Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2024: 1.7
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Huang, Yonggang | Teng, Teng | Li, Yuanyuan | Zhang, Minghao
Article Type: Research Article
Abstract: In order to avoid the risk of patients’ private information leakage, this paper puts forward a research on the protection of medical Internet private information based on double chaotic encryption algorithm. This paper analyzes the quantification of risk indicators for privacy information protection of medical Internet, establishes the risk quantification structure of health care big data according to the quantitative calculation results, and puts forward the strategy of controlling access to health care big data, configuring the risk level, describing the attributes of the system database, and realizing the privacy information protection of medical Internet under the double chaotic encryption …algorithm. The experimental results show that the real identity of patients is protected to a certain extent in the protection of private information of medical internet after applying this method. Moreover, this method has high storage integrity and small storage standard deviation, and the method in this paper can effectively resist network intrusion. Therefore, it shows that this method has a good effect of protecting private information of medical Internet. Show more
Keywords: Double chaotic encryption algorithm, medical internet, private information, information protection.
DOI: 10.3233/JIFS-237670
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7779-7789, 2024
Authors: Salem, Dina Ahmed | Hassan, Nesma AbdelAziz | Hamdy, Razan Mohamed
Article Type: Research Article
Abstract: Smart farming, also known as precision agriculture or digital farming, is an innovative approach to agriculture that utilizes advanced technologies and data-driven techniques to optimize various aspects of farming operations. One smart farming activity, fruit classification, has broad applications and impacts across agriculture, food production, health, research, and environmental conservation. Accurate and reliable fruit classification benefits various stakeholders, from farmers and food producers to consumers and conservationists. In this study, we conduct a comprehensive comparative analysis to assess the performance of a Convolutional Neural Network (CNN) model in conjunction with four transfer learning models: VGG16, ResNet50, MobileNet-V2, and EfficientNet-B0. Models …are trained once on a benchmark dataset called Fruits360 and another time on a reduced version of it to study the effect of data size and image processing on fruit classification performance. The original dataset reported accuracy scores of 95%, 93%, 99.8%, 65%, and 92.6% for these models, respectively. While accuracy increased when trained on the reduced dataset for three of the employed models. This study provides valuable insights into the performance of various deep learning models and dataset versions, offering guidance on model selection and data preprocessing strategies for image classification tasks. Show more
Keywords: Artificial intelligence, convolutional neural network, Fruit360, machine learning, transfer learning
DOI: 10.3233/JIFS-233514
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7791-7803, 2024
Authors: Hoang, Dinh Linh | Luong, Tran Thi
Article Type: Research Article
Abstract: The XOR operator is a simple yet crucial computation in computer science, especially in cryptography. In symmetric cryptographic schemes, particularly in block ciphers, the AddRoundKey transformation is commonly used to XOR an internal state with a round key. One method to enhance the security of block ciphers is to diversify this transformation. In this paper, we propose some straightforward yet highly effective techniques for generating t-bit random XOR tables. One approach is based on the Hadamard matrix, while another draws inspiration from the popular intellectual game Sudoku. Additionally, we introduce algorithms to animate the XOR transformation for generalized block ciphers. …Specifically, we apply our findings to the AES encryption standard to present the key-dependent AES algorithm. Furthermore, we conduct a security analysis and assess the randomness of the proposed key-dependent AES algorithm using NIST SP 800-22, Shannon entropy based on the ENT tool, and min-entropy based on NIST SP 800-90B. Thanks to the key-dependent random XOR tables, the key-dependent AES algorithm have become much more secure than AES, and they also achieve better results in some statistical standards than AES. Show more
Keywords: Random XOR table, AES, key-dependent block cipher, randomness, Shannon entropy
DOI: 10.3233/JIFS-236998
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7805-7821, 2024
Authors: Aljanabi, Abdulqadir Rahomee Ahmed | Ghafour, Karzan Mahdi
Article Type: Research Article
Abstract: Buying decisions are influenced by a variety of factors that can give rise to impulsive, unplanned, or even irrational purchases. Research has examined the motivational factors that foster organic food consumption, but no study has explored the relative weights of these factors and whether their effects vary depending on the type of food. This study adopted the cognitive-affective perspective to examine the antecedents of online impulsive buying of organic food using a sample of 452 consumers living in Baghdad, Iraq. The fuzzy AHP and fuzzy TOPSIS methods were used to rank five organic food alternatives. The results revealed that the …effects of cognitive factors on organic food purchases differ from those of affective factors. Show more
Keywords: Impulsive buying behaviour, AHP, fuzzy TOPSIS, multi-criteria decision-making, organic food
DOI: 10.3233/JIFS-237400
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7823-7838, 2024
Authors: Xie, Wenhao | Lei, Lin | Liu, Xiangyi | Liu, Yuan
Article Type: Research Article
Abstract: Clustering is an essential unsupervised technique when category information is not available. Although K-means and Max-min distance K-means clustering algorithms are widely used, they have some disadvantages such as dependence on the initial centers, sensitivity to outliers caused by using only distance as the clustering criterion. To overcome the problems, this paper proposes SMM-K-means algorithm which overcomes the dependence on the initial cluster centers and the initial number of clusters and the sensitivity to the outliers. First, the initial value K of the optimal cluster number is determined by the elbow method, and K-means is used for initial clustering. A …new inter-cluster separation measure is then constructed based on the idea of q-nearest neighbors, which is constructed by comprehensive considering the separation between clusters and the distribution compactness of clusters themselves. Finally, the two sample points with highest degree of separation are brought into Max-min distance K-means algorithm as new initial centers for clustering. The definite determining method of cluster centers eliminates the complicated iterative calculation, and the construction of inter-cluster separation measure overcomes the sensitivity of clustering results to noise points and isolated points, and has good applicability and generalization. In addition, this algorithm is not limited by the shape and size of the clusters and has better flexibility. The experimental results show that the SMM-K-means algorithm has higher CH values, resulting in a better clustering effect and stability. Show more
Keywords: K-means algorithm, max-min distance K-means algorithm, elbow method, inter-cluster separation measure, CH index
DOI: 10.3233/JIFS-231747
