Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2024: 1.7
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Liang, Baohua | Lu, Zhengyu
Article Type: Research Article
Abstract: Attribute reduction is a widely used technique in data preprocessing, aiming to remove redundant and irrelevant attributes. However, most attribute reduction models only consider the importance of attributes as an important basis for reduction, without considering the relationship between attributes and the impact on classification results. In order to overcome this shortcoming, this article firstly defines the distance between samples based on the number of combinations formed by comparing the samples in the same sub-division. Secondly, from the point of view of clustering, according to the principle that the distance between each point in the cluster should be as small …as possible, and the sample distance between different clusters should be as large as possible, the combined distance is used to define the importance of attributes. Finally, according to the importance of attributes, a new attribute reduction mechanism is proposed. Furthermore, plenty of experiments are done to verify the performance of the proposed reduction algorithm. The results show that the data sets reduced by our algorithm has a prominent advantage in classification accuracy, which can effectively reduce the dimensionality of high-dimensional data, and at the same time provide new methods for the study of attribute reduction models. Show more
Keywords: Rough sets, attribute reduction, clustering, combined distance
DOI: 10.3233/JIFS-222666
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1481-1496, 2023
Authors: Sakthivel, S. | Vinotha, N.
Article Type: Research Article
Abstract: Concerns of security as well as privacy are the chief obstacles which have prevented the public cloud’s extensive adoption in Intel IT as well as across the industry. Generally, IT organizations are quite reluctant to store sensitive as well as valuable data in infrastructures which are out of their control. The technique of anonymization is employed by enterprises to raise the security of the public cloud’s data whilst facilitating the data’s analysis as well as application. The procedure of data anonymization will modify how the data is either employed or published in such a way that it will prevent the …key information’s identification. The privacy issues are addressed using k-anonymity. However, the issue of selecting the variables for anonymization and suppression of variables without the loss of knowledge is an optimization problem. To address the selection of variables for anonymization and suppression, metaheuristic algorithms are used. Diverse research groups have successfully utilized the River Formation Dynamics (RFD) metaheuristic to handle numerous problems of discrete combinatorial optimization. Even so, this metaheuristic has never been adapted for use in domains of continuous optimization. To mitigate the local minima problem, hybridization of the algorithms is proposed. In this work, a modified K-Anonymity technique’s proposal has been given by using the Modified Hill Climbing (MHC) optimization, the RFD-MHC optimization, the RFD-PSO optimization, the RFD-MHC suppression as well as the RFD-PSO suppression. Furthermore, proposal for a suppression technique has also been given in this work. Experiments demonstrated that the RFD-PSO optimization has higher classification accuracy in the range of 6.73% to 8.55% when compared to manual K-anonymization. The work has also given better trade off for security analysis and data utility effectiveness. Show more
Keywords: Privacy preservation, security, K-anonymity model, river formation dynamics (RFD) and particle swarm optimization (PSO) algorithm, modified hill climbing (MHC)
DOI: 10.3233/JIFS-223509
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1497-1512, 2023
Authors: Wang, Changjing | Jiang, Huiwen | Wang, Yuxin | Huang, Qing | Zuo, Zhengkang
Article Type: Research Article
Abstract: The smart contract, a self-executing program on the blockchain, is key to programmable finance. However, the rise of smart contract use has also led to an increase in vulnerabilities that attract illegal activity from hackers. Traditional manual approaches for vulnerability detection, relying on domain experts, have limitations such as low automation and weak generalization. In this paper, we propose a deep learning approach that leverages domain-specific features and an attention mechanism to accurately detect vulnerabilities in smart contracts. Our approach reduces the reliance on manual input and enhances generalization by continuously learning code patterns of vulnerabilities, specifically detecting various types …of vulnerabilities such as reentrancy, integer overflow, forced Ether injection, unchecked return value, denial of service, access control, short address attack, tx.origin, call stack overflow, timestamp dependency, random number dependency, and transaction order dependency vulnerabilities. In order to extract semantic information, we present a semantic distillation approach for detecting smart contract vulnerabilities. This approach involves using a syntax parser, Slither, to segment the code into smaller slices and word embedding to create a matrix for model training and prediction. Our experiments indicate that the BILSTM model is the best deep learning model for smart contract vulnerability detection task. We looked at how domain features and self-attentiveness mechanisms affected the ability to identify 12 different kinds of smart contract vulnerabilities. Our results show that by including domain features, we significantly increased the F1 values for 8 different types of vulnerabilities, with improvements ranging from 7.35% to 48.58%. The methods suggested in this study demonstrate a significant improvement in F1 scores ranging from 4.18% to 38.70% when compared to conventional detection tools like Oyente, Mythril, Osiris, Slither, Smartcheck, and Securify. This study provides developers with a more effective method of detecting smart contract vulnerabilities, assisting in the prevention of potential financial losses. This research provides developers with a more effective means of detecting smart contract vulnerabilities, thereby helping to prevent potential financial losses. Show more
