Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2024: 1.7
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Yu, Weiqing | Huang, Zhichao | Zhong, Chengping | Liu, Juping | Yuan, Zhensong
Article Type: Research Article
Abstract: In order to solve the problem of low efficiency and low efficiency of traditional methods, a method based on discrete wavelet is proposed to suppress the torsional vibration noise of automobile transmission system. Based on the operation mechanism of automobile transmission system, the transmission system model is built. In this model, the features of torsional vibration of transmission system were analyzed and the vibration signals were measured. The hardware equipments were used to collect the noise caused by torsional vibration, and then the discrete wavelet processing technology was used to quantify the torsional vibration noise. Based on the quantized noise …data, the torsional vibration noise of automobile driveline was suppressed by active suppression and passive suppression. The experimental results show that the suppression time of this method for different noise size is less than 0.5 s, far less than the traditional method. Experimental results prove that the designed noise suppression method can greatly reduce the torsional vibration noise, so it has good application effect. Show more
Keywords: Torsional vibration mechanics model, noise sampling, vibration signal, differential equation
DOI: 10.3233/JIFS-179830
Citation: Journal of Intelligent & Fuzzy Systems, vol. 38, no. 6, pp. 7585-7594, 2020
Authors: Liu, Qiang | Lian, Zhifeng | Guo, Yu
Article Type: Research Article
Abstract: Quality is of great significance in enterprises, strengthening and identifying enabling factors of quality defect management are one of core goals of organizational operation management. In this study, sense-making theory is adopted to identify organizational quality defect management enabling factors, and interval-valued hesitant fuzzy set ELECTRE for multi-attribute decision-making method and quantile regression analysis method are used to empirically identify and verify organizational quality defect management enabling factors, revealing influence size and scale, influence degree and influence significance level of enabling factors on organizational quality defect management. Empirical analysis results indicate that combination methods of sense-making theory, interval-valued hesitant fuzzy …set ELECTRE for multi-attribute decision-making method and quantile regression analysis method can effectively identify organizational quality defect management enabling factors, which will have great promise in the field of organizational quality management and operation management based on the rationality, feasibility and applicability. Show more
Keywords: Interval-valued hesitant fuzzy set ELECTRE for multi-attribute decision-making, organizational quality defect management, quantile regression method, sense-making theory
DOI: 10.3233/JIFS-179831
Citation: Journal of Intelligent & Fuzzy Systems, vol. 38, no. 6, pp. 7595-7608, 2020
Authors: Liu, Qiang | Lian, Zhifeng | Guo, Yu | Yang, Feixue
Article Type: Research Article
Abstract: Combined with the relevant theories and frameworks, this study constructs evaluation indicator and index system of organization quality specificity immune evolution ability. On the basis, this study uses the intuitively fuzzy multi-attribute decision making method based on evidential reasoning to carry out empirical analysis of organizational quality specificity immune evolution ability, empirical analysis data derive from the research objects of relevant experts, typical and representative large-sized manufacturing enterprises. The empirical analysis results indicate that the intuitively fuzzy multi-attribute decision making method based on evidential reasoning considers subjective and objective factors, which integrates the intuitively fuzzy information and gives out the …corresponding decision according to the evaluation value. It is also useful, effective, feasible and operable to take the intuitively fuzzy multi-attribute decision making method based on evidential reasoning to evaluate, select and make decision choice on the best and optimal partner and investee object in multi-attribute group decision making according to organization quality specificity immune evolution ability, and give out orders of all partners and investees. The research methods and results can further improve the organization quality specificity immune efficiency, identify organization quality problems and defects, improve organization quality performance, and maintain organization health, which also provide new decision-making method for the multi-attribute groups of organization quality specificity immune evolution ability. Show more
Keywords: Intuitively fuzzy multi-attribute group decision making, evidential reasoning, organizational quality specificity immune evolution ability
DOI: 10.3233/JIFS-179832
Citation: Journal of Intelligent & Fuzzy Systems, vol. 38, no. 6, pp. 7609-7622, 2020
Authors: Wang, Hui | Cao, Zijian | Hong, Bo
Article Type: Research Article