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7839-7857, 2024
Authors: Cao, Heling | Han, Dong | Chu, Yonghe | Tian, Fangchao | Wang, Yun | Liu, Yu | Jia, Junliang | Ge, Haoyang
Article Type: Research Article
Abstract: Automatic program repair (APR) is crucial to improve software quality. Recently, neural machine translation (NMT) based modeling for bug fixes has demonstrated great potential. However, these approaches still have two major challenges. One is that their search space is limited due to the out-of-vocabulary (OOV) problem. The other is that the NMT-based APR models tend to ignore past translation information, which often leads to over-translation and under-translation. To address the above challenges, we propose MNRepair, a new NMT-based APR approach that combines multiple mechanisms to fix bugs in source code. Specifically, we devise an encoder-decoder NMT framework with the attention …mechanism. Our framework combines the copy mechanism to overcome the OOV problem that occurs with source code. To deal with the over-translation and under-translation, we utilize a coverage mechanism to record past translation information. MNRepair is able to capture a wide range of repair operators and fix 26 bugs in Defects4J. Our evaluation shows the effectiveness of multiple mechanisms in the repair process. Show more
Keywords: Automatic program repair, neural machine translation, multiple mechanisms
DOI: 10.3233/JIFS-234037
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7859-7873, 2024
Authors: Zhang, Hongli | Wu, Guangyu | Zhao, Dongfang | Chen, Yesheng | Wei, Dou | Liu, Shulin | Jiang, Lunchang
Article Type: Research Article
Abstract: Mechanical fault diagnosis is currently a highly trending topic, facing two significant challenges. Firstly, the acquisition of an ample number of fault samples proves to be difficult, thereby limiting access to sufficient data samples. Secondly, intricate and non-mathematically describable associations often exist among different faults. Most algorithms treat fault samples as isolated entities, consequently impacting the accuracy of fault diagnosis. This paper proposes a novel machine learning framework called Domain Graph Attention Neural Network (DGAT), which leverages the topological structure of graphs to effectively capture the interrelationships among fault samples. Additionally, this framework incorporates domain information during node updates …to obtain richer embeddings, particularly in scenarios with limited available samples. It effectively overcomes the fixed receptive field limitation of the original Graph Attention Network (GAT). In order to validate the effectiveness of the model, we conducted extensive comparative experiments on diverse datasets, which demonstrated the superior performance of the proposed model. Show more
Keywords: Classification, graph attention neural network, small-sample, mechanical fault diagnosis
DOI: 10.3233/JIFS-234042
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7875-7886, 2024
Article Type: Research Article
Abstract: A consistency fuzzy set is composed of mean values and consistency degrees of fuzzy sequences in the transformation process of a fuzzy multiset (FM), but lacks confidence intervals in relation to a confidence level of fuzzy sequences, which shows its deficiency. To solve this deficiency, this paper aims to propose an improved transformation approach from FM to a confidence consistency fuzzy cubic set (CCFCS) and to develop an exponential similarity measure of CCFCSs for modeling piano performance evaluation (PPE) in a FM scenario. Consequently, this study includes the following context. First, a transformation approach from FM to CCFCS is proposed …in terms of mean values, consistency degrees (the complement of standard deviation), and confidence intervals of fuzzy sequences subject to a confidence level and normal distribution. Second, the exponential similarity measure of CCFCSs is proposed in the scenario of FMs. Third, a PPE model is developed based on the proposed similarity measure of CCFCSs in the FM scenario. Finally, the developed model is applied to a piano performance competition organized by Shaoxing University in China as an actual evaluation example, and then the rationality and validity of the proposed model in the scenario of FMs are verified through sensitivity and comparison analysis. Show more
Keywords: Fuzzy multiset, confidence consistency fuzzy cubic set, exponential similarity measure, confidence level, piano performance evaluation
DOI: 10.3233/JIFS-235084
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7887-7896, 2024
Authors: Yang, Lei | Li, Deqing | Zeng, Wenyi | Ma, Rong | Xu, Zeshui | Yu, Xianchuan
Article Type: Research Article
Abstract: Pythagorean fuzzy sets, as a generalization of intuitionistic fuzzy sets, have a wide range of applications in many fields including image recognition, data mining, decision making, etc. However, there is little research on clustering algorithms of Pythagorean fuzzy sets. In this paper, a novel clustering idea under Pythagorean fuzzy environment is presented. Firstly, the concept of feature vector of Pythagorean fuzzy number (PFN) is presented by taking into account five parameters of PFN, and some new methods to compute the similarity measure of PFNs by applying the feature vector are proposed. Furthermore, a fuzzy similarity matrix by utilizing similarity measure …of PFNs is established. Later, the fuzzy similarity matrix is transformed into a fuzzy equivalent matrix which is utilized to establish a novel Pythagorean fuzzy clustering algorithm. Based on the proposed clustering algorithm, a novel multiple attribute decision making (MADM) method under Pythagorean fuzzy environment is presented. To illustrate the effectiveness and feasibility of the proposed technique, an application example is offered. Show more
Keywords: Pythagorean fuzzy number, feature vector, similarity measure, Pythagorean fuzzy clustering analysis, multiple attribute decision making
DOI: 10.3233/JIFS-235488
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7897-7907, 2024
Authors: Guo, Xu
Article Type: Research Article
Abstract: The detection of tomato leaf diseases is crucial for agricultural sustainability, impacting crop health, yield optimization, and global food supply. Despite the advancements in deep learning methods, a pressing challenge persists— achieving consistently high accuracy rates, particularly in the context of rigorous agricultural requirements. This study addresses this problem directly, introducing a novel approach by employing the Yolov8 architecture in a deep learning model for tomato leaf disease detection. The identified research challenge is precisely targeted, and the model is developed using a meticulously curated custom dataset. Through comprehensive training, validation, and testing phases, the study ensures the robust performance …of the Yolov8 model. The novelty of this research lies in its focused solution to the specific accuracy challenge within deep learning-based tomato leaf disease detection. The proposed methodology is rigorously evaluated through extensive experimentation, showcasing its ability to surpass existing benchmarks and offering a highly effective solution. This innovative approach not only contributes a unique solution to the identified problem but also advances the field by providing a more accurate and reliable method for detecting tomato leaf diseases. Show more
Keywords: Tomato leaf disease detection, deep learning methods, agricultural sector
DOI: 10.3233/JIFS-236905
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7909-7921, 2024
Authors: Kalaimathi, M. | Balamurugan, B.J. | Nagar, Atulya K.
