Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2024: 1.7
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Arunkumar, S. | Vairavasundaram, Subramaniyaswamy | Ravichandran, K.S. | Ravi, Logesh
Article Type: Research Article
Abstract: The development of the Internet of Things (IoT) can be attributed to the sudden rise in miniature electronic devices, as well as their computing power and ability to make interconnections. These devices exchange large volumes of confidential information from diverse locations. Similar to the Internet, the IoT has also encountered various issues with information security. Due to limited computing and energy resources in the field of IoT, it is necessary to develop a scheme to ensure feasible and more effective concealment and security properties. This paper proposes a unique methodology that captures an image using IoT sensors, which are subjected …to lighter cryptographic operations for conversion into a cipher image, and is then sent to a home server. At the home server, a combined cryptography and steganography approach is employed to conceal the cipher image in a cover image, camouflaging the presence of the secret image, which is then sent to the IoT-Cloud server for storage. During the embedding process, QR decomposition is performed on the RIWT transformed secret image and RIWT - DCT transformed cover image. Modification performed on the R matrix of QR decomposition does not affect the structural properties of the cover image. A block selection algorithm is used to select optimal blocks with high contrast areas to embed the secret image. The experimental results indicate that our scheme enhances imperceptibility, robustness, and resistance to steganalysis attacks. Show more
Keywords: Image steganography, RIWT, DCT, security in cloud, block selection algorithm, QR decomposition, IoT
DOI: 10.3233/JIFS-169984
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4265-4276, 2019
Authors: Chen, Lihui | Yang, Xiaomin | Lu, Lu | Liu, Kai | Jeon, Gwanggil | Wu, Wei
Article Type: Research Article
Abstract: The rapid developments of computation, communication and control contribute to the generation of cyber physical systems (CPS). For full-time urban surveillance or military reconnaissance in complex environments, infrared and visible imaging sensors typically need to be integrated into the CPS. Furthermore, an effective and stable image fusion algorithm is important for CPS to provide images with rich information. Therefore, an image fusion algorithm for CPS is introduced in this paper. Compared with traditional multi-scale and multi-direction decomposition based algorithms, a more efficient MSMD based algorithm is proposed. Firstly, base layers reserved edges and detailed layers are obtained by multi-scale decomposition. …Secondly, multi-direction decomposition is employed to base layers rather than detailed layers in traditional method. Then, serials of detailed layers and multi-directional base layers are obtained by choosing the max value based on patch. After the inverse transformation of multi-direction decomposition is conducted for multi-directional fused base layers, the reconstruction result is obtained via superposition of fused base and detail layers. Experiments prove that our algorithm outperforms the art-of-state. Show more
Keywords: Cyber-physical systems, image fusion, rolling guided filter, non-subsample directional filter bank
DOI: 10.3233/JIFS-169985
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4277-4291, 2019
Authors: Narasappa, Jithendra Huchageeranahally | Rekha, D.
Article Type: Research Article
Abstract: Wireless Mobile Ad hoc network is the foundation for the Vehicular Ad hoc Network which plays a pivotal role in disseminative safety information to the general public and can be used in commercial applications. Challenging issue in VANET is routing of data, due to swift mobility of vehicles and the network topology which changes with time and speed. Mobile Ad hoc Networks (MANETs) routing protocols cannot fully solve the unique characteristics in vehicular networks. Vehicular Ad hoc Networks system enables the intercommunication between the vehicles by allowing them exchange the traffic data or information. Such kind of exchange of information …may create privacy apprehension since the vehicle-generated information can contain much confidential information of the vehicle and its driver. Vehicular networks throw a plenty of unique challenges. The traffic information in the network may greatly affect the traffic decisions. Traffic View is a mechanism that can be routed with a vehicle as the future aspect. In this paper, Energy Aware Methodical Data Forwarding (EAMDF) Mechanism in Vehicular Ad hoc Networks is proposed, Information about the node is collected which is situated at the edge of radio range of the sender node (because of its proximity to the sender and as the information has to move in line with the destination route) and then the packet is transmitted by using the trustworthy greedy position based routing approach through that node. The key aspect of EAMDF mechanism is to prolong the energy of the nodes as well as increasing the packet delivery ratio. The results show that the through put is increased by 50%, packet delivery ratio is increased by 12.5% and also energy is prolonged in the network lifetime compared to other algorithms. Show more
Keywords: VANET, greedy forwarding, Energy Aware Methodical Data Forwarding (EAMDF)
DOI: 10.3233/JIFS-169986
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4293-4303, 2019
Authors: Banerjee, Anuradha | Akbar Hussain, D.M.