Abstract: Intrusion detection systems (IDSs) play an important point in resisting hacker intrusion. With the rapid development of the network technology, network security has received more and more attention from researchers of different fields, and the traditional network security system based on the regular intrusion detection rules cannot meet the growing demand of changeable and timely intrusion prevention. Therefore, the development of efficient IDSs always is an open challenge. Firstly, a novel intrusion detection method based on the Convolutional Neural Network (CNN) is proposed in this paper. Secondly, based on the proposed method, an efficient, real-time and automated intrusion detection system …named IDS-CNN is well designed. The system is built by several open source tools, such as the packet capture interface Tcpdump, the traffic analysis Bro and the machine learning interface Tensorflow. The system is composed of data preprocessing, neural network training, network testing and intrusion response based on Linux platform. Finally, through the simulation experiment with NSL-KDD data set and the actual network flow test, the experimental results indicate that the proposed IDS-CNN system can not only complete the intrusion detection for network data streams efficiently, but also its detection precision is better than the state-of-the-art method. Show more
Keywords: Convolutional Neural Network, intrusion detection, NSL-KDD, data flow analysis
DOI: 10.3233/JIFS-179833
Citation: Journal of Intelligent & Fuzzy Systems, vol. 38, no. 6, pp. 7623-7637, 2020
Authors: Yang, Qianru | Cheng, Shouming | Zhou, Bo
Article Type: Research Article
Abstract: In view of the weak vertical bearing capacity and low safety performance of the traditional soft rock pile foundation for human settlements, this paper proposes to monitor the vertical bearing capacity of the soft rock pile foundation for human settlements in Lhasa. The vertical mechanism of soft rock is analyzed, including the uniaxial compressive strength of rock around the pile, the relative displacement of pile rock and the interface condition of pile rock. The vertical bearing capacity of the pile foundation in soft rock is calculated by load transfer method. The side friction model and the pile end of the …pile are established to determine the pile foundation. The calculation formula of the load settlement curve is obtained by using the side friction model and the pile end resistance model. The vertical bearing capacity of the pile foundation in soft rock is analyzed when the pile side rock is in the elastic stage and the surrounding rock is in the plastic stage. The test results show that friction pile plays an important role in the test pile under the working load. This method can effectively monitor the vertical bearing capacity of pile in the soft rock geological environment of human settlements, and can be applied to practical projects. Show more
Keywords: Lhasa, human settlements, soft rock, geological pile foundation, vertical, bearing capacity
DOI: 10.3233/JIFS-179834
Citation: Journal of Intelligent & Fuzzy Systems, vol. 38, no. 6, pp. 7639-7650, 2020
Authors: Qiao, Peixin | Hou, Ying
Article Type: Research Article
Abstract: When studying the application of discrete fruit fly algorithm in enhancement of wireless sensor node coverage, the wireless sensor node coverage model is designed according to the node measurement model, and the discrete fruit fly algorithm is used to evaluate each initial population in the wireless sensor node coverage to determine the elite individuals. The number of retentions of the elite individual is calculated in the essence library, and the final result is output when the number of retentions of the elite individual is greater than the minimum number of retentions of the elite individual. Conversely, inter-population immigrations are implemented …to form new fruit fly populations. The classification olfactory random search method based on adaptive compensation is adopted in the population. The fruit fly individuals are evaluated by the taste judgment function, and they are visually located to re-determine the optimal individuals of each population. The above steps are repeated until the number of retentions of elite individuals is greater than the minimum number of retentions of elite individuals. Then the optimal solution of the wireless sensor node coverage model is output, and the optimization scheme of the wireless sensor node coverage is designed according to the optimal solution. The experimental analysis shows that when the number of iterations is 50, the maximum node coverage and node fitness are 99.81% and 0.99 respectively. When the number of nodes is 20, the time of the enhanced node is the shortest, 9.8 ms. That is, the method can significantly enhance the node coverage effect. Show more
Keywords: Discrete fruit fly algorithm, wireless sensor, node coverage, enhancement, adaptive compensation, classification olfactory
DOI: 10.3233/JIFS-179835
Citation: Journal of Intelligent & Fuzzy Systems, vol. 38, no. 6, pp. 7651-7660, 2020
Authors: Zhou, Qinghong
Article Type: Research Article