Article Type: Research Article
Abstract: Let G = (V , E ) be a simple graph. A 1-1 function f : V → ℕ , where ℕ is the set of natural numbers, is said to induce a k -Zumkeller graph G if the induced edge function f * : E → ℕ defined by f * (xy ) = f (x ) f (y ) satisfies the following conditions:(i) f * (xy ) is a Zumkeller number for every xy ∈ E . (ii) The total number …of distinct Zumkeller numbers on the edges of G is k . A Mycielski transformation of a graph is a larger graph having more vertices and edges. In this article, the Mycielski transformation of a graphs such as path, cycle and star graphs have been computed and their k -Zumkeller graphs have been investigated by reducing the number of distinct Zumkeller numbers. AMS Subject Classification: 05C78 f * (xy ) is a Zumkeller number for every xy ∈ E . The total number of distinct Zumkeller numbers on the edges of G is k . Show more
Keywords: Zumkeller numbers, k-Zumkeller graph, Mycielski transformation
DOI: 10.3233/JIFS-231095
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7923-7932, 2024
Authors: Xiao, Yanjun | Pei, Eryue | Shi, Linhan | Peng, Kai | Liu, Weiling
Article Type: Research Article
Abstract: In order to solve the problem that Switched Reluctance Motor (SRM) generates torque pulsation phenomenon during operation, which reduces the stability of loom spindle operation, this paper proposes and designs a multi-algorithm fusion-based SRM control strategy from the point of view of control strategy research. Combined with the operating characteristics of the loom, the causes of SRM torque pulsation are analyzed from the point of view of SRM control strategy, and combined with the spindle control indexes, the voltage chopper control and torque distribution function are introduced to construct the SRM control strategy scheme for the loom. On this basis, …an optimization strategy based on the fusion of fuzzy control algorithm, particle swarm algorithm and simulated annealing algorithm is proposed to optimize the torque distribution function, and the algorithmic process of SRM control strategy is verified through comparative tests. The results show that the control strategy can make its torque pulsation reduced to less than 10%, the speed rise time is less than 0.1 s, and the relative error of the speed is less than 0.05%, which meets the index requirements of the spindle drive. This proves that the SRM torque pulsation can be reduced by the multi-algorithm fusion control strategy without increasing the hardware cost, which provides a useful reference for solving the SRM torque pulsation problem under the requirement of low cost. Show more
Keywords: Rapier loom, switched reluctance motor, torque distribution function, multi-algorithm fusion
DOI: 10.3233/JIFS-233138
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7933-7957, 2024
Authors: Zakaria, Aliya Syaffa | Shafi, Muhammad Ammar | Mohd Zim, Mohd Arif | Musa, Aisya Natasya
Article Type: Research Article
Abstract: Lung cancer constituted 12.2% of newly diagnosed cancer cases globally in 2020. The high fatality rate of the condition is attributed to delayed diagnosis and inadequate symptom recognition. In Malaysia, the incidence of lung cancer is estimated to be 1 in 60 males and 1 in 138 females, with a median age of 70 years or above. Most lung cancer cases were detected during advanced stages, specifically stages III and IV, with a prevalence exceeding 90% for both genders. In Malaysia, most patients are diagnosed in stages III and IV, which are associated with a lower likelihood of long-term survival. …Many cases are identified at a late stage, characterized by significant tumor expansion or the spread of cancer cells to areas that cannot be treated surgically. Malaysians are unaware of cancer symptoms; hence the situation is common. To improve survival and reduce mortality, Malaysians must recognize the symptoms of lung cancer. Fuzzy linear regression and multiple linear regression models have been compared to predict high-risk lung cancer symptoms in Malaysia. The fuzzy linear regression model analyses secondary data, eliminates irrelevant information and enhances precision in the results. Lung cancer patients at Al-Sultan Abdullah Hospital (UiTM Hospital) in Selangor provided data for this study. Data from 124 lung cancer patients were analyzed using Microsoft Excel, SPSS, and MATLAB. To improve data accuracy, the study used cross-validation measurement error (MSE and RMSE). According to data analysis, hemoptysis and chest pain are high-risk symptoms with MSE and RMSE values of 1.549 and 1.245, respectively. Show more
Keywords: Lung cancer, symptoms of lung cancer, fuzzy linear regression, prediction data, statistical error
DOI: 10.3233/JIFS-233714
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7959-7968, 2024
Authors: Xiao, Yanjun | Li, Shifang | Zhang, Kun | Zhang, Yameng | Xiao, Yanchun
Article Type: Research Article
Abstract: Recovering low-quality waste heat using industrial waste heat is challenging, and the reuse technology needs to erupt. Moreover, the gas source of low-quality waste heat is relatively volatile, which makes it challenging to keep the actual working condition of the plant stable. Therefore, it is inspiring to research the robustness of root-waste heat power generation processed measurement and control system to improve the stability of the plant operation. Hence, in this paper, we have applied uncertainty theory to analyze it and formulate the uncertainty model based on the Bode diagram. We also proposed a control method based on the uncertainty …model, which combines robust control and internal model control to make the roots waste heat power generation system operate stably under the effect of external disturbances and changes of internal structure or parameters in actual operation. Experimental results show that the robust internal model control method has a speed deviation of no more than 7.9 r/min compared with the PID control method. The adjustment time to track the set value does not exceed 73.1 seconds within the allowed fluctuation range. The fluctuation variance is 30.95% of that of the PID controller. The dynamic performance is better, with strong anti-interference capability and significantly improved tracking performance. It ensures the stability of the roots-type waste heat utilization system, which is essential for future intelligent grid-connected power generation. Show more
