Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2024: 1.7
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Arokiaraj, S. | Viswanathan, N.
Article Type: Research Article
Abstract: Human Activity Recognition (HAR) has reached its new dimension with the support of Internet of Things (IoT) and Artificial Intelligence (AI). To observe human activities, motion sensors like accelerometer or gyroscope can be integrated with microcontrollers to collect all the inputs and send to the cloud with the help of IoT transceivers. These inputs give the characteristics such as, angular velocity of movements, acceleration and apply them for an effective HAR. But reaching high recognition rate with less complicated computational overhead still represents a problem in the research. To solve this aforementioned issue, this work proposes a novel ensembling of …Capsule Networks (CN) and modified Gated Recurrent Units (MGRU) with Extreme Learning Machine (ELM) for an effective HAR classification based on data collected using IoT systems called Ensemble Capsule Gated (ECG)-Networks (NETS). The proposed system uses Capsule networks for spatio-feature extraction and modified (Gated Recurrent Unit) GRU for temporal feature extraction. The powerful feed forward training networks are then employed to train these features for human activity recognition. The proposed model is validated on real time IoT data and WISDM datasets. Experimental results demonstrates that proposed model achieves better results comparatively higher than existing (Deep Learning) DL models. Show more
Keywords: Artificial intelligence, capsule networks, human activity recognition, internet of things, gated recurrent units and spatio-feature extraction
DOI: 10.3233/JIFS-221551
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8219-8229, 2023
Authors: Srinivasa Rao, Illapu Sankara | Rajalakshmi, N.R.
Article Type: Research Article
Abstract: Since the IPv6 Wireless Personal Area Network (6LoWPAN) can be utilized for information dissemination, this network gains significant attention in recent years. Proxy mobile IPv6 (PMIPv6) is standard for mobility control based on network at entire IP wireless applications. But, group-based body area networks cannot respond effectively. A new improved group flexibility system decrease the number of control messages contain router requests as well as advertising messages when compared to the group-based PMIPv6 protocol, in order to minimize delay and signaling costs. The IEEE 802.15.4 standard for low-power personal area networks (6LoWPAN) complies through IPv6-compliant MAC and physical layers. If …the default parameters, excessive collisions, packet loss, and great latency occur arbitrarily in high traffic by default MAC parameters while using a great number of 6LoWPAN nodes. The implemented Whale optimization algorithm is based on artificial neural network optimization, genetic algorithm or particle swarm optimization to choose and authenticate MAC parameters. This manuscript proposes a novel intelligent method for choosing optimally configured MAC 6LoWPAN layer set parameters. Results of simulations based on the metrics such as Average delay time (ADT), Average signaling cost, Delivery ratio, Energy consumption, Latency, Network Life time (Nlt), Packet Overhead (PO), Packet loss. The performance of the proposed method provides 19.08%, 25.87%, 31.98%, 26.98%, 31.98%, 26.98% and 23.89% lower Latency, 12.67%, 25.98%, 31.98%, 26.98%, 27.98%, 31.97% and 27.85% lower Packet Overhead and 19.78%, 27.96%, 37.98%, 18.09%, 28.97%, 27.98% and 56.04% higher Delivery ratio compared with the existing methods such as 6LoWPAN-NUM-OHCA-FFA, 6LoWPAN-GTCCF-PSO, 6LoWPAN- DODAG-ACO, 6LoWPAN- MAC-GA-PSO, 6LoWPAN-NCG-DTC-NGIPSA and 6LoWPAN-TDMA-GTS-SHJA algorithms respectively. Show more
Keywords: Artificial neural networks, genetic algorithm, low power personal areas network (6LoWPAN), medium access control protocols (MAC Proxy mobile IPv6 (PMIPv6), particle swarm optimization and Whale optimization algorithm (WOA)
DOI: 10.3233/JIFS-222956
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8231-8255, 2023
Authors: Liu, Zhichao
Article Type: Research Article
Abstract: In the 75th session of the United Nations General Assembly, the Chinese government first proposed the goal of carbon neutrality and carbon peaking. Since then, China’s economy and society have undergone a comprehensive green and sustainable development upgrade and transformation. The development of green finance can provide financial support for achieving dual carbon goals and mitigate the impact of climate change. More importantly, it can contribute to the national economy’s and society’s sustainable development. We innovatively draw on the quality function deployment theory in marketing to logically formulate the research idea of this paper. On this basis, we also apply …the G1-entropy method from fuzzy mathematical theory for quantitative research. We innovatively address the actual national conditions in China and fully integrate green elements in constructing the index system from green finance and sustainability perspectives. Finally, we calculate index weights through G1-entropy quantification to assess the development quality of China’s green financial system and qualitatively propose countermeasures for the quality of China’s green financial development with respect to key index factors. Specifically, we sort out this paper in the following three aspects: (1) we innovatively combined the quality function deployment theory and built the quantitative analysis process architecture in this paper, which enhanced the readability of this paper (2) we realized the use of quantitative research for qualitative analysis and proposed the G1-entropy value method, which made up for the defects of the subjective and objective methods in the traditional assessment methods (3) we realized the organic combination of quantitative and qualitative analysis and proposed relevant countermeasure suggestions based on the quantitative index calculation results, which provided relevant countermeasure suggestions for promoting the sustainable and high-quality development of green finance in China. Our study will provide a set of perfect assessment methods for the quality improvement path and sustainable development strategy formulation after the construction of China’s future green financial system. It can also provide a reference assessment idea for the high-quality and sustainable development of China’s green finance, which will further help China’s economic transition to green and low-carbon and the achievement of the double carbon goal. Show more
Keywords: Economic quality assessment, dual carbon context, quality function deployment theory, G1-entropy value method, green financial system
DOI: 10.3233/JIFS-222935
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8257-8280, 2023
Authors: Wang, Shuai | Ning, Yufu | Huang, Hong | Chen, Xiumei
Article Type: Research Article