Article Type: Research Article
Abstract: Efficient servicing of requests in cloud environment has become need of the hour. Cloud services work based on zones in various locations and multiple service requests may be simultaneously considered as a batch and allocated to various zones. Experience-based Efficient Scheduling or EXES focuses on achieving minimum possible waiting time for a batch of requests, under the constraint that overall allocation cost should be less than or equal to a budget limit. Migration of tasks is also possible to balance loads if budget permits and we gain in energy. For each task in a batch and all available zones, a …priority value is computed based on previous interaction experience of the zone and the site that generated this task. The zone that produces highest priority for a task, is allocated the task. An SDN controller is in charge of the entire process of priority computation and assigning tasks to zones. Priority is given to requests generating from sites that consumed lesser execution time compared to other sites that have generated requests in request queue of the zone. To the best of authors’ knowledge, no existing scheduling scheme in cloud has considered batch processing based on service process experience of zones. Show more
Keywords: Allocation, budget, cloud, load, minimum waiting time, priority, software-defined-networks
DOI: 10.3233/JIFS-169987
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4305-4317, 2019
Authors: Kumar, C. | Sathish Kumar, K. | Indra Gandhi, V. | Vijayakumar, V. | Rawal, Bharat S
Article Type: Research Article
Abstract: This paper presents a new evolutionary approach for reconfiguration of radial systems. The framework applied for optimization is Symbiotic Organism Search Algorithm (SOSA). The algorithm is impressed by the interactive behavior opted by the living organisms for surviving and to propagate in the ecosystem. This concept aims for optimal survivability in the ecosystem involving the harm and benefits received from other organisms. The aim is to find optimal reconfiguration and to reduce the real power loss in the distribution side. This approach is examined on 16-bus and 33-bus systems. The results show a significant reduction of real power loss. The …time required for execution is less when compared to other approaches. Based on the results calculated with distribution load flow algorithm the SOSA gives better results in terms of real power loss reduction and it is best suitable for digital automation systems. Show more
Keywords: Symbiotic organism search algorithm, reconfiguration, power loss reduction
DOI: 10.3233/JIFS-169988
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4319-4326, 2019
Authors: Arivudainambi, D. | Dhanya, D.
Article Type: Research Article
Abstract: Even though, cloud computing reduces the operating cost by enabling adaptation of virtual machines, it has suffered in selection of optimal virtual machine due to shortage of resource or resource wastage, sudden changes in requirement so it requires optimal resource allocation. Resource allocation is the process of providing services and storage space to the particular task requested by the users. This is one of the important challenges in cloud computing environment and has variant level of issues like scheduling task, computational performance, reallocation, response time and cost efficiency. In this research work we introduce a three-phase scheduling method based on …memory, energy and QOS in order to overcome the above issues which also yield low energy consumption, maximum storage and the high level Quality of Service (QoS). Biggest Memory First and Biggest Access First is introduced with NUMA scheduler and cache scheduler for memory scheduling and the optimal VM resulting from the three phases of scheduling is determined by Grey Wolf Optimization (GWO) algorithm. To carry the security level of optimized VMs, Streamline Security and Introspection security analysis are exhausted for detecting the malware VMs which results the secured and efficient VMs for further resource allocation. Our proposed methodology is implemented using the Cloud Sim tool and the experimental result shows the efficiency of our proposed method in terms of security, time consumption, and cost. Show more
Keywords: Quality of service (QoS), Biggest Access First (BAF), Biggest Memory First (BMF), Grey Wolf Optimization (GWO), streamline security, introspection security analysis
DOI: 10.3233/JIFS-169989
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4327-4340, 2019
Authors: Anusooya, G. | Vijayakumar, V. | Narayanan, V. Neela
Article Type: Research Article
Abstract: Predicting the peak time load among data center and distributing the load will minimize the usage of the power consumption and also will minimize the carbon emission from data center. Reducing the carbon emission by lessening the energy consumption in a data center will impact on environment which will lead to a reduced carbon footprint. The proposed Water Shower Model (WSM) with Circular Peak Time Services (CPTS) has reduced the execution time to 10 ms comparing with Round Robin Algorithm. The load is shared among the data centers by predicting the type of request by the user as Read Only Request …(ROR) or Read Write Request (RWR). The ROR will assign the load to an optimized Container and the RWR will assign the load to a Virtual Machine. CPTS is a proposed model used to measure the carbon emission right from the idle state of the server in a datacenter and till it reaches the peak time of the load and vice versa. The advantage of existing Dynamic Voltage Frequency Scaling (DVFS) techniques is used in the proposed model to optimize the resource allotment and adjust the power and speed in computing devices which allocates only the required minimal amount of power for performing a task. Show more
Keywords: Green computing, load balancing, data center, carbon emission, container, virtual machine
DOI: 10.3233/JIFS-169990
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4341-4348, 2019
Authors: Devarajan, Malathi | Fatima, N. Sabiyath | Vairavasundaram, Subramaniyaswamy | Ravi, Logesh
Article Type: Research Article
Abstract: Cyber-physical Social Network (CPSN) becomes an essential component of daily life. In recent years, CPSN has dragged millions of users to convey their social opinions. It is highly desirable to mine influential features from such diverse data to make a prediction on users’ Point of Interest (POI). Notably, social ties of the user in a specific location have a tendency to share similar opinions. Thus with the appearance of social links, the location based recommendations become popular to acquire reliable POI recommendations. Collaborative Filtering Recommender System (CFRS) able to discover reliable POI recommendations for the target user based on Location-based …CPSN. To enhance the performance of CFRS, a clustering ensemble model is proposed in this article. Four different swarm intelligent based cluster optimization algorithms were utilized to generate finite clusters. The experiment is conducted on two real-time social network dataset to exhibit the performance of the proposed CE-CFRS. The result shows that the clustering ensemble model outperforms a single clustering model in terms of assessment metrics. Show more
Keywords: Cyber-physical system, point-of-interest, location-based social network, collaborative filtering recommendation, clustering ensemble
DOI: 10.3233/JIFS-169991
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4349-4360, 2019
Authors: Raghav, R.S. | Dhavachelvan, P.
