Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2023: 2
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Wang, Haolun | Zhang, Faming
Article Type: Research Article
Abstract: Frank operations are more robust and flexible than other algebraic operations, and interaction operational laws consider interrelationship between membership functions in Pythagorean fuzzy number. Combining the strengths of both, we define some Frank interaction operational laws of Pythagorean fuzzy numbers for the first time in this article. Based on this, the Pythagorean fuzzy Frank interaction weighted averaging and geometric operators are developed. Meanwhile, we discuss their basic properties and related special cases. Furthermore, a novel multiple attribute decision-making framework is established based on the modified WASPAS method in Pythagorean fuzzy environment. The proposed method is implemented in a real-case study …of cloud computing product selection to test the proposed methodology’s plausibility. A sensitivity analysis is conducted to verify our method’s reliability, and the effectiveness and superiority are illustrated by comparative study. Show more
Keywords: Frank interaction operational laws, Pythagorean fuzzy Frank interaction aggregation operators, PyF-ITARA, WASPAS, cloud computing product
DOI: 10.3233/JIFS-213152
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 5793-5816, 2022
Authors: Yao, Xuan | Wang, Hai | Xu, Zeshui
Article Type: Research Article
Abstract: Preference relations are often used to derive the priority of attributes and/or alternatives. Linguistic term with weakened hedges (LTWH) as a type of complex linguistic expressions can more straightforwardly describe the linguistic information provided by DMs when evaluating under uncertainties. The preference relations represented by LTWHs are an effective tool to model linguistic information. The concept and properties of additive consistency have been proposed before. This paper aims to study the multiplicative consistency of preference relations expressed by LWTHs. This paper constructs the principle of inspection for multiplicative consistency. Especially, the theories and algorithms for consistency checking and improving are …proposed. We develop an automatic approach to improve a LWHPR that is not multiplicatively consistent. Finally, we demonstrate the practicality of the proposed method through a case study of evaluating the attributes in the prevention of haze pollution in China. Show more
Keywords: Preference relations, multiplicative consistency, linguistic term with weakened hedges
DOI: 10.3233/JIFS-213170
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 5817-5832, 2022
Authors: Zhang, Qinghui | Tian, Xinxin | Chen, Weidong | Yang, Hongwei | Lv, Pengtao | Wu, Yong
Article Type: Research Article
Abstract: Unsound wheat kernel recognition is an important part of wheat quality inspection, and it is also a key indicator to measure wheat quality. Research on unsound wheat kernel recognition is of great significance to the correct evaluation of wheat quality. The existing researches on unsound wheat kernel recognition are mainly to directly optimize the classical classification networks, and the recognition effect is often unsatisfactory due to insufficient training data. Aiming at the problem that the recognition rate of unsound wheat kernels is not ideal due to the lack of training data, we propose a Transfer Learning Feature Fusion (TLFF) model. …The model uses transfer learning and feature fusion to identify unsound wheat kernels. First, feature extraction is performed by deep Convolutional Neural Networks (CNNs) VGG-16 and VGG-19 pre-trained on the large public dataset ImageNet. Then, the features extracted by the pre-trained neural networks are fused and classified through the flattening layer, fully connected layer, Dropout layer, and Softmax layer. We conduct experiments on single model, two-model fusion, three-model fusion, and four-model fusion, and select the three-model fusion scheme to perform this task. Finally, we vote on the output results of the three best fusion models to further improve the recognition rate. The pre-trained models we use are trained on a large public dataset ImageNet. Since the scale of the dataset is very large, these pre-trained models also have good generalization performance for images other than ImageNet dataset. Therefore, although our dataset is small, we can still achieve good recognition results. Experimental results show that the recognition performance of the TLFF model is significantly better than the existing unsound wheat kernel recognition models. Show more
Keywords: Transfer learning, feature fusion, unsound wheat kernel recognition, convolutional neural network, voting
DOI: 10.3233/JIFS-213195
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 5833-5858, 2022
Authors: Zhao, Zhen-Yu | Ma, Xu
Article Type: Research Article
Abstract: The power industry has significantly contributed to the prosperity of the national economy, and accurate prediction can reflect the development trend of the power system and power market. The short-term electricity consumption of a country exhibits both annual growth certainty and random change uncertainty, which can be suitably considered with the grey forecasting model. Regarding the short-term trends of electricity consumption in China, this study established an optimized multivariate grey forecasting model with variable background values (OGM(1, N) model) to forecast the electricity consumption level in China. The established model could be converted into the GM(1, N) model and different …variant models by adjusting the model parameters. With Beijing, Tianjin and Shanghai as examples, the OGM(1, N) model is compared to the GM(1, N) model and its variant model. The excellent prediction results confirm the feasibility of the proposed model. Then, the proposed model is applied to study China’s electricity consumption. The research results indicated that the OGM(1, N) model attains an extraordinarily high precision in the prediction of electricity consumption and can provide a practical reference for accurate electricity consumption prediction. Show more
Keywords: Electricity consumption, multivariate grey forecasting model, variable background values, China
DOI: 10.3233/JIFS-213210
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 5859-5875, 2022
Authors: Babypriya, B. | Renoald, A. Johny | Shyamalagowri, M. | Kannan, R.
Article Type: Research Article
Abstract: In the context of this paper a three phase grid connected Photo-Voltaic (PV) system that is used to design with MPPT and developed Grey Wolf optimization (GWO) algorithm for analyzing the power quality issues in the grid system. The proposed Grey Wolf optimization (GWO) algorithm is incorporated in the prototype model and compared with other related optimization algorithms namely Particle Swarm Optimization (PSO) and Genetic Algorithm (GA). The various loading conditions as well as solar irradiances are modeled by using MATLAB simulation and experimentally validated by a DSPIC (DS 1104) based prototype model. A three phase PV grid connected non-linear …load is observed in different operating environmental conditions. The optimization control algorithms was developed and implemented in Super-Lift Inverter (SLI) grid connected system. The findings of this work are, grid reactive power demand is compensated using DSTATCOM, and also from the real power of renewable energy system. But, majority of the active power is provided or absorbed by DSTATCOM component. The objective of this proposed work is that the three optimization control algorithms are examined, and the PV integrated grid tied system maintains a compensation power at Unity Power Factor (UPF). The proposed optimization methods produce load output power factor values such as 0.89 (GWO), 0.88, (PSO) and 0.86 (GA). Show more
Keywords: PV system, particle swarm optimization, genetic algorithm, Grey Wolf optimization, Grid
DOI: 10.3233/JIFS-213259
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 5877-5896, 2022
Authors: Jiang, Yadan | Qiu, Dong
Article Type: Research Article
Abstract: The difference operation for fuzzy number is an essential concept for the fuzzy set theory. There are several differences proposed: generalized difference, generalized Hukuhara difference and granule difference. Based on these differences, generalized differentiability, generalized Hukuhara differentiability and granule differentiability are also proposed, respectively. In this paper, the relations among these three kinds of differences and that of related three kinds of differentiability are clarified.
