Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2024: 1.7
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Chandrasekar, Jayakumar | Madhawa, Surendar | Sangeetha, J.
Article Type: Research Article
Abstract: A robust disruption prediction system is mandatory in a Tokamak control system as the disruption can cause malfunctioning of the plasma-facing components and impair irrecoverable structural damage to the vessel. To mitigate the disruption, in this article, a data-driven based disruption predictor is developed using an ensemble technique. The ensemble algorithm classifies disruptive and non-disruptive discharges in the GOLEM Tokamak system. Ensemble classifiers combine the predictive capacity of several weak learners to produce a single predictive model and are utilized both in supervised and unsupervised learning. The resulting final model reduces the bias, minimizes variance and is unlikely to over-fit …when compared to the individual model from a single algorithm. In this paper, popular ensemble techniques such as Bagging, Boosting, Voting, and Stacking are employed on the time-series Tokamak dataset, which consists of 117 normal and 70 disruptive shots. Stacking ensemble with REPTree (Reduced Error Pruning Tree) as a base learner and Multi-response Linear Regression as meta learner produced better results in comparison to other ensembles. A comparison with the widely employed stand-alone machine learning algorithms and ensemble algorithms are illustrated. The results show the excellent performance of the Stacking model with an F1 score of 0.973. The developed predictive model would be capable of warning the human operator with feedback about the feature(s) causing the disruption. Show more
Keywords: GOLEM Tokamak, stacking, REPTree algorithm, multi-response linear regression, disruption prediction
DOI: 10.3233/JIFS-189155
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8365-8376, 2020
Authors: Bragadeesh, Srinivasan Ananthanarayanan | Umamakeswari, Arumugam
Article Type: Research Article
Abstract: Traceability and food quality are significant challenges in realizing a reliable food supply chain. The reliability of data in supply chains is one of the critical factors. Ensuring transparency, integrity, and availability is the primary requirement for establishing a proper supply chain network. Blockchain is a distributed structure of immutable records that are chained together to form blocks. It provides a guarantee of storing the data correctly and reliably. Smart contracts, which are self-executing contracts containing the terms of the agreement between the entities involved, provide utility for automation of reputation calculation with the transactions. Reputation systems allow participants to …rate each other, thus building trust through reputation. The present reputation systems have bounded scrutiny and lack granularity; hence they are not ideal for supply chains. In this work, we propose a reliable supply chain framework using blockchain and smart contracts. It uses a consortium blockchain network to trace communication between the participants and to calculate reputation scores dynamically. Rewards and penalties are assigned to the participants of the supply chain network based on the food product quality involved in the trade. The network participants have defined roles and the access permissions govern who can access the ledger. An immutable ledger stores all the transactions occurring in the network. Any change in one block will reflect in the consecutive blocks, which ensures the data is reliable and secure. The proposed system is implemented using Hyperledger Composer. The proposed framework is evaluated in terms of throughput and latency for varying asset size and batch size using the benchmarking tool Caliper. Results show that the security and reliability provided by the proposed framework justify the overheads in contrast to a trading model that does not include a blockchain network. Show more
Keywords: Blockchain, hyperledger composer, penalty, reputation, smart contracts
DOI: 10.3233/JIFS-189156
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8377-8387, 2020
Authors: Kamili, Asra | Fatima, Izat | Hassan, Muzamil | Parah, Shabir A. | Vijaya Kumar, V. | Ambati, L. S.
Article Type: Research Article
Abstract: Embedding information in medical images is considered as one of the significant methods for safeguarding the integrity and authenticity of medical images besides providing security to electronic patient records (EPR). The conventional embedding methods deteriorate the perceptual quality of medical images making them unsuitable for proper diagnosis. To preserve the perceptual quality of medical images reversible embedding is used. The reversible embedding schemes, however, have less embedding capacity. In this work, a reversible scheme based on histogram bin shifting and RGB plane concatenation has been proposed which offers high embedding capacity as well. We have exploited the fact that medical …images, unlike general images, consist of a large number of peaks and zero points that can be employed for reversibly embedding the data. Reversibility ensures that original image restoration takes place after the extraction of embedded data, which is of great importance in medical images for proper diagnosis and treatment. We have used various subjective and objective image quality metrics for analyzing the scheme. The proposed scheme has been shown to provide a Peak Signal to Noise Ratio (PSNR) value of above 56 dB for an embedding capacity of 0.58 bits per pixel (bpp). The results obtained show that the performance of scheme presented is far better in comparison to the state-of-the-art. Show more
Keywords: Medical images, security, authentication, reversibility, electronic patient record
DOI: 10.3233/JIFS-189157
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8389-8398, 2020
Authors: Chernyi, Sergei G. | Vyngra, Aleksei V. | Novak, Bogdan P.
Article Type: Research Article
Abstract: In order to implement and demonstrate all the processes associated with the real stability trial system on vessels, a ship’s model was made. The developed model consists of electrical and hardware parts. It is concluded that the model is applicable for the study of issues of automatic control of the ship’s list, simulating various loading options. Scalable loading studies of various types and sizes of cargo were carried out. The results of the study showed the correct operation of the model according to a specified algorithm. To work with the microcontroller and to code, the mathematical modeling environment Matlab/Simulink was …used. The results of the study showed that the created control system is able to secure the vessel during various types of loading operations, speed up the loading process, thus reducing the time spent at the port stay and save port costs. Show more
Keywords: Stability, electrical and hardware parts, automatic control, specified algorithm, microcontroller, code, Simulink
DOI: 10.3233/JIFS-189158
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8399-8408, 2020
Authors: Jha, Sudan | Prashar, Deepak | Elngar, Ahmed A.
Article Type: Research Article
Abstract: In today’s era, cloud computing has played a major role in providing various services and capabilities to a number of researchers around the globe. One of the major problems we face in cloud is to identify the various constraints related with the delay in the Task accomplishment as well as the enhanced approach to execute the task with high throughput. Many studies have shown that it is almost difficult to create an ideal solution but it seems feasible to provide a sub-optimal solution utilizing heuristic algorithms. In this paper, compared to previously used particle swarm optimization (PSO), heuristic approaches, and …improved PSO algorithm for efficient task scheduling, we propose “Modified Filtering Algorithm” for task scheduling on cloud setting. Comparing all these three algorithms, we strive to build an optimum schedule to reduce the completion period of execution of activities. Show more
Keywords: Cloud environment, modified filtering algorithm (MFA), heuristic algorithms, PSO, task scheduling, quantum time
DOI: 10.3233/JIFS-189159
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8409-8417, 2020
Authors: Venkatesh, Veeramuthu | Anishin Raj, M. M. | Mohamed Sajith, K. | Anushiadevi, R. | Suriya Praba, T.