Article Type: Research Article
Abstract: The Severe acute respiratory syndrome coronavirus (SARS-CoV) are deadly infectious disease which can easily transmit and causes severe problems in humans. It is known as a coronavirus and referred as a common form of virus that naturally causes upper-respiratory tract illnesses and the symptoms are hard to identify. It is important to recognize the patient and providing them with suitable action with constant intensive care. Healthcare amenities is constructed on fog and big-data based system and it is integrated with cyber-physical system. The role of Cyber physical system in health care domain is to fetch deep insights about the nature …of disease and carry the monitoring process with early detection of infected users. The objective is to identify occurrence of SARS at initial stage. In proposed system, resemblance factor is evaluated from the extracted keywords. In order to identify the difference between SARS affected and others, the proposed scheme fetches the inputs from user’s displayed in the form of text. It is passed to deep recurrent neural network (RNN) model. It extracts useful information from the raw information given by the user. The J48graft algorithm is used to carry the classification based on the type of infection and symptoms of each user. The data is stored in the bigdata layer (mongoDB) and it detects the infected area by using the geospatial feature in mongo dB. The methodology is framed in the proposed model to prevent the spread of disease to other users. In case of any abnormality the generation of alert process is done instantaneously and directed on user’s mobile from fog layer. The final experimental outcome reveals information about the performance of proposed system in terms of Success rate, failure rate, latency and accuracy %. It shows that the proposed algorithm gives high level of accuracy when it is compared with other primitive methods. Show more
Keywords: Cyber physical systems, deep recurrent neural network, J48graft, bigdata analytics, fog layer, mongo dB
DOI: 10.3233/JIFS-169992
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4361-4373, 2019
Authors: Zhu, Xuhui | Ni, Zhiwei | Ni, Liping | Jin, Feifei | Cheng, Meiying | Li, Jingming
Article Type: Research Article
Abstract: Ensemble pruning is usually used to improve classification ability of an ensemble using less number of classifiers, and it is an NP-hard problem. Existing ensemble pruning approaches always find the optimal sub-ensemble using diversity of classifiers or running heuristic search algorithms separately. Diversity and accuracy of classifiers are widely recognized as two important properties of an ensemble. The increase of the diversity of classifiers must lead to the decrease of the average accuracy of the whole classifiers, and vice versa, so there is a tradeoff between diversity and accuracy of classifiers. Finding the tradeoff is the key to a successful …ensemble. Heuristic algorithms have good results when it comes to finding the tradeoff, but it is unfeasible to do an exhaustive search. Hence, we propose a Spread Binary Artificial Fish swarm algorithm combined with a Double-fault measure for Ensemble Pruning (SBAFDEP) using a combination of diversity measures and heuristic algorithms. First, the classifiers in an initial pool are pre-pruned using a double-fault measure, which significantly alleviates the computational complexity of ensemble pruning. Second, the final ensemble is efficiently assembled from the retaining classifiers after pre-pruning using the proposed Spread Binary Artificial Fish Swarm Algorithm (SBAFSA). Simulation and experiment results on 25 UCI datasets show that SBAFDEP performs better than other state-of-the-art pruning approaches. It provides a novel research idea for ensemble pruning. Show more
Keywords: Artificial fish swarm algorithm, spread behavior, double-fault measure, diversity, ensemble pruning
DOI: 10.3233/JIFS-169993
Citation: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4375-4387, 2019
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]