Keywords: Generalized differences, generalized differentiability, granule differentiability, fuzzy-number-valued function
DOI: 10.3233/JIFS-213270
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 5897-5911, 2022
Authors: Tran, Van Quan | Nguyen, Linh Quy
Article Type: Research Article
Abstract: The use of recycled glass in the concrete mix instead of natural coarse aggregates and supplemental cementitious material has several advantages, including the conservation of natural resources, the reduction of CO2 emissions, and cost savings. However, due to their qualities, the mechanical properties of concrete containing Ground Glass Particles (GGP) differ from those of natural aggregates concrete. As a result, assessing the compressive strength (CS) of concrete with GGP is crucial. Therefore, this paper proposes the hybrid Machine Learning (ML) model including the Gradient Boosting (GB) and Bayesian optimization (BO) algorithms for predicting the compressive strength of concrete containing …GGP. The hybrid ML model is developed and validated based on the training dataset (70% of the data) and the test dataset (30% of the remaining data), respectively. The performance of hybrid ML model is evaluated by three criteria, such as the Pearson correlation coefficient (R), Root Mean Square Error (RMSE) and Mean Absolute Error (MAE). The K-Fold Cross-Validation technique is also used to verify the reliability of the hybrid ML model). The best performance of the hybrid ML model is determined with the R = 0.9843, RMSE = 1.7256 (MPa), and MAE = 1.3154 (MPa) for training dataset and R = 0.9784, RMSE = 2.4338 (MPa) and MAE = 1.9618 (MPa) for testing dataset. Based on the best hybrid ML model, the sensitivity analysis including SHapley Additive exPlanation (SHAP) and Partial Dependence Plots (PDP) 2D are investigated to obtain an in-depth examination of each individual input variable on the predicted compressive strength of concrete contaning GGP. The sensitivity analysis shows that four factors, such as curing age, surface area, TiO2 , and temperature have the most effect on the compressive strength of concrete containing GGP. Show more
Keywords: Gradient boosting, bayesian optimization, compressive strength, concrete, machine learning, ground glass particles
DOI: 10.3233/JIFS-213298
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 5913-5927, 2022
Authors: Zhang, Lijun | Duan, Lixiang
Article Type: Research Article
Abstract: To address data distribution discrepancy across scenarios, deep transfer learning is used to help the target scenario complete the recognition task using similar scenario data. However, fault misrecognition or low diagnostic accuracy occurs due to the weak expression of the deep transfer model in cross-scenario application. The Convolutional Block Attention Module (CBAM) can independently learn the importance of each channel and space features, recalibrate the channel and space features, and improve image classification performance. This study introduces the CBAM module using the Residual Network (ResNet), and proposes a transfer learning model that combines the CBAM module with an improved ResNet, …denoted as TL_CBAM_ResNet17. A miniature ResNet17 deep model is constructed based on the ResNet50 model. The location of the CBAM module embedded in the ResNet17 model is determined to strengthen model expression. For effective cross-scenario transfer and reduced data distribution discrepancy between source and target domains, a multi-kernel Maximum Mean Discrepancy (MK–MMD) layer is added in front of the classifier layer in the ResNet17 model to select data with common domain features. Considering a reciprocating compressor as the research object, cross-scenario datasets are produced by the vibration signals from the simulation test bench and simulation signals from the dynamic simulation model. Mutual transfer experiments are conducted using these datasets. The proposed method (TL_CBAM_ResNet17) demonstrates better classification performance than TCA, JDA, the TL_ResNet50 model, the TL_ResNet17 model, and the TL_ResNet17 model integrated with other attention mechanism module, and greatly improves the accuracy of fault diagnosis and generalization of the model in cross-scenario applications. Show more
Keywords: Cross-scenario, transfer learning, reciprocating compressor, ResNet, CBAM, dynamic simulation
DOI: 10.3233/JIFS-213340
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 5929-5943, 2022
Authors: Manoharan, G. | Sivakumar, K.
Article Type: Research Article
Abstract: Outlier detection in multivariate data is one of the critical challenges in preprocessing phase. Many outlier detection methods have been emerged for the past few years to perform outlier detection efficiently in multivariate datasets. The prediction accuracy cannot be improved without proper outlier analysis and the prediction model might not confirm the expected behavior. The generation of huge data in real time applications makes the outlier detection process more crucial and challenging. Most of the currently available detection methods are based on mean and covariance that are not suitable for handling large volume of datasets, they are suitable for handlind …static data and simple data to detect outliers. They cannot cope up with large scale data. So, there is a need for an efficient outlier detection model to detect the outliers in multivariate datasets. The primary objective of this research work is to develop a robust model for outlier detection in multivariate data. To achieve this, the work proposed an enhanced Hidden Semi-Markov Model (HSMM) which allows arbitrary time distribution in its states to detect outliers. The proposed work utilized six benchmark datasets and the performance is compared with several outlier detection algorithms such as HMM, iForest, FastABOD, and Expose. The work achieves 98.2 % of accuracy which is significantly better for detecting outliers in multivariate dataset. The proposed work improvised the percentage of acheivements between 2% to 25% than the currently available models.. The experimental analysis shows that the proposed model performs well than the currently available models in terms of accuracy, and receiver operation curve (ROC). Show more
Keywords: Outlier detection, multivariate data, Hidden Markov Model, iForest, expose
DOI: 10.3233/JIFS-213374
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 5945-5951, 2022
Authors: Liu, Sijia | Guo, Zixue
Article Type: Research Article
Abstract: In order to solve the problem of multi-attribute decision-making with unknown weights under probabilistic hesitant fuzzy information, considering the shortcomings of the existing probabilistic hesitant fuzzy distance measure, such as weak distinguishing ability, a probabilistic hesitant fuzzy multi-attribute decision-making method based on improved distance measures is proposed. Firstly, the hesitancy degree of probabilistic hesitant fuzzy element and the improved difference measure of probabilistic hesitant fuzzy element are defined, and an improved probabilistic hesitant fuzzy distance measure based on hesitancy degree, incompleteness degree and improved difference measure is proposed. Secondly, based on the improved distance measure, a mathematical programming model with …the goal of minimizing the relative approach degree is con-structed to determine the attribute weights of evaluation indexes in multi-attribute decision making problems. Using it as a base, a new probabilistic hesitant fuzzy multi-attribute decision-making method is proposed by combining the improved probabilistic hesitant fuzzy distance measure with the compromise ratio method. Finally, the proposed method is applied to the problem of green supplier selection, and the feasibility and effectiveness of the proposed method are verified by case analysis and comparison with other methods. Show more
Keywords: Probabilistic hesitant fuzzy set, multi-attribute decision-making, distance measure
DOI: 10.3233/JIFS-213427
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 5953-5964, 2022
Authors: Song, Xudong | Wang, Hao | Liu, Yifan | Wang, Zi | Cui, Yunxian
Article Type: Research Article
Abstract: Aiming at the inherent defects of BP neural network in the field of rolling bearing fault diagnosis, based on the optimization of particle swarm optimization algorithm, this paper uses a variety of optimization strategies to optimize the particle swarm optimization algorithm, and then uses the optimized particle swarm optimization algorithm to optimize the BP neural network. Therefore, a new fault diagnosis method (Dual Strategy Particle Swarm Optimization BP neural network, DSPSOBP) is proposed. DSPSOBP fault diagnosis method is mainly divided into two steps. The first step is EMD decomposition of vibration signal, and the second step is to classify rolling …bearing faults by using BP neural network optimized by Double Strategy Particle Swarm Optimization algorithm. Experiments show that DSPSOBP has stronger advantages than BP neural network basic fault diagnosis model. Show more
Keywords: Bearing fault diagnosis, BP neural network, optimization algorithm, particle swarm optimization
DOI: 10.3233/JIFS-213485
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 5965-5971, 2022
Authors: Bennajeh, Anouer | Said, Lamjed Ben
Article Type: Research Article
Abstract: Studying driver behaviors has become a major concern for the transportation community, businesses, and the public. Thus, based on the simulation, we proposed an adaptive driving model in the car-following driving behavior and based on the normative behavior of the driver during decision-making and anticipation, whose intention is to ensure the objectives of imitation of ordinary human behavior and road safety. The presented model is based on a software agent paradigm to model a human driver and the Fuzzy Logic Theory to reflect the driver agent’s reasoning. To validate our model, we used the dataset from the program of the …US Federal Highway Administration. In this context, we notice an excellent homogeneity in the deviation of the adopted trajectory of the autonomous driver agent from the adopted trajectories by the human drivers. Moreover, the advantage of our model is that it works with different velocities. Show more
Keywords: Fuzzy logic, decision-making, anticipation, adaptive control, autonomous agent
DOI: 10.3233/JIFS-213498
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 5973-5983, 2022
Authors: Apinaya Prethi, K.N. | Sangeetha, M.