Article Type: Research Article
Abstract: Cancer is a prevalent disease which comes in several forms. The need of the hour in cancer research is to be able to diagnose cancer in its early stages. The furthermost common forms of cancer among women us breast cancer. In recent times, there has been a drastic increase in the number of breast cancer cases among women. As a wide range of medical data is available in electronic form and with easy access to Machine Learning(ML) techniques disease progression risk evaluation has been made easier. These ML tools can aid in giving us complex insights from the massive amounts …of available data. Some of the techniques used for developing predictive models for perfect decision making in cancer research are Artificial Neural Networks (ANNs), Bayesian Networks (BNs), Support Vector Machines (SVMs), and Decision Trees (DTs). Although it is acceptable that ML is used to predict cancer progression, we need some level of validation. In this paper, we have come up with a review of several ML methods in modelling cancer progression. We discuss several predictive models based on supervised ML techniques and the inputs given by users, along with the data available. The results that were obtained from Logistic Regression show us that this method gave a significantly higher accuracy than most other classifiers. The best accuracy is 98.2%, however, the best precision and recall is 100 and 98.60% correspondingly. Show more
Keywords: Machine learning, cancer susceptibility, predictive models, feature selection techniques, breast cancer
DOI: 10.3233/JIFS-189160
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8419-8426, 2020
Authors: Espinosa-Leal, Leonardo | Chapman, Anthony | Westerlund, Magnus
Article Type: Research Article
Abstract: Industry has always been in the pursuit of becoming more economically efficient and the current focus has been to reduce human labour using modern technologies. Even with cutting edge technologies, which range from packaging robots to AI for fault detection, there is still some ambiguity on the aims of some new systems, namely, whether they are automated or autonomous. In this paper, we indicate the distinctions between automated and autonomous systems as well as review the current literature and identify the core challenges for creating learning mechanisms of autonomous agents. We discuss using different types of extended realities, such as …digital twins, how to train reinforcement learning agents to learn specific tasks through generalisation. Once generalisation is achieved, we discuss how these can be used to develop self-learning agents. We then introduce self-play scenarios and how they can be used to teach self-learning agents through a supportive environment that focuses on how the agents can adapt to different environments. We introduce an initial prototype of our ideas by solving a multi-armed bandit problem using two ε -greedy algorithms. Further, we discuss future applications in the industrial management realm and propose a modular architecture for improving the decision-making process via autonomous agents. Show more
Keywords: Autonomous systems, reinforcement learning, self-play, digital twin, industry 4.0
DOI: 10.3233/JIFS-189161
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8427-8439, 2020
Authors: Sekar, K. R. | Thaventhiran, C. | Sathiamoorthy, G.
Article Type: Research Article
Abstract: Vitiligo is a problem due to the destruction of melanocytes which is present in 1% of people all over the world. The origin of this disease is unknown and difficult to cure. Absence of melanin in the body causes lesions which will ooze out all over the body. Phototherapy and surgical therapy are the two types of treatment available in the existing world. The Cytotoxic CD8 + T lymphocytes act as a major factor for the abovesaid disease. The main objective of this work is to treat patients with different methods according to the severity of vitiligo, which can be identified with …the help of out ranking based on hesitant fuzzy relation. Multi-criteria and multi-objective hesitant fuzzy are applied in this work to find out the ranking through which the severity of the disease is detected. This method helps in identifying the vitiligo lesions, which can be treated effectively in a short period of time. During the application of vitiligo treatment, FQA-TOPSIS (Fuzzy Quantified Attribute-TOPSIS) hesitant fuzzy relation methodology is deployed with three decision maker’s support using linguistic and intuitionistic values. The decision maker’s fuzzy values will be normalized and aggregated in this work with improved methodologies. The two objectives are deployed with their own fuzzy values and are implemented in the decision maker’s values. In the article fuzzy weightage has been calculated in two ways. One is every linguistic like low, medium, high and very high has got its significant intuitionistic values that all will be available with the scale of 1 to 10. The same has given as triplets. In our research work the above said has applied with the objective based weightage. So the accuracy has been increased through the work. The outcome of this methodology is to find out the coefficient closeness of the alternatives and to out rank the decision alternatives. The difference between the Final +ve Ideal Solution (FPIS) and Final -ve Ideal Solution (FNIS) is determined and FQA-TOPSIS Hesitant Fuzzy is ranked in the result. Show more
Keywords: FQA-TOPSIS, hesitant fuzzy, cytotoxic, vitiligo, melanocytes, final positive ideal solution and final -ve ideal solution
DOI: 10.3233/JIFS-189162
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8441-8451, 2020
Authors: Palanisamy, R. | Mohana Sundram, K. | Selvakumar, K. | Boopathi, C.S. | Selvabharathi, D. | Vijayakumar, V.
Article Type: Research Article
Abstract: An Artificial Neural Network (ANN) based Space Vector Pulse Width Modulation (SVPWM) for five level cascaded H-bridge inverter (CHBI) fed grid connected photovoltaic (PV) system. The multilevel inverter topologies are offers better performance compare conventional two level inverter like reduced total harmonic distortion, less electromagnetic interferences and voltage stresses across switches are low. The ANN based SVPWM generates the switching pulses for cascaded H-bridge inverter; it improves the accuracy in reference vectors tuning and identification, which leads to improve the inverter output voltage, better utilization of dc-link voltage and controlled output current. The ANN control makes the implementation of SVPWM …becomes simple and minimizes the intricacy in tracking reference vector and calculation of switching time; it is suitable for any type of non-linear systems. This proposed system is energized using PV system and it is boosted using dc-dc boost converter, and the output of CHBI is synchronized with grid connected system using coupled inductor. The simulation and experimental results of ANN based SVPWM for CHBI is verified using simulink-matlab and DSP processor. Show more
Keywords: Artificial Neural Network (ANN), space vector pulse width modulation (SVPWM), cascaded H-bridge inverter (CHBI), photovoltaic (PV) system, DSP processor, multilevel inverter (MLI).
DOI: 10.3233/JIFS-189163
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8453-8462, 2020
Authors: Srinivasan, Palanivel | Doraipandian, Manivannan
Article Type: Research Article
Abstract: Rare event detections are performed using spatial domain and frequency domain-based procedures. Omnipresent surveillance camera footages are increasing exponentially due course the time. Monitoring all the events manually is an insignificant and more time-consuming process. Therefore, an automated rare event detection contrivance is required to make this process manageable. In this work, a Context-Free Grammar (CFG) is developed for detecting rare events from a video stream and Artificial Neural Network (ANN) is used to train CFG. A set of dedicated algorithms are used to perform frame split process, edge detection, background subtraction and convert the processed data into CFG. The …developed CFG is converted into nodes and edges to form a graph. The graph is given to the input layer of an ANN to classify normal and rare event classes. Graph derived from CFG using input video stream is used to train ANN Further the performance of developed Artificial Neural Network Based Context-Free Grammar – Rare Event Detection (ACFG-RED) is compared with other existing techniques and performance metrics such as accuracy, precision, sensitivity, recall, average processing time and average processing power are used for performance estimation and analyzed. Better performance metrics values have been observed for the ANN-CFG model compared with other techniques. The developed model will provide a better solution in detecting rare events using video streams. Show more
Keywords: Artificial Neural Network, Context-free grammar, Rare event detection, streaming video monitoring
DOI: 10.3233/JIFS-189164
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8463-8475, 2020
Authors: Revathy, P. | Mukesh, Rajeswari
Article Type: Research Article
Abstract: Like many open-source technologies such as UNIX or TCP/IP, Hadoop was not created with Security in mind. Hadoop however evolved from the other tools over time and got widely adopted across large enterprises. Some of Hadoop’s architectural features present Hadoop its unique security issues. Given this security vulnerability and potential invasion of confidentiality due to malicious attackers or internal customers, organizations face challenges in implementing a strong security framework for Hadoop. Furthermore, given the method in which data is placed in Hadoop Cluster adds to the only growing list of these potential security vulnerabilities. Data privacy is compromised when these …critical and data-sensitive blocks are accessed either by unauthorized users or for that matter even misuse by authorized users. In this paper, we intend to address the strategy of data block placement across the allotted DataNodes. Prescriptive analytics algorithms are used to determine the Sensitivity Index of the Data and thereby decide on data placement allocation to provide impenetrable access to an unauthorized user. This data block placement strategy aims to adaptively distribute the data across the cluster using innovative ML techniques to make the data infrastructure extra secured. Show more
Keywords: Big data, Hadoop security, data placement strategy for sensitive data, sensitivity in Hadoop, prescriptive analytics
DOI: 10.3233/JIFS-189165
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8477-8486, 2020
Authors: Devarajan, Malathi | Sasikaladevi, N.
