Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2024: 1.7
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Ali, Riaz | Abdullah, Saleem | Muhammad, Shakoor | Naeem, Muhammad | Chinram, Ronnason
Article Type: Research Article
Abstract: Due to the indeterminacy and uncertainty of the decision-makers (DM) in the complex decision making problems of daily life, evaluation and aggregation of the information usually becomes a complicated task. In literature many theories and fuzzy sets (FS) are presented for the evaluation of these decision tasks, but most of these theories and fuzzy sets have failed to explain the uncertainty and vagueness in the decision making issues. Therefore, we use complex intuitionistic fuzzy set (CIFS) instead of fuzzy set and intuitionistic fuzzy set (IFS). A new type of aggregation operation is also developed by the use of complex intuitionistic …fuzzy numbers (CIFNs), their accuracy and the score functions are also discussed in detail. Moreover, we utilized the Maclaurin symmetric mean (MSM) operator, which have the ability to capture the relationship among multi-input arguments, as a result, CIF Maclarurin symmetric mean (CIFMSM) operator and CIF dual Maclaurin symmetric mean (CIFDMSM) operator are presented and their characteristics are discussed in detail. On the basis of these operators, a MAGDM method is presented for the solution of group decision making problems. Finally, the validation of the propounded approach is proved by evaluating a numerical example, and by the comparison with the previously researched results. Show more
Keywords: Intuitionistic fuzzy set, complex intuitionistic fuzzy set, multi-attribute group decision making, emergency management program evaluation, Maclaurin symmetric mean operator
DOI: 10.3233/JIFS-202254
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 1, pp. 517-538, 2021
Authors: Deng, Xue | Huang, Cuirong
Article Type: Research Article
Abstract: In the previous uncertain portfolio literature on background risk and mental account, only a general background risk and a few kinds of mental accounts were considered. Based on the above limitations, on the one hand, the multiple background risks are defined by linear weighting of different background asset risks in this paper; on the other hand, the total nine kinds of mental accounts are comprehensively considered. Especially, the risk curve is regarded as the risk measurement of different mental accounts for the first time. Under the framework of uncertainty theory, a novel mean-entropy portfolio model with risk curve and total …mental accounts under multiple background risks is constructed. In addition, transaction fees, chance constraint, upper and lower limits and initial wealth constraints are also considered in our proposed model. In theory, the equivalent forms of the models with different uncertainty distributions (general, normal and zigzag) are presented by three theorems. Simultaneously, the corresponding concrete expressions of risk curves are obtained by another three theorems. In practice, two numerical examples verify the feasibility and effectiveness of our proposed model. Finally, we can obtain the following unique and meaningful findings: (1) investors will underestimate the potential risk if they ignore the existence of multiple background risks; (2) with the increase of the return threshold, the return of the sub-portfolio will inevitably increase, but investors also bear the risk that the risk curve is higher than the confidence curve at this time. Show more
Keywords: Uncertainty theory, mental account, background risk, entropy, risk curve
DOI: 10.3233/JIFS-202256
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 1, pp. 539-561, 2021
Authors: Fu, Yingwen | Lin, Nankai | Lin, Xiaotian | Jiang, Shengyi
Article Type: Research Article
Abstract: Named entity recognition (NER) is fundamental to natural language processing (NLP). Most state-of-the-art researches on NER are based on pre-trained language models (PLMs) or classic neural models. However, these researches are mainly oriented to high-resource languages such as English. While for Indonesian, related resources (both in dataset and technology) are not yet well-developed. Besides, affix is an important word composition for Indonesian language, indicating the essentiality of character and token features for token-wise Indonesian NLP tasks. However, features extracted by currently top-performance models are insufficient. Aiming at Indonesian NER task, in this paper, we build an Indonesian NER dataset (IDNER) …comprising over 50 thousand sentences (over 670 thousand tokens) to alleviate the shortage of labeled resources in Indonesian. Furthermore, we construct a hierarchical structured-attention-based model (HSA) for Indonesian NER to extract sequence features from different perspectives. Specifically, we use an enhanced convolutional structure as well as an enhanced attention structure to extract deeper features from characters and tokens. Experimental results show that HSA establishes competitive performance on IDNER and three benchmark datasets. Show more
Keywords: Indonesian, named entity recognition, named entity corpus, structured-attention, residual gated convolution neural network
DOI: 10.3233/JIFS-202286
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 1, pp. 563-574, 2021
Authors: Zhu, Yan | Fan, Chuanhao | Xiao, Jing | Liu, Shenghua
Article Type: Research Article