Article Type: Research Article
Abstract: Network resources and traffic priorities can be utilized to distribute requested tasks across edge nodes at the edge layer. However, due to the variety of tasks, the edge nodes have an impact on data accessibility. Resource management approaches based on Virtual Machine (VM) migration, job prioritization, and other methods were used to overcome this problem. A Minimized Upgrading Batch VM Scheduling (MSBP) has recently been developed, which reduces the number of batches required to complete a system-scale upgrade and assigns bandwidth to VM migration matrices. However, due to poor resource sharing caused by suboptimal VM utilization, the MSBP was unable …to effectively ensure the global best solutions. In order to distribute resources and schedule tasks optimally during VM migration, this paper proposes the MSBP with Multi-objective Optimization of Resource Allocation (MORA) method. The major goal of this proposed methodology is to take into account different objectives and solve the Pareto-front problem to enhance lifetime of the fog-edge network. First, it formulates an NP-hard challenge for MSBP by taking into account a variety of factors such as network sustainability, path contention, network delay, and cost-efficiency. The Multi-objective Krill Herd optimization (MoKH) algorithm is then used to address the NP-hard issue using the Pareto optimality rule and produce the best solution. First, it introduces an NP-hard challenge for MSBP by accounting in network sustainability, path contention, network latency, and cost-efficiency. The Pareto optimality rule is then implemented to overcome the NP-hard problem and provide the optimum solution employing the Multi-objective Krill Herd optimization (MoKH) algorithm. This increases network lifetime and improves resource allocation cost efficiency. Finally, the simulation results show that the MSBP-MORA distributes resources more efficiently and hence increases network lifetime when compared to other traditional algorithms. Show more
Keywords: VM migration, MSBP, resource allocation, pareto-front issue, multi-objective Krill herd optimization algorithm, NP-hard challenge
DOI: 10.3233/JIFS-213520
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 5985-5995, 2022
Authors: Chen, Liuxin | Wang, Yutai | Yang, Dongmei
Article Type: Research Article
Abstract: Picture fuzzy linguistic set is a vital solution to express complex and uncertain information, which has been applied in multi-attribute group decision-making (MAGDM). However, the credibility of decision-making information is unconsidered, which may give rise to the inaccuracy of final result. To solve this problem, the picture fuzzy Z-linguistic set (PFZLS) composed of linguistic term, picture fuzzy number, and credibility is proposed, which could express more complete decision-making information. Subsequently, operation rules, comparison methods, and distance measures of PFZLS are introduced. In addition, the weighted geometric average operator and the classical VIKOR method are extended and combined to solve the …MAGDM problem under the picture fuzzy Z-linguistic environment. Finally, an illustrative example about the emergency decision-making (EDM) problem of forest fire accident is proposed, and a series of comparative analyses are presented to verify the rationality and superiority of the PFZLS. Show more
Keywords: Multi-attribute group decision-making, picture fuzzy Z-linguistic set, weighted geometric average operator, VIKOR method
DOI: 10.3233/JIFS-213531
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 5997-6011, 2022
Authors: Wang, Fan | Tian, Shengwei | Yu, Long | Long, Jun | Zhou, Tiejun | Wang, Bo | Wang, Junwen | Wang, Yongtao
Article Type: Research Article
Abstract: Human multi-modal emotions analysis includes time series data with different modalities, such as verbal, visual, and auditory. Due to different sampling rates from each modality, the collected data streams are unaligned. The asynchrony cross-modality increases the difficulty of multi-modal fusion. Therefore, we propose a new Cross-Modality Reinforcement model (CMR) based on recent advances in a cross-modality transformer, which performs multi-modal fusion in unaligned multi-modal sequences for emotion prediction. To deal with the long-time dependencies of unaligned sequences, we introduce a time domain aggregation to model the single modal, by aggregating the information in the time dimension, and enhance contextual dependencies. …Moreover, a CMR strategy is introduced in our approach.With the main and secondary modalities as inputs to the module, main modal features are strengthened through cross-modality attention and cross-modality gate, and the secondary modality information flows to the main modality potentially, while retaining main modality-specific features and complementing the missing cues. This process gradually learns the common contributing features between the main and secondary modalities and reduces the noise caused by the variability of the modal features. Finally, the enhanced features are used to make predictions about human emotions. We evaluate CMR on two multi-modal sentiment analysis benchmark datasets, and we report the accuracy of 82.7% on the CMU-MOSI and 82.5% and CMU-MOSEI, respectively, which demonstrates our method outperforms current state-of-the-art methods. Show more
Keywords: Cross-modality processing, multi-modal fusion, multi-modal unaligned sequences, multi-modal sentiment analysis
DOI: 10.3233/JIFS-213536
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6013-6025, 2022
Authors: Kong, Yuting | Qian, Yurong | Tan, Fuxiang | Bai, Lu | Shao, Jinxin | Ma, Tinghuai | Tereshchenko, Sergei Nikolayevich
Article Type: Research Article
Abstract: Data clustering has been applied and developed in all walks of life, which can provide convenience for enterprise service optimization. However, when the original data to be analyzed contains users’ personal privacy information, the clustering analysis process of the data holder may expose users’ privacy. Differential privacy k-means algorithm is a clustering method based on differential privacy protection technology, which can solve the privacy disclosure problem in the process of data clustering. In the differential privacy k-means algorithm, Laplacian noise controlled by privacy parameter ɛ is added to the center point of clustering to protect user sensitive information and clustering …results in the original data, but the addition of noise will affect the utility of clustering. In order to balance the availability and privacy of the differential privacy k-means clustering algorithm, the research on the improvement of the algorithm pays more attention to the selection of the initial clustering center or the optimization of the outlier processing, but does not consider the different contribution degree of each dimension data to the clustering. Therefore, this paper proposes a differential privacy CVDP k-means clustering algorithm based on coefficient of variation. The CVDP scheme first eliminates outliers in the original data through data density, and then designs weighted data point similarity calculation method and initial centroid selection method using variation coefficient. Experimental results show that CVDP k-means algorithm has some improvements in availability, performance and privacy. Show more
Keywords: Differential privacy, differential privacy k-means clustering, coefficient of variation, CVDP k-means
DOI: 10.3233/JIFS-213564
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6027-6045, 2022
Authors: Zhang, Shu | Wang, Yuhong
Article Type: Research Article
Abstract: This paper aims to improve the accuracy of software defect prediction by using a prediction model based on grey incidence analysis and Naive Bayes algorithm. The model employs the Naïve Bayes as the basic classifier of the software defect prediction model. The grey incidence analysis is used to analyze the relation between software modules and ideal modules. Then, the grey correlation degree is embedded into the Naive Bayes classification model as a feature attribute. According to the comparison and analysis of NASA’s public dataset, the prediction model in this paper improves the prediction accuracy.
Keywords: Naive Bayes, grey incidence analysis, software defect prediction
DOI: 10.3233/JIFS-213570
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6047-6060, 2022
Authors: Shi, Wen | Huang, Yongming | Zhang, Guobao | Yang, Wankou
Article Type: Research Article
Abstract: Degradation prognostic plays a crucial role in increasing the efficiency of health management for rolling element bearings (REBs). In this paper, a novel four-step data-driven degradation prognostics approach is proposed for REBs. In the first step, a series of degradation features are extracted by analyzing the vibration signals of REBs in time domain, frequency domain and time-frequency domain. In the second step, three indicators are utilized to select the sensitive features. In the third step, different health state labels are automatically assigned for health state estimation, where the influence of uncertain initial condition is eliminated. In the last step, a …multivariate health state estimation model and a multivariate multistep degradation trend prediction model are combined to estimate the residence time in different health status and remaining useful life (RUL) of REBs. Verification results using the XJTU-SY datasets validate the effectiveness of the proposed method and show a more accurate prognostics results compared with the existing major approaches. Show more
Keywords: Degradation prognostic, rolling element bearings (REBs), health state estimation, remaining useful life (RUL)
DOI: 10.3233/JIFS-213586
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6061-6076, 2022
Authors: Elmenshawy, Maha A. | Hamza, Taher | El-Deeb, Reem
Article Type: Research Article
Abstract: Due to the obvious significant expansion in the number of online Arabic textual information, Arabic Text Summarization has become a focus of intense research. Manual text summarization necessitates a large investment of time, effort, and money. Hence, Automatic Arabic Text Summarization (AATS) is currently necessary to create accurate and relevant summaries from the huge amount of accessible content. The developed techniques and methodologies for AATS are still in their immaturity because of the intrinsic complexity of the structure and morphology of the Arabic language. AATS methods could be categorized as extractive, abstractive, hybrid extractive to abstractive. The extractive method selects …and combines the most important sentences from the input document(s) to produce the summary. While the abstractive method needs deep understanding of the input document(s) for creating the summary with sentences that differ from the original ones. The extractive to abstractive method is a hybrid strategy for creating an informative and cohesive summary using the extractive summary as a first step. This paper provides a detailed explanation of the fundamental issues related to Arabic text summarization. It describes and analyzes the various methods and systems currently in use, traces their history and monitors their performance. The challenges and trends are explored. Show more
Keywords: Automatic text summarization, arabic text summarization, summarization approaches, extractive approaches, abstractive approaches, summary evaluation
DOI: 10.3233/JIFS-213589
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6077-6092, 2022
Authors: Rani, R.Jhansi | Vasanth, K.