Article Type: Research Article
Abstract: With ever growing popularity, wireless communication system also vulnerable to various security attacks. To provide high level security, many cryptographic solutions have been proposed. One such solution is signcryption, where authenticity and confidentiality provided by single logical step. Therefore, signcryption scheme helps to reduce computational cost, but it is not feasible for resource constraint environments. Because, most of the existing approaches were based on El-Gamal, bilinear pairing, Rivest-Shamir-Adleman (RSA), and Elliptic curve Cryptography (ECC). They consume more energy due to their increased key size. Hence, the new signcryption approach is proposed based on Hyper Elliptic Curve Cryptosystem (HECC) whose key …size is much lesser than ECC. It significantly reduces the cost of computation and communication overhead by half the amount of ECC which suits well for resource constraint environments. Further, the proposed scheme attains necessary security features along with forward secrecy and public verifiability. On the other hand, the security of the approach is validated through an automated protocol validation tool – AVISPA. Show more
Keywords: Hyper elliptic curve, signcryption, mutual authentication, security analysis, AVISPA
DOI: 10.3233/JIFS-189166
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8487-8498, 2020
Authors: Varela, Noel | Pineda Lezama, Omar Bonerge | Neira, Harold
Article Type: Research Article
Abstract: The principle assaults on a Wireless Sensor Network (WSN) essentially influence the uprightness and accessibility of the data gathered, for example, Deni-al of Service, Blackhole, Wormhole, and assault on the data being transmitted. Privacy is not an important security objective because the data caught by the sensors are typically not delicate or mystery from individuals. A remote sensor organizes applied to shrewd metering frameworks might be adequately powerful as far as robotization and adjustment of the information that is gathered, however, if the system doesn’t have satisfactory security, both the client and the organization offering the support might be influenced …by assaults on the respectability and accessibility of the data transmitted. This research proposes the use of MESH encryption techniques and Star topology to find the best combination that meets the requirements of a Smart Metering System. Show more
Keywords: Security, encryption, topology, WSN, smart metering networks, cryptographic techniques
DOI: 10.3233/JIFS-189167
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8499-8506, 2020
Authors: Varghese, Lijo Jacob | Sira Jacob, Suma | Banumathi, S. | Ravi, Logesh | Vairavasundaram, Subramaniyaswamy | Jacob Raglend, I.
Article Type: Research Article
Abstract: This work aims to improve the operation of multi-level inverter with reduced switching losses, thereby propose a new structure for an MLI with a reduced component count. A 27-level asymmetric Multi Level Inverter (MLI) with a minimal number of static switches is considered as a test system. The proposed MLI is developed with three input DC sources and thirteen power electronic switches. The hardware prototype is developed for 40 V and 3.5 A output. The control logic is developed in dsPIC30F410 controller. The main objective of this work is to effectively bring down the Total Harmonic Distortion (THD) of the resulting …output voltage by analyzing the harmonic spectrum of the proposed MLI configuration with various low frequencies switching techniques and optimizing their switching angles and to choose an appropriate switching state using fuzzy logic controller (FLC). The proposed FLC covers wide range of operating conditions i.e. 10 switching states and variables 9*9 rules to predict the suitable switching angel. The performance metrics of the proposed structure of 27-level MLI has been evaluated upon simulation results and experimental results based on hardware prototype. The comparative study also carried out with the recent MLI topologies. Show more
Keywords: Asymmetric multilevel inverter, fuzzy logic, total harmonic distortion, pulse width modulation, reduced number of switches, optimum switching angles.
DOI: 10.3233/JIFS-189168
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8507-8519, 2020
Authors: Nagarajan, Manikandan | Sasikumar, A. | Muralidharan, D. | Rajappa, Muthaiah
Article Type: Research Article
Abstract: Approximate computing is a rapidly growing technique to speed up applications with less computational effort while maintaining the accuracy of error-resilient applications such as machine learning and deep learning. Inheritance properties of the machine and deep learning process give freedom for the designer to simplify the circuitry to speed up the computation process at the expense of accuracy of computational results. Fundamental blocks of any computation are adders. In order to optimize it for better performance, 2-bit multi-bit approximate adders (MAPX) are proposed in this work which breaks the lengthy carry chain. In contrast with other approximate larger width adders, …instead of using accurate adders for the most significant part, here proposed 2-bit MAPX-1 and MAPX-2 adders are arranged in various ways to compose most and least significant parts. Designed 8-bit and 16-bit adders are evaluated for their performance and error characteristics. Proposed 2-bit MAPX-2 shows better error characteristics whose MED is 0.250 while occupying less area and MAPX-1 consumes less power and delay at the cost of accuracy. Among the extended adders, MAPX 8-bit adder design1 outperforms the best performing APX based 8-bit adder design1. The error performance of it is improved by 14%, 42.1% and 50.4% compared to the existing well-performing APX 8-bit Design1, Design2 and Design3 respectively. Similarly, proposed MAPX 16-bit Design1 exhibits overwhelming performance compared to best performing APX 16-bit Design1, and its error performance is improved by 24.3%, 34.9% and 50.3% compared to APX 16-bit Design1, Design2 and Design3 respectively. In order to evaluate the proposed adder for a real application, extended MAPX 16-bit Design1 is fit in the convolution layer of Low Weights Digit Detector (LWDD) convolutional neural network-based digit classification system. Our modified system accelerates the computation process by 1.25 factors while exhibiting the accuracy of 91% and it best fits error-tolerant real applications. All the adders are synthesized and implemented in the Intel Cyclone IV EP4CE22F17C6N FPGA. Show more
Keywords: Approximate adders, multi-bit adders, CNN accelerator, digit classification, deep learning
DOI: 10.3233/JIFS-189169
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8521-8528, 2020
Authors: Martinaa, M. | Santhi, B. | Raghunathan, A.