Keywords: Waste heat power generation, uncertain theory, robust internal model control, roots power machine
DOI: 10.3233/JIFS-234416
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7969-7987, 2024
Authors: Lei, Fan | Cai, Qiang | Wei, Guiwu
Article Type: Research Article
Abstract: The development and application of blockchain provides technical support for supply chain technological innovation and industrial innovation. Integrating the decentralized, independent, open, traceable and tamper-proof features of the blockchain into the supply chain can effectively improve the problems of unstable supply chain structure, low security, low privacy, low collaboration ability and high operating costs. Establishing probabilistic double hierarchy linguistic multi-attribute decision-making (PDHL-MADM) model to evaluate the performance of blockchain is an effective measure to optimize blockchain performance and improve supply chain stability. Therefore, this thesis first takes the processing efficiency, cost, security performance, update and improvement ability as evaluation attributes. …Then the IDOCRIW weight method is used to calculate the objective weight of attributes. Based on Aczel-Alsina t-norm (AATN) and Aczel-Alsina t-conorm (AATCN), four operations of probabilistic double hierarchy linguistic term set (PDHLTS) are defined, and PDHLAAWA operator, PDHLAAOWA operator, PDHLAAHA operator, PDHLAAHM operator, PDHLAAWHM operator and their dual operators are proposed, and a series of corresponding PDHL operator models are constructed. In addition, the sensitivity and stability of this series of operator models are analyzed in depth. Finally, the new model proposed in this thesis is compared with the existing model to verify its scientific and superiority. Show more
Keywords: Probabilistic double hierarchy linguistic term set (PDHLTS), Multi-attribute decision-making (MADM), PDHLAAWA operator and PDHLAAWHM operator, evaluate the performance of blockchain
DOI: 10.3233/JIFS-235215
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 7989-8024, 2024
Authors: Qiao, Junfeng | Peng, Lin | Zhou, Aihua | Pan, Sen | Yang, Pei | Xu, Min | Shen, Xiaofeng | Chen, Jingde | Gu, Hua
Article Type: Research Article
Abstract: This paper proposes a method of beforehand prediction of electric equipment faults based on chain-linked recurrent neural network algorithm, which takes the operating parameters of power equipment and other relevant environmental factors as inputs, and takes the fault characteristics as output judgment marks, and constructs a machine learning training model to realize the prediction of power equipment faults. The neural network algorithm adopted in this paper adopts a tree structure. Each sub-node can transfer information with its multiple superior nodes, so that the correlation between the data of the front and back nodes can be obtained, which meets the needs …of the equipment fault prediction model. Considering that the occurrence of power transformer faults is sudden and greatly affected by changes in the surrounding environment, the input of prediction algorithms should consider more environmental factors. This method takes the historical data of various parameters including meteorological phenomena, geography data, and temperature of adjacent equipment and facilities as the training sample set, improves the learning model, gives the trend curve of each index, and gives a prompt at its threshold to ensure the prediction accuracy and give the index prediction. Show more
Keywords: Recurrent neural network, power equipment fault prediction, index trend curve, fault feature sample set, power supply reliability
DOI: 10.3233/JIFS-236459
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8025-8035, 2024
Authors: Kamala Devi, K. | Raja Sekar, J.
Article Type: Research Article
Abstract: Breast cancer has been life-threatening for many years as it is the common cause of fatality among women. The challenges of screening such tumors through manual approaches can be overcome by computer-aided diagnosis, which aids radiologists in making precise decisions. The selection of significant features is crucial for the estimation of prediction accuracy. This work proposes a hybrid Genetic Algorithm (GA) and Honey Badger Algorithm (HBA) based Deep Neural Network (DNN), HGAHBA-DNN for the concurrent optimal features selection and parameter optimization; further, the optimal features and parameters extracted are fed into the DNN for the prediction of the breast cancer. …It fuses the benefits of HBA with parallel processing and efficient feedback with GA’s excellent global convergent rate during the processing stages. The aforementioned method is evaluated on the Wisconsin Original Breast Cancer (WOBC), Wisconsin Diagnostic Breast Cancer (WDBC), and the Surveillance, Epidemiology, and End Results (SEER) datasets. Subsequently, the performance is validated using several metrics like accuracy, precision, Recall, and F1-score. The experimental result shows that HGAHBA-DNN obtains accuracy of 99.42%, 99.84%, and 92.44% for the WOBC, WDBC, and SEER datasets respectively, which is much superior to the other state-of-the-art methods. Show more
Keywords: Breast cancer prediction, DNN, feature selection, genetic algorithm, honey badger algorithm, parameter optimization
DOI: 10.3233/JIFS-236577
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8037-8048, 2024
Authors: Hou, Yuntong | Shang, Shuye | Cao, Shengxi | Liu, Zhengjia
Article Type: Research Article
Abstract: A robust muscle fatigue algorithm plays a pivotal role in depicting the degree of muscle fatigue in both time-series EMG signal graphs and spectral graphs, aligning with human perception. While the fuzzy approximate entropy (fApEn ) algorithm has been enhanced from the foundation of approximate entropy (ApEn ) through the incorporation of fuzzy affiliation, concerns persist regarding the threshold value and the algorithm’s application range. This study extracts EMG signals across varied time durations and head-down angles, employing enhanced signal preprocessing techniques and optimizing the fApEn algorithm. Furthermore, real-time fatigue perceptions of subjects were recorded using the rating of …perceived exertion. Experimental outcomes reveal that the EMG signal, post-wavelet analysis preprocessing, demonstrates promising noise reduction capabilities. Notably, the fApEn algorithm exhibits considerable enhancements through the identification of an optimal threshold using the gradient descent algorithm and a machine learning strategy. Show more