Keywords: Smart contract, vulnerability detection, attention mechanism, domain features, recurrent neural network 2010 MSC: 00-01, 99-00
DOI: 10.3233/JIFS-224489
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1513-1525, 2023
Authors: Xu, Haiyan | Zhang, Hao | Zhu, Anfeng | Xu, Gang
Article Type: Research Article
Abstract: In order to improve the accuracy and security of encrypted holographic 3D geographic information data acquisition and improve the actual resolution of geographic information files, a blind watermarking algorithm for encrypted holographic 3D geographic information data based on mapping mechanism is proposed. According to the characteristics of the mapping mechanism, a mapping mechanism structure diagram is constructed; Under the mapping mechanism technology, blind watermark data is preprocessed. Then, a watermark embedding operation is performed to obtain the watermark information image, and then a blind watermark that encrypts the holographic three-dimensional geographic information data is extracted. Finally, using the blind watermark …signal as input, the blind watermark information is obtained by using the watermark strength, and the holographic 3D geographic data information is segmented and encrypted to complete blind watermark detection. The blind watermark algorithm for encrypting the holographic 3D geographic information data is studied. The results show that the maximum difference between the correlation coefficient of the algorithm in this paper and the correlation coefficient of the unaffected algorithm is only 0.04, which has better anti attack performance, high security, good terrain information collection ability, high data accuracy, and can achieve curvature repair of information data. Show more
Keywords: Mapping mechanism, encrypted holography, 3D geographic information data, blind watermarking algorithm
DOI: 10.3233/JIFS-230064
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1527-1537, 2023
Authors: Smitha, E.S. | Sendhilkumar, S. | Mahalakshmi, G.S.
Article Type: Research Article
Abstract: Multi-modal information outbreak is consistently increasing in social media. Classification of tweet sentiments using various information modalities will help the recommender systems to achieve success in digital marketing. Moreover, aspect-level sentiment analysis categorizes a target’s sentiment polarity in a specific environment. Using topic modelling in aspect-level sentiment analysis enables the identification of more accurate aspect-based tweet sentiments. The existing sentiment classification techniques used for the development of recommendation systems do not focus on the aspect-based approach modelled using deep learning classifier with temporal analysis on the social media data. Hence, this paper proposes an efficient sentiment classification model that highlights …the impact of topic modelling-based word feature embedding for improvising the classification of Twitter sentiments and product reviews based on temporal reasoning and analysis for performing predictive analysis. For tweets context analysis, Latent Dirichlet Allocation based topic modelling is used in this work which generates the topics. For each topic, the sentiment is calculated separately and the topic guided feature expansion is done using Senti-wordnet. Moreover, an extended deep learning classification algorithm called Long Short-Term Memory (LSTM) with word embedding and temporal reasoning(LSTMWTR) is proposed in this paper for improving the classification accuracy. Finally, the labelled data are classified using the existing machine learning algorithms namely Naïve Bayes, Support Vector Machines and also using the deep learning models such as Convolution Neural Network(CNN),LSTM, Recurrent Neural Networks (RNN) and the transformer model namelyBi-directional Encoder Representation from Transformers (BERT),Convolution Bi-directional Recurrent Neural Network (CBRNN) and the proposed deep learning algorithm namelyLSTMWTR. These sentiment classification algorithms have been evaluated with word embedding for tweet sentiment classification and product review classification. The results obtained from this work show that the proposed LSTMWTR algorithm emerges as the highly accurate model for tweet sentiment and product review classification. Show more
Keywords: Sentiment, classification, word embedding, temporal reasoning, NB, multinomial NB, SVM, LSTM, LSTMWTR, BERT, CNN, RNN, and CBRNN
DOI: 10.3233/JIFS-230246
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1539-1565, 2023
Authors: Ali, Imran | Li, Yongming | Pedrycz, Witold
Article Type: Research Article
Abstract: In literature granular computing and formal concept analysis algorithm use only single-value attributes to knowledge discovery for the data of spatio-temporal aspects. However, most of the datasets like forest fires and tornado storms involve multiscale values for attributes. The limitation of single-value attributes of the existing approaches indicates only the data related to event occurrence which may be missing the elicitation of important knowledge related to severity of event occurrence. Motivated by these limitations, this research article proposes a novel and generalized method which uses ordinal semantic weighted multiscale values for attributes in formal concept analysis with granular computing measures …especially when spatio-temporal attributes are not given. The originality of proposed methodology is using ordinal semantic weighted multiscale values for attributes that give complete information of event occurrences. Moreover, the use of ordinal semantic weighted multiscale values improves the results of granular computing measures. The significance of proposed approach is well explained by experimental evaluation performed on publicly available datasets on storm occurring in different States of America. Show more
