Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2024: 1.7
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Anu Shalini, T. | Sri Revathi, B.
Article Type: Research Article
Abstract: This paper presents the design of a grid connected hybrid system using modified Z source converter, bidirectional converter and battery storage system. The input sources for the proposed system are fed from solar and wind power systems. A modified high gain switched Z source converter is designed for supplying constant DC power to the DC-link of the inverter. A hybrid deep learning (HDL) algorithm (CNN-BiLSTM) is proposed for predicting the output power from the hybrid systems. The HDL method and the PI controller generates pulses to the proposed system. The superiority of the proposed hybrid DL method is compared with …the conventional DL methods like CNN, LSTM, BiLSTM methods and the performance of the hybrid system is validated. A closed loop control framework is implemented for the proposed grid integrated hybrid system and its performance is observed by implementing the PI, Fuzzy and ANN controllers. A 1.5Kw hybrid system is designed in MATLAB/SIMULINK software and the results are validated. A prototype of the proposed system is developed in the laboratory and experimental results are obtained from it. From the simulation and experimental results, it is observed that the ANN controller with SVPWM (Space vector Pulse width Modulation) gives a THD (Total harmonic distortion) of 2.2% which is within the IEEE 519 standard. Therefore, from the results it is identified that the ANN-SVPWM method injects less harmonic currents into the grid than the other two controllers. Show more
Keywords: Power forecasting, timeseries forecasting, bidirectional long short-term memory, convolution neural network, renewable power generation
DOI: 10.3233/JIFS-220307
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 6, pp. 8247-8262, 2022
Authors: Radhakrishnan, C. | Asokan, R.
Article Type: Research Article
Abstract: To safeguard private information, image steganography is extensively used. Research is focused on ways to enhance steganographic technologies so that they may increase compression ratio while maintaining steganography image integrity. Because of its essential qualities such as security, scalability, and robustness, Steganography is a preferred way of communicating protected secret information to prevent hacking and misuse. This proposed research offers a steganography approach based on Enhanced Chaotic Particle Swarm Optimization (ECPSO), which uses chaos theory to determine the optimal pixel positions in the cover picture to hide confidential information when keeping the steganography quality in the images. Both the cover …and secret pictures are separated into blocks to increase hiding capacity, with each component storing a sufficient quantity of secret data by mapping the pixels. The suggested ECPSO-Stegano system has better results with the criteria of Mean Square Error (MSE) of 0.00018%, Peak-Signal-to-Noise-Ratio (PSNR) of 79.66%, Bit Error Rate (BER) of 0.45% in average, and Structural Similarity Index (SSI) of 0.98 in average for various input size. It’s also robust to statistical threats. Show more
Keywords: Chaos map, BET, Stego-image, blocks, optimal pixel, confidentiality
DOI: 10.3233/JIFS-221093
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 6, pp. 8263-8273, 2022
Authors: Sammeta, Naresh | Parthiban, Latha
Article Type: Research Article
Abstract: In recent times, a number of Internet of Things (IoT) related healthcare applications have been deployed for automating healthcare services and offering easy accessibility to patients. Several issues like security, fault-tolerant, and reliability have restricted the utilization of IoT services in real-time healthcare environments. To achieve security, blockchain technology can be utilized which offers effective interoperability of healthcare databases, ease of medical data access, device tracking, prescription database, hospital assets, etc. Therefore, this paper presents an optimal Elliptic curve cryptography-based encryption algorithm for a blockchain-enabled medical image transmission model, named OECC-BMIT. The presented OECC-BMIT model involves different stages of operations …such as encryption, optimal key generation, blockchain-enabled data transmission, and decryption. Firstly, the OECC-BMIT model performs Elliptic curve cryptography (ECC) based encryption technique to securely transmit the medical images. In order to generate the optimal set of keys for the ECC technique, modified bat optimization (MBO) algorithm is applied. Then, the encrypted images undergo secure transmission via blockchain technology. The encrypted images are decrypted on the recipient side and the original medical image is reconstructed effectively. Extensive sets of experimentations were performed to highlight the goodness of the OECC-BMIT algorithm and the obtained results pointed out the improved outcome over the state of art methods in terms of different measures. Show more
