Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2024: 1.7
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Xie, Yi | Wang, Yulin | Ma, Maode
Article Type: Research Article
Abstract: Today, the manner in which we communicate has greatly advanced. The technology is not just about machines, but people with technology together. Machine-to-machine (M2M) communication is unavoidable in the Internet of things. However, at the same time, there are more attacks against the M2M system. Therefore, a reliable and secure authentication mechanism is required. Blockchain technology is decentralized and highly secure while being tamper-proof. This protects M2M service providers by eliminating the single point of failures. This paper proposes a blockchain-based authentication scheme that uses a practical Byzantine fault tolerance (pBFT) consensus mechanism for M2M security in cyber physical systems. …By implementing a blockchain to an M2M system, it provides an ID for devices on the blockchain. Simulation results have shown that the data on the chain cannot be altered. A pBFT consensus algorithm also ensures that the blockchain network is able to come to a consensus with faults. Show more
Keywords: Machine-to-machine communication, blockchain, pBFT consensus algorithm
DOI: 10.3233/JIFS-189702
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4425-4430, 2021
Authors: Zhang, Xuejun | Lao, Huan | Wu, Dongbo | Liang, Chan | Liang, Binmei | Ma, Liangdi
Article Type: Research Article
Abstract: Mass of an object is an important characteristic for quality assessment. However, in some cases, it is hard to measure the mass of objects with instruments directly. In this paper, we proposed a novel method based on Fuzzy c-means (FCM) to measure the mass of an object by analyzing the deformation degree in a grid pattern. In the spatial field, thin plate spline (TPS) algorithm was adopted to calculate the minimum deformation bending energy in order to give a quantitative analysis of the weight; In frequency domain, the Fast Fourier Transform (FFT) algorithm was used to calculate the spectrum within …a deformation frequency area before and after the change of grids, from which the relationship between weight and spectrum was investigated using FCM algorithm. Two different equations evaluated by the above two methods were proposed in order to calculate the mass of an object. Both of them showed a high level of explanatory power of R2 (R2 = 0.9833 and R2 = 0.9698, respectively). The equations were then used to determine the estimated mass. Estimated and measured values were plotted against each other. A high correlation (R2 = 0.9833 and R2 = 0.9698, respectively) was found between actual and calculated mass. Finally, Bland-Altman plot was introduced to access the agreement of the calculated mass and the actual mass. The average bias was –54.408 g and –0.007 g for spatial domain method and frequency domain method, respectively. Theoretical analysis and experiments were performed to verify the effectiveness of our approaches. Show more
Keywords: Thin plate spline (TPS), fast fourier transform, mass, bending energy, image processing
DOI: 10.3233/JIFS-189703
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4431-4438, 2021
Authors: Shu, Yufeng | Zhang, Liangchao | Zuo, Dali | Zhang, Junhua | Li, Junlong | Gan, Haoquan
Article Type: Research Article
Abstract: This article has been retracted. A retraction notice can be found at https://doi.org/10.3233/JIFS-219268 .
