Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2024: 1.7
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Ramadas, Rithvik | Chowdhury, Anirban
Article Type: Research Article
Abstract: Voice User Interfaces have become popular with the advent of Alexa, Google Home, Cortana and other commercial speech recognition interfaces; however, the privacy of the end users is compromised while using these interfaces in public. In addition, users can feel a bit awkward while using these interfaces with loud voice while they are outside their homes. Contextually, ‘Hypnosis’ and ‘Hypnotherapy’ have not been frequently applied as a way of human communications although the principle of suggestion induced behavior changes in an interesting approach to interact with machines. In this paper, GEORGIE a prototype AI was used to achieve a novel …means of interaction inspired from the principles of hypnotherapy, which is a discrete interface ensuring that end-users’ privacy is not compromised. It is envisaged that people who prefer secret communication and interaction might love to use this hypnotic computer interface (hypCI). The hypCI would be the novel means of human robot interface (HRI) or human computer interface (HCI). Show more
Keywords: Artificial intelligence, cognitive science, defense, hypnotic triggers, user experience design, voice user interfaces
DOI: 10.3233/JIFS-179731
Citation: Journal of Intelligent & Fuzzy Systems, vol. 38, no. 5, pp. 6507-6516, 2020
Authors: Murali, Ritwik | Shunmuga Velayutham, C.
Article Type: Research Article
Abstract: This paper attempts to employ Evolutionary Algorithm(EA) techniques to evolve variants of a computer virus(Timid ) that successfully evades popular antivirus scanners. Generating authentic variants of a specific malware results in a valid database of malware variants, which is sought by anti-malware scanners, so as to identify the variants before they are released by malware developers. This preliminary investigation applies EAs to mutate the Timid virus with a simple code evasion strategy, i.e., insertion and deletion(if available) of a specific assembly code instruction directly into the virus source code. Starting with a database of over 60 popular antivirus scanners, …this EA based approach for malware variant generation successfully evolves Timid variants that evade more than 97% of the antivirus scanners. The results from these preliminary investigations demonstrate the potential for EA based malware generation and also opens up avenues for further analysis. Show more
Keywords: Anti-malware research, cyber security, evolutionary algorithms, malware, malware creation, virus
DOI: 10.3233/JIFS-179732
Citation: Journal of Intelligent & Fuzzy Systems, vol. 38, no. 5, pp. 6517-6526, 2020
Authors: Patil, Nilesh Vishwasrao | Rama Krishna, C. | Kumar, Krishan
Article Type: Research Article
Abstract: A Distributed Denial of Service (DDoS) attack is the biggest threat to Internet-based applications and consumes victim service by sending a massive amount of attack traffic. In the literature, numerous approaches are available to protect the victim from the DDoS attacks. However, the attack incidents are increasing year by year. Further, several issues exist in the traditional framework based detection system such as itself becoming a victim, slow detection, no real-time response, etc. Therefore, the traditional framework based system is not capable of processing live traffic in the big data environment. This paper proposes a novel Spark streaming-based distributed and …real-time DDoS detection system called S-DDoS. The proposed S-DDoS system employs the K-Means clustering algorithm to recognize the DDoS attack traffic in real-time. The proposed detection model designed on the Apache Hadoop framework using highly scalable H2O sparkling water. The detection model deployed on the Spark framework to classify live traffic flows. The results show that the proposed S-DDoS detection system efficiently detects the DDoS attack from network traffic flows with higher detection accuracy (98% ). Show more
Keywords: Distributed denial of service (DDoS), K-means clustering algorithm, big data, entropy, network security, apache spark
DOI: 10.3233/JIFS-179733
Citation: Journal of Intelligent & Fuzzy Systems, vol. 38, no. 5, pp. 6527-6535, 2020
Authors: Dickson, Anne | Thomas, Ciza
Article Type: Research Article
Abstract: Intrusion detection system is a second layer of defence in a secured network environment. When comes to an IoT platform, the role of IDS is very critical since it is highly vulnerable to security threats. For a trustworthy intrusion detection system in a network, it is necessary to improve the true positives with minimum false positives. Research reveals that the true positive and false positive are conflicting objectives that are to be simultaneously optimized and hence their trade-off always exists as a major challenge. This paper presents a method to solve the tradeoff among these conflicting objectives using multi-objective particle …swarm optimization approach. We conducted empirical analysis of the system with multiple machine learning classifiers. Experimental results reveals that this technique with J48 classifier gives the highest gbest value 10.77 with minimum optimum value of false positive 0.02 and maximum true positive 0.995. Empirical evaluation shows an incredible improvement in Pareto set in the objective function space by attaining an optimum point. Show more