Article Type: Research Article
Abstract: Wireless Sensor Networks (WSNs) is created, stemming from their applications in distinct areas. Huge sensor nodes are deployed in geographically isolated regions in WSN. As a result of uninterrupted transmission, the energy level of the nodes gets rapidly depleted. Sensor node batteries cannot be replaced or recharged often and maintaining the energy level is a crucial issue. Thus energy efficiency is the significant factor to be consider in WSN. This paper focuses to implement an efficient clustering and routing protocols for maximized network lifetime. Clustering has been confirmed as a successful approach in network organization. The fundamental responsibilities of the …clustering mechanism include improved energy efficiency and extended network lifespan. In this work, energy efficiency is improved to maximize lifespan of the WSN by proposing a novel method known as the Populated Cluster aware Routing Protocol (PCRP). The proposed method comprises three different steps: cluster formation, cluster head selection, and multi-hop data transmission. All sensor nodes are joined to a Cluster Head in a single hop in the cluster formation phase. Node distance is calculated and from which cluster head is selected. Then, cluster head aggregates the data from sensor nodes and transfer to the Base Station (BS). The shortest pathway is estimated by the Energy Route Request Adhoc On-demand Distance Vector (ERRAODV) algorithm. The proposed method considers the residual energy involved to attain high energy efficiency and network stability. The experimental analysis is demonstrated to validate the proposed method with existing, which improves the network lifespan. Vital parameters are validated using Network Simulator (NS2). Show more
Keywords: Energy consumption, clustering, routing protocol, network lifetime, wireless sensor networks
DOI: 10.3233/JIFS-189170
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8529-8542, 2020
Authors: Nourbakhsh, Azamossadat | Moin, Mohammad-Shahram | Sharifi, Arash
Article Type: Research Article
Abstract: Face is the most important and most popular biometric used in many identification and verification systems. In these systems, for reducing recognition error rate, the quality of input images need to be as high as possible. Face Image Compliancy verification (FICV) is one of the most essential methods for this purpose. In this research, a brain functionality inspired model is presented for FICV using Haxby model, which is a face visual perception consistent model containing three bilateral areas for three different functionalities. As a result, contribution of this work is presenting a new model, based on human brain functionality, improving …the compliancy verification of face images in FICV context. Perceptual understanding of an image is the motivation of most of the quality assessment methods, i.e., the human quality perception is considered as a gold standard and a perfect reference for recognition and quality assessment. The model presented in this work aims to make the operational process of face image quality assessment system closer to the performance of a human expert. Three basic modules have been introduced. Face structural information, for initial information encoding, is simulated by an extended Viola-Jones model. Face image quality assessment is presented by International Civil Aviation Organization (ICAO), in ICAO (ISO / IEC19794 -11) requirements’ compliancy assessment document. Like Haxby model, perception is performed through two distinct functional and neurological pathways, using Hierarchical Maximum pooling (HMAX) and Convolutional Deep Belief Networks (CDBN). Information storing and fetching for training are similar to their corresponding modules in brain. For simulating the brain decision making, the final results of two separate paths are integrated by weighting sum operator. Nine ISO / ICAO requirements were used for testing the model. The simulation results, using AR and PUT databases, shows improvements in six requirements using the proposed method, in comparison with the FICV benchmark. Show more
Keywords: Haxby model, ICAO, facial images quality verification, HMAX model, CDBN
DOI: 10.3233/JIFS-189171
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8543-8555, 2020
Authors: Jagdish, Mukta | Viloria, Amelec | Vargas, Jesus | Pineda Lezama, Omar Bonerge | Ovallos-Gazabon, David
Article Type: Research Article
Abstract: Cloud-based computation is known as the source architecture of the upcoming generation of IT enterprise. In context to up-coming trade solutions, the Information Technology sections are established under logical, personnel, and physical control, it transfers application software and large database to appropriate data centers, where security and management of database with services are not trustworthy fully. So this process may face many challenges towards society and organizations and that not been well understood over a while duration. This becomes one of the major challenges days today. So in this research, it focuses on security-based data storage using cloud, which plays …one of the important aspects bases on qualities of services. To assure user data correctness in the cloud system, a flexible and effective distributed technique with two different salient features was examined by utilizing the token called homomorphic with erasure-coded data for distributed verification, based on this technique it achieved error data localization and integration of storage correctness. Also, it identifies server misbehaving, efficient, and security-based dynamic operations on data blocking such as data append, delete, and update methods. Performance analysis and security show the proposed method is more effective resilient and efficient against Byzantine failure, even server colluding attacks and malicious data modification attacks. Show more
Keywords: Cloud security, architecture design, data storage, homomorphic token, dynamic operation
DOI: 10.3233/JIFS-189172
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8557-8564, 2020
Authors: Quadir, Md Abdul | Christy Jackson, J. | Prassanna, J. | Sathyarajasekaran, K. | Kumar, K. | Sabireen, H. | Ubarhande, Shivam | Vijaya Kumar, V.
Article Type: Research Article
Abstract: Domain name system (DNS) plays a critical part in the functioning of the Internet. But since DNS queries are sent using UDP, it is vulnerable to Distributed Denial of Service (DDoS) attacks. The attacker can take advantage of this and spoof the source IP address and direct the response towards the victim network. And since the network does not keep track of the number of requests going out and responses coming in, the attacker can flood the network with these unwanted DNS responses. Along with DNS, other protocols are also exploited to perform DDoS. Usage of Network Time Protocol (NTP) …is to synchronize clocks on systems. Its monlist command replies with 600 entries of previous traffic records. This response is enormous compared to the request. This functionality is used by the attacker in DDoS. Since these attacks can cause colossal congestion, it is crucial to prevent or mitigate these types of attacks. It is obligatory to discover a way to drop the spoofed packets while entering the network to mitigate this type of attack. Intelligent cybersecurity systems are designed for the detection of these attacks. An Intelligent system has AI and ML algorithms to achieve its function. This paper discusses such intelligent method to detect the attack server from legitimate traffic. This method uses an algorithm that gets activated by excess traffic in the network. The excess traffic is determined by the speed or rate of the requests and responses and their ratio. The algorithm extracts the IP addresses of servers and detects which server is sending more packets than requested or which are not requested. This server can be later blocked using a firewall or Access Control List (ACL). Show more
Keywords: Amplification attacks, DRDoS, domain name system, network time protocol
DOI: 10.3233/JIFS-189173
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8565-8572, 2020
Authors: Sengan, Sudhakar | Priya, V. | Syed Musthafa, A. | Ravi, Logesh | Palani, Saravanan | Subramaniyaswamy, V.
Article Type: Research Article
Abstract: Breast cancer should be diagnosed as early as possible. A new approach of the diagnosis using deep learning for breast cancer and the particular process using segmentation strategies presented in this article. Medical imagery is an essential tool used for both diagnosis and treatment in many fields of medical applications. But, it takes specially trained medical specialists to read medical images and make diagnoses or treatment decisions. New practices of interpreting medical images are labour exhaustive, time-wasting, expensive, and prone to error. Using a computer-aided program which can render diagnosis and treatment decisions automatically would be more beneficial. A new …computer-based detection method for the classification between compassionate and malignant mass tumours in mammography images of the breast proposed. (a) We planned to determine how to use the challenging definition, which produces severe examples that boost the segmentation of mammograms. (b) Employing well designing multi-instance learning through deep learning, we validated employing inadequately labelled data of breast cancer diagnosis using a mammogram. (c) The study is going through the Deep Lung method incorporating deep multi-dimensional automated identification and classification of the lung nodule. (d) By combining a probabilistic graphic model in deep learning, it authorizes how weakly labelled data can be used to improve the existing breast cancer identification method. This automated system involves manually defining the Region Of Interest (ROI), with the region and threshold values based on the next region. The High-Resolution Multi-View Deep Convolutional Neural Network (HRMP-DCNN) mainly developed for the extraction of function. The findings collected through the subsequent in available public databases like mammography screening information database and DDSM Curated Breast Imaging Subset. Ultimately, we’ll show the VGG that’s thousands of times quicker, and it is more reliable than earlier programmed anatomy segmentation. Show more
Keywords: Deep convolutional neural network, computer-based automated detection, breast cancer screening, deep learning, machine learning, mammography, fuzzy logic.
DOI: 10.3233/JIFS-189174
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8573-8586, 2020
Authors: Agrawal, Deepika | Pandey, Sudhakar | Gupta, Punit | Kumar Goyal, Mayank
Article Type: Research Article
Abstract: Wireless Sensor Networks is a complex network with millions of small-scale sensor nodes, working together to detect certain physical phenomena. Sensor nodes are operated by battery therefore the major concern is energy efficiency. Clustering is an effective technique to decrease the energy depletion in the network. However, choosing the optimum Cluster Heads is an NP-Hard problem. This paper proposes an unequal clustering technique that selects probationary Cluster Heads through fuzzy logic and the optimization of this probationary Cluster Heads is done through Harmony Search Algorithm (HSA). The proposed algorithm exhibits the dynamic capability of fuzzy logic and high search efficiency …of HSA that extends the network lifespan. The findings are simulated against traditional clustering protocols and compared. The findings obtained show that the protocol proposed is performing superior in terms of network lifespan prolongation and other metrics. Show more
Keywords: Optimal cluster heads, optimization, harmony search algorithm, wireless sensor networks, unequal clustering
DOI: 10.3233/JIFS-189175
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8587-8597, 2020
Authors: Abdulhay, Enas | Alafeef, Maha | Hadoush, Hikmat | Arunkumar, N.