Article Type: Research Article
Abstract: Latent fingerprint recognition plays an essential role for law enforcement agencies to detect criminals and security purposes. One of the key stages utilized in the latent fingerprint recognition model is to automatically learn consistent minutiae from fingerprint images. However, the existing state-of-the-art recognition approaches are not adequate since live-scan fingerprint images and enhancements are necessary for each step of the recognition process. Hence, an automated recognition system along with appropriate minutiae learning algorithm is required for matching the latent fingerprint exactly. In this paper, an efficient recognition system using dictionary learning and Local Context-Perception deep neural network (LCPnet) has been …proposed to enhance the accuracy of latent fingerprint recognition. Primarily, the Total Variation decomposition model is utilized to remove the smooth background noise and dictionary learning contributes to the extraction of multiple patches. Afterward, the LCPnet is trained for 12 patch types to develop a salient minutiae descriptor where every descriptor is trained using LCPnet with a particular patch size at a location surrounding the minutiae. The proposed detection system has been tested through two latent public datasets. Here, three different types of templates (LCPnet minutiae, LCPnet texture, and LCPnet minutiae+texture) are analyzed for evaluating the proposed fingerprint detection system. The performance results manifest that the proposed system acquires a superior recognition accuracy of 99.44% and 99.58% under two different datasets. Show more
Keywords: Latent fingerprint, dictionary learning, ridge enhancement, minutiae extraction, deep neural network
DOI: 10.3233/JIFS-220056
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6093-6108, 2022
Authors: Jiang, Hailiang | Chen, Yumin | Kong, Liru | Cai, Guoqiang | Jiang, Hongbo
Article Type: Research Article
Abstract: Learning Vector Quantization (LVQ) is a clustering method with supervised information, simple structures, and powerful functions. LVQ assumes that the data samples are labeled, and the learning process uses labels to assist clustering. However, the LVQ is sensitive to initial values, resulting in a poor clustering effect. To overcome these shortcomings, a granular LVQ clustering algorithm is proposed by adopting the neighborhood granulation technology and the LVQ. Firstly, the neighborhood granulation is carried out on some features of a sample of the data set, then a neighborhood granular vector is formed. Furthermore, the size and operations of neighborhood granular vectors …are defined, and the relative and absolute granular distances between granular vectors are proposed. Finally, these granular distances are proved to be metrics, and a granular LVQ clustering algorithm is designed. Some experiments are tested on several UCI data sets, and the results show that the granular LVQ clustering is better than the traditional LVQ clustering under suitable neighborhood parameters and distance measurement. Show more
Keywords: Supervised learning, granular computing, LVQ clustering, neighborhood granules
DOI: 10.3233/JIFS-220092
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6109-6122, 2022
Authors: Sood, Mansi | Gera, Jaya | Kaur, Harmeet
Article Type: Research Article
Abstract: This work creates, evaluates, and optimizes a domain-based dictionary using labeled domain documents as the input. The dictionary is created using selected unigrams and bigrams from the labeled text documents. Dictionary is evaluated using the Naïve Bayes classification model. Classification Accuracy obtained is used as a metric to evaluate the effectiveness of the dictionary. The paper also studies the impact of applying the Stochastic Gradient Descent (SGD) technique, with Lasso and Ridge Regularization, on the effectiveness of a domain-based dictionary. Both, Lasso and Ridge regularization, with Ridge faring better than Lasso, help to optimize the dictionary size, without any significant …reduction in the accuracy. The created dictionaries are evaluated on the dataset used for their creation and subsequently on an unseen dataset as well. The applicability of a created dictionary to classify the documents belonging to a different dataset gives an idea about the generality of that dictionary. The paper establishes that the dictionaries created using the above methodology are generic enough to classify documents of other unseen datasets. Show more
Keywords: Domain-based dictionary, unigram, bigram, Naïve Bayes classification, Stochastic Gradient Descent
DOI: 10.3233/JIFS-220110
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6123-6136, 2022
Authors: Zhu, Linkai | Wang, Wennan | Huang, Maoyi | Chen, Maomao | Wang, Yiyun | Cai, Zhiming
Article Type: Research Article
Abstract: A lot of manual work goes into identifying a topic for an article. With a large volume of articles, the manual process can be exhausting. Our approach aims to address this issue by automatically extracting topics from the text of large numbers of articles. This approach takes into account the efficiency of the process. Based on existing N-gram analysis, our research examines how often certain words appear in documents in order to support automatic topic extraction. In order to improve efficiency, we apply custom filtering standards to our research. Additionally, delete as many noncritical or irrelevant phrases as possible. In …this way, we can ensure we are selecting unique keyphrases for each article, which capture its core idea1 . For our research, we chose to center on the autonomous vehicle domain, since the research is relevant to our daily lives. We have to convert the PDF versions of most of the research papers into editable types of files such as TXT. This is because most of the research papers are only in PDF format. To test our proposed idea of automating, numerous articles on robotics have been selected. Next, we evaluate our approach by comparing the result with other models. Show more
Keywords: Automatic topic extraction, frequency statistic, keyphrase, N-gram
DOI: 10.3233/JIFS-220115
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6137-6146, 2022
Authors: Shi, Lukui | Zu, Haoran | Tai, Jikai | Niu, Weifei
Article Type: Research Article
Abstract: Because X-ray welding images have complex backgrounds and welding defects have different sizes and shapes, effectively detecting welding defects in X-ray images is still a challenge. To solve these problems, a shape-aware network (SA-NET) was proposed, whose core was the shape-aware module (SAM). SAM includes a free-shape region proposal network (FS-RPN) and a two-level regression head (TR-Head). FS-RPN predicts the shape of the anchor boxes corresponding to each position on the feature maps, and aligns the feature maps according to the predicted anchor box shape. Then, the offset and the foreground classification score of the anchor boxes are predicted according …to the aligned feature maps. Thus, FS-RPN generates the proposal regions with a higher quality. TR-Head uses the first-level detection head, which only contains one regression branch, to further improve the quality of the proposal regions by fine-tuning the proposal regions. It employs the second-level detection head, which consists of one classification branch and one regression branch, to predict the categories and the boxes of defects. The experimental results showed that SA-NET effectively improved the quality of the proposal regions and greatly improved the detection effect of welding defects, especially defects with special shapes. Show more
Keywords: Welding defects, defect detection, shape awareness, FS-RPN, TR-head
DOI: 10.3233/JIFS-220132
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6147-6162, 2022
Authors: Martinez-Gil, Jorge | Chaves-Gonzalez, Jose Manuel
Article Type: Research Article
Abstract: The automatic semantic similarity assessment field has attracted much attention due to its impact on multiple areas of study. In addition, it is also relevant that recent advances in neural computation have taken the solutions to a higher stage. However, some inherent problems persist. For example, large amounts of data are still needed to train solutions, the interpretability of the trained models is not the most suitable one, and the energy consumption required to create the models seems out of control. Therefore, we propose a novel method to achieve significant results for a sustainable semantic similarity assessment, where accuracy, interpretability, …and energy efficiency are equally important. We rely on a method based on multi-objective symbolic regression to generate a Pareto front of compromise solutions. After analyzing the output generated and comparing other relevant works published, our approach’s results seem to be promising. Show more
Keywords: Knowledge engineering, sustainable computing, semantic similarity assessment
DOI: 10.3233/JIFS-220137
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6163-6174, 2022
Authors: Du, Ye | Yao, Bingxue
Article Type: Research Article
Abstract: Zhan and Jiang defined covering-based compact and loose variable precision fuzzy rough set models. Soon after, they proposed a reflexive fuzzy β-neighborhood operator and defined a covering-based generalized variable precision fuzzy rough set. Based on them, in this paper, we use the reflexive fuzzy β-neighborhood operator to establish two covering-based generalized variable precision fuzzy rough set models, which are called covering-based generalized compact and loose variable precision fuzzy rough set models, respectively. Then, we investigate the important properties of the two rough set models and their relationship to the original models. Finally, we apply the covering-based generalized compact variable precision …fuzzy rough set model to decision-making problems. A simple example is given to verify the validity of the model and compare the results with other models. Show more
Keywords: Fuzzy rough set , compact, loose, fuzzy logical operator
DOI: 10.3233/JIFS-220152
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6175-6187, 2022
Authors: Angammal, S. | Hannah Grace, G.
