: Obstacle detection, artificial neural networks, FPGA implementation, architecture trade-off analysis, road safety
DOI: 10.3233/JIFS-169997
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4425-4436, 2019
Authors: Sinha, Rupesh Kumar | Sahu, S.S.
Article Type: Research Article
Abstract: Cryptography is the most peculiar way to secure data and most of the encryption algorithms are mainly used for textual data and not suitable for transmission data such as images. It is seen that the generation of secure key in Image cryptography has been a challenging task in the way of providing secured key generation for the transmitted data. In order to aid secured key generation in this context, an optimized secret key generation based on Chebyshev polynomial with Adaptive Firefly (FF) optimization technique is proposed. The optimized key is utilized with process of shuffling, diffusion, and swapping to get …a better encrypted image. At the receiver end, reverse process is applied with optimized key to retrieve the original input image. The efficiency of our proposed method is assessed by the exhaustive experimental study. The results show that the proposed methodology provided correlation coefficient of 0.21, Number of Pixels Change Rate (NPCR) of 0.996, Unified Average Changing Intensity (UACI) of 0.3346 and Information Entropy of 7.995 as compared with the existing methods. Show more
Keywords: Encrypted image, DWT, Chebyshev polynomial, optimized secret key, Adaptive firefly (FF) optimization algorithm
DOI: 10.3233/JIFS-169998
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4437-4447, 2019
Authors: Srinivasan, Sundar | ShivaKumar, K.B. | Muazzam, Mohammad
Article Type: Research Article
Abstract: A cognitive radio (CR) can be programmed and configured dynamically to use best wireless channels. Such a radio automatically detects available channels in wireless spectrum, and then accordingly changes its transmission. The CR system consists of primary user or licensed user and secondary user or unlicensed user. The security attacks such as active attack and passive attack are identified between primary user and secondary user and packet loss occurs during packet transmission. The security problem occurring while transmission of signal between primary user and secondary user is rectified by using a hybrid RSA (Riverest, Shaimer and Adleman) and HMAC (Hash …Message Authentication Code) algorithms where former is used for key generation and latter is used for tag generation which is sent along with signal. Additionally packet loss incurred in system incurs is reduced with aid of Markov Chain Model during transmission. The comparison results provided showefficiency of the proposed algorithm in cognitive radio system in terms of parameters such as throughput, encryption time, decryption time, Packet Delivery Ratio and energy consumption. Show more
Keywords: Cognitive radio, RSA (Riverest, Shaimer and Adleman), HMAC (Hash Message Authentication Code), Markov Chain Model, active attack, passive attack
DOI: 10.3233/JIFS-169999
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4449-4459, 2019
Authors: Vijayakumar, K. | Rajesh, K. | Vishnuvardhanan, G. | Kannan, S.
Article Type: Research Article
Abstract: The Distributed Generation (DG) systems are highly useful in recent days for increasing the penetration of renewable energy, in which the design of grid connected inverters is one of the demanding and challenging task. For this reason, different controller strategies are developed in the traditional works for controlling the inverters with increased efficiency. But, it has the major limitations of increased computational complexity, steady state error and reduced compensation capability. To solve these issues, this research work aims to design a new controller by implementing a novel Monkey King Evolution Algorithm (MKEA) for grid connected converters. The motive of this …work is to increase the overall effectiveness of the power system by controlling the inverter without affecting its output. Also, it aims to provide a secure and convenient controller for the power converters. Here, the information that is obtained from the system which includes real power, distorted power due to load, reactive power of load, and apparent power of inverter are taken as the input. Later, the four numbers of monkeys are initialized, which evaluates the best solution based on these parameters. Sequentially, the monkey king obtains the best solutions from the monkeys, using which the most suitable and best solution for taking the decision is selected. Based on this, the reference current is generated by performing the voltage regulation, and abc to dq0 transformation processes. During simulation, the efficiency of the controller is analyzed by using the measures of phase voltage, phase current, active power, reactive power, apparent power, grid voltage, and output voltage. The Total Harmonic Distortion (THD) is effectively reduced by using the MKEA based controller design. Extensive simulation and experimental results are presented to validate the effectiveness of the proposed controller and control strategy. Show more
Keywords: Grid connected inverters, Distributed Generation System, Monkey King Evolution Algorithm (MKEA), Photovoltaic (PV) System, controller design, reference current generation
DOI: 10.3233/JIFS-179000
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4461-4478, 2019
Authors: Jain, Parul | Dixit, Veer Sain
Article Type: Research Article