Article Type: Research Article
Abstract: Autism is a developmental disorder that influences social communication skills. It is currently diagnosed only by behavioral assessment. The assessment is susceptible to the experience of the examiner as well as to the descriptive scaling standard. This paper presents a computer aided approach to discrimination between neuro-typical and autistic children. A new method- based on the computing of the elliptic area of the Continuous Wavelet Transform complex plot of resting state EEG- is presented. First, the complex values of CWT, as a function of both time and frequency, are calculated for every EEG channel. Second, the CWT complex plot is …obtained by plotting the real parts of the resulted CWT values versus the related imaginary components. Third, the 95% confidence value of the elliptic area of the complex plot is computed for every channel for both autistic and healthy subjects; and the obtained values are considered as the first set of features. Fourth, three additional features are computed for every channel: the average CWT, the maximum EEG amplitude, and the maximum real part of CWT. The classification of those features is realized through artificial neural network (ANN). The obtained accuracy, sensitivity and specificity values are: 95.9%, 96.7%, and 95.1% respectively. Show more
Keywords: Autism, EEG, CWT, Elliptic area, classification
DOI: 10.3233/JIFS-189176
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8599-8607, 2020
Authors: Patel, Chintan | Joshi, Dhara | Doshi, Nishant | Veeramuthu, A. | Jhaveri, Rutvij
Article Type: Research Article
Abstract: With the agile development of the Internet era, starting from the message transmission to money transactions, everything is online now. Remote user authentication (RUA) is a mechanism in which a remote server verifies the user’s correctness over the shared or public channel. In this paper, we analyze an RUA scheme proposed by Chen for the multi-server environment and prove that their scheme is not secured. We also find numerous vulnerabilities such as password guessing attack, replay attack, Registration Center (RC) spoofing attack, session key verification attack, and perfect forward secrecy attack for Chen’s scheme. After performing the cryptanalysis of Chen’s …scheme, we propose a biometric-based RUA scheme for the same multi-server environment. We prove that the proposed authentication scheme achieves higher security than Chen’s scheme with the use of informal security analysis as well as formal security analysis. The formal security analysis of the proposed scheme is done using a widely adopted random oracle method. Show more
Keywords: Multi-server, smart card, biometrics, three factor authentication
DOI: 10.3233/JIFS-189177
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8609-8620, 2020
Article Type: Other
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8621-8621, 2020
Authors: Lin, Tang
Article Type: Research Article
Abstract: Although much less fatal than the Ebola and previous SARS virus epidemics, the current coronavirus outbreak (COVID-19) has spread to more people in more countries in a much shorter time frame. With the rapid development of the Internet of things, it has played an important role to track/monitor transmission movements throughout the population. The technology infrastructure between mobile devices, wearable devices and sensors, smart home device makes it possible to readily deploy solutions to monitor and collect data and perform analysis to ensure policy make intelligent, rapid decisions. This research combines AOL and Support Vector Machine to form the Internet …of things cycle through smart home. The parameters of Support Vector Machine model are optimized by ALO algorithm, which shortens the learning time and improves the performance of classifier. Then, the algorithm of ALO is used to optimize the Support Vector Machine intrusion detection method and agent technology, and the intrusion detection model is established. Experimental results show that the combination of these two can effectively reduce the false alarm rate of network intrusion. Show more
Keywords: Support vector machine, intrusion detection, internet of things security, smart home
DOI: 10.3233/JIFS-189258
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8623-8632, 2020
Authors: Hongwei, Zhu, | Xuesong, Wang,
Article Type: Research Article
Abstract: With the continuous progress of social science and technology, the development of the Internet of things is growing. With the development of Internet of things, security problems emerge in endlessly. During the period of COVID-19, the Internet of Things have been widely used to fight virus outbreak. However, the most serious security problem of the Internet of things is network intrusion. This paper proposes a balanced quadratic support vector machine information security analysis method for Internet of things. Compared with the traditional support vector machine Internet of things security analysis method, this method has a higher accuracy, and can shorten …the detection time, with efficient and powerful characteristics. The method proposed in this paper has certain reference value to the Internet of things network intrusion problem. It provides better security for the Internet of things during the protection period of covid-19. Show more
Keywords: SVM, Balanced binary decision, internet of things security, intrusion detection, COVID-19
DOI: 10.3233/JIFS-189259
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8633-8642, 2020
Authors: Weining, Sun | Cheli, Zhao
Article Type: Research Article
Abstract: During COVID-19 pandemic, researchers have used innovative technologies for fast tracking the development to end this pandemic. Virtual Reality (VR) has offered an imperative role for fighting this pandemic, through audiovisual-based virtual communication. Virtual reality modeling language (VRML), as an international standard of virtual reality, has developed rapidly. VRML expanded the function of script node by introducing Java and script programs written in java script language. This paper presents a VRML method. Libraries and platoons are virtualized to meet the normal use of users. In principle, any text editing system can be used for VRML programming, but some editing systems …have few related functions and are not suitable for large-scale VRML Scene Design. The VRML algorithm proposed in this paper can be applied to large buildings. The VRML algorithm proposed in this paper is compared with the traditional algorithm. The VRML algorithm proposed in this paper is superior to the traditional algorithm in the aspects of realism, interactivity, design rationality and execution speed. The practicability of the VRML algorithm is proved. It provides help for people who are inconvenient to go out during the protection period of covid-19. Show more
Keywords: Virtual reality modeling language virtual library, virtual volleyball hall, 3D, Internet, system
DOI: 10.3233/JIFS-189260
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8643-8653, 2020
Authors: Zhaoguo, Liu | Tingting, Liang | Wenzhan, Wang
Article Type: Research Article
Abstract: Under the influence of novel corona virus pneumonia epidemic, the protection of traditional villages is put forward higher request. The spread of the epidemic among villages will make the situation of epidemic prevention and control more difficult. As an important part of culture, traditional villages have high historical value. In this paper, the traditional village protection method, a new geographical data algorithm IData storage method. Compared with the traditional ArcGIS method, it improves the efficiency and accuracy of topographic map entry. IData’s data factory can use the symbolic technology of skeleton lines to represent all the figures in the national …standard mode, and any complex figure can only be represented by one element. Idate can quickly load data and render symbols in a drawing. With the powerful data processing engine of IData data factory, we can check out the errors that other software can’t find and process the data automatically. Records of the loss of traditional villages can be recorded quickly. The establishment and protection of traditional villages have had a beneficial impact. Show more
Keywords: Traditional village protection, big data, COVID-19, ArcGIS
DOI: 10.3233/JIFS-189261
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8655-8664, 2020
Authors: Tingting, Liang | Zhaoguo, Liu | Wenzhan, Wang
Article Type: Research Article
Abstract: The Covid-19 first occurs in Wuhan, China in December 2019. After that, the virus has spread all over the world and at the time of writing this paper the total number of confirmed cases are above 11 million with over 600,000 deaths. The pattern recognition of complex environment can be used to determine if a COVID-19 breath pattern can be established with accuracy. The traditional decorative pattern detection method has a high degree of recognition in simple scene. However, the efficiency of decorative pattern detection in complex scenes is low and the recognition accuracy is not high. Firstly, the evaluation …index of target detection method is designed. Through this paper, it is found that the success rate of some targets is naturally better than other targets, and easy to distinguish from the background. In order to improve the recognition success rate of the object in the complex environment and determine the position and attitude of the object, the pattern as the artificial identification in the environment is proposed. The interior art decoration pattern is selected as the experimental pattern and the pattern classification evaluation index is designed. The experimental results show that the method proposed in this paper can optimize the pattern subsets which are confused with each other and easy to distinguish from the background. It has a certain reference value for decorative pattern recognition in complex environment for COVID-19 epidemic. Show more