Abstract: Uncertain least squares estimation is one of the important methods to deal with imprecise data, which can fully consider the influence of given data on regression equation and minimize the absolute error. In fact, some scientific studies or observational data are often evaluated in terms of relative error, which to some extent allows the error of the forecasting value to vary with the size of the observed value. Based on the least squares estimation and the uncertainty theory, this paper proposed the uncertain relative error least squares estimation model of the linear regression. The uncertain relative error least squares estimation …minimizes the relative error, which can not only solve the fitting regression equation of the imprecise observation data, but also fully consider the variation of the error with the given data, so the regression equation is more reasonable and reliable. Two numerical examples verified the feasibility of the uncertain relative error least squares estimation, and compared it with the existing method. The data analysis shows that the uncertain relative error least squares estimation has a good fitting effect. Show more
Keywords: Relative error least squares estimation, relative error, least squares estimation, uncertainty theory
DOI: 10.3233/JIFS-222955
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8281-8290, 2023
Authors: Cui, Zhexin | Yue, Jiguang | Tao, Wei | Xia, Qian | Wu, Chenhao
Article Type: Research Article
Abstract: Collaboration is essential to improve the efficiency of product research and development (R&D), shorten the R&D cycle, and reduce the R&D costs in complex product lifecycle model management (CPLMM). However, disorganized processes and the unreliability of the result evaluation remain enormous challenges for efficient collaboration. This article proposes an active-passive collaboration mechanism to enable a regulated collaboration system, which can direct the self-organized collaboration of stakeholders. C-D-Petri Net is presented for the formal collaboration process modeling. The result evaluation in active-passive collaboration involves multi-source knowledge across disciplines and phases. To address the unreliable collaboration evaluation (Co-evaluation) caused by insufficient evaluation …knowledge and weak correlation between expertise and evaluation task, the collaborative fuzzy comprehensive evaluation (CFCE) model is established to support Co-evaluation actions, and its core improvement lies in the definition and introduction of collaboration volume. Finally, a simulated aircraft horizontal tail control system is regarded as an engineering application case to demonstrate and verify the effectiveness of the proposed method. Show more
Keywords: Active-passive collaboration, Knowledge-related fuzzy evaluation, C-D-Petri Net, Collaboration volume
DOI: 10.3233/JIFS-223978
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8291-8308, 2023
Authors: Li, Yufeng | Xu, Keyi | Ding, Yumei | Sun, Zhiwei | Ke, Ting
Article Type: Research Article
Abstract: Many traditional clustering algorithms are incapable of processing mixed-type datasets in parallel, limiting their applications in big data. In this paper, we propose a CF tree clustering algorithm based on MapReduce to handle mixed-type datasets. Mapper phase and reducer phase are the two primary phases of MR-CF. In the mapper phase, the original CF tree algorithm is modified to collect intermediate CF entries, and in the reducer phase, k -prototypes is extended to cluster CF entries. To avoid the high costs associated with I/O overheads and data serialization, MR-CF loads a dataset from HDFS only once. We first analyze the …time complexity, space complexity, and I/O complexity of MR-CF. We also compare it with sklearn BIRCH, Apache Mahout k -means, k -prototypes, and mrk-prototypes on several real-world datasets and synthetic datasets. Experiments on two mixed-type big datasets reveal that MR-CF reduces execution time by 45.4% and 61.3% when compared to k -prototypes, and it reduces execution time by 73.8% and 55.0% when compared to mrk-prototypes. Show more
Keywords: Clustering analysis, CF tree, mixed-type datasets, BIRCH, k-prototypes
DOI: 10.3233/JIFS-224234
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8309-8320, 2023
Authors: Khan, Muhammad Zahir | Aslam, Muhammad | Albassam, Mohammed
Article Type: Research Article
Abstract: When the target value (T) is located in the midpoint of the specification interval (m). Traditional process capability indices (PCIs) are often employed for a process with a symmetric tolerance (T = m). In case a process with asymmetric tolerance (T ≠m) traditional PCIs can be misleading. Process capability indices (PCIs) with asymmetric tolerance have been designed and successfully used in a crisp form in process capability analysis (PCA). These PCIs with asymmetric tolerance can benefit from the use of fuzzy set theory to deal with ambiguity and to add greater flexibility and sensitivity to mean variance, and target value (T), …and specification limits (SLs). In order to produce fuzzy SLs of PCIs with asymmetric tolerance fuzzy mean, fuzzy variance and the fuzzy target value have been used. Furthermore, these PCIs are graphically represented. It is concluded that the intermediate values of fuzzy SLs can be explored, which is not achievable with crisp SLs. Furthermore, it is recommended to utilize fuzzy SLs of PCIs with asymmetric tolerance to monitor goods that fall outside specification limits due to their flexibility and sensitivity in a fuzzy environment. The proposed FPCIs were illustrated with a real-life example using piston diameters that were produced in a factory. Show more
Keywords: Target value, fuzzy mean, fuzzy variance, asymmetric tolerance
DOI: 10.3233/JIFS-221993
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8321-8327, 2023
Authors: Jain, Archika | Sharma, Sandhya
Article Type: Research Article
Abstract: Hate speech on social media post is running now a days. Social media like YouTube, Twitter, and Facebook etc. are responsible for hated speech. Hated speech spreads through digital media, causing individuals to get confused and adopt prejudiced viewpoints. To limit the negative effects of disinformation on the digital platform, it is critical to detect it. Now a days, lots of digital platforms are available. Hate speech detection in dataset is very difficult. As a result, the Twitter dataset is of the size of 25296 is presented in this work. Many deep learning techniques are applied on Twitter dataset. The …Google Colab tool is used to scrape dataset material. Different deep learning approaches are utilized to boost the accuracy of the hated speech dataset. For training and validation accuracy and loss some models are used on Twitter dataset like Bi-directional Long Short Term Memory with Glove, Bi-LSTM, and Embedding from Language Model (Elmo) with deep learning, Convolutional Neural Network (CNN), Long Short Term Memory with Glove and LSTM. The performance of the proposed tweet dataset is evaluated using a variety of deep learning classifiers on text dataset. The planned deep learning techniques produced good results on tweet dataset. LSTM with Glove gave the highest accuracy 0.89 and minimum loss 0.19 on tweet dataset. So when compare our model on same dataset that was used earlier then we get highest accuracy and minimum loss. Show more
Keywords: Deep learning, classifiers, twitter dataset, LSTM, and accuracy