Abstract: Context aware recommender system has become an area of rigorous research attributing to incorporate context features, thereby increases accuracy while making recommendations. Most of the researches have proved neighborhood based collaborative filtering to be one of the most efficient mechanisms in recommender systems because of its simplicity, intuitiveness and wide usage in commercial domains. However, the basic challenges observed in this area include sparsity of data, scalability and utilization of contexts effectively. In this study, a novel framework is proposed to generate recommendations independently of the count and type of context dimensions, hence pertinent for real life recommender systems. In …the framework, we have used k -prototype clustering technique to group contextually similar users to get a reduced and effective set. Additionally, particle swarm optimization technique is applied on the closest cluster to find the contribution of different context features to control data sparsity problem. Also, the proposed framework employs an improved similarity measure which considers contextual condition of the user. The results came from the series of experiments using two context enriched datasets showcasing that the proposed framework increases the accuracy of recommendations over other techniques from the same domain without consuming extra cost in terms of time. Show more
Keywords: Collaborative filtering, unsupervised learning, particle swarm optimization, euclidean distance, context aware recommendations
DOI: 10.3233/JIFS-179001
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4479-4490, 2019
Authors: Hasnat, Abul | Barman, Dibyendu | Sarkar, Suchintya
Article Type: Research Article
Abstract: Shared visual cryptography is a method to protect image-based secrets where an image is kept as multiple shares having less computational decoding process. Steganography is a technique to hide secret data in some carrier like-audio, image etc. Steganography technique is categorized into four categories. i) Spatial Domain Technique- Image pixel values are converted into binary and some of the binary values changed to hide secret data. ii) Transform Domain Technique- the message is hidden in cover image and then it is transformed in the frequency domain. iii) Distortion Technique-information is stored by changing the value of the pixel. iv)Visual Cryptography …Technique-Image is broken into two or more parts called shares. This article proposes a hybrid visual crypto-steganography approach which exploits the advantages of both approaches to protect image based secret in communication. Most of the visual cryptography is applied on black and white images but the proposed method can be applied directly on color images having three channels. This method does not change the image size. Also an exact replica of original image can be reconstructed therefore this process does not result in image quality degradation. This article proposes novel color image share cryptography where seven shares are generated from one color image (correlated/de-correlated color space). These shares are sent to the receiver and original image is reconstructed using all those shares. Share generation and image reconstruction is based on simple operation like pixel shuffling, reversing binary string of the image information, ratio of pixel intensity values. Row key matrix and column key matrix are generated using random function. Pixel positions are shuffled using these two key matrixes. These seven shares namely Row Key, Column Key, Remainder matrix, Quotient matrix, R ratio matrix, G ratio matrix and B ratio matrix are generated. Then Row key matrix, Column key matrix, Remainder matrix, Quotient matrix and three ratio matrices are hidden into separate cover images by LSB encoding technique and sent over the network. Receiver can reconstruct the image if all shares are available only. The proposed method is applied on standard images in the literature and images captured using standard digital camera. Comparison study with existing methods shows that the proposed method performs better in terms of NIST metrics. The method has many applications in the area of visual cryptography, shared cryptography, image based authentication etc. Show more
Keywords: Binary image, Cryptography, GCD, image decryption, image encryption, image security, quotient, remainder, shared visual cryptography, steganography
DOI: 10.3233/JIFS-179002
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4491-4506, 2019
Authors: Ramachandran, Sumalatha | Palivela, Lakshmi Harika
Article Type: Research Article
Abstract: The importance of the surveillance is increasing every day. Surveillance is monitoring of activities, behavior and other changing information. An intelligent automatic system to detect behavior of the human is very important in public places. For this necessity, a framework is proposed to detect suspicious human behavior as well as tracking of human who is doing some unusual activity such as fighting and threatening actions and also distinguishing the human normal activities from the suspicious behavior. The human activity is recognized by extracting the features using the convolution neural network (CNN) on the extracted optical flow slices and pre-training the …activities based on the real-time activities. The obtained learned feature creates a score for each input which is used to predict the type of activity and it is classified using multi-class support vector machine (MSVM). This improved design will provide better surveillance system than existing. Such system can be used in public places like shopping mall, railway station or in a closed environment such as ATM where security is the prime concern. The performance of the system is evaluated, by using different standard datasets having different objects and achieved 95% performance as explained in experimental analysis. Show more
Keywords: Suspicious activity detection, optical flow, convolutional neural networks, support vector machine, multi-class SVM
DOI: 10.3233/JIFS-179003
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4507-4518, 2019
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]