DOI: 10.3233/JIFS-189704
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4439-4449, 2021
Authors: Wen, Yuebing | Tan, Jianping | Sang, Yanwei
Article Type: Research Article
Abstract: In order to solve the problems, such as the asymmetry, complex control methods, inconsistent dynamic characteristics for positive/negative directions and poor stability for asymmetric control system, in this paper, a system symmetric control method based on state feedback was brought out and the state space mathematical model was derived for valve controlled hydraulic cylinder system. With the symmetric control method of the state feedback, the valve controlled asymmetric hydraulic system can be converted into state space symmetric system, then the unified control method can be used for positive and negative directions after conversion, finally the feedback link of the system …was educed. Through simulation, the accuracy of the model and the effectiveness of the control method were verified. Through experiments, the input and output characteristics and load response characteristics of the system before and after conversion were compared. It was concluded that the system had symmetric characteristics for inputs and outputs, and better load response characteristics after conversion. This study can be a base for the application of symmetric control theory to large asymmetric hydraulic systems and was of great help to realize symmetric control of large asymmetric hydraulic systems. Show more
Keywords: Valve controlled asymmetric cylinder system, state feedback, fuzzy symmetrical compensation, fuzzy symmetrical
DOI: 10.3233/JIFS-189705
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4451-4460, 2021
Authors: Jiang, Xiaoming | Yang, Huamin | Yang, Ya | Chen, Zhanfang
Article Type: Research Article
Abstract: In server clusters, the static scheduling algorithm has superior performance when the user visits are relatively stable. In the face of sudden increase in user traffic, the dynamic scheduling algorithm has a better load balancing effect than the static scheduling algorithm. However, in the face of complex network environments, the static scheduling algorithm cannot adjust the load according to the performance of the server in real time. The dynamic scheduling algorithm using a single weight to evaluate server performance is unreliable, and load scheduling with reference to the number of connections has uncertainty. In view of this problem, this paper …proposes a cluster load balancing algorithm based on dynamic consistent hash based on the study of load balancing based on LVS clusters. By analyzing the performance and load parameters, we divide the request process into in-cycle and out-of-cycle. By setting up the LVS cluster system, the performance weights, load parameters, number of virtual nodes and cycles of the algorithm in this paper are determined experimentally. Finally, the response time and throughput of the algorithm in this paper are compared with the WRR algorithm and WLC algorithm. The results show that the time and throughput of this algorithm are better than WRR algorithm and WLC algorithm. Show more
Keywords: Dynamic, consistent hash, load balancing, cluster
DOI: 10.3233/JIFS-189706
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4461-4468, 2021
Authors: Zhou, Lanfeng | Li, Ling
Article Type: Research Article
Abstract: Traditional Hough circle detection algorithm usually determines the center and radius of a circle by mapping points in cartesian coordinate system to polar coordinate system. Since it accumulates in the three-dimensional space, it requires more calculation consumption. In this paper, we solve the problem of high time complexity of Hough algorithm in judging circle radius and circle center from two aspects of circle angle and circle radius according to the geometric features of quasi-circles. A large number of experiments show that, compared with the traditional algorithm, this algorithm can not only identify quasi-circles, but also improve the detection success rate …of circles by about 10%, with efficient running speed, and obtain good experimental results in the detection of craters. Show more
Keywords: Hough transform, crater recognition, pattern recognition, edge detection, geometric features
DOI: 10.3233/JIFS-189707
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4469-4477, 2021
Article Type: Research Article
Abstract: Aiming at the problems of low fire detection accuracy and high false alarm rate of the current intelligent camera fire accident alarm system, a fire accident alarm system based on fuzzy recognition algorithm is designed. By analyzing the structural principle of the fire detection and alarm system, selecting the CO gas, temperature and smoke sensor selection, designing the corresponding fire signal detection circuit, and designing the single-chip system circuit, including the single-chip clock circuit, reset circuit, power supply circuit and A/D conversion circuit design, on the basis of in-depth study of the Bluetooth communication protocol structure, the hardware design of …the serial interface circuit of the single-chip microcomputer, PC and Bluetooth module has been completed. The fuzzy recognition algorithm is used to set the input and output, establish the control rule table and reasoning relationship, generate the input and output rule table, preprocess the sensor signal, and finally output the fire alarm model through the fuzzy inference system, so as to realize the fire accident alarm of the intelligent camera. The experimental results show that the fire detection accuracy of the proposed method is high, and can effectively reduce the false alarm rate and false alarm rate of the system. Show more