Keywords: EMG, muscle fatigue, fuzzy approximate entropy, wavelet transform, machine learning
DOI: 10.3233/JIFS-237293
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8049-8063, 2024
Authors: Tian, Huaqiang | Yu, Long | Tian, Shengwei | Long, Jun | Zhou, Tiejun | Wang, Bo | Li, Yuhuan
Article Type: Research Article
Abstract: A spect-B ased S entiment A nalysis (ABSA ) has been the focus of increasing study in recent years. Previous research has demonstrated that incorporating syntactic information, such as dependency trees, can enhance ABSA performance. Despite the widespread use of metaphors in daily life to express emotions more vividly, few studies have integrated this literary device into ABSA. In this paper, we propose a novel ABSA model that utilizes M etaphor I dentification P rocedure (MIP ) to encode both the sentence and aspect word as a single unit, thereby overcoming these limitations. Our experimental results demonstrate that our model …achieves competitive performance in ABSA. Show more
Keywords: Aspect-based sentiment analysis, metaphorical sentiment analysis, transformer, deep learning
DOI: 10.3233/JIFS-233077
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8065-8074, 2024
Authors: Ding, Huafeng | Shang, Junyan | Zhou, Guohua
Article Type: Research Article
Abstract: Emotional state recognition is an important part of emotional research. Compared to non-physiological signals, the electroencephalogram (EEG) signals can truly and objectively reflect a person’s emotional state. To explore the multi-frequency band emotional information and address the noise problem of EEG signals, this paper proposes a robust multi-frequency band joint dictionary learning with low-rank representation (RMBDLL). Based on the dictionary learning, the technologies of sparse and low-rank representation are jointly integrated to reveal the intrinsic connections and discriminative information of EEG multi-frequency band. RMBDLL consists of robust dictionary learning and intra-class/inter-class local constraint learning. In robust dictionary learning part, RMBDLL …separates complex noise in EEG signals and establishes clean sub-dictionaries on each frequency band to improve the robustness of the model. In this case, different frequency data obtains the same encoding coefficients according to the consistency of emotional state recognition. In intra-class/inter-class local constraint learning part, RMBDLL introduces a regularization term composed of intra-class and inter-class local constraints, which are constructed from the local structural information of dictionary atoms, resulting in intra-class similarity and inter-class difference of EEG multi-frequency bands. The effectiveness of RMBDLL is verified on the SEED dataset with different noises. The experimental results show that the RMBDLL algorithm can maintain the discriminative local structure in the training samples and achieve good recognition performance on noisy EEG emotion datasets. Show more
Keywords: Multi-frequency band, dictionary learning, electroencephalogram, noise data, low-rank representation
DOI: 10.3233/JIFS-233753
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8075-8088, 2024
Authors: Wei, Jiaxin | Yang, Jin | Liu, Xinyang
Article Type: Research Article
Abstract: Due to intensified off-balance sheet disclosure by regulatory authorities, financial reports now contain a substantial amount of information beyond the financial statements. Consequently, the length of footnotes in financial reports exceeds that of the financial statements. This poses a novel challenge for regulators and users of financial reports in efficiently managing this information. Financial reports, with their clear structure, encompass abundant structured information applicable to information extraction, automatic summarization, and information retrieval. Extracting headings and paragraph content from financial reports enables the acquisition of the annual report text’s framework. This paper focuses on extracting the structural framework of annual report …texts and introduces an OpenCV-based method for text framework extraction using computer vision. The proposed method employs morphological image dilation to distinguish headings from the main body of the text. Moreover, this paper combines the proposed method with a traditional, rule-based extraction method that exploits the characteristic features of numbers and symbols at the beginning of headings. This combination results in an optimized framework extraction method, producing a more concise text framework. Show more
Keywords: OpenCV, dilation operation, text structure extraction
DOI: 10.3233/JIFS-234170
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8089-8108, 2024
Authors: Li, Wuke | Wang, Xingzhu | Tang, Minli
Article Type: Research Article
Abstract: Aiming at the problem of inaccurate transformer fault diagnosis in dissolved gas analysis, this paper proposes a novel diagnostic method that integrates an enhanced honey badger algorithm (EHBA) with an ensemble learning-based deep hybrid kernel extreme learning machine (DHKELM). First, kernel principal component analysis (KPCA) was deployed for feature fusion of the gas data, thus extracting more effective features. The DHKELM, combining polynomial and RBF kernel functions, was used as a base learning to build a powerful classifier with Adaboost framework. The EHBA introduces information sharing and firefly perturbation strategies based on HBA. This EHBA was harnessed to optimize the …DHKELM’s critical parameters, establishing the EHBA-DHKELM-Adaboost transformer fault diagnosis model. Finally, the features garnered by KPCA were fed into the model, simulating and validating various fault diagnosis models. The findings reveal that EHBA-DHKELM-Adaboost achieves 98.75% diagnostic accuracy in transformer faults, surpassing other models. Show more
Keywords: Transformer fault diagnosis, dissolved gas analysis, deep hybrid kernel extreme learning machine, adaboost, enhanced honey badger algorithm
DOI: 10.3233/JIFS-235563
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8109-8121, 2024
Authors: Brintha, K. | Joseph Jawhar, S.