Abstract: Aiming at the problem that Separable Gabor filter can destroy the ridge structure of fingerprint adjacent singular points, and the effect of directional Fourier filter in repairing fingerprint ridges is not obvious, a method for singular point region enhancement of fingerprint image based on symmetric phase consistency is proposed. Fingerprint image is preprocessed to extract effective fingerprint region; the singularity region of the effective fingerprint region is obtained by using the singularity extraction method; the method of singular region feature extraction is used to obtain the singular region feature of fingerprint image; the fuzzy clustering algorithm is used to enhance …the singular region feature of fingerprint image, which can enhance the singular region of fingerprint image. The results show that the quality of fingerprint image enhanced by the proposed method is better, the performance of denoising is remarkable, and the efficiency of extracting singular feature of fingerprint image is high. Show more
Keywords: Symmetric phase, consistency, fingerprint, image, singular point, enhancement
DOI: 10.3233/JIFS-179836
Citation: Journal of Intelligent & Fuzzy Systems, vol. 38, no. 6, pp. 7661-7669, 2020
Authors: Tian, Chenxiao | Zhang, Baoshuai | Duan, Jun
Article Type: Research Article
Abstract: Based on the Copula-CoVaR framework, the Beta-skew-t-EGARCH model is used to capture the leverage effect of financial assets, the thick tail distribution and the conditional skewness. Then, based on the standard deviation, this paper introduces the extreme value theory, combined with the Copula function and the CoVaR method which are used to measure the effect of China’s crude oil market on the risk spillover effects of domestic and international commodity markets, and reveals the impact of China’s crude oil market. The results show that, regardless of the domestic Crude oil market and international commodity market, domestic crude oil market and …domestic commodity market, there is a two-way positive risk spillover effect, which shows asymmetric characteristics. The results provide some theoretical supports for the regulatory authorities to enhance the marketization level of China’s crude oil market, some suggestions for the investment institutions to assess the risk level of China’s crude oil market, and some reference value for investors to invest in China’s crude oil market. Finally, based on the conclusions of the study, this paper provides some targeted recommendations to the development of China’s crude oil market. Show more
Keywords: Oil markets, commodity markets, risk spillover effect
DOI: 10.3233/JIFS-179837
Citation: Journal of Intelligent & Fuzzy Systems, vol. 38, no. 6, pp. 7671-7682, 2020
Authors: Wei, Pengcheng | Shi, Chengxiang | He, Fangcheng
Article Type: Research Article
Abstract: When the malicious code is detected by the current method, the features of the malicious code cannot be classified in detail. A static detection method of malicious code based on behavior information gain is proposed. The method uses the feature selection method of behavior information gain to get the average mutual information between different code types, and gives different types of feature libraries. On this basis, the character sets are fused and the sample characteristics of the malicious code are extracted. The dispersion degree of the sequence distribution of malicious code samples is measured, the distance vector of the plurality …of eigenvectors is obtained, and the weighted matching of the features is performed. The malicious code is detected statically based on the matching result. The results demonstrated that the proposed method tends to be more accurate and provides a scientific basis for ensuring the security and stability of the Android operating system. Show more
Keywords: Behavior information gain, malicious code, static detection, feature selection method, dispersion degree
DOI: 10.3233/JIFS-179838
Citation: Journal of Intelligent & Fuzzy Systems, vol. 38, no. 6, pp. 7683-7692, 2020
Authors: Ou, Yufeng
Article Type: Research Article
Abstract: Aiming at the problems of poor tracking effect and low precision of traditional methods, a symmetric algorithm is introduced to dynamically track moving objects in multiple frames. Symmetric encryption algorithm is used to hide the reversible information of the image, and the correlation between adjacent pixels of the encrypted image is increased through high-bit flip prediction. Generate sparse pixel classification matrix to improve compression efficiency and reduce the occupation of effective bit-plane space. Embed secret information in the most significant bit of the encrypted pixel based on the hidden key to generate an encrypted-portable image. The receiving end can generate …two kinds of decrypted images, one is consistent with the original image, and the other contains the secret information. Has hidden key to extract secret information from ciphertext image and plaintext image separately. Under the hiding of target image information, a window adaptive adjustment algorithm is introduced to track the target, and a comprehensive predictor is designed to predict and track the target when the target is temporarily blocked. The experimental results show that the target tracking accuracy of this method can reach 99% and the prediction accuracy can reach 100%. The proposed method has strong security performance and high tracking prediction accuracy, and is a feasible target dynamic tracking method. Show more
Keywords: Symmetry algorithm, multi-frame, moving target, tracking
DOI: 10.3233/JIFS-179839
Citation: Journal of Intelligent & Fuzzy Systems, vol. 38, no. 6, pp. 7693-7703, 2020
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]