Keywords: Blockchain, encryption, healthcare, medical images, optimal key generation
DOI: 10.3233/JIFS-211216
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 6, pp. 8275-8287, 2022
Authors: Ren, Yaxue | Wen, Yintang | Liu, Fucai | Zhang, Yuyan
Article Type: Research Article
Abstract: Chaotic systems are dynamic systems with aperiodic and pseudo-random properties, and systems in many fields exhibit chaotic time-series properties. Aiming at the fuzzy modeling problem of chaotic time series, this paper proposes a new fuzzy identification method considering the selection of important input variables. The purpose is to achieve higher model modeling and prediction accuracy by constructing a model with a simple structure. The relevant input variable was swiftly chosen in accordance with the input variable index after the Two Stage Fuzzy Curves method was used to determine the weight of the correlation between each input variable and the output …from a large number of selectable input variables. The center and width of the irregular Gaussian membership function were then optimized using the fuzzy C-means clustering algorithm and the particle swarm optimization technique, which led to the determination of the fuzzy model’s underlying premise parameters. Finally, the fuzzy model’s conclusion parameters were determined using the recursive least squares method. This model is used to simulate three chaotic time series, and the outcomes of the simulation are contrasted and examined. The outcomes demonstrate that the fuzzy identification system has higher prediction accuracy based on a simpler structure, demonstrating its validity. Show more
Keywords: Fuzzy identification, input variable selection, chaotic time series, fuzzy c-means algorithm, irregular gaussian function
DOI: 10.3233/JIFS-212527
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 6, pp. 8289-8301, 2022
Authors: Alshareef, Esam Alsadiq | Ebrahim, Fawzi Omar | Lamami, Yosra | Milad, Mohamed Burid | Eswani, Mohamed S.A. | Bashir, Sedigh Abdalla | Bshina, Salah A.M. | Jakdoum, Anas | Abourqeeqah, Asharaf | Elbasir, Mohamed O | Elbahrit, Ellafi.A.
Article Type: Research Article
Abstract: This article has been retracted. A retraction notice can be found at https://doi.org/10.3233/JIFS-219433 .
DOI: 10.3233/JIFS-220516
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 6, pp. 8303-8313, 2022
Authors: Harikumar, Sandhya | Sathyajit, Rohit | Karumudi, Gnana Venkata Naga Sai Kalyan
Article Type: Research Article
Abstract: News feeds generate colossal amount of data consisting of important information hidden in the intricacies. State of the art methods are still at infancy in providing a very generic and publicly available solution to skim through the important information in the news from various sources and an ability to search using specific keywords in different languages. This paper focuses on designing a tool to extract semantic details from news articles published through various internet sources in various languages. The semantic information is stored within DBMS for ease of organizing and retrieving the data. Further, a querying facility to search through …entire articles based on the keyword or date-based search is also proposed to view the crisp content. The news articles in English, and two Indian languages - Hindi and Malayalam are considered for experimentation. The proposed strategy consists of two main components namely, Generative model creation and Query engine. Generative model aims to extract important entities and keywords along with their relevance to the article and other similar articles using Latent Dirichlet Allocation(LDA) and Named Entity Recognition(NER). Query engine is to facilitate on the fly retrieval of semantic content from the database, based on user keyword. The search engine, along with database indexing, reduces the access time to the database thereby retrieving the information in less time. Experimental results show that the proposed method is effective in terms of quality of information and time consumed for information retrieval. Show more
Keywords: News analytics, multilingual, natural language processing(NLP), Latent dirichlet allocation(LDA), semantic information retrieval
DOI: 10.3233/JIFS-221184
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 6, pp. 8315-8327, 2022
Authors: Senthamizh Selvi, S. | Anitha, R.