Article Type: Research Article
Abstract: Automated railway security systems prevent train collisions with trackside obstructions that cause accidents in high-speed railways. Rail safety is being improved and accident rates reduced through continuous research. A rapid advancement in deep learning has promoted new possibilities for research in this field. In this work, a novel deep learning-based FOD-YOLO net is proposed for detecting the fasteners faults and objects in the railway tracks. There are two basic components in the deep learning-based YOLOv8: the backbone and the head. YOLOv8 utilizes an improved version of the CSPDarknet53 network for detecting objects on the railway track. The head of YOLOv8 …consists of EfficientNet with various convolutional layers with squeeze and excitation blocks for detecting any defect in the track fasteners. These layers are liable for detecting the objectness scores, bounding boxes and class probabilities structured with fully connected layers for the objects and faults in tracks. Based on the results from the Yolo network, the alert message is sent to the loco pilot to avoid accidents using fuzzy logic. The experimental fallouts of proposed FOD-YOLO net achieve higher accuracy and yields better evaluation results with 98.14% accuracy, 98.84% precision and 95.94% recall. From the experimental results, the FOD-YOLO net improves the overall accuracy range by 5.44%, 4.72%, 0.73%, and 13.18% better than Fast RCNN, YOLOv5s-VF, YOLO-GD, and 2D-SSA + Deep network respectively. Show more
Keywords: Railway track, object detection, fault detection, deep learning, Yolo network, fuzzy logic
DOI: 10.3233/JIFS-236445
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8123-8137, 2024
Authors: Zhan, Huawei | Li, Junjie | Wei, Gaoyong | Han, Chengju
Article Type: Research Article
Abstract: Aiming at the existing UAV fire detection system with low small target detection accuracy, a high leakage rate, and a slow rate, an improved YOLOv5 UAV flame detection algorithm is proposed. First, the anchor box clustering is optimized using the K-mean++algorithm to reduce the classification error rate. Second, the original backbone network is enhanced with the CBAM attention mechanism, which scans the whole globe to obtain the target area with a high weighting proportion and needs to be focused on. Replace the PANet network with the BiFPN network in the neck and introduce jump connections when performing feature fusion, which …can better retain the semantic information of high-level and low-level features. Finally, the α-IoU loss function is added to achieve the regression accuracy of different levels of the bounding box by modulating α, which improves the detection accuracy of small datasets and the robustness to noise. According to the experimental results, using a randomly segmented dataset, the modified YOLOv5 algorithm obtains a mAP value of 80.2%, which is 6.7% higher than the original YOLOv5 method, while maintaining an FPS of 64 frames per second. The method helps to improve the accuracy of UAVs for fire monitoring, and the performance is better than the existing flame detection algorithms, which meet the requirements of practical applications. Show more
Keywords: YOLOv5, feature fusion, CBAM, unmanned aerial vehicle (UAV), α-IoU
DOI: 10.3233/JIFS-236836
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8139-8151, 2024
Authors: Achich, Nassira | Ghorbel, Fatma | Hamdi, Fayçal | Métais, Elisabeth | Gargouri, Faiez
Article Type: Research Article
Abstract: Dealing with temporal data imperfection is a crucial issue in several application domains. In fact, failure to handle these imperfections can have significant consequences and lead to incorrect analysis and decision-making. This is particularly true when handling imperfect temporal data inputs in applications for Alzheimer’s patients as a real example. In this context, there is a need for a global ontology that provides a semantic representation of temporal data imperfection. In the literature, there is a big number of ontologies that represent data. Some represent only perfect temporal data. Some others represent imperfect data but not temporal ones. To the …best of our knowledge, there is no ontology that represents temporal data imperfection. In this paper, we represent “TimeOntoImperfection”, a usable global ontology that represents four types of imperfection: imprecision, uncertainty, both uncertainty and imprecision and conflict. We describe the structure of “TimeOntoImperfection”, then we conduct a case a study in which we illustrate the usefulness of our ontology. Finally, we introduce the validation part in the context of CAPTAIN MEMO - an ontology based memory prothesis dedicated to alzheimer patients- and we discuss the encouraging results derived from the evaluation step. Show more
Keywords: Ontology, temporal data imperfection, temporal reasoning, uncertainty, imprecision, conflict, possibilistic ontology, fuzzy ontology, probabilistic ontology, probabilistic ontology
DOI: 10.3233/JIFS-237693
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8153-8168, 2024
Authors: Kang, Chen | Jin, Shuaizhen | Zhong, Zheng | Li, Kunyan | Zeng, Xiaoyu
Article Type: Research Article
Abstract: The quantification of the interplay between student behavior data and classroom teaching effectiveness using quantitative metrics has perennially posed a challenge in the evaluation of classroom instruction. Classroom activity serves as a reflection of student engagement, emotional ambiance, and other pertinent aspects during the pedagogical process. This article presents a methodology for quantifying student head posture during classroom instruction utilizing AI-driven video analysis technology, notably the Classroom Activity Index (CAI). A Classroom Activity Analysis System (CAAS) was designed and developed, integrating a multi-scale classification network based on ECA-ResNet50 and ECA-ResNet18. This network discerns and categorizes various head regions of students …situated in both the frontal and real rows of a lecture-style classroom, irrespective of their dimensions. The classification network attains exceptional performance, boasting F1 score of 0.91 and 0.92 for student head-up and head-nodding. Drawing on the live classroom instruction at a higher vocational college in Wuhan, Hubei Province, China, a comparative experiment was executed. The findings revealed that three factors: teacher-student verbal interaction, teacher body language, and utilization of digital resource, all exert an influence on CAI. Simultaneously, the degree of classroom activity as gauged by FIAS and manual analysis fundamentally aligns with the CAI indicators quantified by CAAS, validating the efficacy of CAI in the quantification of classroom activity. Consequently, the incorporation of CAAS in teaching, research, and oversight scenarios can augment the precision and scientific rigor of classroom teaching assessment. Show more
Keywords: Classroom activity index, multi-scale he.ad posture classification network, classroom activity analysis system, head-up rate, head-nodding rate
DOI: 10.3233/JIFS-237970
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8169-8183, 2024
Authors: Sun, Ping | Song, LinLin | Yuan, Ling | Yu, Haiping | Wei, Yinzhen
Article Type: Research Article
Abstract: News text is an important branch of natural language processing. Compared to ordinary texts, news text has significant economic and scientific value. The characteristics of news text include structural hierarchy, diverse label categories, and limited high-quality annotation samples. Many machine learning and deep learning methods exist to analyze various forms of news text. However, due to label imbalance, hierarchical semantics, and confusing labels, current methods have limitations. Therefore, this paper proposes a news text classification framework based on hierarchical semantics and prior correction (HSPC). Firstly, data augmentation is used to enhance the diversity of the training set and adversarial learning …is employed to improve the resistance of the model with its robustness. Then, a hierarchical feature extraction approach is employed to extract semantic features from different levels of news texts. Consequentially, a feature fusion method is designed to allow the model to focus on relevant hierarchical semantics for label classification. Finally, highly confusing label predictions are corrected to optimize the label prediction of the model and improve confidence. Multiple experiments are performed on four widely used public datasets. The experimental results indicate that HSPC achieves higher classification accuracy compared to other models. On the FCT, AGNews, THUCNews, and Ohsumed datasets, HSPC improves the accuracy by 1.03%, 1.38%, 2.55%, and 1.15%, respectively, compared to state-of-the-art methods. This validates the rationality and effectiveness of the designed mechanisms. Show more
Keywords: Text Categorization, hierarchical semantics, feature fusion, prior distribution, data enhancement
DOI: 10.3233/JIFS-238433
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8185-8203, 2024
Authors: Myithili, K.K. | Beulah, R.D.