Keywords: Neural network, pattern classification, decorative pattern detection, complex environment, COVID-19
DOI: 10.3233/JIFS-189262
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8665-8673, 2020
Authors: Jihong, Yang | Lu, Yun
Article Type: Research Article
Abstract: Under the influence of novel corona virus pneumonia epidemic prevention and control, higher requirements for behavior recognition in complex environment are put forward. The accuracy of traditional methods for sports training is not high, so a method is needed to improve the local action recognition to assist sports training. In the process of behavior recognition, if only the track is regarded as an independent individual, the information of its neighbor will be ignored. Therefore, we use KNN algorithm to get the nearest neighbor trajectory. In order to calculate the rich neighborhood information around the track, this paper calculates the complex …relationship between the center track and the neighborhood track from four different angles, including absolute motion, relative motion, distance relationship and direction relationship. Then, from the four different perspectives of variance, discrete coefficient, skewness and kurtosis, this paper proposes a large interval nearest neighbor coding method. This method makes the four eigenvalues complement each other and improves the ability of describing complex and changeable behaviors. The experimental results show that the coding method proposed in this paper can be used for behavior recognition according to different transformation matrix. Show more
Keywords: Behavior recognition, track space-time feature, feature matching, fuzzy set
DOI: 10.3233/JIFS-189263
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8675-8684, 2020
Authors: Gang, Li | Fang, Wang | Sishi, Quan
Article Type: Research Article
Abstract: COVID-19’s significant impact on economic and social life has rightfully garnered the attention of citizens and policymakers alike. In response to the pandemic, governments have issued strict guidelines and restrictions to shut down some cities and many rural villages in China. With no cure or vaccine on the horizon, governments are working to mitigate the damage of the lockdowns on rural cultural village. Over the past two decades, rural village has been negatively impacted by terrorism, lack of funding and loss of population. COVID-19 has had similar effect, but in an incredibly short period of time. During the control period …of COVID-19, traditional data are widely used in village protection and renewal. Collect and sort out the original data of Huizhou culture to prepare for the subsequent calculation. After the data is ready, the data is processed as the basis of mining its potential application value. In this paper, the key words of Huizhou cultural resources are summarized. The data analysis platform is established. This paper analyzes people’s preference for Huizhou cultural resources. To better realize the more effective and far-reaching development and exploitation of Huizhou cultural resources. Show more
Keywords: Big data, Huizhou traditional village cultural resources, cultural heritage, mining applications, COVID-19
DOI: 10.3233/JIFS-189264
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8685-8693, 2020
Authors: Yingzhi, Xu | Lu, Yun
Article Type: Research Article
Abstract: Under the influence of novel coronavirus pneumonia, the traditional manual oil painting creation has put forward higher requirements. The disadvantages of traditional hand drawing are very obvious: tedious, inconvenient to modify and save, slow speed of painting, which can no longer meet the requirements of social development. In this paper, the fitness of oil painting function is discussed. Through the analysis of the experimental results, it is found that this method has important reference value for optimizing algorithm and improving traditional hand drawing during COVID-19.
Keywords: Genetic algorithm, aesthetic criteria, COVID-19, genetic operator, fitness function
DOI: 10.3233/JIFS-189265
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8695-8702, 2020
Authors: Yongjun, Tang
Article Type: Research Article
Abstract: During the period of COVID-19 protection, Internet of Things (IoT) has been widely used to fight the outbreak of pandemic. However, the security is a major issue of IoT. In this research, a new algorithm knn-bp is proposed by combining BP neural network and KNN. Knn-bp algorithm first predicts the collected sensor data. After the forecast is completed, the results are filtered. Compared with the data screened by traditional BP neural network, k-nearest-neighbor algorithm has good data stability in adjusting and supplementing outliers, and improves the accuracy of prediction model. This method has the advantages of high efficiency and small …mean square error. The application of this method has certain reference value. Knn-bp algorithm greatly improves the accuracy and efficiency of the Internet of things. Internet of things network security is guaranteed. It plays an indelible role in the protection of COVID-19. Show more
Keywords: Artificial neural network, security design, internet of things, KNN, COVID-19
DOI: 10.3233/JIFS-189266
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8703-8711, 2020
Authors: Yuan, Luo | Xiaofei, Zhao | Yiyu, Qiu
Article Type: Research Article
Abstract: At present, the evaluation of normal teaching order and teaching quality has been seriously interfered by the impact of COVID-19. In order to ensure the quality of art classroom teaching, this article uses BP neural network technology to build a model for art teaching quality evaluation during the epidemic. Based on the introduction of the BP neural network model and the problems of art teaching quality evaluation, the article focuses on the art teaching quality evaluation indicators and the BP neural network algorithm and process. In addition, the article also uses an empirical method to verify the effect of the …BP network model training method, and obtains the expected effect. Finally, it discusses the problem of information processing in art teaching evaluation. Show more
Keywords: Art teaching quality evaluation, BP neural network, COVID-19
DOI: 10.3233/JIFS-189267
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8713-8721, 2020
Authors: Qiuling, Zheng | Ke, Yang | Qiang, Xu | Chenglong, Zhang | Liguang, Wang
Article Type: Research Article
Abstract: Under the influence of novel corona virus pneumonia, the staff are controlled. Therefore, it is a difficult problem to measure the parameters of wood structure building on site. The measurement error of traditional wood structure parameters in complex environment is large, so an efficient and accurate measurement and recognition method is needed. In this paper, a method combining random decrement method and ITD method is proposed to measure the frequency, damping ratio and other structural dynamic parameters of ancient building timber structure under crowd random load excitation. In this paper, the frequency and damping ratio of the typical ancient building …timber structure are predicted by using the artificial neural network model trained by the known data. The experimental results show that the population density has a great influence on the measurement of the dynamic parameters of the wooden structure of ancient buildings. Using this method, combined with the long-term monitoring data of temperature and humidity, the influence of various environmental factors on the dynamic characteristics of the structure can be analyzed. This provides data support for structural damage identification and health monitoring. Show more
Keywords: Artificial neural network (ANN), ITD method, population distribution density, dynamic characteristics, COVID-19
DOI: 10.3233/JIFS-189268
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8723-8729, 2020
Authors: Xi, Zhang
Article Type: Research Article
Abstract: The transmission routes of novel coronavirus pneumonia include direct transmission, aerosol transmission and contact transmission. Therefore, the novel coronavirus pneumonia has been spread very quickly. This has a certain impact on the development of graphic design. Graphic design plays an important role in product design. However, the traditional aided design method is too complex, and it is difficult for designers to design works that meet their own needs. In the design of 3D virtual vision graphics, the distance calculation of time series is not accurate. This kind of error will bring some errors to the design of complex curved surface …products. In order to measure the similarity of time series effectively, the calculation principle of Euclidean distance and dynamic bending distance is analyzed. Combined with the advantages of these two methods, a new distance calculation method based on morphological fitting is proposed. In this paper, through the research of ordered point sequence, the 3D virtual design method is used to improve the design effect, which has reference value for the design of works that meet the requirements of designers during the popularity of COVID-19. Show more
Keywords: 3D virtual graphic design, time series, distance calculation, shape fitting, COVID-19
DOI: 10.3233/JIFS-189269
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8731-8738, 2020
Authors: Guanggen, Li | Matthews, Andrew
Article Type: Research Article