DOI: 10.3233/JIFS-222431
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8329-8341, 2023
Authors: Camgoz Akdag, Hatice | Menekse, Akin
Article Type: Research Article
Abstract: Breast cancer is the leading cause of cancer-related deaths, and choosing a suitable treatment plan for this disease has proved difficult for oncologists owing to the variety of criteria and alternatives that must be considered during the decision-making process. Since prospective treatment options influence patients’ health-related quality of life in a variety of ways, a methodology that can completely and objectively evaluate alternative treatments has become an essential issue. This paper proposes a novel multi-criteria decision-making (MCDM) methodology by integrating the CRiteria Importance Through Intercriteria Correlation (CRITIC) and the REGIME techniques and handles the problem of breast cancer treatment selection …problem. CRITIC enables the determination of objective criterion weights based on the decision matrix, while REGIME ranks the options without the need for lengthy computations or normalization procedures. The suggested methodology is demonstrated in a spherical fuzzy atmosphere, which allows decision experts to independently express their degrees of membership, non-membership, and hesitancy in a broad three-dimensional spherical space. In the numerical example provided, three oncologists evaluate four breast cancer treatment alternatives, namely, surgery, radiotherapy, chemotherapy, and hormone therapy, with respect to five criteria, which are disease or tumor type, stage of disease, patient type, side effects, and financial status of the patient. The tumor type is determined to be the most important assessment criterion, and surgery is selected as the best course of action. The stability and validity of the proposed methodology are verified through sensitivity and comparative studies. The discussions, limitations, and future research avenues are also given within the study. Show more
Keywords: CRITIC, REGIME, spherical fuzzy set, MCDM, breast cancer treatment selection
DOI: 10.3233/JIFS-222648
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8343-8356, 2023
Authors: Ma, Zhanyou | Gao, Yingnan | Li, Zhaokai | Li, Xia | Liu, Ziyuan
Article Type: Research Article
Abstract: The verification of reachability properties of fuzzy systems is usually based on the fuzzy Kripke structure or possibilistic Kripke structure. However, fuzzy Kripke structure or possibilistic Kripke structure is not enough to describe nondeterministic and concurrent fuzzy systems in real life. In this paper, firstly, we propose the generalized possibilistic decision process as the model of nondeterministic and concurrent fuzzy systems, and deduce the possibilities of sets of paths of the generalized possibilistic decision process relying on defining of schedulers. Then, we give fuzzy matrices calculation methods of the maximal possibilities and the minimal possibilities of eventual reachability, always reachability, …constrained reachability, repeated reachability and persistent reachability. Finally, we propose a model checking approach to convert the verification of safety property into the analysis of reachabilities. Show more
Keywords: Generalized possibilistic decision processes, scheduler, fuzzy matrices, reachability, safety property
DOI: 10.3233/JIFS-222803
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8357-8373, 2023
Authors: Wu, Yisheng | Jin, Xin | Huang, Haiping
Article Type: Research Article
Abstract: This paper focuses on the task of Point-of-interest (POI) recommendation whose goal is to generate a list of POIs for a target user based on his or her history check-in records. Different from the traditional recommendation tasks (e.g., movie recommendation), there are many factors, like temporal factor and geographical factor, which make a great influence on user preference. Though existing POI recommendation methods tend to model the user preference from temporal factor, geographical factor or social factor, they fail to model these factors into a jointly model, leading to learn the suboptimal user preference. To tackle this issue, we propose …a Muti-channel Graph Attention Network (MGAN) for POI recommendation which learns the user preference from multiple aspects in a unify model. Specifically, MGAN first constructs several graphs with corresponding contextual features to capture the user preference from temporal, geographical, semantic and social aspects. Then MGAN leverages the graph attention networks to learn the representations of POIs from these graphs. Finally, MGAN estimates the user preference from the history check-in records and other similar users via the learned POI representations. We conduct extensive experiments on real-world datasets. And the results indicate that our proposed MGAN outperforms mainstream POI recommendation methods. Show more
Keywords: Point-of-interest, recommendation, graph attention network, temporal, geographical
DOI: 10.3233/JIFS-222952
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8375-8385, 2023
Authors: Deng, Xue | Geng, Fengting | Fang, Wen | Huang, Cuirong | Liang, Yong
Article Type: Research Article
Abstract: By considering the stock market’s fuzzy uncertainty and investors’ psychological factors, this paper studies the portfolio performance evaluation problems with different risk attitudes (optimistic, pessimistic, and neutral) by the Data Envelopment Analysis (DEA) approach. In this work, the return rates of assets are characterized as trapezoidal fuzzy numbers, whose membership functions with risk attitude parameters are described by exponential expression. Firstly, these characteristics with risk attitude are strictly derived including the possibilistic mean, variance, semi-variance, and semi-absolute deviation based on possibility theory. Secondly, three portfolio models (mean-variance, mean-semi-variance, and mean-semi-absolute-deviation) with different risk attitudes are proposed. Thirdly, we prove the …real frontiers determined by our models are concave functions through mathematical theoretical derivation. In addition, two novel indicators are defined by difference and ratio formulas to characterize the correlation between DEA efficiency and portfolio efficiency. Finally, numerical examples are given to verify the feasibility and effectiveness of our model. No matter what risk attitude an investor holds, the DEA can generate approximate real frontiers. Correlation analysis indicates that our proposed approach outperforms in evaluating portfolios with risk attitudes. At the same time, our model is an improvement of Tsaur’s work (2013) which did not study the different risk measures, and an extension of Chen et al.’s work (2018) which only considered risk-neutral attitude. Show more
Keywords: Portfolio performance evaluation, risk attitude, data envelopment analysis (DEA), possibility theory, real frontier
DOI: 10.3233/JIFS-223543
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8387-8411, 2023
Authors: Lin, Sihong | Zhang, Kunbin | Guan, Dun | He, Linjie | Chen, Yumin
Article Type: Research Article
