Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2024: 1.7
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Xie, Yi | Wang, Yulin | Ma, Maode
Article Type: Research Article
Abstract: Today, the manner in which we communicate has greatly advanced. The technology is not just about machines, but people with technology together. Machine-to-machine (M2M) communication is unavoidable in the Internet of things. However, at the same time, there are more attacks against the M2M system. Therefore, a reliable and secure authentication mechanism is required. Blockchain technology is decentralized and highly secure while being tamper-proof. This protects M2M service providers by eliminating the single point of failures. This paper proposes a blockchain-based authentication scheme that uses a practical Byzantine fault tolerance (pBFT) consensus mechanism for M2M security in cyber physical systems. …By implementing a blockchain to an M2M system, it provides an ID for devices on the blockchain. Simulation results have shown that the data on the chain cannot be altered. A pBFT consensus algorithm also ensures that the blockchain network is able to come to a consensus with faults. Show more
Keywords: Machine-to-machine communication, blockchain, pBFT consensus algorithm
DOI: 10.3233/JIFS-189702
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4425-4430, 2021
Authors: Zhang, Xuejun | Lao, Huan | Wu, Dongbo | Liang, Chan | Liang, Binmei | Ma, Liangdi
Article Type: Research Article
Abstract: Mass of an object is an important characteristic for quality assessment. However, in some cases, it is hard to measure the mass of objects with instruments directly. In this paper, we proposed a novel method based on Fuzzy c-means (FCM) to measure the mass of an object by analyzing the deformation degree in a grid pattern. In the spatial field, thin plate spline (TPS) algorithm was adopted to calculate the minimum deformation bending energy in order to give a quantitative analysis of the weight; In frequency domain, the Fast Fourier Transform (FFT) algorithm was used to calculate the spectrum within …a deformation frequency area before and after the change of grids, from which the relationship between weight and spectrum was investigated using FCM algorithm. Two different equations evaluated by the above two methods were proposed in order to calculate the mass of an object. Both of them showed a high level of explanatory power of R2 (R2 = 0.9833 and R2 = 0.9698, respectively). The equations were then used to determine the estimated mass. Estimated and measured values were plotted against each other. A high correlation (R2 = 0.9833 and R2 = 0.9698, respectively) was found between actual and calculated mass. Finally, Bland-Altman plot was introduced to access the agreement of the calculated mass and the actual mass. The average bias was –54.408 g and –0.007 g for spatial domain method and frequency domain method, respectively. Theoretical analysis and experiments were performed to verify the effectiveness of our approaches. Show more
Keywords: Thin plate spline (TPS), fast fourier transform, mass, bending energy, image processing
DOI: 10.3233/JIFS-189703
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4431-4438, 2021
Authors: Shu, Yufeng | Zhang, Liangchao | Zuo, Dali | Zhang, Junhua | Li, Junlong | Gan, Haoquan
Article Type: Research Article
Abstract: This article has been retracted. A retraction notice can be found at https://doi.org/10.3233/JIFS-219268 .