Abstract: Quality function deployment (QFD) is a quality management tool that aims to improve customer satisfaction by transforming customer requirements into technical characteristics. It is a crucial procedure to obtain the prioritization of technical characteristics for the products or services in QFD. Traditional QFDs are often implemented by a small number of QFD members. However, with the increasing complexity of product and service design, QFD requires the participation of more QFD members from dispersed departments or institutions. Additionally, the evaluation information given by QFD members may widely differ due to their different knowledge and background. Furthermore, the psychological behaviours of QFD …members also greatly influence the final prioritization of technical characteristics. Hence, this paper proposes a novel QFD framework to prioritize technical characteristics using a consensus-reaching process and prospect theory when large numbers of QFD members are involved. In the large-scale QFD framework, prospect theory is generally utilized to depict the psychological behaviours of QFD members. Then, QFD members are divided into several clusters. Eventually, a consensus-reaching process is established to assist QFD members in reaching a consensus. To verify the practicability of the presented framework, this paper applies it to the evaluation of contingency plan to determine the critical measures. Show more
Keywords: Quality function deployment, consensus-reaching process, prospect theory, large-scale group decision making, contingency plan
DOI: 10.3233/JIFS-202326
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 1, pp. 575-594, 2021
Authors: Jiang, Le | Liu, Hongbin
Article Type: Research Article
Abstract: The use of probabilistic linguistic term sets (PLTSs) means the process of computing with words. The existing methods computing with PLTSs mainly use symbolic model. To provide a semantic model for computing with PLTSs, we propose to represent a PLTS by using an interval type-2 fuzzy set (IT2FS). The key step is to compute the footprint of uncertainty of the IT2FS. To this aim, the upper membership function is computed by aggregating the membership functions of the linguistic terms contained in the PLTS, and the lower membership function is obtained by moving the upper membership function downward with the step …being total entropy of the PLTS. The comparison rules, some operations, and an aggregation operator for PLTSs are introduced. Based on the proposed method of computing with PLTSs, a multi-criteria group decision making model is introduced. The proposed decision making model is then applied in green supplier selection problem to show its feasibility. Show more
Keywords: Green supplier selection, interval type-2 fuzzy set, lower membership function, probabilistic linguistic term set, upper membership function
DOI: 10.3233/JIFS-202386
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 1, pp. 595-612, 2021
Authors: Dong, Yan Yan | Wang, Jun Tao
Article Type: Research Article
Abstract: In this paper, we first point out some mistakes in [12 ]. Especially the Theorem 3.9 [12 ] showed that: Let A be residuated lattice and ∅ ≠ X ⊆ A , then the least ideal containing X can be expressed as: 〈X 〉 = {a ∈ A |a ≤ (·· · ((x 1 ⊕ x 2 ) ⊕ x 3 ) ⊕ ·· ·) ⊕ x n , x i ∈ X , i = 1, 2 ·· · , n }. But we present an example to illustrate the ideal generation formula may not hold on residuated lattices. Further we give the correct ideal generation formula on residuated lattices. Moreover, we extend the concepts of annihilators …and α -ideals to MTL-algebras and focus on studying the relations between them. Furthermore, we show that the set I α (M ) of all α -ideals on a linear MTL-algebra M only contains two trivial α -ideals {0} and M . However, the authors [24 ] studied the structure of I α (M ) in a linear BL-algebra M , which means some results with respect to I α (M ) given in [24 ] are trivial. Unlike that, we investigate the lattice structure of I α (M ) on general MTL -algebras. Show more
Keywords: Residuated lattice, MTL-algebra, Ideal generation formula, Annihilator, α-ideal
DOI: 10.3233/JIFS-202417
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 1, pp. 613-623, 2021
Authors: Silmi Juman, Zeinul Abdeen M. | Masoud, Mahmoud | Elhenawy, Mohammed | Bhuiyan, Hanif | Komol, Md Mostafizur Rahman | Battaïa, Olga
Article Type: Research Article
Abstract: The uncapacitated transportation problem (UTP) deals with minimizing the transportation costs related to the delivery of a homogeneous product from multi-suppliers to multi-consumers. The application of the UTP can be extended to other areas of operations research, including inventory control, personnel assignment, signature matching, product distribution with uncertainty, multi-period production and inventory planning, employment scheduling, and cash management. Such a UTP with interval-defined demands and suppliers capacities (UTPIDS) is investigated in this paper. In UTPIDS, the demands and suppliers capacities may not be known exactly but vary within an interval due to variation in the economic conditions of the global …economy. Following the variation, the minimal total cost of the transportation can also be varied within an interval and thus, the cost bounds can be obtained. Here, although the lower bound solution can be attained methodologically, the correct estimation of the worst case realization (the exact upper bound) on the minimal total transportation cost of the UTPIDS is an NP-hard problem. So, the decision-makers seek for minimizing the transportation costs and they are interested in the estimation of the worst case realization on these minimal costs for better decision making especially, for proper investment and return. In literature very few approaches are available to find this estimation of the worst case realization with some shortcomings. First, we demonstrate that the available heuristic methods fail to obtain the correct estimation of the worst case realization always. In this situation, development of a better heuristic method to find the better near optimal estimation of the worst case realization on the minimal total costs of the UTPIDS is desirable. Then this paper provides a new polynomial time algorithm that runs in O (N2) time (N, higher of the numbers of source and destination nodes) for better estimation. A comparative assessment on solutions of available benchmark instances, some randomly generated numerical example problems and a real-world application shows promising performance of the current technique. So, our new finding would definitely be benefited to practitioners, academics and decision makers who deal with such type of decision making instances. Show more