Abstract: Intrusion detection systems have become one of the important tools for network security due to the frequent attacks brought about by the explosive growth of network traffic. Autoencoder is an unsupervised learning model with a neural network structure. It has a powerful feature learning capability and is effective in intrusion detection. However, its network construction suffers from overfitting and gradient disappearance problems. Traditional granular computing methods have advantages in solving such problems, but the process is relatively complex, the granularity dimension is high, and the computational cost is large, which is not suitable for application in intrusion detection systems. To …address these problems, we propose a novel autoencoder: Granular AutoEncoders (GAE). The granulation reference set is constructed by random sampling. The granulation of training samples is based on single-feature similarity in a reference set to form granules. The granulation of multiple features results in granular vectors. Some operations of granules are defined. Furthermore, we propose some granular measures, including granular norms and granular loss functions. The GAE is further applied to the field of intrusion detection by designing an anomaly detection algorithm based on the GAE. The algorithm determines whether the network flows are anomalous by comparing the difference between an input granular vector and its output granular vector that is reconstructed by the GAE. Finally, some experiments are conducted using an intrusion detection dataset, comparing multiple metrics in terms of precision, recall, and F1-Score. The experimental results validate the correctness and effectiveness of the intrusion detection method based on GAE. And contrast experiments show that the proposed method has stronger ability for detecting anomalies than the correlation algorithms. Show more
Keywords: Granular computing, intrusion detection, autoencoder, deep Learning, anomaly detection
DOI: 10.3233/JIFS-223649
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8413-8424, 2023
Authors: Shanmukha, M.C. | Lee, Sokjoon | Usha, A. | Shilpa, K.C. | Azeem, Muhammad
Article Type: Research Article
Abstract: Topological indices and coindices are numerical invariants that relate to quantitative structure property/activity connections. The purpose of topological indices and coindices were introduced to draw the data related to chemical graphs with respect to adjacent & non adjacent pairs of vertex degrees respectively. These indices equip the researchers with a lot of information related to the properties and structure of the chemical compound. In this article, CoM-polynomials for molecular graph of linear and multiple Anthracene are computed from which eleven degree based topological coindices are derived.
Keywords: CoM-polynomial, topological coindex, anthracene
DOI: 10.3233/JIFS-223947
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8425-8436, 2023
Authors: Devi Sri Nandhini, M. | Pradeep, Gurunathan
Article Type: Research Article
Abstract: Sentiment analysis is the contextual analysis of words to retrieve the social opinion of a brand which aids the business firms/institutions to know the impact of their products/services. It is habitual that users may express different opinions regarding various aspects of the same entity. Therefore, there is a strong demand to extract all the opinion targets may those be explicitly mentioned aspects or implicit aspects which are not directly specified in the reviews. In this context, comparatively less amount of work has been carried out concerning implicit aspect detection. The proposed work has been dedicated solely to extracting the implicit …aspects using a dynamic approach based on the type of sentence containing the clues for implicit aspect. A novel aspect pointer compendium (APC) has been developed that catalyzes the task of finding implicit aspects to the maximum extent possible. The APC incorporates the usage of different types of clues such as synonym clues, context clues, phrase clues, and partially implicit aspects that aid in the detection of hidden aspects. Based on this idea, the proposed work classifies the implicit aspect sentences into six types and proceeds with the task in an efficient manner. To strengthen the task of implicit aspect detection, the proposed work utilizes a hybrid technique encompassing APC, domain-specific adjective-noun collocation list (DSANCL), and the explicit aspect-opinion word pairs extracted from the reviews. The experimentation and results reveal that the proposed hybrid approach shows a good improvement in terms of the efficacy of extracting the implicit aspects as compared to the existing baseline models. Show more
Keywords: Implicit aspect detection, aspect pointer compendium, partially implicit aspects
DOI: 10.3233/JIFS-222927
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8437-8450, 2023
Authors: Yang, Yali | Zhang, Tianwei
Article Type: Research Article
Abstract: This paper firstly establishes the discrete-time lattice networks for nonlocal stochastic competitive neural networks with reaction diffusions and fuzzy logic by employing a mix techniques of finite difference to space variables and Mittag-Leffler time Euler difference to time variable. The proposed networks consider both the effects of spatial diffusion and fuzzy logic, whereas most of the existing literatures focus only on discrete-time networks without spatial diffusion. Firstly, the existence of a unique ω-anti-periodic in distribution to the networks is addressed by employing Banach contractive mapping principle and the theory of stochastic calculus. Secondly, global exponential convergence in mean-square sense to …the networks is discussed on the basis of constant variation formulas for sequences. Finally, an illustrative example is used to show the feasible of the works in the current paper with the help of MATLAB Toolbox. The work in this paper is pioneering in this regard and it has created a certain research foundations for future studies in this area. Show more
Keywords: Lattice, reaction diffusion, stochastic, finite difference method
DOI: 10.3233/JIFS-223495
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8451-8470, 2023
Authors: Comakli Sokmen, Özlem | yılmaz, Mustafa
Article Type: Research Article
Abstract: The hierarchical Chinese postman problem (HCPP) aims to find the shortest tour or tours by passing through the arcs classified according to precedence relationship. HCPP, which has a wide application area in real-life problems such as shovel snow and routing patrol vehicles where precedence relations are important, belongs to the NP-hard problem class. In real-life problems, travel time between the two locations in city traffic varies due to reasons such as traffic jam, weather conditions, etc. Therefore, travel times are uncertain. In this study, HCPP was handled with the chance-constrained stochastic programming approach, and a new type of problem, the …hierarchical Chinese postman problem with stochastic travel times, was introduced. Due to the NP-hard nature of the problem, the developed mathematical model with stochastic parameter values cannot find proper solutions in large-size problems within the appropriate time interval. Therefore, two new solution approaches, a heuristic method based on the Greedy Search algorithm and a meta-heuristic method based on ant colony optimization were proposed in this study. These new algorithms were tested on modified benchmark instances and randomly generated problem instances with 817 edges. The performance of algorithms was compared in terms of solution quality and computational time. Show more