DOI: 10.3233/JIFS-189704
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4439-4449, 2021
Authors: Wen, Yuebing | Tan, Jianping | Sang, Yanwei
Article Type: Research Article
Abstract: In order to solve the problems, such as the asymmetry, complex control methods, inconsistent dynamic characteristics for positive/negative directions and poor stability for asymmetric control system, in this paper, a system symmetric control method based on state feedback was brought out and the state space mathematical model was derived for valve controlled hydraulic cylinder system. With the symmetric control method of the state feedback, the valve controlled asymmetric hydraulic system can be converted into state space symmetric system, then the unified control method can be used for positive and negative directions after conversion, finally the feedback link of the system …was educed. Through simulation, the accuracy of the model and the effectiveness of the control method were verified. Through experiments, the input and output characteristics and load response characteristics of the system before and after conversion were compared. It was concluded that the system had symmetric characteristics for inputs and outputs, and better load response characteristics after conversion. This study can be a base for the application of symmetric control theory to large asymmetric hydraulic systems and was of great help to realize symmetric control of large asymmetric hydraulic systems. Show more
Keywords: Valve controlled asymmetric cylinder system, state feedback, fuzzy symmetrical compensation, fuzzy symmetrical
DOI: 10.3233/JIFS-189705
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4451-4460, 2021
Authors: Jiang, Xiaoming | Yang, Huamin | Yang, Ya | Chen, Zhanfang
Article Type: Research Article
Abstract: In server clusters, the static scheduling algorithm has superior performance when the user visits are relatively stable. In the face of sudden increase in user traffic, the dynamic scheduling algorithm has a better load balancing effect than the static scheduling algorithm. However, in the face of complex network environments, the static scheduling algorithm cannot adjust the load according to the performance of the server in real time. The dynamic scheduling algorithm using a single weight to evaluate server performance is unreliable, and load scheduling with reference to the number of connections has uncertainty. In view of this problem, this paper …proposes a cluster load balancing algorithm based on dynamic consistent hash based on the study of load balancing based on LVS clusters. By analyzing the performance and load parameters, we divide the request process into in-cycle and out-of-cycle. By setting up the LVS cluster system, the performance weights, load parameters, number of virtual nodes and cycles of the algorithm in this paper are determined experimentally. Finally, the response time and throughput of the algorithm in this paper are compared with the WRR algorithm and WLC algorithm. The results show that the time and throughput of this algorithm are better than WRR algorithm and WLC algorithm. Show more
Keywords: Dynamic, consistent hash, load balancing, cluster
DOI: 10.3233/JIFS-189706
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4461-4468, 2021
Authors: Zhou, Lanfeng | Li, Ling
Article Type: Research Article
Abstract: Traditional Hough circle detection algorithm usually determines the center and radius of a circle by mapping points in cartesian coordinate system to polar coordinate system. Since it accumulates in the three-dimensional space, it requires more calculation consumption. In this paper, we solve the problem of high time complexity of Hough algorithm in judging circle radius and circle center from two aspects of circle angle and circle radius according to the geometric features of quasi-circles. A large number of experiments show that, compared with the traditional algorithm, this algorithm can not only identify quasi-circles, but also improve the detection success rate …of circles by about 10%, with efficient running speed, and obtain good experimental results in the detection of craters. Show more
Keywords: Hough transform, crater recognition, pattern recognition, edge detection, geometric features
DOI: 10.3233/JIFS-189707
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4469-4477, 2021
Article Type: Research Article
Abstract: Aiming at the problems of low fire detection accuracy and high false alarm rate of the current intelligent camera fire accident alarm system, a fire accident alarm system based on fuzzy recognition algorithm is designed. By analyzing the structural principle of the fire detection and alarm system, selecting the CO gas, temperature and smoke sensor selection, designing the corresponding fire signal detection circuit, and designing the single-chip system circuit, including the single-chip clock circuit, reset circuit, power supply circuit and A/D conversion circuit design, on the basis of in-depth study of the Bluetooth communication protocol structure, the hardware design of …the serial interface circuit of the single-chip microcomputer, PC and Bluetooth module has been completed. The fuzzy recognition algorithm is used to set the input and output, establish the control rule table and reasoning relationship, generate the input and output rule table, preprocess the sensor signal, and finally output the fire alarm model through the fuzzy inference system, so as to realize the fire accident alarm of the intelligent camera. The experimental results show that the fire detection accuracy of the proposed method is high, and can effectively reduce the false alarm rate and false alarm rate of the system. Show more