Article Type: Research Article
Abstract: The concept of intuitionistic fuzzy soft set is applied to generalize the theory of transversals in hypergraphs. The notion of transversals of an Intuitionistic Fuzzy Soft Hypergraphs (IFSHGs) and locally minimal transversals of IFSHGs are pioneered with some of its specifications. It is also proved that H ˜ is (μ, ν )-tempered IFSHGs if H ˜ is support simple, elementary and simply ordered. Then, an algorithm is developed and proposed to find the minimal transversals of IFSHGs. An application is also identified in selecting appropriate location for the …installation of wind turbines. Finally the proposed algorithm works in finding the suitable place for wind turbine installation. As a result the proposed algorithm is helpful in making decisions. Show more
Keywords: Transversals, locally minimal transversals, (μ, ν)-tempered IFSHGs
DOI: 10.3233/JIFS-222714
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8205-8212, 2024
Authors: Diao, Xiu-Li | Zhang, Quan-Lei | Zeng, Qing-Tian | Duan, Hua | Song, Zheng-guo | Zhao, Hua
Article Type: Research Article
Abstract: Knowledge tracing aims to model learners’ knowledge mastery based on their historical interaction records and predict their future performance. Due to its great potential in enabling personalized learning in intelligent tutoring systems, it has received extensive attention. However, most deep learning-based knowledge tracing methods have significant predictive performance. It is difficult to extract meaningful interpretations from the thousands of parameters in neural networks. The interpretability of knowledge tracing refers to the ability of learners to easily understand the predicted results.To address this problem, based on learning factors that influence the learner’s exercise performance, this paper proposes a novel knowledge tracing …model which is named Integrating L earning factors and B ayesian network for interpretable K nowledge T racing (LBKT). Firstly, meaningful learning factors, including knowledge mastery, learning ability, and exercise difficulty, are calculated from learners’ historical interaction records using deep learning and statistical methods. Then, Bayesian network is constructed to capture the causal relation between the three learning factors and exercise response. Finally, the Bayesian network is generated through structure and parameter learning to obtain interpretable prediction of future exercise performance. The proposed model named LBKT is evaluated on three public real-world educational datasets. The experiment results demonstrate that our approach achieves better predictive performance compared to baseline knowledge tracing methods, while also exhibiting significant superiority in model interpretability. Show more
Keywords: Interpretability, knowledge tracing, Bayesian networks, deep learning, personalized learning
DOI: 10.3233/JIFS-232189
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8213-8229, 2024
Authors: Borzooei, Rajab Ali | Ahn, Sun Shin | Jun, Young Bae
Article Type: Research Article
Abstract: Using the notion of the Łukasiewicz fuzzy set, we study the filter theory of Sheffer stroke Hilbert algebras. Here’s what we’re trying to do. 1. We first introduce the Łukasiewicz fuzzy filter of Sheffer stroke Hilbert algebras. 2. We provide an example to illustrates the Łukasiewicz fuzzy filter. 3. We examine the various properties of the Łukasiewicz fuzzy filter. 4. We discuss characterizations of the Łukasiewicz fuzzy filter. 5. We explore the conditions under which Łukasiewicz fuzzy set can be Łukasiewicz fuzzy filter. 6. We discuss the relationship between fuzzy filter and Łukasiewicz fuzzy …filter. 7. We use the given filter to creates a Łukasiewicz fuzzy filter. 8. We present conditions for the three subsets, called ∈-set, q -set and O -set, to be filters. Show more
Keywords: Sheffer stroke Hilbert algebra, Łukasiewicz fuzzy filter, ∈-set, q-set, O-set
DOI: 10.3233/JIFS-233295
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8231-8243, 2024
Authors: Yu, Peng | Song, Huxiong | Liu, Hui
Article Type: Research Article
Abstract: How to expand the variable domain and monotonicity of aggregation functions to generate new aggregation functions is an important research content in aggregation functions. In this work, the concept of interval-valued pre-(quasi-)grouping functions is given by relaxing the interval monotonicity of interval-valued (quasi-)grouping functions to interval directional monotonicity. Then, some basic properties of interval-valued pre-(quasi-)grouping functions and the relationship between interval-valued pre-(quasi-)grouping functions and pre-(quasi-)grouping functions are presented. Accordingly, several construction methods of interval-valued pre-(quasi-)grouping functions are proposed. Finally, the concept of ( I G , IN ) -interval-valued directional monotonic fuzzy implications and QL …-interval-valued directional monotonic operations are introduced on the basis of interval-valued pre-(quasi-)grouping functions I G , interval-valued overlap functions IO and interval-valued fuzzy negations IN . In addition, related studies were conducted on the basic properties of ( I G , IN ) -interval-valued directional monotonic fuzzy implications and QL -interval-valued directional monotonic operations. Show more
Keywords: Interval mathematics, Aggregation functions, Pre-(quasi-)grouping functions, Interval-valued directional monotonic fuzzy implications
DOI: 10.3233/JIFS-233318
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8245-8272, 2024
Authors: Yuan, Weijin | Deng, Yunfeng
Article Type: Research Article
Abstract: This paper improves the visual change-based personnel evacuation model by considering the evacuees’ gravity. Specifically, first, the new model incorporates the gravity formula in the model’s mechanic part to consider the influence of gravity. Second, the new model involves rules for determining the visual range of personnel moving in the stairwell. Third, the proposed model investigates the influence of the angle and width of the stairwell, the number of people, and other factors during personnel evacuation under the influence of gravity. The model is developed in Python and is compared with actual results, revealing that the proposed model is more …realistic considering the evacuation time compared to current models. Indeed, under a fixed number of people, when the stairwell angle is less than 34°, the evacuation time decreases as the angle increases, and when the stairwell angle exceeds 34°, the evacuation time is almost unchanged. Additionally, under a fixed number of evacuees, the evacuation time decreases as the width of the stairwell increases, and due to stairwell width space redundancy, the evacuation time tends to stabilize. The results of the new model research provide reference for the design of building safety evacuation, thereby improving the safety of buildings. Show more