Keywords: Fuzzy recognition algorithm, fuzzy control, neural network, fire alarm system
DOI: 10.3233/JIFS-189708
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4479-4491, 2021
Authors: Xu, Tongtong | Xiang, Zheng
Article Type: Research Article
Abstract: In this work, modified constant modulus algorithm based on bat algorithm is proposed for wireless sensor communications systems. The bat algorithm is a swarm intelligence optimization algorithm, which mainly used to solve optimization problems. The proposed algorithm focused on modified constant modulus algorithm, which is also applicable to the constant modulus algorithm. The error function of blind equalization algorithm is used as the evaluation function of the bat algorithm, and then the initial value of the weight vector is calculated adaptively by the bat algorithm. Theoretical analysis is provided to illustrate that the proposed algorithm has a faster convergence speed …than the original one and is suitable for almost all blind channel equalization algorithms. The simulation results support the newly proposed improved algorithm. The proposed algorithm could be applied to some more complex wireless channel environments to improve the reception performance of sensor communication systems. Show more
Keywords: Wireless sensor communications, blind equalization, bat algorithm, weight vector, modified constant modulus algorithm
DOI: 10.3233/JIFS-189709
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4493-4500, 2021
Authors: Xiong, Jiangyong | Li, Chongchong
Article Type: Research Article
Abstract: In this study, the combination of fuel injection parameters and SCR was used to test the material emitted from DME engine combustion under different cylinder conditions by Avl-fire. In order to study the effect of injection pressure and injection time and SCR on engine emissions, the effect of injection DME on engine combustion emissions under the condition that the injection pressure changes continuously from 20 mpa-73 mpa and the injection time from BTDC to ATDC is 15° to ATDC. The study found that when the injection pressure around 38 MPa, NOX , CO and HC emissions of engine exhaust can satisfy the VI …emissions requirements; When the injection time within 3.5° BTDC to 3.5° between ATDC, NOX , CO and HC emissions of engine exhaust can satisfy the VI emissions requirements; When affected by complex working conditions and environment, the production of NOX will increase. At this point, with the combination of SCR, the maximum conversion rate of NOX in the exhaust can reach nearly 79%. Through Fuzzy Logic Toolbox of MATLAB/Simulink (Fuzzy Logic Toolbox) engine emissions of Fuzzy inference system (FIS), then it is introduced into the Fuzzy Logic Controller (Fuzzy Logic Controller) in emission control, the simulation results show that under the condition of Fuzzy control, engine NOX emissions of nitrogen oxides, carbon monoxide, CO and HC hydrocarbons under the VI standard 8.9%, 4.0% and 5.0%, so as to improve the diesel car of environmental protection. Show more
Keywords: Injection pressure, injection time, exhaust gas, SCR, fuzzy control
DOI: 10.3233/JIFS-189710
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4501-4510, 2021
Authors: Chen, You Ying | Xu, Bing | Long, Jun
Article Type: Research Article
Abstract: Network security issues have become increasingly prominent, and information security risk assessment is an important part of network security protection. Security risk assessment based on methods such as attack trees, attack graphs, neural networks, and fuzzy logic has problems such as difficulty in data collection during the assessment process, excessive reliance on expert experience, failure to consider the actual network environment, or ineffective joint application. The qualitative and quantitative information security fuzzy comprehensive evaluation method uses the theory of fuzzy mathematics to better solve the above problems, so that the evaluation method is scientific, comprehensive and operable. To improve the …accuracy of information security risk assessment in wireless sensor networks, we propose a fuzzy comprehensive evaluation method based on Bayesian attack graphs. This considers the impact of environmental factors of the assessed system on security risk and the spread of the effects on the Bayesian network. Therefore, this model can reflect possible situations due to network attacks in the wireless sensor network system. The results show that this quantitative evaluation method is applicable to assessing risk in wireless sensor network systems, and the results are more objective and accurate. Show more
Keywords: Information security, wireless sensor networks, fuzzy comprehensive evaluation, dynamic security risk assessment, bayesian network, attack graph
DOI: 10.3233/JIFS-189711
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4511-4517, 2021
Authors: Zhang, Jiansai | Guo, Lu | Lyu, Tingjie
Article Type: Research Article