Keywords: Optimization, arc routing problems, chance-constrained stochastic programming, new efficient algorithm, hierarchical Chinese postman problem
DOI: 10.3233/JIFS-222097
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8471-8492, 2023
Authors: Zhong, Cheng | Wang, Jie-Sheng | Liu, Yu
Article Type: Research Article
Abstract: The rolling bearing fault diagnosis is affected by industrial environmental noise and other factors, leading to the existence of some redundant components after signal decomposition. At the same time, the existence of the modal aliasing phenomenon in empirical mode decomposition (EMD) and the relevant improved algorithms also leads to the existence of many invalid features in the components. These phenomena have great influence on the bearing fault diagnosis. So a rolling bearing bidirectional-long short term memory (Bi-LSTM) fault diagnosis method was proposed based on segmented interception auto regressive (SIAR) spectrum analysis and information fusion. The ensemble empirical mode decomposition (EEMD), …the complementary ensemble empirical mode decomposition (CEEMD) and the robust EMD (REMD) algorithms decompose the rolling bearing fault signals, and AR spectrum analysis is performed on the obtained components respectively. By comparing the AR spectra of the components corresponding to different fault locations, the effective AR spectral values are intercepted as the eigenvalues of the data, and finally all the eigenvalues are fused to achieve the purpose of screening effective features more efficiently so as to reduce the impact of feature redundancy caused by mode aliasing on neural network training. Then the Bi-LSTM neural network was used as a rolling bearing fault diagnosis classifier, and the simulation experiments were conducted based on the rolling bearing fault signal data from Case Western Reserve University to verify the effectiveness of the proposed feature extraction and fault diagnosis method. Show more
Keywords: Rolling bearing, fault diagnosis, AR spectrum analysis, information fusion, empirical mode decomposition, LSTM
DOI: 10.3233/JIFS-222476
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8493-8519, 2023
Authors: Rajesh, Thota Radha | Rajendran, Surendran | Alharbi, Meshal
Article Type: Research Article
Abstract: Multi-agent reinforcement learning (MARL) is a generally researched approach for decentralized controlling in difficult large-scale autonomous methods. Typical features create RL system as an appropriate candidate to develop powerful solutions in variation of healthcare fields, whereas analyzing decision or treatment systems can be commonly considered by a prolonged and sequential process. This study develops a new Penguin Search Optimization Algorithm with Multi-agent Reinforcement Learning for Disease Prediction and Recommendation (PSOAMRL-DPR) model. This research aimed to use a unique PSOAMRL-DPR algorithm to forecast diseases based on data collected from networks and the cloud by a mobile agent. The major intention of …the proposed PSOAMRL-DPR algorithm is to identify the presence of disease and recommend treatment to the patient. The model manages the agent container with different mobile agents and fetched data from dissimilar locations of the network as well as cloud. For disease detection and prediction, the PSOAMRL-DPR technique exploits deep Q-network (DQN) technique. In order to tune the hyperparameters related to the DQN technique, the PSOA technique is used. The experimental result analysis of the PSOAMRL-DPR technique is validated on heart disease dataset. The simulation values demonstrate that the PSOAMRL-DPR technique outperforms the other existing methods. Show more
Keywords: Multi-agent reinforcement learning, penguin search optimization, deep Q-learning, disease prediction, treatment recommendation
DOI: 10.3233/JIFS-223933
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8521-8533, 2023
Authors: Wang, Jing | Cai, Qiang | Wang, Hongjun | Wei, Guiwu | Liao, Ningna
Article Type: Research Article
Abstract: Green supply chain management attaches great importance to the coordinated development of social economy and ecological environment, and requires enterprises to consider environmental protection factors in product design, packaging, procurement, production, sales, logistics, waste and recycling. Suppliers are the “source” of the entire supply chain, and the choice of green suppliers is the basis of green supply chain management, and their quality will directly affect the environmental performance of enterprises. The green supplier selection is a classical multiple attribute group decision making (MAGDM) problems. Interval-valued intuitionistic fuzzy sets (IVIFSs) are the extension of intuitionistic fuzzy sets (IFSs), and are utilized …to depict the complex and changeable circumstance. To better adapt to complex environment, the purpose of this paper is to construct a new method to solve the MAGDM problems for green supplier selection. Taking the fuzzy and uncertain character of the IVIFSs and the psychological preference into consideration, the original MABAC method based on the cumulative prospect theory (CPT) is extended into IVIFSs (IVIF-CPT-MABAC) method for MAGDM issues. Meanwhile, the method to evaluate the attribute weighting vector is calculated by CRITIC method. Finally, a numerical example for green supplier selection has been given and some comparisons is used to illustrate advantages of IVIF-CPT-MABAC method and some comparison analysis and sensitivity analysis are applied to prove this new method’s effectiveness and stability. Show more
Keywords: Multiple attribute group decision making (MAGDM), interval-valued intuitionistic fuzzy sets (IVIFSs), MABAC, cumulative prospect theory (CPT), CRITIC, green supplier selection
DOI: 10.3233/JIFS-224206
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8535-8560, 2023
Authors: Gokul Pran, S. | Raja, Sivakami
Article Type: Research Article