Article Type: Research Article
Abstract: In agriculture crop planning plays an important role. There are many uncertainties and indeterminacy factors that occur in agriculture cultivation process. Hence, many parameters are determined by using intuitionistic fuzzy number. The present study discussed the new Interactive Neutrosophic Programming Approach (INPA) based on Neutrosophic Set (NS) to increase the production and profit of Ariyalur district medium farm holder with minimum expenditure taking into account the land, labour, water & food requirement constraints. To verify and validate the proposed method, the results obtained by INPA are compared with some existing optimization approaches such as FOT, IFOT and Torabi interactive fuzzy …optimization approach and it is clear that the proposed approach is superior than the existing model. Show more
Keywords: Crop planning, multi objective optimization, intuitionistic fuzzy parameter, membership function, neutrosophic programming
DOI: 10.3233/JIFS-220156
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6189-6201, 2022
Authors: Jiang, Man
Article Type: Research Article
Abstract: In this paper, the notions of hesitant fuzzy dot subalgebras, hesitant fuzzy normal dot subalgebras, and hesitant fuzzy dot ideals of B-algebras are presented, and some of their features are examined, in this study. The homomorphic image and inverse image of hesitant fuzzy dot subalgebras, as well as the hesitant fuzzy dot ideal, are investigated. We also explore some related characteristics of hesitant fuzzy relations on the family of hesitant fuzzy dot subalgebras and hesitant fuzzy dot ideal of B-algebras.
Keywords: B-algebra, hesitant fuzzy dot subalgebra, hesitant fuzzy normal dot subalgebra, hesitant fuzzy dot ideal, hesitant fuzzy ρ- product relation
DOI: 10.3233/JIFS-220158
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6203-6212, 2022
Authors: Yu, Shun-Chi
Article Type: Research Article
Abstract: In the recent decades, genetic algorithms (GAs) have often been applied as heuristic techniques at various settings entailing production scheduling. However, early convergence is one of the problems associated with this approach. This study develops an efficient local search rule for the target-oriented rule in traditional GAs. It also addresses the problem of two-stage multiprocessor flow-shop scheduling (FSP) by viewing the due window and sequence-dependent setup times as constraints faced by common flow shops with multiprocessor scheduling suites in the actual production scenario. Using the simulated data, this study verifies the effectiveness and robustness of the proposed algorithm. The results …of data testing demonstrate that the proposed method may outperform other algorithms, including a significant hybrid algorithm, in addressing the problems considered. Show more
Keywords: Target-oriented, genetic algorithm, two-stage multiprocessor flow shop scheduling, due window, setup time
DOI: 10.3233/JIFS-220174
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6213-6228, 2022
Authors: Xu, Zhiwei | Li, Peng | Wei, Cuiping
Article Type: Research Article
Abstract: In recent years, to address the continued aging of China’s population, the Chinese government has focused on the issue of pensions through a series of pension policies. The traditional system of institutional pensions is facing serious challenges, with a variety of novel pension modes placing them under enormous pressure. Furthermore, the development of institutional pensions has been restricted by many factors, such as long construction cycles and high fees, meaning that this traditional system no longer meets the pension needs of the elderly. Improving the service quality of institutional pensions is inevitable for future progress. Thus, identifying the key factors …that influence the service quality of institutional pensions, and understanding the relationships between these factors, is hugely significant. Furthermore, traditional decision-making trial and evaluation laboratory (DEMATEL) method can not solve this problem because the number of factors is too large. To address these issues, we establish an evaluation system for Chinese pension institutions, and propose a hierarchical DEMATEL model based on probabilistic linguistic term sets (PLTSs), which can help decision makers to find the key factors influencing service quality in institutional pensions and deal with the evaluation problem with a large number of criteria. The proposed hierarchical DEMATEL model based on PLTSs fully reflects experts’ preferences and evaluation information, and is able to identify the directions in which China’s pension institutions should improve their quality of service. In addition, we use the best-worst method (BWM) to calculate the importance values of each subsystem, which makes the cause-effect relationship between subsystems more reasonable than the traditional DEMATEL method. Finally, we apply our method to evaluate nursing homes in Zhenjiang, Jiangsu province and propose some managerial implications. Show more
Keywords: Evaluation, hierarchical DEMATEL, PLTS, institutional pension, aging
DOI: 10.3233/JIFS-220181
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6229-6251, 2022
Authors: Prabhu, S. | Deepa, S. | Arulperumjothi, M. | Susilowati, Liliek | Liu, Jia-Bao
Article Type: Research Article
Abstract: Power utilities must track their power networks to respond to changing demand and availability conditions to ensure effective and efficient operation. As a result, several power companies continuously employ phase measuring units (PMUs) to continuously check their power networks. Supervising an electric power system with the fewest possible measurement equipment is precisely the vertex covering graph-theoretic problems otherwise a variation of the dominating set problem, in which a set D is defined as a power dominating set (PDS) of a graph if it supervises every vertex and edge in the system with a couple of rules. If the distance …vector eccentrically characterizes each node in G with respect to the nodes in R , then the subset R of V (G ) is a resolving set of G . The problem of finding power dominating set and resolving set problems are proven to be NP-complete in general. The finite subset R of V (G ) is said to be resolving-power dominating set (RPDS) if it is both resolving and power dominating set, which is another NP-complete problem. The η p (G ) is the minimal cardinality of an RPDS of a graph G . A neural network is a collection of algorithms that tries to figure out the underlying correlations in a set of data by employing a method that replicates how the human brain functions. Various neural networks have seen rapid progress in multiple fields of study during the last few decades, including neurochemistry, artificial intelligence, automatic control, and informational sciences. Probabilistic neural networks (PNNs) offer a scalable alternative to traditional back-propagation neural networks in classification and pattern recognition applications. They do not necessitate the massive forward and backward calculations that ordinary neural networks entail. This paper investigates the resolving-power domination number of probabilistic neural networks. Show more
Keywords: Metric dimension, basis, phasor measurement unit, power domination, probabilistic neural network, resolving set
DOI: 10.3233/JIFS-220218
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6253-6263, 2022
Authors: Kumar, B. Praveen | Hariharan, K. | Shanmugam, R. | Shriram, S. | Sridhar, J.
Article Type: Research Article
Abstract: Integration of the latest technological advancements such as Internet of Things (IoT) and Computational Intelligence (CI) techniques is an active research area for various industrial applications. The rapid urbanization and exponential growth of vehicles has led to crowded traffic in cities. The deployment of IoT infrastructures for building smart and intelligent traffic management system greatly improves the quality and comfort of city dwellers. This work aims at building a cost effective IoT enabled traffic forecasting system using deep learning techniques. The case study experimentation is done in a real time traffic environment. The main contributions of this work include: (i) …deploying road side sensor station built with ultrasonic sensor and Arduino Uno controller for obtaining traffic flow data (ii) building an IoT cloud system based on open source Thingspeak cloud platform for monitoring real time traffic (iii) performing short term traffic forecast using Recurrent Neural Network (RNN) models such as Long Short Term Memory (LSTM) and Gated Recurrent Unit (GRU). The performance of the prediction model is compared with the traditional statistical methods such as Autoregressive Integrated Moving Average (ARIMA), Seasonal ARIMA (SARIMA) and Convolutional Neural Network (CNN). The results show good performance metrics with RMSE of 5.8, 7.9, 10.2 for LSTM model and 6.7, 8.6, 10.9 for GRU model for three different scenarios such as whole day, morning congested hour and evening congested hour datasets. Show more
Keywords: IoT, cloud, vehicle detector, traffic flow forecast, time series prediction, RNN, LSTM, GRU
DOI: 10.3233/JIFS-220230
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6265-6276, 2022
Authors: Vinothkumar, V. | Kanimozhi, R.