Abstract: Nowadays, the Expansion and evolution of the global financial system oblige lenders to develop stricter requirements for assessing creditworthiness of borrowers. This paper analyses the problems prevalent in the existing credit models of coastal cities in China Pearl River Delta, including data centralization, difficulties in detecting forged data and delay in data transmission; we constructed a CDDC model based fuzzy sets that employs all the issues. The related results showed that the technology fuzzy sets decentralizes and expands data sources, acquires and processes data automatically and self-perfects its ability to rank borrowers into cohorts of creditworthiness. Moreover, the CDDC model …out-performs the traditional model in assessing creditworthiness and reducing delinquencies and defaults. That means our fuzzy sets model employs decentralized data sources, destroys historical data regularly and facilitates training and improvement. It ranks creditworthy borrowers in a better fashion than the statistics-based traditional credit model. Show more
Keywords: Credit identification, block chain, CDDC model, fuzzy sets
DOI: 10.3233/JIFS-189712
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4519-4525, 2021
Authors: Li, Junpeng | Zhu, Kaiyan | Wang, Fei | Jiang, Fengjiao
Article Type: Research Article
Abstract: Overfishing of marine fishery is a serious threat to fishery ecological security. Fishing supervision is one of the main ways to maintain marine fishery ecology. In order to improve the intelligence of fishing supervision system, a real time fish detection method based on YOLO-V3-Tiny-MobileNet was proposed. Aiming at the problems of shallow network layers and insufficient feature extraction ability in YOLO-V3-Tiny network, the proposed network takes YOLO-V3-Tiny as baseline and combines it with MobileNet. The proposed network is pre-trained by VOC2012 dataset, and then retrained and tested on Kaggle_ NCFM (The Nature Conservancy Fisheries Monitoring) dataset. The experimental results show …that the proposed method has superior performance in parameters number, mean average precision and detection performance, compared with other methods. Compared with the monitoring method of fishing vessel detection on shore supervision, the real time monitoring method can give timely warning to the fishing vessel operators, which is more conducive to fishery ecological protection. Show more
Keywords: Marine fishery, fishing supervision, real time fish detection, YOLO-V3-Tiny, MobileNet
DOI: 10.3233/JIFS-189713
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4527-4532, 2021
Authors: Ou, Hongshi | Sun, Jifeng
Article Type: Research Article
Abstract: In the deep learning-based video action recognitio, the function of the neural network is to acquire spatial information, motion information, and the associated information of the above two kinds of information over an uneven time span. This paper puts forward a network extracting video sequence semantic information based on deep integration of local Spatial-Temporal information. The network uses 2D Convolutional Neural Network (2DCNN) and Multi Spatial-Temporal scale 3D Convolutional Neural Network (MST_3DCNN) respectively to extract spatial information and motion information. Spatial information and motion information of the same time quantum receive 3D convolutional integration to generate the temporary Spatial-Temporal information …of a certain moment. Then, the Spatial-Temporal information of multiple single moments enters Temporal Pyramid Net (TPN) to generate the local Spatial-Temporal information of multiple time scales. Finally, bidirectional recurrent neutral network is used to act on the Spatial-Temporal information of all parts so as to acquire the context information spanning the length of the entire video, which endows the network with video context information extraction capability. Through the experiments on the three video action recognitio common experimental data sets UCF101, UCF11, UCFSports, the Spatial-Temporal information deep fusion network proposed in this paper has a high correct recognition rate in the task of video action recognitio. Show more
Keywords: Video action recognition, spatial-temporal information deep fusion, deep learning
DOI: 10.3233/JIFS-189714
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4533-4545, 2021
Authors: Bai, Baodan | Zhao, Yufang | Chen, Xinrong | Chen, Yingmin | Luo, Zhangyuan
Article Type: Research Article
Abstract: In this paper, a smart low-power wearable ECG monitoring and analyzing system which has an advanced architecture and low power consumption has been developed. There is a single channel ECG monitor that removes all loose wires from the system and minimizes the footprint on the user, ECG data can be continuously monitored for up to 14 days without affecting daily life. In addition, Bluetooth low energy (BLE), smartphone APP, analysis software and management platform have been added to the system for remote monitoring and whole process of heart health management. Clinical test to compare our wearable monitor with the Holter …recorder are conducted on 108 groups under different ambulatory conditions. The results confirmed that it is equivalent to Holter in the clinical diagnosis of arrhythmia. This system can free patients from the short-range monitoring with lead wire entanglement to realize the long-term detection in daily life, early detection and early intervention; more convenient connections between patients and doctors, efficient use of medical resources, remote monitoring to reduce the burden of the medical and health system. Show more
Keywords: ECG monitoring system, smart wearable device heart diseases, 24 hours Holter, long-term monitoring
DOI: 10.3233/JIFS-189715
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4547-4557, 2021
Authors: Chen, Ying
Article Type: Research Article
