Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2024: 1.7
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Agrawal, Deepika | Pandey, Sudhakar | Gupta, Punit | Kumar Goyal, Mayank
Article Type: Research Article
Abstract: Wireless Sensor Networks is a complex network with millions of small-scale sensor nodes, working together to detect certain physical phenomena. Sensor nodes are operated by battery therefore the major concern is energy efficiency. Clustering is an effective technique to decrease the energy depletion in the network. However, choosing the optimum Cluster Heads is an NP-Hard problem. This paper proposes an unequal clustering technique that selects probationary Cluster Heads through fuzzy logic and the optimization of this probationary Cluster Heads is done through Harmony Search Algorithm (HSA). The proposed algorithm exhibits the dynamic capability of fuzzy logic and high search efficiency …of HSA that extends the network lifespan. The findings are simulated against traditional clustering protocols and compared. The findings obtained show that the protocol proposed is performing superior in terms of network lifespan prolongation and other metrics. Show more
Keywords: Optimal cluster heads, optimization, harmony search algorithm, wireless sensor networks, unequal clustering
DOI: 10.3233/JIFS-189175
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8587-8597, 2020
Authors: Abdulhay, Enas | Alafeef, Maha | Hadoush, Hikmat | Arunkumar, N.
Article Type: Research Article
Abstract: Autism is a developmental disorder that influences social communication skills. It is currently diagnosed only by behavioral assessment. The assessment is susceptible to the experience of the examiner as well as to the descriptive scaling standard. This paper presents a computer aided approach to discrimination between neuro-typical and autistic children. A new method- based on the computing of the elliptic area of the Continuous Wavelet Transform complex plot of resting state EEG- is presented. First, the complex values of CWT, as a function of both time and frequency, are calculated for every EEG channel. Second, the CWT complex plot is …obtained by plotting the real parts of the resulted CWT values versus the related imaginary components. Third, the 95% confidence value of the elliptic area of the complex plot is computed for every channel for both autistic and healthy subjects; and the obtained values are considered as the first set of features. Fourth, three additional features are computed for every channel: the average CWT, the maximum EEG amplitude, and the maximum real part of CWT. The classification of those features is realized through artificial neural network (ANN). The obtained accuracy, sensitivity and specificity values are: 95.9%, 96.7%, and 95.1% respectively. Show more
Keywords: Autism, EEG, CWT, Elliptic area, classification
DOI: 10.3233/JIFS-189176
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8599-8607, 2020
Authors: Patel, Chintan | Joshi, Dhara | Doshi, Nishant | Veeramuthu, A. | Jhaveri, Rutvij
Article Type: Research Article
Abstract: With the agile development of the Internet era, starting from the message transmission to money transactions, everything is online now. Remote user authentication (RUA) is a mechanism in which a remote server verifies the user’s correctness over the shared or public channel. In this paper, we analyze an RUA scheme proposed by Chen for the multi-server environment and prove that their scheme is not secured. We also find numerous vulnerabilities such as password guessing attack, replay attack, Registration Center (RC) spoofing attack, session key verification attack, and perfect forward secrecy attack for Chen’s scheme. After performing the cryptanalysis of Chen’s …scheme, we propose a biometric-based RUA scheme for the same multi-server environment. We prove that the proposed authentication scheme achieves higher security than Chen’s scheme with the use of informal security analysis as well as formal security analysis. The formal security analysis of the proposed scheme is done using a widely adopted random oracle method. Show more
Keywords: Multi-server, smart card, biometrics, three factor authentication
DOI: 10.3233/JIFS-189177
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8609-8620, 2020
Article Type: Other
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8621-8621, 2020
Authors: Lin, Tang
Article Type: Research Article
Abstract: Although much less fatal than the Ebola and previous SARS virus epidemics, the current coronavirus outbreak (COVID-19) has spread to more people in more countries in a much shorter time frame. With the rapid development of the Internet of things, it has played an important role to track/monitor transmission movements throughout the population. The technology infrastructure between mobile devices, wearable devices and sensors, smart home device makes it possible to readily deploy solutions to monitor and collect data and perform analysis to ensure policy make intelligent, rapid decisions. This research combines AOL and Support Vector Machine to form the Internet …of things cycle through smart home. The parameters of Support Vector Machine model are optimized by ALO algorithm, which shortens the learning time and improves the performance of classifier. Then, the algorithm of ALO is used to optimize the Support Vector Machine intrusion detection method and agent technology, and the intrusion detection model is established. Experimental results show that the combination of these two can effectively reduce the false alarm rate of network intrusion. Show more
Keywords: Support vector machine, intrusion detection, internet of things security, smart home
DOI: 10.3233/JIFS-189258
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8623-8632, 2020
Authors: Hongwei, Zhu, | Xuesong, Wang,
Article Type: Research Article
Abstract: With the continuous progress of social science and technology, the development of the Internet of things is growing. With the development of Internet of things, security problems emerge in endlessly. During the period of COVID-19, the Internet of Things have been widely used to fight virus outbreak. However, the most serious security problem of the Internet of things is network intrusion. This paper proposes a balanced quadratic support vector machine information security analysis method for Internet of things. Compared with the traditional support vector machine Internet of things security analysis method, this method has a higher accuracy, and can shorten …the detection time, with efficient and powerful characteristics. The method proposed in this paper has certain reference value to the Internet of things network intrusion problem. It provides better security for the Internet of things during the protection period of covid-19. Show more