Keywords: Intrusion detection system, receiver operating characteristics, particle swarm optimization, pareto front, multi-objective optimization, non-linear programming
DOI: 10.3233/JIFS-179734
Citation: Journal of Intelligent & Fuzzy Systems, vol. 38, no. 5, pp. 6537-6547, 2020
Authors: Hussain, Muzakkir | Saad Alam, Mohammad | Sufyan Beg, M.M. | Akhtar, Nadeem
Article Type: Research Article
Abstract: Vehicular Fog Computing (VFC) is a natural extension of Fog Computing (FC) in Intelligent Transportation Systems (ITS). It is an emerging computing model that leverages latency aware and energy aware application deployment in ITS. However, due to heterogeneity, scale and dynamicity of vehicular networks (VN), deployment of VFC is a challenging task. In this paper, we propose a multi-objective optimization model towards minimizing the response time and energy consumption of VFC applications. Using the concepts of probability and queuing theory, we propose an efficient offloading scheme for the fog computing nodes (FCN) used in VFC architecture. The optimization model is …then solved using a modified differential evolution (MDE) algorithm. Extensive experimentations performed on real-world vehicular trace of Shenzhen, reveals the superiority of proposed VFC framework over generic cloud platforms. Show more
Keywords: Intelligent transportation systems, modified differential evolution, vehicular fog computing
DOI: 10.3233/JIFS-179735
Citation: Journal of Intelligent & Fuzzy Systems, vol. 38, no. 5, pp. 6549-6560, 2020
Authors: Chandrawanshi, Veervrat Singh | Tripathi, Rajiv Kumar | Pachauri, Rahul
Article Type: Research Article
Abstract: The design of a wireless sensor network (WSN) faces many constraints. Mostly, WSN is energy constraint because the sensor nodes are battery operated. Available power expenditure in WSN largely depends on the efficient use of limited resources and appropriate routing of the data packets. The power consumption can be minimized by balancing the energy consumption between the sensor nodes and selecting the minimum power consumption route for the data packets. Clustering is one of the most effective technique that not only uniformly distributes the energy among all the sensor nodes but also play a vital role in the designing of …routing protocols. So based on these advantages, a low power consumption routing protocol is proposed that makes use of fuzzy c-means++ algorithm. The proposed approach minimizes the power consumption of the sensor network by the excellent management of the WSN and also raises the lifespan. The simulation result illustrates the effectiveness of the proposed routing method when compared with the recently developed protocols based on k-means and fuzzy c-means algorithms. Show more
Keywords: Wireless sensor networks, clustering, cluster head, k-means, k-means++, fuzzy c-means algorithm, fuzzy c-means++ algorithm, energy efficient network
DOI: 10.3233/JIFS-179736
Citation: Journal of Intelligent & Fuzzy Systems, vol. 38, no. 5, pp. 6561-6570, 2020
Authors: Suriya Praba, T. | Sethukarasi, T. | Venkatesh, Veeramuthu
Article Type: Research Article
Abstract: In wireless sensor networks (WSN), the establishment of large-scale sensor networks has always needed attention. One of the many challenges is to set up an architecture that is different from the rest and find mechanisms that can efficiently scale up with the growing number of nodes that may be essential to ensure sufficient coverage of large areas under study. Concurrently, these new architectures and mechanisms are supposed to maintain low power consumption per node to comply with energy guaranty acceptable network lifetime. The researchers utilized numerous Data collection techniques for the prompt data aggregation, yet still those outcomes the node …with path failures. To solve this issue, the mobile sink is being extensively used for data aggregation in large scale wireless sensor networks (WSNs). This technique avoids imbalances in energy consumption due to multi-hop transmission but might lead to extended delay time. In this paper, our focus is on shortening the length of the mobile sink’s travelling path to reduce the delay time during data gathering in large scale WSN. To achieve this, the mobile sink visits the cluster heads in an optimized path instead of sensors one by one. Here Hierarchical clusters are efficiently formed by modified K- means with outlier elimination and node proximity and residual energy based second level clustering algorithm. Next, we determine the optimal path for the mobile sink by formulating KH based Travelling Salesman Problem solving optimization algorithm. This technique proposed reduces not only the length of the path travelled by the mobile sink but also lessens the computational effort that is required for travelling-path planning and enhances the lifetime of nodes. And to ensure aggregation accuracy in cluster heads iterative filtering is implemented. Our experimental results show the proposed algorithm shortens the tour length by 40–60 percent compared to Bacterial foraging optimization-based TSP algorithm. Also delivers better results compared to other’s in terms of the computational effort, time, energy use, and enhances the network lifetime. Show more