Abstract: At present, resource configuration of mobile cloud computing has received extensive attention from the outside world. Most of the similar resource scheduling configuration fails to comprehensively consider the dynamics of mobile terminals and the difference in user requested resources. Therefore, considering uncertainty in paging scheduling under mobile cloud resource environment from the perspective of consumers has become the key to solving the problem of resource allocation in the mobile cloud computing environment. This paper proposes an adaptive matching resource allocation algorithm based on uncertain factors under mobile cloud computing environment. Uncertain factors of the mobile terminal are derived via QoS …attribute, and then user information and load characteristics of the user requested resources are analyzed through CLIQUE similarity matching. Afterwards, based on the mapping between similarity and resources, resource paging allocation can be carried out based on adaptive matching resource allocation algorithm. From the perspective of consumers, dynamics of mobile terminals and uncertainty of paging scheduling in the mobile cloud resource environment under different user requested resources can be considered to allow minimized delay and optimized paging strategies. Show more
Keywords: Mobile cloud computing, uncertain factors, resource scheduling, paging strategy
DOI: 10.3233/JIFS-189716
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4559-4564, 2021
Authors: Ji, Xun | Shao, Chunfu
Article Type: Research Article
Abstract: Frequent occurrence of urban rainy weather, especially rainstorm weather, affects transportation operation and safety, so it is essential that effective intervention measures to recover disordered traffic be adopted and then analyzed for their influence on the dynamic network. Therefore, models and algorithm to show dynamic traffic flow of traffic network in rainy weather are a fundamental need and have drawn great interest from governments and scholars. In this paper, innovative content contains a travel cost function considering rainfall intensity; considering the travel cost function, a dynamic traffic assignment model based on dynamic rainfall intensity is built. Then a corresponding algorithm …is designed. Moreover, this study designs three scenarios under rainfall and analyzes the influence of the rainfall on an example network. The results show that rainfall has a significant effect on traffic flow. The finding proved the proposed models and algorithm can express the development trend of path flow rate on a dynamic network under rainfall. Show more
Keywords: Traffic network, rainfall intensity, travel cost, iterative loading algorithm
DOI: 10.3233/JIFS-189717
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4565-4575, 2021
Authors: Yin, Tingting | Yang, Zhong | Wu, Youlong | Jia, Fangxiu
Article Type: Research Article
Abstract: The high-precision roll attitude estimation of the decoupled canards relative to the projectile body based on the bipolar hall-effect sensors is proposed. Firstly, the basis engineering positioning method based on the edge detection is introduced. Secondly, the simplified dynamic relative roll model is established where the feature parameters are identified by fuzzy algorithms, while the high-precision real-time relative roll attitude estimation algorithm is proposed. Finally, the trajectory simulations and grounded experiments have been conducted to evaluate the advantages of the proposed method. The positioning error is compared with the engineering solution method, and it is proved that the proposed estimation …method has the advantages of the high accuracy and good real-time performance. Show more
Keywords: Ordnance science and technology, high precision, roll attitude estimation, PMSG, hall-effect sensor, relative roll dynamic model
DOI: 10.3233/JIFS-189718
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4577-4585, 2021
Authors: Li, Chongchong | Xiong, Jiangyong | Liu, Tingshan | Zhang, Ziang
Article Type: Research Article
Abstract: In order to further improve vehicle ride performance, a dynamic monitoring feedback iteration control algorithm is proposed by combining the features of a variable-damping semi-active suspension system and applying them to the system. A seven-degree-of-freedom finished vehicle simulation model is built based on MATLAB/Simulink. The root-mean-square values of the acceleration of the sprung mass, the dynamic travel of the suspension and the dynamic tire load are taken as evaluation indicators of vehicle ride performance. An analytic hierarchy process (AHP) is used to determine the weighting coefficients of the evaluation indicators, and a genetic algorithm is utilized to determine the optimal …damping of the suspension under various typical working conditions. Suspension damping is controlled with a dynamic monitoring feedback iteration algorithm. The correction coefficients of the control algorithm are determined according to the deviation between the obtained damping and the optimized damping so that the control parameters will agree with the optimal result under typical working conditions, and the control effect under other working conditions is verified. The simulation results indicate that the proposed dynamic monitoring feedback iteration control algorithm can effectively reduce the root-mean-square value of the acceleration of the sprung mass by 10.56% and the root-mean-square value of the acceleration of the dynamic travel of the suspension by 11.98% under mixed working conditions, thus improving vehicle ride performance. The study in this paper provides a new attempt for damping control of semi-active suspension and lays a theoretical foundation for its application in engineering. Show more