Article Type: Research Article
Abstract: In India, most of the Science and Technology resources available are in English. Developing an Automatic Language Translation Engine from English (source language) to Tamil (target language) is very essential for the people who need to get technical resources in their native language. The challenges in designing such engines using Natural Language Processing (NLP) tools include Lexical, Structural, and Syntax level ambiguity. To solve these challenges, the development of a Part-Of-Speech (POS) tagger is essential. The Verb-Framed languages like Tamil, Japanese, and many languages in Romance, Semitic, and Mayan languages families have high morphological richness but lack either a large …volume of annotated corpora or manually constructed linguistic resources for building POS tagger. Moreover, the Tamil Language has a low resource, high word sense ambiguity, and word-free order form giving rise to challenges in designing Tamil POS taggers. In this paper, we postulate a Hybrid POS tagger algorithm for Tamil Language using Cross-Lingual Transformation Learning Techniques. It is a novel Mining-based algorithm (MT), which finds equivalent words of Tamil in English on less volume of English-Tamil bilingual unannotated parallel corpus. To enhance the performance of MT, we developed Tamil language-specific auxiliary algorithms such as Keyword-based tagging algorithm (KT) and Verb pattern-based tagging algorithm (VT). We also developed a Unique pair occurrence-tagging algorithm (UT) to find the one-time occurrence of Tamil-English pair words. Our experiments show that by improving Context-based Bilingual Corpus to Bilingual parallel corpus and after leaving one-time occurrence words, the proposed Hybrid POS tagger can predict 81.15% words, with 73.51% accuracy and 90.50% precision. Evaluations prove our algorithms can generate language resources, which can improve the performance of NLP tasks in Tamil. Show more
Keywords: Natural language processing, part-of-speech tagger, sandhi, bilingual parallel corpus, cross-lingual transformation learning
DOI: 10.3233/JIFS-221278
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 6, pp. 8329-8348, 2022
Authors: Rajesh, D. | Kiruba, D. Giji
Article Type: Research Article
Abstract: This article has been retracted. A retraction notice can be found at https://doi.org/10.3233/JIFS-219433 .
DOI: 10.3233/JIFS-212012
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 6, pp. 8349-8357, 2022
Authors: Gopinath, N. | Prayla Shyry, S.
Article Type: Research Article
Abstract: As technology advances, it becomes easier to share large amounts of data over the internet. Cloud computing is one of the technologies that allows for easy data sharing over the internet. It is critical to provide security for this data when they are being shared across the internet. The security of data saved in cloud storage, as well as data transport and transmitting a key required to encrypt data between two parties, has been a source of concern for the industry, as a result of the growing use of cloud services in recent years. Collective attacks are significantly more powerful …than individual strikes, according to our research. Despite the fact that additional research works were studied in the previous literature review, there are some study concerns for not correcting third-party data hacking. Therefore, this paper focuses on the design of Secured Quantum Key Distribution (SQKD) with Fuzzy logic to improve the security of the shared key. Quantum Key Distribution, Post Quantum Key Distribution, and the EPR Proto-col are technologies that increase the security of data sharing. We have incorporated the Secured Quantum Key Distribution (SQKD) with Fuzzy logic in our proposed work to improve the security of the shared key. The proposed systems include some additional characteristics in addition to the existing approaches. The proposed model uses shifting algorithms and the fuzzification procedure to assure the security of the secret key in the Fuzzification of Quantum Key approach. The experimental results states that the mean value of security losses in SFQ is 1.8306051, and the mean value of QKD is 14.6448416, with standard deviations of 1.7329 and 13.863 for SFQ and QKD, respectively. Show more
Keywords: Quantum key distribution, fuzzy logic, SQKD, Q-bits and quantum cryptography
DOI: 10.3233/JIFS-220398
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 6, pp. 8359-8369, 2022
Authors: Wei-Jie, Lucas Chong | Chong, Siew-Chin | Ong, Thian-Song
Article Type: Research Article
Abstract: Masked face recognition embarks the interest among the researchers to find a better algorithm to improve the performance of face recognition applications, especially in the Covid-19 pandemic lately. This paper introduces a proposed masked face recognition method known as Principal Random Forest Convolutional Neural Network (PRFCNN). This method utilizes the strengths of Principal Component Analysis (PCA) with the combination of Random Forest algorithm in Convolution Neural Network to pre-train the masked face features. PRFCNN is designed to assist in extracting more salient features and prevent overfitting problems. Experiments are conducted on two benchmarked datasets, RMFD (Real-World Masked Face Dataset) and …LFW Simulated Masked Face Dataset using various parameter settings. The experimental result with a minimum recognition rate of 90% accuracy promises the effectiveness of the proposed PRFCNN over the other state-of-the-art methods. Show more
Keywords: Covid-19, PRFCNN, random forest, principal component analysis, convolutional neural network
DOI: 10.3233/JIFS-220667
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 6, pp. 8371-8383, 2022
Authors: Levitan, Boris A. | Dinyaeva, Nellie S. | Sudarenko, Dmitry A. | Lyutov, Alexey V.