Keywords: Heuristics, upper bound, least aggregated expense, NP-hard problem
DOI: 10.3233/JIFS-202436
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 1, pp. 625-637, 2021
Authors: Pak, Sunae | Choe, Huichol | Sin, Kinam | Kwon, Sunghyok
Article Type: Research Article
Abstract: In this paper, we investigate the necessary and sufficient conditions for existence of solutions for initial value problem of fuzzy Bagley-Torvik equation and the solution representation by using the multivariate Mittag-Leffler function. First we convert fuzzy initial value problem into the cut problem (system of fractional differential equations with inequality constraints) and obtain existence results for the solution of the cut problem under (1,1)- differentiability. Next we study the conditions for the solutions of the cut problem to constitute the solution of a fuzzy initial value problem and suggest a necessary and sufficient condition for the (1,1)-solution. Also, some examples …are given to verify the effectiveness of our proposed method. The necessary and sufficient condition, solution representation for (1,2)-solution of initial value problem of fuzzy fractional Bagley-Torvik equation are shown in Appendix. Show more
Keywords: Fuzzy Fuzzy Bagley-Torvik equation, generalized Hukuhara differentiability, multivariate Mittag-Leffler function
DOI: 10.3233/JIFS-202453
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 1, pp. 639-654, 2021
Authors: AlAlaween, Wafa’ H. | AlAlawin, Abdallah H. | Al-Durgham, Lamees | Albashabsheh, Nibal T.
Article Type: Research Article
Abstract: A new integrated modelling architecture based on the concept of the fuzzy logic is presented to represent the turning process. Such an architecture consists of two stages. In the first stage, fuzzy logic systems (FLSs) having various topologies are employed to extract rule bases using perhaps limited amount of sparse data. In the second stage, the fuzzy rules extracted are assessed and integrated using the singular value decomposition-QR factorization (SVD-QR) paradigm in order to minimize the computational efforts. Such a step leads to reducing the number of fuzzy rules and results in a reduced FLS model. Such a reduced model …is then employed to represent the turning process and predict both the cutting force and the surface roughness. In addition, it provides a comprehensive understanding of the turning process presented linguistically in the form of If/Then rules. The proposed structure has been validated using a set of laboratory experiments. It has been noticed that it can predict both the cutting force and the surface roughness successfully. In addition, such an integrated architecture outperforms the artificial neural network, the well-known FLS, the radial basis functions and the multilinear regression model, where the overall improvement is of approximately 19%, 13%, 14% and 270%, respectively. Show more
Keywords: Fuzzy logic system, singular value decomposition-QR factorization (SVD-QR) algorithm, turning process
DOI: 10.3233/JIFS-202457
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 1, pp. 655-667, 2021
Authors: Hikal, Noha A. | Shams, Mahmoud Y. | Salem, Hanaa | Eid, Marwa M.
Article Type: Research Article
Abstract: Mobile Ad hock Networks (MANETs) are currently used for developing the privacy and accuracy of modern networks. Furthermore, MANET applications are fit to be data-oriented systems, that introduce a secure and more robust data transmission protocol making it a topmost priority in the design. The lack of infrastructure in the existence of dynamic topology as well as limited resources of MANET is a major challenge facing those interested in the field. Further, the nonexistence of a formerly authorized trust relationship within the connected nodes produces instability of the detection process in MANETs. Basically, by adding adapted LEACH routing protocol to …MANET, enhancement of the preserved nodes vitality will be achieved, moreover, the load balancing with data loss reduction provides MANET ability to tracks along with shortest and limited paths. This paper proposes a newly developed detection scheme for both active and passive black-hole attacks in MANETs. Moreover, the scheme deals with assessing a group of selected features for each node-based AdaBoost-SVM algorithm. These features are collected from cluster members nodes based on Ad hoc On-demand Multipath Distance Vector (OMDV) with LEACH routing protocol clustering approaches. Although SVM is considered a more stable classifier, there are great influences of the AdaBoost weight adaption algorithm to enhance the classification process in terms of strengthening the weights of extracted features. This hybrid algorithm is essential for active black-hole attacks as well as for identifying passive black-hole attacks in MANET. The proposed scheme is tested against the effect of mobility variation to determine the accuracy of the detection process including the routing overhead protocol. The experimental results investigated that the accuracy of detecting both active and passive black-holes attacks in MANET reached 97% with a promising time complexity for different mobility conditions. Moreover, the proposed scheme provides an accurate decision about malicious vs benign node dropping behavior using an adjustable threshold value. Show more
Keywords: Ada-boost, support vector machine, AOMDV, black-hole attack, and MANET
DOI: 10.3233/JIFS-202471
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 1, pp. 669-682, 2021
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]