Abstract: Network flaws are used by hackers to get access to private systems and data. This data and system access may be extremely destructive with losses. Therefore, this network intrusions detection is utmost significance. While investigating every feature set in the network, deep learning-based algorithms require certain inputs. That’s why, an Adaptive Artificial Neural Network Optimized with Oppositional Crow Search Algorithm is proposed for network intrusions detection (IDS-AANN-OCSA). The proposed method includes several phases, including feature selection, preprocessing, data acquisition, and classification. Here, the datas are gathered via CICIDS 2017 dataset. The datas are fed to pre-processing. During pre-processing, redundancy eradication …and missing value replacement is carried out with the help of random forest along Local least squares for removing uncertainties. The pre-processed datas are fed to feature selection to select better features. The feature selection is accomplished under hybrid genetic algorithm together with particle swarm optimization technique (GPSO). The selected features are fed to adaptive artificial neural network (AANN) for categorization which categorizes the data as BENIGN, DOS Hulk, PortScan, DDoS, DoS Golden Eye. Finally, the hyper parameter of adaptive artificial neural network is tuned with Oppositional Crow Search Algorithm (OCSA) helps to gain better classification of network intrusions. The proposed approach is activated in Python, and its efficiency is evaluated with certain performance metrics, like accuracy, recall, specificity, precision, F score, sensitivity. The performance of proposed approach achieves better accuracy 99.75%, 97.85%, 95.13%, 98.79, better sensitivity 96.34%, 91.23%, 89.12%, 87.25%, compared with existing methods, like One-Dimensional Convolutional Neural Network Based Deep Learning for Network Intrusion Detection (IDS-CNN-GPSO), An innovative network intrusion detection scheme (IDS-CNN-LSTM) and Application of deep learning to real-time Web intrusion detection (IDS-CNN-ML-AIDS) methods respectively. Show more
Keywords: Adaptive artificial neural network, feature selection, genetic particle swarm optimization, intrusion detection systems
DOI: 10.3233/JIFS-222120
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8561-8571, 2023
Authors: Liu, Jing | Zhang, ErZi | Ma, Chao | Yager, Ronald R. | Senapati, Tapan | Yatsalo, Boris | Jin, LeSheng
Article Type: Research Article
Abstract: In many multi criteria group decision making problems, the individual evaluation values offered by experts are with uncertainties. Therefore, when assigning weights to those experts using preferences induced weights allocation, we can have two types of bi-polar preferences. The first one is the optimism-pessimism preference over evaluation values; the second one is the uncertainty aversion preference over the attached numerical certainty/uncertainty degrees. When performing preferences induced weights allocation, the certainty/uncertainty degrees will affect the optimism-pessimism preference induced weights allocation because the magnitudes of those evaluation values might not be the exact ones. Moreover, the importance of those experts in multi …criteria group decision making can also have influence over the two types of preference induced weights allocation processes, and the importance can also be with uncertainties and can be expressed using basic uncertain information. Therefore, to handle this situation with multiple inducing variables and uncertainties, we simultaneously consider the influence of the uncertainties attached to evaluation values and the influence of uncertain importance of experts, and thus we at the same time adopt the method of confidence threshold and the method of uncertain importance level function to propose some synthesized method to adjust the induced weights allocation processes. We also propose a complete multi criteria group decision making problems to show the feasibility and reasonability of the proposed decision model for the complex situation where both evaluation values and expert importance are expressed by basic uncertain information. Show more
Keywords: Aggregation operators, basic uncertain information, induced ordered weighted averaging operators, information fusion, multi criteria group decision making, uncertain decision making
DOI: 10.3233/JIFS-222590
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8573-8583, 2023
Authors: Wang, Chong | Yang, Gongping | Huang, Yuwen | Liu, Yikun | Zhang, Yan
Article Type: Research Article
Abstract: Fruit detection is essential for harvesting robot platforms. However, complicated environmental attributes such as illumination variation and occlusion have made fruit detection a challenging task. In this study, a Transformer-based mask region-based convolution neural network (R-CNN) model for tomato detection and segmentation is proposed to address these difficulties. Swin Transformer is used as the backbone network for better feature extraction. Multi-scale training techniques are shown to yield significant performance gains. Apart from accurately detecting and segmenting tomatoes, the method effectively identifies tomato cultivars (normal-size and cherry tomatoes) and tomato maturity stages (fully-ripened, half-ripened, and green). Compared with existing work, the …method has the best detection and segmentation performance for these tomatoes, with mean average precision (mAP) results of 89.4% and 89.2%, respectively. Show more
Keywords: Mask R-CNN, Swin Transformer, tomato detection, instance segmentation
DOI: 10.3233/JIFS-222954
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8585-8595, 2023
Authors: Amanulla Khan, M. | Sithi Shameem Fathima, S.M.H.
Article Type: Research Article
Abstract: Gait recognition is the process of recognizing a person based on their walking style. Each person’s walking gait is distinctive and cannot be imitated by others. However, the walking motion of a person will be changed based on their behaviour but their walking pattern doesn’t change. In this paper, a novel Clustering based Faster RCNN has been proposed to identify the single, double and multi-gait. The gait images from the publicly available dataset are pre-processed using Multi scale Retinex (MSR) to reduce the noise artifacts. The Faster RCNN is used for extracting the relevant features from the gait images via …the two modules namely CNN and RPN. The CNN layers extract the most relevant features as feature maps and RPN is used for creating the bounding boxes for the extracted features. Fuzzy K-means clustering is used to group the features based on their labels, and it specifies the features acquired using CNN and RPN as input. Finally, the Fast RCNN is employed for classifying the gait images into suspicious and non-suspicious walking pattern. The proposed Clustering based Faster RCNN net achieves the high accuracy rate of 98.74% and 99.19% for suspicious and non-suspicious walking pattern respectively. The proposed Clustering based Faster RCNN model was compared with other traditional models like CNN, U-net, Fab net and Fast R-CNN. The proposed Clustering based Faster RCNN model improves the overall accuracy of 8.86% 33.77% 3.12% and 5.48% better than mmGait, LSTM Net, STDNN and RNN respectively. Show more
Keywords: Gait recognition, deep learning, faster R-CNN, fuzzy K-means clustering, multi scale Retinex
DOI: 10.3233/JIFS-224114
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8597-8606, 2023
Authors: Chen, Kejia | Wu, Qianqian | Yan, Minru | Li, Xuannan
Article Type: Research Article