Keywords: Semi-active suspension, controlled damping, dynamic monitoring feedback iteration, analytic hierarchy process, genetic algorithm, ride performance
DOI: 10.3233/JIFS-189719
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4587-4595, 2021
Article Type: Research Article
Abstract: Based on a survey database of cross-border acquisitions by Chinese private firms, this study uses a fuzzy-set qualitative comparative analysis (fsQCA) to explore the holistic impact of acquisition ownership, organizational factors and environmental factors on acquisition performance in cross-border acquisitions. It is found that the cross-border acquisitions taken by Chinese private enterprises have four kinds of acquisition ownership strategies leading to high acquisition performance under different internal and external conditions. This study points out that ownership strategy is a key decision affecting cross-border acquisition performance and provides a variety of paths leading to the same outcome rather than just finding …the linear relationship between corporate activity and performance. This study supports the assumption of equivalence, and reveals a variety of scenarios in which cross-border acquisition ownership contributes to the outcome of high cross-border acquisition performance, and further confirms the view of causal asymmetry between condition and outcome. This study reveals whether the proportion of cross-border acquisition ownership affects cross-border acquisition performance and under what circumstances is conducive to the realization of expected cross-border acquisition performance. Show more
Keywords: Fuzzy-set qualitative comparative analysis (fsQCA), acquisition ownership, acquisition performance, cross-border acquisition
DOI: 10.3233/JIFS-189720
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4597-4607, 2021
Authors: Xia, Yingchun | Xie, Zhiqiang | Xin, Yu | Zhang, Xiaowei
Article Type: Research Article
Abstract: The customized products such as electromechanical prototype products are a type of product with research and trial manufacturing characteristics. The BOM structures and processing parameters of the products vary greatly, making it difficult for a single shop to meet such a wide range of processing parameters. For the dynamic and fuzzy manufacturing characteristics of the products, not only the coordinated transport time of multiple shops but also the fact that the product has a designated output shop should be considered. In order to solve such Multi-shop Integrated Scheduling Problem with Fixed Output Constraint (MISP-FOC), a constraint programming model is developed …to minimize the total tardiness, and then a Multi-shop Integrated Scheduling Algorithm (MISA) based on EGA (Enhanced Genetic Algorithm) and B&B (Branch and Bound) is proposed. MISA is a hybrid optimization method and consists of four parts. Firstly, to deal with the dynamic and fuzzy manufacturing characteristics, the dynamic production process is transformed into a series of time-continuous static scheduling problem according to the proposed dynamic rescheduling mechanism. Secondly, the pre-scheduling scheme is generated by the EGA at each event moment. Thirdly, the jobs in the pre-scheduling scheme are divided into three parts, namely, dispatched jobs, jobs to be dispatched, and jobs available for rescheduling, and at last, the B&B method is used to optimize the jobs available for rescheduling by utilizing the period when the dispatched jobs are in execution. Google OR-Tools is used to verify the proposed constraint programming model, and the experiment results show that the proposed algorithm is effective and feasible. Show more
Keywords: Customized products, integrated scheduling, multiple workshop, fixed output, branch and bound
DOI: 10.3233/JIFS-189721
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4609-4617, 2021
Authors: Wang, Zhiru | Wang, Min | He, Ruyu | Bhamra, Ran S. | Yang, Lili
Article Type: Research Article
Abstract: In order to better achieve active defense in the escalator risk management, this study based on the vulnerability theory, task driven theory, management error theory, proposed a Gray Relational Analysis (GRA) based fuzzy assessment of escalator accident risk approach. The risk assessment index system of subway station escalator accident was constructed based on the commonness and essence of management defects; the weight of risk index was calculated scientifically and reasonably by using Analytic Hierarchy Process (AHP); escalator accident risk was evaluated by the combination of GRA and Fuzzy approach. The results show that escalator equipment, environment, safety knowledge of riders …are all in good condition in the station. However, ‘Maintenance’ of escalator in the Beijing subway station is in an extremely high risk level. The contributions of this studies are: (1) general risk elements analysis model for escalator accidents which enable to compose any risk factor possible to induce escalator accident in subway station; (2) GRA based risk assessment approach can avoid the problem when expend the range to left and right. It can also judge whether the continuous improvement effect of the object is significant by the difference degree of each risk level before and after. Show more
Keywords: Subway escalator incident, risk assessment, gray relational analysis (GRA), gray clustering, fuzzy method