Article Type: Research Article
Abstract: To increase the life and efficiency of power electronics equipment in a utility distribution system, the power quality improvement is essential part. In this work, to improve power quality by using Robust Resilient Back Propagation Neural Network (RBPNN) scheme for a Photovoltaic (PV)-Integrated Unified Power Quality Conditioner (UPQC) with cascaded multi-level inverter configurations are described. Among the proposed methods, there is no need to use a transformer and filter when multilevel UPQC is applied, and it is one of the great advantages. The proposed UQPC offers a PV array composition with a power converter connected to a DC-link capacitor that …can compensate for voltage sag, swell, voltage interruption, harmonics and reactive power. The Robust Resilient Back Propagation Neural Network controller is generate gating pulses to the UPQC. The reference currents and voltages for the controller are estimated using Synchronous Reference Frame (SRF) theory. The proposed cascaded multi-level inverter-based UPQC is designed using Matlab/Simulink Software. The simulation results confirm that the proposed method gives good results compared with existing Adaptive neural Fuzzy Inference System (ANFIS) and fuzzy logic methods. A real-time hardware system is also established to validate the simulation results. The effectiveness of the proposed system RBPN-UPQC approach is compared for both simulation and experimental results gives better low THD level 1.22%. Show more
Keywords: Unified power quality conditioner, photovoltaic, resilient back propagation neural network, harmonics, power quality
DOI: 10.3233/JIFS-220231
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6277-6294, 2022
Authors: Kırmacı, Volkan | Guler, Evrim | Kaya, Hüseyin
Article Type: Research Article
Abstract: This study consists of modeling studies for thermal separation of a Ranque Hilsch Vortex Tube (RHVT) by using four different machine learning methods. Compressed air used RHVT, the data obtained as a result of experiments with different nozzles were modeled with linear, k-Nearest Neighbor (kNN), Random Forest (RF), and Support Vector Machine (SVM) regression methods to compare each other. Nozzle properties and inlet pressure were used as input parameters, and the total temperature gradient ΔT was examined as the output. Experiment results were handled in two groups as training and test groups at different percentages. ΔT calculated by modeling hot …and cold output test data, and ΔT calculated directly with the experiments were modeled and compared. According to the obtained results, the highest percentage of accuracy value of 97.58% was obtained with the SVM method, and this value was obtained with the set in which 90%–10% of the experimental results were used as the training and test data, respectively. The accuracy ratios calculated with RF, kNN, and linear regression models under the same conditions are 93.99, 88.49, and 78.97, respectively. Show more
Keywords: Vortex tube, thermal performance, prediction, regression models
DOI: 10.3233/JIFS-220274
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6295-6306, 2022
Authors: Jain, Vipin | Kashyap, Kanchan Lata
Article Type: Research Article
Abstract: This work presents the analysis of significant sentiments and attitudes of people towards the COVID-19 vaccination. The tweeter messages related to the COVID-19 vaccine is used for sentiment evaluation in this work. The proposed work consists of two steps: (i) natural processing language (NLP) and (ii) classification. The NLP is utilized for text pre-processing, tokenization, data labelling, and feature extraction. Further, a stack-based ensemble machine learning model is used to classify sentiments as positive, negative, or neutral. The stack ensemble machine learning model includes seven heterogeneous machine learning techniques namely, Naive Bayes, Logistic regression, Decision Tree, Random Forest, AdaBoost Classifier, …Gradient Boosting, and extreme Gradient Boosting (XGB). The highest classification accuracy of 97.2%, 88.34%, 88.22%, 85.23%, 86.30%, 87.54%, 86.63%, and 88.78% is achieved by ensemble machine learning model, Logistic regression, AdaBoost, Decision Tree, Naive Bayes, Random Forest, Gradient Boosting, and XGB Classifier, respectively. Show more
Keywords: COVID-19 vaccinations, sentiments, social-media, machine learning, ensemble machine learning
DOI: 10.3233/JIFS-220279
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6307-6319, 2022
Authors: Saad, Muhammad | Rafiq, Ayesha
Article Type: Research Article
Abstract: T-spherical fuzzy sets, the direct extension of fuzzy sets, intuitionistic fuzzy sets and picture fuzzy sets are examined in this composition, and a mathematical examination among them is set up. A T-spherical fuzzy set can demonstrate phenomenon like choice utilizing four trademark capacities indicating the level of choice of inclusion, restraint, resistance, and exclusion, another example of such situation is that human opinion cannot be restricted to yes or no but it can be yes, abstain, no and refusal. T-spherical fuzzy set can deal the said situation with a boundless space. With the assistance of some mathematical outcomes, it is …talked about that current similarity measures have a few drawbacks and could not be implemented where the data is in T-spherical fuzzy mode. Thus, some new similarity measures in T-spherical fuzzy environment are proposed, with the assistance of certain outcomes, it is demonstrated that the suggested similarity measures are generalization of current ones. Further the proposed similarity measures are applied in pattern recognition with numerical supportive examples. The maximum spanning tree clustering algorithm has been extended into T-spherical fuzzy context and supports our theory with numerical examples. A parallel investigation of fresh and existing similarity measures have been made and some of the benefits of designated work have been discussed. Show more
Keywords: T-spherical fuzzy sets, T-spherical fuzzy similarity measures, pattern recognition, maximum spanning tree, clustering
DOI: 10.3233/JIFS-220289
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6321-6331, 2022
Authors: Suphalakshmi, A. | Ahilan, A. | Jeyam, A. | Subramanian, Malliga
Article Type: Research Article
Abstract: Cervical cancer is the most common and deadly malignancy affecting women worldwide. The prediction and treatment of this malignancy are necessary in order to avoid serious complications. In recent days, deep learning has enhanced the accuracy of cervical cancer prediction in its early stages. In this study, a deep learning based EN-FELM approach is proposed to detect and classify the cervical cells. Initially, the pap smear images are pre-processed to eliminate the background distortions. The EfficientNet is a reversed bottleneck MBConv used for feature extraction. Consequently, fuzzy extreme learning machine (FELM) is used to classify the healthy, benign, low squamous …intraepithelial lesions (LSIL) and high squamous intraepithelial lesions (HSIL). The proposed model acquires the best classification accuracy on Herlev and SIPaKMeD datasets range of 99.6% and 98.5% respectively. As a result, the classification using FELM produces more efficient and accurate result which is significantly high compared to the traditional classifiers. The proposed EN-FELM improves the overall accuracy of 0.2%, 0.13% and 14.6% better than Autoencoder, LSTM and KNN with CNN respectively. Show more
Keywords: Cervical cancer, fuzzy extreme learning machine (FELM), efficientnet, pap smear images, classification
DOI: 10.3233/JIFS-220296
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6333-6342, 2022
Authors: Ulu, Cenk
Article Type: Research Article
Abstract: Almost all exact inversion methods provide inverse solutions for only one input variable of fuzzy systems. These methods have certain limitations on the fuzzy system structure such as monotonic rule bases, singleton rule consequents, and invertibility check. These requirements limit the modeling capabilities of the fuzzy systems and also may result in poor application performances. In this study, an exact analytical inversion method is presented for multi-input-single-output decomposable TS fuzzy systems with either singleton or linear consequents. In the proposed method, fuzzy system structures do not need to have monotonic rule bases, singleton rule consequents, or any invertibility conditions. Thus, …more flexible fuzzy systems can be used in inverse model based applications. The proposed method provides a simple and systematic way to obtain unique inverse solutions of all input variables simultaneously with respect to any desired system output value. For this purpose, an inversion trajectory approach that guarantees the existence and uniqueness of the inverse solutions is introduced. The inversion trajectory consists of a set of paths defined on the specific edges of universe of discourses of the decomposed fuzzy subsystems. Using this approach, the inverse definition of the overall fuzzy system can easily be derived only by inverting the related decomposed fuzzy subsystems on this inversion trajectory and then combining their inverse definitions. In this way, the inverse definition of the overall fuzzy system is obtained as consisting of analytical solutions of linear and quadratic equations for singleton and linear consequent cases, respectively. Simulation studies are given for the inversion of two and three-input-single-output fuzzy systems, and the exactness and effectiveness of the proposed method are demonstrated. Show more