Abstract: The purpose of this paper is to explore how port enterprises can scientifically select a better logistic service provider (LSP) to achieve a high efficiency. An empirical study is conducted to verify the effectiveness of the combination weighting-grey synthetic decision-making method by helping the LSP selection of a port enterprise in China. Data are collected from questionnaires administered to port logistics’ industry professionals. The method is proposed, which associates the analysis network process method with the entropy method to determine the combined weights of the evaluation indexes. The improved centre-point triangular whitenization weight function is introduced to cluster the alternative …port LSPs and judge the corresponding grey classes. Subsequently, the synthetic weighted decision-making vectors are used to determine the grey synthetic decision-making coefficient vectors. The grey synthetic clustering decision-making coefficients are calculated to establish a synthetic decision-making rank of the alternative plans. The combined method can help the port enterprises realize the selection of better LSPs in a scientific manner. Show more
Keywords: Combination weighting, grey synthetic decision-making, logistics service, provider selection
DOI: 10.3233/JIFS-222156
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8607-8626, 2023
Authors: Tao, Zhifu | Wang, Xinyu | Zhu, Benji | Wu, Peng
Article Type: Research Article
Abstract: The aim of this paper is to introduce a combination of Basic Uncertain Information (BUI) and a Bag Based Technique for Order Preference by Similarity to Ideal Solution (BBTOPSIS), which is further applied to multi-attribute decision making (MADM) with BUI. To realize the decision process, a novel comparison law is developed to derive the superiority, inferiority and noninferiority multi-attribute canonical fuzzy bags. Mathematical properties of the developed comparison law is discussed. Besides, to extend traditional TOPSIS method in BUI, a novel distance measure between BUI is also introduced, which is composed by distance between transformed intervals and similarity between BUI. …Superiority of the developed distance measure is illustrated. Finally, a decision algorithm is presented to solve MADM with BUI by using the developed BBTOPSIS under BUI. A numerical example on location of medical warehouse is presented to illustrate the feasibility and validity of the developed decision method. Show more
Keywords: Basic uncertain information, BBTOPSIS, multi-attribute decision making, medical warehouse, location
DOI: 10.3233/JIFS-223835
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8627-8636, 2023
Authors: Liu, Chang
Article Type: Research Article
Abstract: The “3 + 2” segmented training between higher vocational colleges and applied undergraduate courses has opened up the rising channel of vocational education from junior college level to undergraduate level, and promoted the organic connection between higher vocational colleges and Universities of Applied Sciences. It is one of the important ways to establish a modern vocational education system. Exploring the monitoring mechanism of talent training quality is an important measure to ensure the achievement of the segmented training goal, and it is a necessary condition to successfully train high-quality skilled applied talents. The talent training quality evaluation of segmented education is viewed …as multiple attribute decision-making (MADM) issue. In this paper, an extended probabilistic simplified neutrosophic number GRA (PSNN-GRA) method is established for talent training quality evaluation of segmented education. The PSNN-GRA method integrated with CRITIC method in probabilistic simplified neutrosophic sets (PSNSs) circumstance is applied to rank the optional alternatives and a numerical example for talent training quality evaluation of segmented education is used to proof the newly proposed method’s practicability along with the comparison with other methods. The results display that the approach is uncomplicated, valid and simple to compute. Show more
Keywords: Multiple attributes decision making (MADM), probabilistic simplified neutrosophic sets (PSNSs), GRA method, talent training quality evaluation
DOI: 10.3233/JIFS-224494
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8637-8647, 2023
Authors: Fang, Jian | Lin, Xiaomei | Liu, Weida | An, Yi | Sun, Haoran
Article Type: Research Article
Abstract: The purpose of facial expression recognition is to capture facial expression features from static pictures or videos and to provide the most intuitive information about human emotion changes for artificial intelligence devices to use effectively for human-computer interaction. Among the factors, the excessive loss of locally valid information and the irreversible degradation trend of the information at different expression semantic scales with increasing network depth are the main challenges faced currently. To address such problems, an enhanced pyramidal network model combining with triple attention mechanisms is designed in this paper. Firstly, three attention mechanism modules, i.e. CBAM, SK, and SE, …are embedded into the backbone network model in stages, and the key features are sensed by using spatial or channel information mining, which effectively reduces the effective information loss caused by the network depth. Then, the pyramid network is used as an extension of the backbone network to obtain the semantic information of expression features across scales. The recognition accuracy reaches 96.25% and 73.61% in the CK+ and Fer2013 expression change datasets, respectively. Furthermore, by comparing with other current advanced methods, it is shown that the proposed network architecture combining with the triple attention mechanism and multi-scale cross-information fusion can simultaneously maintain and improve the information mining ability and recognition accuracy of the facial expression recognition model. Show more
Keywords: Facial expression recognition, attention mechanism, Resnet-50, pyramid network
DOI: 10.3233/JIFS-222252
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8649-8661, 2023
Authors: Zuo, Haichun
Article Type: Research Article
Abstract: The rapid growth of cloud services for hosting applications in the scientific, commercial, web, and social networks has led to enormous growth in the number of large-scale data centers. By shifting the costs of data center maintenance, hardware, and software from customers to service providers using a pay-as-you-go policy, service providers and customers are benefited. On the other hand, the massive growth of data centers has been accompanied by challenges that have limited the boundaries of this technology. Thus, researchers in this field tend to focus on eliminating these limitations. Since virtualization is at the core of cloud computing, allocating …Virtual Machines (VMs) to physical hosts in the Infrastructure as a Service layer (IaaS) is one of the most significant challenges. Nonetheless, the VM allocation problem is a combinatorial optimization problem that is known to be NP-Hard. In this paper, we presented a comprehensive analysis of virtual machine placement problem and outlined different approaches to solving it. This paper aims to provide insight into the challenges and issues for recent virtual machine placement strategies. The current study aims to comprehensively classify the physical resource allocation for VMs by overviewing available trends. Show more
Keywords: Cloud computing, virtual machine allocation, virtualization, resource utilization, review
DOI: 10.3233/JIFS-222896
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8663-8696, 2023
Authors: Navaneethan, M. | Janakiraman, S.