Keywords: SVM, Balanced binary decision, internet of things security, intrusion detection, COVID-19
DOI: 10.3233/JIFS-189259
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8633-8642, 2020
Authors: Weining, Sun | Cheli, Zhao
Article Type: Research Article
Abstract: During COVID-19 pandemic, researchers have used innovative technologies for fast tracking the development to end this pandemic. Virtual Reality (VR) has offered an imperative role for fighting this pandemic, through audiovisual-based virtual communication. Virtual reality modeling language (VRML), as an international standard of virtual reality, has developed rapidly. VRML expanded the function of script node by introducing Java and script programs written in java script language. This paper presents a VRML method. Libraries and platoons are virtualized to meet the normal use of users. In principle, any text editing system can be used for VRML programming, but some editing systems …have few related functions and are not suitable for large-scale VRML Scene Design. The VRML algorithm proposed in this paper can be applied to large buildings. The VRML algorithm proposed in this paper is compared with the traditional algorithm. The VRML algorithm proposed in this paper is superior to the traditional algorithm in the aspects of realism, interactivity, design rationality and execution speed. The practicability of the VRML algorithm is proved. It provides help for people who are inconvenient to go out during the protection period of covid-19. Show more
Keywords: Virtual reality modeling language virtual library, virtual volleyball hall, 3D, Internet, system
DOI: 10.3233/JIFS-189260
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8643-8653, 2020
Authors: Zhaoguo, Liu | Tingting, Liang | Wenzhan, Wang
Article Type: Research Article
Abstract: Under the influence of novel corona virus pneumonia epidemic, the protection of traditional villages is put forward higher request. The spread of the epidemic among villages will make the situation of epidemic prevention and control more difficult. As an important part of culture, traditional villages have high historical value. In this paper, the traditional village protection method, a new geographical data algorithm IData storage method. Compared with the traditional ArcGIS method, it improves the efficiency and accuracy of topographic map entry. IData’s data factory can use the symbolic technology of skeleton lines to represent all the figures in the national …standard mode, and any complex figure can only be represented by one element. Idate can quickly load data and render symbols in a drawing. With the powerful data processing engine of IData data factory, we can check out the errors that other software can’t find and process the data automatically. Records of the loss of traditional villages can be recorded quickly. The establishment and protection of traditional villages have had a beneficial impact. Show more
Keywords: Traditional village protection, big data, COVID-19, ArcGIS
DOI: 10.3233/JIFS-189261
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8655-8664, 2020
Authors: Tingting, Liang | Zhaoguo, Liu | Wenzhan, Wang
Article Type: Research Article
Abstract: The Covid-19 first occurs in Wuhan, China in December 2019. After that, the virus has spread all over the world and at the time of writing this paper the total number of confirmed cases are above 11 million with over 600,000 deaths. The pattern recognition of complex environment can be used to determine if a COVID-19 breath pattern can be established with accuracy. The traditional decorative pattern detection method has a high degree of recognition in simple scene. However, the efficiency of decorative pattern detection in complex scenes is low and the recognition accuracy is not high. Firstly, the evaluation …index of target detection method is designed. Through this paper, it is found that the success rate of some targets is naturally better than other targets, and easy to distinguish from the background. In order to improve the recognition success rate of the object in the complex environment and determine the position and attitude of the object, the pattern as the artificial identification in the environment is proposed. The interior art decoration pattern is selected as the experimental pattern and the pattern classification evaluation index is designed. The experimental results show that the method proposed in this paper can optimize the pattern subsets which are confused with each other and easy to distinguish from the background. It has a certain reference value for decorative pattern recognition in complex environment for COVID-19 epidemic. Show more
Keywords: Neural network, pattern classification, decorative pattern detection, complex environment, COVID-19
DOI: 10.3233/JIFS-189262
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8665-8673, 2020
Authors: Jihong, Yang | Lu, Yun
Article Type: Research Article
Abstract: Under the influence of novel corona virus pneumonia epidemic prevention and control, higher requirements for behavior recognition in complex environment are put forward. The accuracy of traditional methods for sports training is not high, so a method is needed to improve the local action recognition to assist sports training. In the process of behavior recognition, if only the track is regarded as an independent individual, the information of its neighbor will be ignored. Therefore, we use KNN algorithm to get the nearest neighbor trajectory. In order to calculate the rich neighborhood information around the track, this paper calculates the complex …relationship between the center track and the neighborhood track from four different angles, including absolute motion, relative motion, distance relationship and direction relationship. Then, from the four different perspectives of variance, discrete coefficient, skewness and kurtosis, this paper proposes a large interval nearest neighbor coding method. This method makes the four eigenvalues complement each other and improves the ability of describing complex and changeable behaviors. The experimental results show that the coding method proposed in this paper can be used for behavior recognition according to different transformation matrix. Show more
Keywords: Behavior recognition, track space-time feature, feature matching, fuzzy set
DOI: 10.3233/JIFS-189263
Citation: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8675-8684, 2020
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]