Keywords: Fuzzy systems, decomposability, inversion, multivariable systems, Takagi-Sugeno fuzzy systems
DOI: 10.3233/JIFS-220329
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6343-6356, 2022
Authors: Karabacak, Yusuf | Yaşar, Ali | Saritaş, İsmail
Article Type: Research Article
Abstract: In this paper, a simulation study enhanced to model that the speed control of brushless direct current (BLDC) motors used in electric vehicles with intelligent control methods. The simulation study was prepared in Matlab/Simulink environment. The first control method is Type-1 fuzzy logic control (T1FLC), and the second control method is the Intermittent Type-2 fuzzy logic control (IT2FLC) model. Membership functions for different membership numbers have been created for both types of FLC models. These are 3×3, 5×5, 7×7. Control methods are prepared in Matlab/M-file environment. The model is defined as the input variable of the error, which is the …difference between the reference speed and the motor speed, and the output variable of the Pulse Width Modulation (PWM) signal applied to the motor. The simulation study maintains the speed of the BLDC motor up to the reference speed with T1FLC and IT2FLC controllers, depending on the reference speed and applied load values. Depending on the number of different memberships, the effects of controller performances on the control of motor speed have been observed. The graphs and findings of the experiment are shown in the results and discussion section. Show more
Keywords: Speed control, fuzzy logic system, BLDC motor
DOI: 10.3233/JIFS-220344
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6357-6370, 2022
Authors: Al Ghour, Samer
Article Type: Research Article
Abstract: Let (Y , σ , B ) be a soft topological space. We introduce two new classes of soft subsets of (Y , σ , B ): soft connectedness relative to (Y , σ , B ) and soft θ -connectedness relative to (Y , σ , B ). We show that the class of soft connected subsets relative to (Y , σ , B ) includes the class of soft θ -connected subsets relative to (Y , σ , B ), but that these two classes do not always coincide. However, they coincide when (Y , σ , B …) is soft regular. We have provided several properties for each of these classes of soft sets. As two main results, we prove that for a given soft function f pu : (Y , σ , B ) ⟶ (Y , σ , B ) and a soft subset H of (Y , σ , B ), the soft set f pu (H ) is θ -connected relative to (Y , σ , B ) if (f pu is soft weakly continuous and H is connected relative to (Y , σ , B )) or (f pu is soft θ -continuous and H is θ -connected relative to (Y , σ , B )). Also, we investigate the correspondence between our new concepts in a soft topological space and their corresponding topological spaces properties. Moreover, we provide some examples to illustrate the obtained results and relationships. Show more
Keywords: θ-closure, soft separation, soft connected, soft θ-continuous, soft generated soft topological space, soft induced topological spaces
DOI: 10.3233/JIFS-220371
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6371-6381, 2022
Authors: Yu, Jianping | Fu, Jilin | Bai, Tana | Zhang, Tao | Li, Shaoxiong
Article Type: Research Article
Abstract: Semantic merger, which is a phenomenon of semantic convergence of two meanings of a word in a certain context, is a kind of semantic indeterminacy in natural language, however, it brings trouble for natural language processing. Discovery of the features causing semantic mergers has been a significant but tough issue in natural language processing. Until now this issue has remained untouched. Therefore, in this article, this issue is studied. Based on a 1.8 million word English multi-genre corpus, taking English modal verb may as the target word, the contextual features causing semantic mergers between may (root possibility) and may …(epistemic possibility) are investigated by an approach of attribute partial order diagram (APOD). First, the objects of may is categorized into 3 classes based on the idea of the three-way decision: may 1 (root possibility), may 2 (epistemic possibility) and may 3 (merger), then the rules for word sense disambiguation (WSD) of the three classes are extracted, respectively, and a comparison is made among the rules for different classes, and finally the features causing semantic merger of may are discovered. The discovered knowledge provides valuable evidence for finding the semantic merger, the cause of the semantic merger and the solution of semantic mergers of may , and the proposed approach can also be use for other modal verbs, which may benefit the natural language processing of English modal verbs. Show more
Keywords: Semantic merger, features causing semantic merger, English modal verb, attribute partial order diagram
DOI: 10.3233/JIFS-220388
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6383-6393, 2022
Authors: Gopinath, P. | Shivakumar, R.
Article Type: Research Article
Abstract: Recognition of finger vein patterns is essential technique that analyses the finger vein patterns to enable accurate authentication of an individual. A proper, accurate and quick learning of patterns is essentially required for improving the classification pattern. It is essential in developing an intelligent algorithm to effectively study and classify the patterns. In this paper, we develop an improved deep learning hybrid model for feature extraction and classification. A dimensional reduction deep neural network (DR-DNN) model has included a dimensional reduction model for extracting the essential features by reducing the dimensionality of feature datasets. A convolutional neural network (CNN) helps …in classifying the benign vein patterns from the malignant vein patterns. The effectiveness is compared against existing deep learning classifiers to measure how effective the deep learning model is used for classifying finger vein patterns for biometric authentication. The results shows that the proposed method achieves an accuracy rate of 97.16% for the proposed method, where the other existing methods including CNN, Recurrent Neural Network (RNN) and Deep Neural Nets (DNN) has an accuracy rate of 86%, 80.66% and 88.31%, respectively. Show more
Keywords: Deep neural networks, Deep Convolutional Neural Network, feature extraction, classification, finger vein patterns
DOI: 10.3233/JIFS-220423
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6395-6403, 2022
Authors: Lin, Ting-Yu | Hung, Kuo-Chen | Lin, Kuo-Ping | Hon, Jau-Shin | Chiu, Anthony Shun Fung
Article Type: Research Article
Abstract: With the economic growth of the world, sustainable development is a popular issue in recent years. Sustainable assessment is an important part of sustainable development. There are many previous scholars have used multiple-criteria decision-making (MCDM) to develop different evaluation frameworks in different fields. Elimination et Choix Traduisant la Realite II (ELECTRE II) is one of the most commonly used methods for MCDM. ELECTRE II uses alternatives, criteria, and criteria weighting from decision-makers to calculate the concordance and discordance indices. These two indices are used to rank the alternatives. The concordance and discordance indices in ELECTRE II are important because they …are the key to make accurate decisions. Previous scholars have failed to make comprehensive calculations for these indices, nor make their units of measure comparable, which negatively affected their results. This study improved the approach in calculating these indices and illustrated it using three case studies: (1) university examination results, (2) a sustainability assessment of groundwater remediation and (3) an assessment of power generation technologies. This improved ELECTRE II method offers decision-makers an objective basis for decision-making. Show more
Keywords: Sustainability assessment, multiple-criteria decision-making, ELECTRE II, decision analysis
DOI: 10.3233/JIFS-220441
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6405-6418, 2022
Authors: Manjula, P. | Priya, S. Baghavathi
Article Type: Research Article
Abstract: In today’s world, a Network Intrusion Detection System (NIDS) plays a vital role in order to secure the Wireless Sensor Network (WSN). However, the traditional NIDS model faced critical constraints with network traffic data due to growth in the complexity of modern attacks. These constraints have a direct impact on the overall performance of the WSN. In this paper, a new robust network intrusion classification framework based on the enhanced Visual Geometry Group (VGG-19) pre-trained model has been proposed to prolong the performance of WSN. Primarily, the pre-trained weights from the ImageNet dataset are utilized to train the parameters of …the VGG-19. Afterward, a Hybrid Deep Neural Network based on Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) will be employed to extract the influential features from network traffic data to enlarge the intrusion detection accuracy. The proposed VGG-19 + Hybrid CNN-LSTM model exploits both binary classification and multi-classification to classify attacks as either normal or attacked. A network intrusion benchmark dataset is used to assess the performance of the suggested system. The results reveal that the proposed VGG-19 + Hybrid CNN-LSTM learning system surpasses other pre-trained models with a superior accuracy of 98.86% during the multi-classification test. Show more
Keywords: Intrusion detection, classification, deep neural network, convolutional neural network, machine learning
DOI: 10.3233/JIFS-220444
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6419-6432, 2022
Authors: Suresh Kumar, K. | Helen Sulochana, C. | Radhamani, A.S. | Ananth Kumar, T.