Abstract: The popularity of covid-19 has led to the introduction of the policy of controlling the flow of personnel, which has a certain impact on the color recognition of the design objects of hand decorative elements. In the past, the research on convolution neural network design and color recognition is still in the traditional method, and the field of computer vision is not really combined with the traditional decorative fabric. This paper proposes a solution based on deep learning. Color learning and main color recognition can be processed as a whole. By introducing convolution neural network, the scheme can learn color …features directly from the image itself, and the process of artificial design features is omitted. While simplifying the process of model building and training, the potential information association can be obtained, so as to obtain better recognition effect. In addition, due to the deep depth of the network, this paper uses the initial optimization module to avoid the performance degradation and over fitting in the training process. This method has an important reference value for the color design of modern hand decoration, and can promote the development of hand decoration during the popularity of covid-19. Show more
Keywords: CNN architecture, inception module, AVG pool, softmax, COVID-19
DOI: 10.3233/JIFS-189270
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8739-8746, 2020
Authors: Guochen, Wan | Feihong, Shan
Article Type: Research Article
Abstract: During covid-19, basketball training was stopped. Instead, the basketball video analysis is used. In this paper, literature, theoretical analysis, numerical simulation, experimental research and other research methods are used. The ant colony algorithm model of deep learning optimization for basketball technical and tactical decision-making is established to solve the optimization problem of actual technical and tactical decision-making. In this paper, video image correlation algorithm is used. In the video of players’ free throw basket, there are many independent frames. The real frame set of free throw basket includes the whole process of jumping, arm lifting, squatting and stretching. The shooting …frame set and shooting information of the ball are obtained. In this paper, a shot frame detection algorithm is proposed by analyzing multiple samples of multi shot video. The mathematical model of the shooting frame is established, which can locate the shooting frame quickly and accurately and determine the penalty frame set. Further obtain the basketball release status information for preparation. The reliability and robustness of the algorithm are verified by experiments on several samples. It provides a new method for basketball training during covid-19. Show more
Keywords: Deep learning theory, video analysis, basketball training assistant, ant colony algorithm model
DOI: 10.3233/JIFS-189271
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8747-8755, 2020
Authors: Xiaozhou, Yang | Fan, Bai | Jones, Paul
Article Type: Research Article
Abstract: Based on the impact of epidemic prevention and control, the floating population supervision department classifies and controls the floating population by industry. There are many personnel management and control points. When the computer-aided management system is used, the outdoor environment is complex and the data interference is large. Therefore, the recognition accuracy of outdoor scenery is required to be higher. In this paper, a convolutional neural network with adaptive weights is proposed. In this method, the feature fusion strategy is combined with the network, and the optimal feature weight is obtained by training the network. In addition, this paper uses …multiple two classifiers instead of multiple classifiers to achieve accurate target classification. Experiments show that the method proposed in this paper has excellent performance in the detection of similar objects. The strategy of replacing multi classification network with multi classification network improves the accuracy and recall of target detection in known environment. Show more
Keywords: Adaptive weight, convolution neural network, fusion strategy, outdoor environment recognition
DOI: 10.3233/JIFS-189272
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8757-8766, 2020
Authors: Kai, Cui
Article Type: Research Article
Abstract: Under the influence of COVID-19, an efficient Ad-hoc network routing algorithm is required in the process of epidemic prevention and control. Artificial neural network has become an effective method to solve large-scale optimization problems. It has been proved that the appropriate neural network can get the exact solution of the problem in real time. Based on the continuous Hopfield neural network (CHNN), this paper focuses on the study of the best algorithm path for QoS routing in Ad-hoc networks. In this paper, a new Hopfield neural network model is proposed to solve the minimum cost problem in Ad-hoc networks with …time delay. In the improved version of the path algorithm, the relationship between the parameters of the energy function is provided, and it is proved that the feasible solution of the network belongs to the category of progressive stability by properly selecting the parameters. The calculation example shows that the solution is not affected by the initial value, and the global optimal solution can always be obtained. The algorithm is very effective in the prevention and control in COVID-19 epidemic. Show more
Keywords: Ad-hoc Network, Routing Algorithm, Neural Network, COVID-19
DOI: 10.3233/JIFS-189273
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8767-8774, 2020
Authors: Bo, Yang | Chunli, Wang
Article Type: Research Article
Abstract: Under the influence of the COVID-19, the analysis of physical health data is helpful to grasp the physical condition in time and promote the level of prevention and control of the epidemic. Especially for novel corona virus asymptomatic infections, the initial analysis of physical health data can help to detect the possibility of virus infection to some extent. The digital information system of traditional hospitals and other medical institutions is not perfect. For a large number of health data generated by smart medical technology, there is a lack of an effective storage, management, query and analysis platform. Especially, it lacks …the ability of mining valuable information from big data. Aiming at the above problems, the idea of combining Struts 2 and Hadoop in the system architecture of the platform is proposed in this paper. Data mining association algorithm is adopted and improved based on MapReduce. A service platform for college students’ physical health is designed to solve the storage, processing and mining of health big data. The experiment result shows that the system can effectively complete the processing and analysis of the big data of College students’ physical health, which has a certain reference value for college students’ physical health monitoring during the COVID-19 epidemic. Show more
Keywords: Physical health data, parallel processing, health monitoring, multi calculation big data, COVID-19
DOI: 10.3233/JIFS-189274
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8775-8782, 2020
Authors: Yong, Chang | Lu, Yun
Article Type: Research Article
Abstract: Under the influence of COVID-19, the efficiency of e-commerce distribution in public health emergencies has become the key to ensuring people’s normal lives. With the development of e-commerce, the location of distribution center is becoming more and more important, which is related to the healthy and long-term development of e-commerce. However, the traditional location efficiency is low, which cannot play an immediate role in the development of e-commerce. This paper combines weiszfeld algorithm, improves particle swarm optimization algorithm, improves the operation efficiency and location accuracy, and finally gets a relatively satisfactory result. Results data analysis shows that the improvement and …integration of the algorithm is reasonable and effective. This method has important reference value for e-commerce location. Show more
Keywords: E-commerce, center location, particle swarm optimization, Weiszfeld algorithm, COVID-19
DOI: 10.3233/JIFS-189275
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8783-8793, 2020
Authors: Huang, Gongxiang | Qu, Huimin
Article Type: Research Article
Abstract: The influence of COVID-19 causes a certain impact on data visualization and data fusion on the visual performance of illustration. Based on the development of illustration, this paper discusses the relationship between illustration, text information and media. This paper studies the feasibility of the combination of illustration and information visualization. In this paper, the interactive image segmentation and gridding methods are proposed. Then, the background theory and significance of flow field design are described, and the flow field generation method based on heat source diffusion is proposed. In this paper, the shadow of the topology of the convective field through …the interaction input of the flow field design is analyzed, and then compared with the related work. In the visualization of flow field, based on the weighted distance field formed by the diffusion of heat source, a visualization method of stratified flow field line is proposed. Finally, the visualization method of stratified flow field is explained and its effect is demonstrated. Experimental data show that the information visualization method proposed in this paper can improve the efficiency and accuracy of illustration information extraction. Show more
Keywords: Illustration, media, information visualization, weighted distance field, COVID-19
DOI: 10.3233/JIFS-189276
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8795-8803, 2020
Authors: He, Zhihui | Li, Xiaofeng
Article Type: Research Article