Keywords: Formal concept analysis, granular computing, granulation measures, ordinal semantic weighted multiscales
DOI: 10.3233/JIFS-223764
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1567-1586, 2023
Authors: Hati, Santu
Article Type: Research Article
Abstract: In present world the major cause of global warming and climate change are emission of carbon and greenhouse gas. Governments and policymakers around the world want to put their best efforts to control the pollution and climate change to save our environment. To reduce greenhouse gas emissions Government and policymakers takes carbon tax policy on carbon emission. Also in real world uncertainty is a pervasive phenomenon. Humans have a significant ability to make logical decisions based on uncertain information. For this purpose, we are developing a pollution control fuzzy production inventory model with imperfect and break-ability items under preservation technology …investment and carbon tax policy. In this model, the break-ability rate is dependent on inventory level as the break-ability rate of breakable items depends on the collected stress of inventory stock level. Here the unit production cost is dependent on raw material cost, wear-tear cost and development cost. Carbon emission is controlled by investing in carbon reduction technology and a fraction of product items are imperfect. In this study demand of the product depends on selling price and inventory stock level of product. Finally, this optimal control problem solved by using Pontryagin Maximum principle and the optimal results are illustrated graphically and numerically using MATLAB software. Subsequently, some sensitivity analysis is investigated as the impact of parameters on total profit. Show more
Keywords: Break-ability, deteriorating items, preservation technology, environment pollution control, fuzzy granular differentiability, fuzzy optimal control production inventory
DOI: 10.3233/JIFS-224019
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1587-1601, 2023
Authors: Murugesan, Malathi | Jeyali Laseetha, T.S. | Sundaram, Senthilkumar | Kandasamy, Hariprasath
Article Type: Research Article
Abstract: Glaucoma is a condition of the eye that is caused by an increase in the eye’s intraocular pressure that, when it reaches its advanced stage, causes the patient to lose all of their vision. Thus, glaucoma screening-based treatment administered in a timely manner has the potential to prevent the patient from losing all of their vision. However, because glaucoma screening is a complicated process and there is a shortage of human resources, we frequently experience delays, which can lead to an increase in the proportion of people who have lost their eyesight worldwide. In order to overcome the limitations of …current manual approaches, there is a critical need to create a reliable automated framework for early detection of Optic Disc (OD) and Optic Cup (OC) lesions. In addition, the classification process is made more difficult by the high degree of overlap between the lesion and eye colour. In this paper, we proposed an automatic detection of Glaucoma disease. In this proposed model is consisting of two major stages. First approach is segmentation and other method is classification. The initial phase uses a Stacked Attention based U-Net architecture to identify the optic disc in a retinal fundus image and then extract it. MobileNet-V2 is used for classification of and glaucoma and non-glaucoma images. Experiment results show that the proposed method outperforms other methods with an accuracy, sensitivity and specificity of 98.9%, 95.2% and 97.5% respectively. Show more
Keywords: Medical image segmentation, classification, convolutional neural network, U-Net, MobileNet-V2
DOI: 10.3233/JIFS-230659
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1603-1616, 2023
Authors: Jebril, Akram H. | Rashid, Rozeha A.
Article Type: Research Article
Abstract: Low power wide area networks (LPWANs) are made to survive conditions of extensive installation. Technological innovations, including Global Network Operator, Long Range Wide Area Network (LoRaWAN), Narrowband Internet of Things (NB-IoT), Weightless, Sigfox, etc., have adopted LPWANs. LoRaWAN is currently regarded to be one of the most cutting-edge and intriguing technology for the widespread implementation of the IoT. Although LoRaWAN offers the best features that make it fit with Internet - of - things specifications, there are still certain technical issues to overcome, such as link coordination, resource allocation and reliable transmission. In LoRaWAN, End-devices transmit randomized uplink frames to …the gateways using un-slotted random-access protocol. This randomness with the restrictions placed on the gateways is a reason that leads to a considerable decline in network performance, in particular downlink frames. In this paper, we propose a new approach to increase Acknowledgement (ACK) messages throughput. The suggested method takes advantage of both class A and class B features to enhance and assist LoRaWAN’s reliability by ensuring that an ACK message is sent for every confirmed uplink while retaining the minimum energy level that is utilized by nodes. Show more
Keywords: Internet of Things, LoRaWAN, Downlink Frame, Differential Evolution optimization, Collision, Acknowledgement Message
DOI: 10.3233/JIFS-230730
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1617-1631, 2023
Authors: Prusty, Sashikanta | Das, Priti | Dash, Sujit Kumar | Patnaik, Srikanta | Prusty, Sushree Gayatri Priyadarsini
Article Type: Research Article
Abstract: This article has been retracted. A retraction notice can be found at https://doi.org/10.3233/JIFS-219433 .
DOI: 10.3233/JIFS-223265
Citation: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 1, pp. 1633-1652, 2023
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]