Article Type: Research Article
Abstract: Many websites are attempting to offer a platform for users or customers to leave their reviews and comments about the products or services in their native languages. The cross-domain adaptation (CDA) analyses sentiment across domains. The sentiment lexicon falls short resulting in issues like feature mismatch, sparsity, polarity mismatch and polysemy. In this research, an augmented sentiment dictionary is developed in our native regional language (Tamil) that intends to construct the contextual links between terms in multi-domain datasets to reduce problems like polarity mismatch, feature mismatch, and polysemy. Data from the source domain and target domain both labeled and unlabeled …are used in the proposed dictionary. To be more specific, the initial dictionary uses normalised pointwise mutual information (nPMI) to derive contextual weight, whereas the final dictionary uses the value of terms across all reviews to compute the accurate rank score. Here, a deep learning model called BERT is used for sentiment classification. For cross-domain adaptation, a modified multi-layer fuzzy-based convolutional neural network (M-FCNN) is deployed. This work aims to build a single dictionary using large number of vocabularies for classifying the reviews in Tamil for several target domains. This extendible dictionary enhances the accuracy of CDA greatly when compared to existing baseline techniques and easily handles a large number of terms in different domains. Show more
Keywords: Cross-domain adaptation (CDA), BERT classification, modified multi-layer fuzzy convolutional neural networks (M-FCNN)
DOI: 10.3233/JIFS-220448
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6433-6450, 2022
Authors: Titus, P. | Ajitha Fancy, J. | Joshi, Gyanendra Prasad | Amutha, S.
Article Type: Research Article
Abstract: A set S ⊆ V in a graph G is a MED -set if every vertex in V - S has a monophonic eccentric vertex in S . The MED -number γme (G ) is the cardinality of a minimum MED -set of G . A set S ⊆ V in a graph G is a CMED -set if S is a MED -set and the induced subgraph is connected. The CMED -number γcme (G ) is the cardinality of a minimum CMED -set of G . We investigate some properties of the CMED …-sets. Also, we determine the bounds of the CMED -number and find the same for some standard graphs. The CMED -number has applications in security based communication networks in real life situations. This motivated us to introduce and investigate CMED -set in a graph. Show more
Keywords: Monophonic eccentric vertex, MED-set, MED-number, CMED-set, CMED-number
DOI: 10.3233/JIFS-220463
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6451-6460, 2022
Authors: Menekse, Akin | Akdag, Hatice Camgoz
Article Type: Research Article
Abstract: Combinative distance-based assessment (CODAS) is a multi-criteria decision-making (MCDM) method that is based on the Euclidean and Hamming distances of alternatives from the average scores of attributes. Spherical fuzzy sets, as the recent extensions of ordinary fuzzy sets, were developed based on Pythagorean and neutrosophic sets and enable decision-makers to express their membership, non-membership, and hesitancy degrees independently and in a larger domain than most other fuzzy extensions. This paper proposes a new interval-valued spherical fuzzy CODAS method and provides extra space for catching the vagueness in the nature of the problem. The feasibility and practicality of the proposed model …are illustrated with an application for evaluating the reopening readiness of academic units for campus education in the era of COVID-19. Three decision-makers from a higher education institution evaluate four academic units with respect to five strategic criteria and prioritize them according to their readiness levels for the campus type of education. Sensitivity and comparative analyses, theoretical and practical contributions, limitations, and future research avenues are also presented in the study. Show more
Keywords: CODAS, interval-valued spherical fuzzy, COVID-19, higher education institution, reopening readiness
DOI: 10.3233/JIFS-220468
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6461-6476, 2022
Authors: Rajnish, Kumar | Bhattacharjee, Vandana
Article Type: Research Article
Abstract: Software defect prediction is used to assist developers in finding potential defects and allocating their testing efforts as the scale of software grows. Traditional software defect prediction methods primarily concentrate on creating static code metrics that are fed into machine learning classifiers to predict defects in the code. To achieve the desired classifier performance, appropriate design decisions are required for deep neural network (DNN) and convolutional neural network (CNN) models. This is especially important when predicting software module fault proneness. When correctly identified, this could help to reduce testing costs by concentrating efforts on the modules that have been identified …as fault prone. This paper proposes a CONVSDP and DNNSDP (cognitive and neural network) approach for predicting software defects. Python Programming Language with Keras and TensorFlow was used as the framework. From three NASA system datasets (CM1, KC3, and PC1) selected from PROMISE repository, a comparative analysis with machine learning algorithms (such as Random Forest (RF), Decision Trees (DT), Nave Bayes (NF), and Support Vector Machine (SVM) in terms of F-Measure (known as F1-score), Recall, Precision, Accuracy, Receiver Operating Characteristics (ROC) and Area Under Curve (AUC) has been presented. We extract four dataset attributes from the original datasets and use them to estimate the development effort, development time, and number of errors. The number of operands, operators, branch count, and executable LOCs are among these attributes. Furthermore, a new parameter called cognitive weight (Wc) of Basic Control Structure (BCS) is proposed to make the proposed cognitive technique more effective, and a cognitive data set of 8 features for NASA system datasets (CM1, KC3, and PC1) selected from the PROMISE repository to predict software defects is created. The experimental results showed that the CONVSDP and DNNSDP models was comparable to existing classifiers in both original datasets and cognitive data sets, and that it outperformed them in most of the experiments. Show more
Keywords: Machine learning, software defect prediction, CNN model, cognitive weight, basic control structures, neural network
DOI: 10.3233/JIFS-220497
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6477-6503, 2022
Authors: Singh, Upendra | Gupta, Puja | Shukla, Mukul
Article Type: Research Article
Abstract: Image Incorporation concerns, including background confusion, uneven population distribution, and variations in scale and familiarity, can make group counting difficult. Pre-existing information and multi-level contextual representations are required to handle these problems effectively with deep neural networks and Mask-RCNN. Numerous studies on crowd counting use density maps without segmentation, which treat a group of individuals as a single entity. This article offers a hybrid method for crowd counting that combines Mask-RCNN (MRCNN) and a bidirectional convolutional long-term memory network (ConvLSTM), dubbed (CC: MRCNN-biCLSTM). The CC: MRCNN-biCLSTM is based on the Mask-RCN; it first segments instances and generates density maps, which …are passed into adversarial learning during the training phase. Finally, the bidirectional convolutional LSTM is being used to return metrics and counts for individuals within a group of individuals. Following that, the suggested activity detection technique based on the Bayesian non-linear filter AD-BNF is used to identify a person’s activity. Additionally, the suggested approach resolves human grouping and enhances metric performance. Extensive studies demonstrate that the suggested method outperforms more sophisticated techniques on four frequently used difficult criteria for density map precision and quality. Show more
Keywords: Mask-RCNN, bidirectional ConvLSTM, cluster counting, adversarial learning, activity detection
DOI: 10.3233/JIFS-220503
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6505-6520, 2022
Authors: Khan, Madad | Anis, Saima | Zuev, Sergei | Ullah, Hikmat | Zeeshan, Muhammad
Article Type: Research Article
Abstract: In this paper, we have discussed some new operations and results of set theory for complex fuzzy sets (CFSs). Moreover, we developed the basic results of CFSs under the basic operations such as complex fuzzy simple difference, bounded sum, bounded difference, dot product, bounded product, union, intersection, and Cartesian product. We explored the CFSs and discussed the related properties with examples such as complex fuzzy bounded sum over the intersection, complex fuzzy dot product over the union, etc. Identifying the reference signals under the environment of CFSs have always been a challenging. Many algorithms based on set theoretic operations and …distance measures have been proposed for identifying a reference signal using any common system. But linear time invariant (LTI) system is considered easy to analyze the linear and time-varying signals. We used CFSs in signals and systems. We developed an algorithm based on convolution product and LTI system under the complex fuzzy environment. We identified a high degree of resemblance (reference signal) of the received signals to the reference signal in a linear time-invariant (LTI) system that receives an input signal and produces an output signal. Show more
Keywords: Complex fuzzy sets, inverse discrete Fourier transform, signals and systems, linear-time invariant (LTI) system
DOI: 10.3233/JIFS-220517
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp. 6521-6548, 2022
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]