DOI: 10.3233/JIFS-189722
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4619-4628, 2021
Authors: Li, Jingyuan
Article Type: Research Article
Abstract: In 2020, under the major impact of the global COVID-19 epidemic, people are paying more and more attention to safety issues including health and personal safety, and relevant supervision and testing methods are also constantly updated across different countries. In industrial enterprises, both spread of diseases and occurrence of accidents are largely caused by unsafe state of things and unsafe behaviors of people, among which, human factor is the most important factor. In recent years, many scholars have conducted theoretical and practical research on individual behavior from the perspective of individual psychological characteristics. Where, individual initiative as an important individual …psychological trait is increasingly incorporated in the research category of safety behavior. A close correlation exists between individual initiative and evolution of safety production behavior. According to constraint conditions and replicator dynamics equation, this paper uses evolutionary game method and computer fuzzy system Matlab simulation software to conduct numerical experiment analysis on the ideal state of the game between organizations and individuals, thereby studying the behavior evolution trend. The basic idea of fuzzy control is to use computer to realize human’s qualitative control experience. Research is found that whether an individual adopts safety obedience behavior will be directly affected by whether the organization adopts regulatory safety production management model. And if the organization adopts regulatory safety production management model and the individual does not implement safety obedience behavior, it is impossible to achieve a stable state. The evolution process of the two to the ideal state is affected by multiple factors. Show more
Keywords: Safety management, safety behavior, fuzzy system simulation, evolutionary game
DOI: 10.3233/JIFS-189723
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4629-4638, 2021
Authors: Li, Chengzheng | Peng, Ying | Peng, Peng | Cao, Lei
Article Type: Research Article
Abstract: Investigating the factors influencing the performance of social conditioning in the network environment is the core issue for improving academic performance. Through the search of existing literature, the paper analyzes the main factors that influence social conditioning learning in current research, and through the questionnaire survey and in-depth processing of the raw data, the advanced behavioral indicators related to learning are obtained and analyzed by Spearman correlation coefficient and fuzzy modeling in machine learning. The results showed that the twelve dimensions of motivation regulation, trust building, efficacy management, cognitive strategy, time management, goal setting, task strategy, peer support, team assessment, …help seeking, environment construction, and team supervision were significantly related to group performance, with team supervision having a significant negative relationship with group performance. In addition, trust building, team supervision and environment construction were the main factors for online social learning, effectiveness management, task strategy, peer support and help-seeking were the secondary factors, while motivation regulation, cognitive strategies, goal setting and team assessment had little impact on the final performance. The findings have some implications for the optimization of social conditioning learning support services and the improvement of social conditioning learning performance. Show more
Keywords: Learning analysis, online collaborative learning, socially modulated learning, machine learning
DOI: 10.3233/JIFS-189724
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4639-4649, 2021
Authors: Ding, Xiaobing | Yang, Kaihe | Hu, Hua | Liu, Zhigang
Article Type: Research Article
Abstract: There is a close relationship between the operation safety and the application of training equipment. If the relationship is not handled well, it will lead to serious problems, even the Conflicts. So designing training equipment management information system is extremely urgent. First, the main training categories are carded, such as drivers training, construction and maintenance, daily safety management, canteen safety, etc., and the basic flow chart of the 4 types of training are drawn; Second, the training equipment management database Train_Database is constructed based on training process, equipment involved, trainers, contingency plans of the 4 kinds of raw data, which …lay the foundation for the follow-up of the management information system design and development; Third, the training equipment declaration and management system is developed, which is called Training_Equipment_MS, and the main modules are: equipment resource information management module, equipment declaration module, equipment audit module, safety check form filling module, equipment declaration results publicity module, etc. Finally, the functions of each module are shown in details. It has good practical guidance to the application and operation of rail transit, which can reduce accidents and hidden danger in the course of training. Show more
Keywords: Rail transit training, safety management of equipment, resource declaration and audit, design and development of system
DOI: 10.3233/JIFS-189725
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4651-4659, 2021