Keywords: Fuzzy recognition algorithm, fuzzy control, neural network, fire alarm system
DOI: 10.3233/JIFS-189708
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4479-4491, 2021
Authors: Xu, Tongtong | Xiang, Zheng
Article Type: Research Article
Abstract: In this work, modified constant modulus algorithm based on bat algorithm is proposed for wireless sensor communications systems. The bat algorithm is a swarm intelligence optimization algorithm, which mainly used to solve optimization problems. The proposed algorithm focused on modified constant modulus algorithm, which is also applicable to the constant modulus algorithm. The error function of blind equalization algorithm is used as the evaluation function of the bat algorithm, and then the initial value of the weight vector is calculated adaptively by the bat algorithm. Theoretical analysis is provided to illustrate that the proposed algorithm has a faster convergence speed …than the original one and is suitable for almost all blind channel equalization algorithms. The simulation results support the newly proposed improved algorithm. The proposed algorithm could be applied to some more complex wireless channel environments to improve the reception performance of sensor communication systems. Show more
Keywords: Wireless sensor communications, blind equalization, bat algorithm, weight vector, modified constant modulus algorithm
DOI: 10.3233/JIFS-189709
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4493-4500, 2021
Authors: Xiong, Jiangyong | Li, Chongchong
Article Type: Research Article
Abstract: In this study, the combination of fuel injection parameters and SCR was used to test the material emitted from DME engine combustion under different cylinder conditions by Avl-fire. In order to study the effect of injection pressure and injection time and SCR on engine emissions, the effect of injection DME on engine combustion emissions under the condition that the injection pressure changes continuously from 20 mpa-73 mpa and the injection time from BTDC to ATDC is 15° to ATDC. The study found that when the injection pressure around 38 MPa, NOX , CO and HC emissions of engine exhaust can satisfy the VI …emissions requirements; When the injection time within 3.5° BTDC to 3.5° between ATDC, NOX , CO and HC emissions of engine exhaust can satisfy the VI emissions requirements; When affected by complex working conditions and environment, the production of NOX will increase. At this point, with the combination of SCR, the maximum conversion rate of NOX in the exhaust can reach nearly 79%. Through Fuzzy Logic Toolbox of MATLAB/Simulink (Fuzzy Logic Toolbox) engine emissions of Fuzzy inference system (FIS), then it is introduced into the Fuzzy Logic Controller (Fuzzy Logic Controller) in emission control, the simulation results show that under the condition of Fuzzy control, engine NOX emissions of nitrogen oxides, carbon monoxide, CO and HC hydrocarbons under the VI standard 8.9%, 4.0% and 5.0%, so as to improve the diesel car of environmental protection. Show more
Keywords: Injection pressure, injection time, exhaust gas, SCR, fuzzy control
DOI: 10.3233/JIFS-189710
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4501-4510, 2021
Authors: Chen, You Ying | Xu, Bing | Long, Jun
Article Type: Research Article
Abstract: Network security issues have become increasingly prominent, and information security risk assessment is an important part of network security protection. Security risk assessment based on methods such as attack trees, attack graphs, neural networks, and fuzzy logic has problems such as difficulty in data collection during the assessment process, excessive reliance on expert experience, failure to consider the actual network environment, or ineffective joint application. The qualitative and quantitative information security fuzzy comprehensive evaluation method uses the theory of fuzzy mathematics to better solve the above problems, so that the evaluation method is scientific, comprehensive and operable. To improve the …accuracy of information security risk assessment in wireless sensor networks, we propose a fuzzy comprehensive evaluation method based on Bayesian attack graphs. This considers the impact of environmental factors of the assessed system on security risk and the spread of the effects on the Bayesian network. Therefore, this model can reflect possible situations due to network attacks in the wireless sensor network system. The results show that this quantitative evaluation method is applicable to assessing risk in wireless sensor network systems, and the results are more objective and accurate. Show more
Keywords: Information security, wireless sensor networks, fuzzy comprehensive evaluation, dynamic security risk assessment, bayesian network, attack graph
DOI: 10.3233/JIFS-189711
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4511-4517, 2021
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]