Abstract: During the COVID-19 epidemic period, it is essential to strengthen physical exercise and improve the health of the whole people. In this paper, based on genetic algorithm, a fuzzy control system is proposed to dynamically adjust the exercise ability of the bodybuilders under the comprehensive consideration of parameters. Through experiments and data processing, the system obtains bioelectric information related to heart rate, heart rate variability and muscle fatigue of the fitness people in the three states of not fatigue, moderate fatigue and extreme fatigue, establishes fuzzy membership function, and thus establishes personalized fitness information feedback control strategy to maintain moderate …fitness intensity. By narrowing the gap between the predicted RPE value based on objective information and the measured RPE, the method provides a unified subjective and objective exercise intensity for the bodybuilders, effectively expands the time of aerobic exercise, and enhances the effect of aerobic exercise. In addition, in order to expand the scope of application of the exercise intensity control model, the service-oriented transformation is carried out to enable it to provide fitness content combinations of interest to fitness practitioners and instructors. Show more
Keywords: Fitness service technology, genetic algorithm, COVID-19
DOI: 10.3233/JIFS-189277
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8805-8812, 2020
Authors: Guo, Chen
Article Type: Research Article
Abstract: In rural construction, affected by covid-19, it leads to the collection and demand survey of basic information data of relevant interest groups. The specific situation of the transformation of ancient villages is also gradually increasing. However, due to the complexity of rural space, the dispersion of settlement space and the diversity of information demand of rural planning work, the data coverage is large, information acquisition is difficult, the use effect of data collection is not ideal, and there is no planning feedback mechanism. However, during the epidemic period, the staff could not carry out a series of reconstruction of ancient …villages. At present, the data of village planning and construction and architectural design are complex, the needs of relevant interest groups are diversified, and regional planning is difficult. In this paper, the big data function is applied to the reconstruction of ancient villages in the epidemic period of covid-19. Show more
Keywords: Reconstruction of ancient villages, big data, regional co-ordination, rural architecture design, COVID-19
DOI: 10.3233/JIFS-189278
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8813-8821, 2020
Authors: Li, Jiafeng | Hu, Hui | Li, Xiang | Jin, Qian | Huang, Tianhao
Article Type: Research Article
Abstract: Under the influence of COVID-19, the economic benefits of shale gas development are greatly affected. With the large-scale development and utilization of shale gas in China, it is increasingly important to assess the economic impact of shale gas development. Therefore, this paper proposes a method for predicting the production of shale gas reservoirs, and uses back propagation (BP) neural network to nonlinearly fit reservoir reconstruction data to obtain shale gas well production forecasting models. Experiments show that compared with the traditional BP neural network, the proposed method can effectively improve the accuracy and stability of the prediction. There is a …nonlinear correlation between reservoir reconstruction data and gas well production, which does not apply to traditional linear prediction methods Show more
Keywords: Back propagation neural network, shale gas exploitation, economic benefit, COVID-19
DOI: 10.3233/JIFS-189279
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8823-8830, 2020
Authors: Wang, Bin | Zhou, Qingyuan
Article Type: Research Article
Abstract: The global economy appears the trend of anti-globalization under the influence of COVID-19. Based on the input-output table of lead database from 2006 to 2020, this paper divides the factors that affect the development of financial industry in China, the United States and Russia into six aspects: price, intermediate input, household consumption, government consumption, export and import. ADGA-BP neural network model is proposed in this paper, which is based on six aspects of price, intermediate input, consumer, government consumption, export and import. The intermediate input is decomposed from the perspective of industrial structure to study the interrelationship between financial industry …and other industries in the three countries. The results show that the intermediate input is the main factor in the development of financial industry in the three countries, but the source industries of the intermediate input are not the same; the two factors of household consumption and price are closely related to the development of financial industry in the three countries, and they all play a role in promoting China, while the relationship between household consumption and the United States and between price and Russia is reverse; Government consumption only has a significant impact on Russia; from the perspective of mutual influence, the mutual investment between the financial industry of China and the United States is relatively large, while the relationship between the Russian financial industry and the two countries is relatively weak. It shows that under the background of covid-19, the development of financial industry is affected. Show more
Keywords: Adaptive genetic algorithm, BP neural network, COVID-19, financial industry
DOI: 10.3233/JIFS-189280
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8831-8838, 2020
Authors: Li, Yongkang
Article Type: Research Article
Abstract: In post COVID-19 era, labor education plays an indispensable part in China’s digital economy, while the digital economy will redefine the labor education at the same time. From the Marxist theory, latest data and survey results, we portray the logic relationships, mutual impacts between digital economy and labor education. Our research indicates that free development of all human beings is the common value shared by the digital economy and labor education. Labor education can cultivate the abilities of competition and cooperation, form the proper digital economy values meanwhile, which is essential to hedge the negative impacts of digital economy on …labor and employment. Labor education comprehensively promotes the digital labor abilities of all laborers in the path with Chinese characteristics. The boom in digital economy and the refocusing on labor education will enable China to cope with the rising risks and challenges in a more diversified and flexible way among this highly uncertain world. Show more
Keywords: Digital economy, labor education, COVID-19, neural network
DOI: 10.3233/JIFS-189281
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8839-8845, 2020
Authors: Fengwei, Ai, | Nan, Wang,
Article Type: Research Article
Abstract: At present, the normal teaching is seriously disturbed by the epidemic situation. In order to ensure the smooth progress of teaching, online teaching is a necessary way. Based on the current situation, this paper discusses the integration of urban and rural planning and human geography teaching in university courses. Based on the full analysis of the advantages of the original curriculum, this paper adjusts the curriculum of urban and rural planning and human geography. The new system focuses on the characteristics of “broad foundation and clear main line”, and follows the three main lines of “art, design and geography” to …optimize the design. A questionnaire survey was conducted among 200 online students in our school and the data were processed by multidimensional BP neural network analysis. The experimental results show that the method proposed in this paper can improve the efficiency of online teaching. Show more
Keywords: Epidemic situation, urban and rural planning and human geography, teaching integration, Information method of online education
DOI: 10.3233/JIFS-189282
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8847-8855, 2020
Authors: Dafei, Wu, | Qinghong, Pan,
Article Type: Research Article
Abstract: In order to strengthen the management and control of personnel flow and the timeliness of information dissemination during the COVID-19 epidemic, it is necessary to improve the reliability of authority and content management. The extensive application of authority information management can closely connect the professional system with the production activities of enterprises. At present, the traditional authority management level is complex, and the management of complex data is chaotic. This paper is based on ASP.NET. This paper proposes a data authority management method. The main function of this method is to establish a standard three-tier structure of rights management level …by using the open-source string template engine technology, tag analysis, SEO search engine optimization technology and information collection technology. This method provides a general process oriented and automatic management platform for users through the hierarchical management mechanism. This technology can meet people’s rights and content requirements for creating, publishing and updating websites without understanding the technology itself. The experimental results show that the rapid management mechanism based on authority management can accurately handle and manage authority and data which can improve the accuracy and timeliness of personnel flow control under the impact of the COVID-19 epidemic. Show more
Keywords: ASP.NET, permission management system, COVID-19 epidemic, string template, hierarchical management mechanism
DOI: 10.3233/JIFS-189283
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8857-8866, 2020
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]