Article Type: Research Article
Abstract: E-commerce, often known as electronic commerce, is the purchasing and selling of goods over the internet using electronic devices to share data. Banks and other financial institutions are frequently added as third-party platforms to traditional e-commerce platforms. As a result, it raises issues with integrity and cyber security. We suggest a deep learning-based strategy called the Hybrid Interactive Autodidactic School-Based Teaching-Learning Optimization (HIASTLO) algorithm to address these issues. The IoT-based e-commerce blockchain is used to extract and reject the various cyberattacks in the network, and deep learning is utilised to improve the weight and bias of the neural networks. We …used a variety of performance indicators, including accuracy, precision, and recall, to identify cyberattacks. We also evaluated how well our work performed when compared to previous BSIoTNET, BCFC, DRNN, DNN-KNN, MOO-FS, LRNN, and HDLM efforts. Furthermore, MudraChain and NormaChain are used to examine the transaction time of our suggested task. The results show that our suggested work performs better than any other methods and offers highly secure internet services. Show more
Keywords: E-commerce, blockchain, deep learning, cyber attacks, IoT
DOI: 10.3233/JIFS-220743
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8697-8709, 2023
Authors: Weng, Peng | Xie, JingJing | Zou, Yang
Article Type: Research Article
Abstract: The estimation of compressive strength includes time-consuming, finance-wasting, and laboring approaches to undertaking High-performance concrete (HPC) production. On the other side, a vast volume of concrete consumption in industrial construction requires an optimal mix design with different percentages to reach the highest compressive strength. The present study considered two deep learning approaches to handle compressive strength prediction. The robustness of the deep model was put high through two novel optimization algorithms as a novelty in the research world that played their precise roles in charge of model structure optimization. Also, a dataset containing cement, silica fume, fly ash, the total …aggregate amount, the coarse aggregate amount, superplasticizer, water, curing time, and high-performance concrete compressive strength was used to develop models. The results indicate that the AMLP-I and GMLP-I models served the highest prediction accuracy. R2 and RMSE of AMLP-I stood at 0.9895 and 1.7341, respectively, which declared that the AMLP-I model could be presented as the robust model for estimating compressive strength. Generally, using optimization algorithms to boost the capabilities of prediction models by tuning the internal characteristics has increased the reliability of artificial intelligent approaches to substitute the more experimental practices. Show more
Keywords: HPC concrete, compressive strength, deep learning, arithmetic optimization algorithm, grasshopper optimization algorithm
DOI: 10.3233/JIFS-221714
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8711-8724, 2023
Authors: Nishanth, R. | Sulochana, C. Helen | Radhamani, A.S. | Ahilan, A.
Article Type: Research Article
Abstract: This article has been retracted. A retraction notice can be found at https://doi.org/10.3233/JIFS-219433 .
DOI: 10.3233/JIFS-220418
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8725-8741, 2023
Authors: Zhang, Huiyuan | Wang, Hongjun | Cai, Qiang | Wei, Guiwu
Article Type: Research Article
Abstract: As an improved form of fuzzy sets (FSs), spherical fuzzy sets (SFSs) could provide decision makers (DMs) with more free space to express their preference information. In this article, we first develop some Hamacher power aggregation operators under SFSs by power operators and Hamacher operators, including spherical fuzzy Hamacher power average (SFHPA) operator, spherical fuzzy Hamacher power geometric (SFHPG) operator, spherical fuzzy Hamacher power weighted average (SFHPWA) operator, spherical fuzzy Hamacher power weighted geometric (SFHPWG) operator, spherical fuzzy Hamacher power ordered weighted average (SFHPOWA) operator, spherical fuzzy Hamacher power ordered weighted geometric (SFHPOWG) operator, spherical fuzzy Hamacher power hybrid average …(SFHPHA) operator and spherical fuzzy Hamacher power hybrid geometric (SFHPHG) operator. At the same time, some properties of the proposed operators are investigated, and the relationships between these operators and existing operators are discussed. Furthermore, a novel spherical fuzzy entropy measure is introduced to calculate unknown attribute weights. Then, some novel multiple attribute group decision making (MAGDM) methods are established by the proposed operators as well as entropy measure under SFSs. Lastly, the practicability of the presented methods is verified with a numerical case. Moreover, the robustness, availability and superiority for the developed methods are demonstrated via sensitivity analysis and further comparation with the existing methods. Show more
Keywords: Spherical fuzzy sets, Hamacher operators, power operators, spherical fuzzy Hamacher power aggregation operators, entropy measure, multiple attribute group decision making
DOI: 10.3233/JIFS-224468
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8743-8771, 2023
Authors: AlShammari, Naif Khalaf | Qazi, Emad Ul Haq | Gabr, Ahmed Maher | Alzamil, Ahmed A. | Alshammari, Ahmed S. | Albadran, Saleh Mohammad | Reddy, G. Thippa
Article Type: Research Article
Abstract: This article has been retracted. A retraction notice can be found at https://doi.org/10.3233/JIFS-219433 .
DOI: 10.3233/JIFS-221295
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8773-8783, 2023
Authors: Hemanand, D. | Sridhar, P. | Priya, C. | Sathish Kumar, P.J.
Article Type: Research Article
Abstract: Wireless Sensor Networks are becoming increasingly popular in everyday life since they offer a variety of network structures for developing cutting-edge real-time applications. Wireless sensor devices have high energy consumption limitations, so it is necessary to handle excessive energy consumption by malicious nodes properly to improve network performance. Even though numerous studies have been conducted to increase the dependability of routing in WSNs, the existing routing strategies do not meet the required security constraints by using intelligent methods to protect the sensor nodes from malicious attack. To overcome this challenge a novel Trust Aware Clustering based Secure Routing Techniques (TAC-SRT) …has been proposed to minimize the overall energy consumption, improved security to nodes and to maximize the network lifetime. The proposed method is carried out in three phases. In the first phase, the cluster head is selected by using K mean clustering. In the second phase, the trust value of each node is evaluated by using Mamdani fuzzy inference rule. In the third phase, the Tversky similarity index is used to find the normal or malicious node and establishes the shortest route. The Fully Homomorphic Elliptic Curve Cryptography technique is then used to perform secure data transmission. The effectiveness of the proposed strategy is examined using several parameters, such as the lifetime of the network, data confidentiality, active nodes, and energy consumption. The proposed technique improves the network lifetime by 23.01%, 17.4%, and 13.2% better than MOSFA, SecDL, and CAR-MOSOA respectively. Finally, the proposed method demonstrated superior performance in terms of delay, throughput, encryption time, network lifetime, and packet delivery ratio compared with existing techniques. Show more
Keywords: Secure routing, fuzzy inference system, wireless sensor network, tversky similarity index, cluster head selection
DOI: 10.3233/JIFS-223197
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8785-8800, 2023
Article Type: Retraction
DOI: 10.3233/JIFS-219327
Citation: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 8801-8801, 2023
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]