Article Type: Research Article
Abstract: The article discusses the production of microwave components based on the technology of low-temperature co-fired ceramics (LTCC). A set of standards Continuous Acquisition and Life cycle Support (CALS) and International Organization for Standardization (ISO) and business process models in these standards are considered. Based on the basic models of the ISO and CALS standards, a structural-parametric description model (SPD) has been developed, in which the structure of ISO-9000 is preserved, and specific parameters of LTCC technology are added. The methodology of the (SPD) of this technology is proposed. Open source software for processes, resources, results, production operations, control and management …has been developed for each technological operation (TO), workplace and area. The methodology for creating information support and Microsoft Access Database Management System (DBMS) of SPD is proposed. Recommendations for the development of a software-methodological complex of information support for SPD of LTCC technology are proposed. Show more
Keywords: Low-temperature co-fired ceramics, ISO-9000, CALS, method of structural parametric description, information support, structural-parametric description model of low-temperature co-fired ceramics, Microsoft Access Database Management System
DOI: 10.3233/JIFS-220889
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 6, pp. 8385-8395, 2022
Authors: Periasamy, Madhumathi | Kaliannan, Thenmalar
Article Type: Research Article
Abstract: Microgrids (MGs) are distributed generation and distribution systems that include distributed generation (DG) units, energy storage systems (ESSs), distributed reactive sources (DRSs), and resilient loads that can operate in either connected or isolated modes. When dealing with uncontrolled DGs such as Wind Energy Systems (WES) and Photovoltaic Energy Systems (PVES), MGs planners have a difficult time making decisions. The work proposed in this paper addresses three interconnected works: (i) the implementation of a rigorous hybrid optimization approach for reconfiguration and DGs placement; (ii) the performance investigation under uncertain behavior of RES-based DGs and demand; and (iii) performance enhancement realization through …the replacement of hybrid DGs for RES-based DGs. An Improved Moth Flame Optimization (IMFO), which is a multi-objective optimization method, has been linked with fuzzy logic in order to handle multiple objectives in an efficient manner. These objectives include the minimization of voltage deviation, the reduction of generation cost, and the reduction of loss. The quality of the power, the amount of money saved by consumers, and the benefits to the Distribution System Operator (DSO) might all be improved with the help of a hybrid algorithm. This research is also extended to address the uncertainties of RES-based DGs by replacing hybrid DGs in the most optimal locations. IEEE 33 bus RDS is used to test radial distribution system (RDS) microgrids. For validation purposes, uses 24-hour load patterns to mimic WES and PVES’ 24-hour load dispatching behavior. The research findings clearly demonstrate the advantages of microgrids over traditional architectures. The hybrid DG requires an average generating cost of 185.33 $/kW in order to produce 100 kW of power throughout the day with significantly reduced emissions. Show more
Keywords: Renewable energy sources, radial distribution system, optimization, whale optimization algorithm, power loss
DOI: 10.3233/JIFS-221363
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 6, pp. 8397-8415, 2022
Authors: Rauthan, J.S.
Article Type: Research Article
Abstract: Fully Homomorphic Encryption (FHE) is the holy grail of encrypted communications. It opens the door to several advanced functionalities to overcome the security and trust issues of the IT world. After 2009, once Craig Gentry had shown that FHE could be achieved, a study in this field boomed, and significant improvement was made in identifying more efficient and realistic programs. FHE is primitive cryptography that enables arbitrary functions to be calculated via encrypted data. These systems are applicable in different ways since they permit users to encrypt their private information securely while still outsourcing the processing of protected data without …fearing disclosing the real data. In 2012, LTV12 presented the first multi-key FHE system and demonstrated the possibility of using multi-key systems in somewhat homomorphic encryption (SHE). Like in the one key context, there have been many advances in the field, but no effort has been made to develop the multi-key methods. This paper presents a discussion of FHE and MKFHE with a specific focus on the current techniques and three implementations, comprising the first in the multi-key setups, to the extent of our understanding. Show more
Keywords: Fully Homomorphic Encryption (FHE), Multi-Key FHE(MKFHE), public-key cryptography, Learning With Errors (LWE), GSW
DOI: 10.3233/JIFS-221454
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 6, pp. 8417-8437, 2022
Article Type: Retraction
DOI: 10.3233/JIFS-219323
Citation: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 6, pp. 8439-8439, 2022
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]