Authors: Jia, Susan (Sixue) | Wu, Banggang
Article Type: Research Article
Abstract: In order to reach a compromise between adhering to the traditional culture and embracing the modern lifestyle, more and more Asian moms are heading towards postpartum care centres for postpartum recovery. However, research regarding the quality of care of these postpartum care centres is nearly missing from the literature. This paper investigated the status quo of the postpartum care centres in Shanghai, China from mothers’ perspectives by means of analysing the 34280 pairs of ratings and reviews posted by postpartum care centre customers on the internet with machine learning and text mining. Results show that the mothers are generally satisfied …with the studied care centres. Meanwhile, the 13 major topics in the customer online reviews were identified, which provide an overview of the interaction between a mother and a care centre. In addition, weight of topic analysis suggests that the studied care centres can further improve in the areas of support team, environment, and facility. Show more
Keywords: User-generated content, text mining, postpartum care, latent Dirichlet allocation
DOI: 10.3233/JIFS-189726
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4661-4668, 2021
Authors: Chen, Yingjiao | Liang, Hu
Article Type: Research Article
Abstract: Rural revitalization is an attempt by China’s rural reform plan. Among them, the pastoral complex emphasizes the integration of agriculture and tourism, extends the agricultural chain, and integrates health care, technology, tourism, creativity, and leisure. However, the pastoral complex is faced with solving rural-urban integration in the context of the current rural revitalization strategy, involving complex factors such as land, ecological, cultural, and social issues. Therefore, this study analyzes the complex factors affecting the pastoral complex. Fuzzy calculation theory is introduced in the pastoral complex to discuss the pastoral complex system’s operational characteristics and further explore how to build an …adaptive system evaluation system at different system levels. Considering that the process needs to consider several Conflicting factors from qualitative to quantitative, to deal with the uncertainty of human judgment in the evaluation process, the process uses fuzzy analytical hierarchy process to obtain the weight of each factor and understand the degree of influence of each factor. The research results show that various factors have different degrees of influence on the pastoral complex. Therefore, in the complex pastoral process, more attention should be paid to the operation mechanism factors to make the complex pastoral system more scientific. Show more
Keywords: Fuzzy calculation, rural revitalization, pastoral complex, FAHP
DOI: 10.3233/JIFS-189727
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4669-4678, 2021
Article Type: Research Article
Abstract: This research focus on the formation mechanism and intervention strategy of coal miners’ job burnout, based on a simulation study using system dynamics method. The simulation result indicates that, work assignment alienation has higher sensitivity to intervention strategies than other elements of coal miners’ job burnout, while health damage is least sensitive to intervention. The top three adoptable strategies shall be reasonable working hours, self-psychological adjustment, and psychological counseling program. As the impact of one intervention strategy weakens with time, it is necessary to constantly change intervention strategies or to adopt a strategy combination to intervene miners’ burnout. This study …explains the formation mechanism of coal miners’ job burnout and offers targeted advice for coal enterprises, aiming to effectively improve their safety management mechanism and to reduce casualties. Show more
Keywords: Coal miners, job burnout, intervention strategy, system dynamics, simulation
DOI: 10.3233/JIFS-189728
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4679-4689, 2021
Authors: Zhu, Wenye | Tan, Chengxiang | Xu, Qian | Xiao, Ya
Article Type: Research Article
Abstract: The cross-trust domain environment in which heterogeneous identity alliances are located often does not have a completely trusted centralized trust root, and different trust domains and entities also have specific security requirements. In view of the above problems, we believe that trust measurement of cross-domain identities based on risk assessment is an effective method to achieve decentralized proof of user identities in heterogeneous cyberspace. There are various risk assessment models. We choose the more mature attack graph theory in the existing research to apply to the new field of cross-trust domain management of heterogeneous identities. We propose an attribute attack …graph evaluation model to evaluate cross-domain identities through risk measurement of attributes. In addition, heterogeneous identity alliances also have architectural risks, especially the risk of decentralized underlying structures. In response to this problem, we identify the risk of the identity alliance infrastructure, and combine the risk assessment and presentation system design to verify the principle. Show more
Keywords: Heterogeneous identity alliance, attribute attack graph, proof of identity, cyber security assessment, trust management
DOI: 10.3233/JIFS-189729
Citation: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 3, pp. 4691-4704, 2021
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]