Keywords: Wireless sensor networks, data aggregation, clustering, travelling salesman problem, krill herd optimization
DOI: 10.3233/JIFS-179737
Citation: Journal of Intelligent & Fuzzy Systems, vol. 38, no. 5, pp. 6571-6581, 2020
Authors: Mathi, Senthilkumar | Joseph, Eric | Advaith, M.S. | Gopikrishna, K.S. | Gopakumar, Rohit
Article Type: Research Article
Abstract: The rapid increase in internet usage for the past few decades has steered to higher demand and for adequate support for the network mobility in heterogeneous networks. However, in the existing mobile IPv6 (Internet Protocol version 6) protocols such as traditional, hierarchical, proxy and related methodologies have been stated to manage the recurrent mobility of the devices in a network with the centralized feature. However, the single point of failure, route optimization, handoff latency and security threats are highly exposed when the number of mobile device increases in the centralized approach. Also, it leads to the limitation of the size …of binding information when the mobile host needs to update its place. Hence, this paper suggests a secure and optimized architecture by distributing mobility functions as distributed access points. Also, the paper addresses the prevention measures for security attacks such as false binding message, rerun and hijack. The proposed scheme is simulated and validated using network simulator and security model verifier – AVISPA. Finally, the numerical and experimental outcomes demonstrate that the proposed scheme offers a substantial diminution in the cost of the binding update, binding refresh, and packet delivery. Show more
Keywords: IP networks, distributed access point, mobile agents, routing, integrity, authentication
DOI: 10.3233/JIFS-179738
Citation: Journal of Intelligent & Fuzzy Systems, vol. 38, no. 5, pp. 6583-6593, 2020
Authors: Sujatha, M. | Geetha, K. | Balakrishnan, P. | Renugadevi, T.
Article Type: Research Article
Abstract: The unprecedented growth in personal, business and research data motivates users to lease storage from multiple cloud storage providers like Amazon, Azure, etc. Selection of cost-effective cloud storage service by considering different pricing policies along with their performance characteristics is a challenging task. This research proposes a model named as OUTFIT (Optimal sUgeno Type Fuzzy Inference sysTem) an optimal data storage hosting model by suggesting an appropriate storage type based on user demands. In the first phase, we have surveyed Amazon, Google Cloud, Azure and Rackspace cloud storage providers and consolidated the different cloud storage types supported by them. In …the second phase the cloud service providers are ranked by using Sugeno fuzzy inference system based on the user preference. The third phase designates the appropriate service that incurs minimal estimated storage usage cost. The proposed approach is able to categorize various cloud service providers with an optimal grading process by including multiple decision criteria for fine-grained storage type selection. The observed results prove it to be a more favourable selection tool in comparison with its counterpart tools like Cloudorado, RightCloudz in terms of cost. Show more
Keywords: CSP selection, QoS Attributes, Sugeno Inference system, Iaas storage selection, Cloud computing
DOI: 10.3233/JIFS-179739
Citation: Journal of Intelligent & Fuzzy Systems, vol. 38, no. 5, pp. 6595-6605, 2020
Authors: Pradeep Kumar, K.A. | Thiruvengadathan, Rajagopalan | Shanmugha Sundaram, G.A.
Article Type: Research Article
Abstract: The perfect Y antenna array configuration is among the most prevalent antenna array arrangement used in radio interferometry for synthesis imaging. It is crucial to determine an antenna array configuration that could offer further higher quality radio-images. In this paper, a novel and an efficient L-band log-periodic spiral antenna array design is presented. The radio-imaging performance of the log-periodic spiral antenna array is compared and shown to outperform an equivalent perfect Y antenna array. Radio imaging performance is evaluated using the computational simulation for the proposed L-band log-periodic spiral antenna array and the equivalent perfect Y antenna array. The metric …used for evaluation is the Structural Similarity Index (SSIM) and Surface Brightness Sensitivity (SBS). The L-band log-periodic spiral antenna array was observed to have about five times higher bandwidth, 2.24 times greater sensitivity, angular resolution better by a factor of five, and 10% wider field of view than the perfect Y configuration antenna array of comparable extent. It has been analytically demonstrated that the log-periodic spiral antenna array is an optimum configuration based on Chow’ s optimization technique. The L-band log-periodic spiral antenna array has outperformed the perfect Y configuration in many different imaging aspects. Show more
Keywords: Radio telescope, interferometry, synthesis array, log-periodic antenna array, antenna array configuration
DOI: 10.3233/JIFS-179740
Citation: Journal of Intelligent & Fuzzy Systems, vol. 38, no. 5, pp. 6607-6618, 2020
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]