Keywords: Stair angle, stair width, view, pedestrian evacuation
DOI: 10.3233/JIFS-236008
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8273-8287, 2024
Authors: Shengbin, Liang | Haoran, Sun | Fuqi, Sun | Hongjian, Wu | Wencai, Du
Article Type: Research Article
Abstract: Mild cognitive impairment (MCI) is a syndrome that occurs in the preclinical stage of Alzheimer’s disease (AD) and is also an early signal of the onset of AD. Early detection and accurate differentiation between MCI and AD populations, and providing them with effective intervention and treatment, are of great significance for preventing or delaying the onset of AD. In this paper, we propose a deep learning model, SE-DenseNet, that combines channel attention and dense connectivity networks and apply it to the field of magnetic resonance imaging (MRI) data recognition for the diagnosis of AD and MCI. First, to extract MRI …features with high quality, a slicing algorithm based on two-dimensional image information entropy is proposed to obtain AD brain lesion features with stronger representation ability. Second, in terms of model structure, SENet is introduced as a channel attention module and redistribute the weight of image features in the channel dimension; use DenseNet as the main architecture to maximize information flow, and each layer is directly interconnected with subsequent layers. It enables the network to learn and extract relevant features from the input data and improve the classification ability of the network. Finally, our proposed model is validated on the Alzheimer’s Disease Neuroimaging Initiative (ADNI) dataset, the results have shown that the accuracy for the four classification tasks of AD-NC, AD-MCI, NC-MCI, and AD-NC-MCI can reach 98.12%, 97.42%, 97.42%, and 95.24%, respectively. At the same time, the sensitivity and specificity have also achieved satisfactory results, exhibited a high performance in comparison with the classic machine learning algorithm and several existing state-of-the-art deep learning methods, demonstrating the proposed method is a powerful tool for the early diagnosis and detection of AD. Show more
Keywords: Alzheimer’s disease classification, computer aided diagnosis, medical image processing, megnetic resonance imaging, deep learning
DOI: 10.3233/JIFS-236542
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8289-8309, 2024
Authors: Teng, Wei | Li, Yan | Sun, Hongxing | Chen, Haojie
Article Type: Research Article
Abstract: In the present study, three hybrid models include support vector regression-salp swarm optimization (SVR-SSO), support vector regression-biogeography-based (SVR-BBO), and support vector regression-phasor particle swarm optimization (SVR- PPSO) was applied to forecast pond ash’s CBR value modified with lime sludge (LS) and lime (LI). In the developed models, five variables were selected as inputs. It can result that the developed integrated models have R2 bigger than 0.9952. It means the agreement between observed and forecasted values by hybrid models is mainly similar to represent the highest accuracy. In both the training and testing stages, PSO-SVR results from better performance than the …BBO-SVR model, with R2, RMSE, MAE, and PI equal to 0.9983, 0.6439, 0.3181, and 0.0081 for training data, and 0.9975, 0.7319, 0.4135, and 0.0141 for testing data, respectively. So, by considering the OBJ index, the OBJ value for PSO-SVR is 12.966, lower than BBO-SVR at 16.9957. Therefore, the PSO-SVR model outperforms another model to estimate the CBR of pond ash modified with LI and LS, consequently being recognized as the proposed model that makes it to be used for practical applications. Show more
Keywords: California bearing ratio, phasor particle swarm optimization, biogeography-based optimization, salp swarm optimization, support vector regression
DOI: 10.3233/JIFS-220745
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8311-8327, 2024
Authors: Chen, Yong | Xie, Xiao-Zhu | Weng, Wei
Article Type: Research Article
Abstract: Graph-structured data is ubiquitous in real-world applications, such as social networks, citation networks, and communication networks. Graph neural network (GNN) is the key to process them. In recent years, graph attention networks (GATs) have been proposed for node classification and achieved encouraging performance. It focuses on the content associated on nodes to evaluate the attention weights, and the rich structure information in the graph is almost ignored. Therefore, we propose a multi-head attention mechanism to fully employ node content and graph structure information. The core idea is to introduce the interactions in the topological structure into the existing GATs. This …method can more accurately estimate the attention weights among nodes, thereby improving the convergence of GATs. Second, the mechanism is lightweight and efficient, requires no training to learn, can accurately analyze higher-order structural information, and can be strongly interpreted through heatmaps. We name the proposed model content- and structure-based graph attention network (CSGAT). Furthermore, our proposed model achieves state-of-the-art performance on a number of datasets in node classification. The code and data are available at https://github.com/CroakerShark/CSGAT. Show more
Keywords: Graph neural network, graph attention network, node classification, graph-structured data
DOI: 10.3233/JIFS-223304
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8329-8343, 2024
Authors: Li, Biao | Tang, Shoufeng | Li, Wenyi
Article Type: Research Article
Abstract: Pose estimation plays a crucial role in human-centered vision applications and has advanced significantly in recent years. However, prevailing approaches use extremely complex structural designs for obtaining high scores on the benchmark dataset, hampering edge device applications. In this study, an efficient and lightweight human pose estimation problem is investigated. Enhancements are made to the context enhancement module of the U-shaped structure to improve the multi-scale local modeling capability. With a transformer structure, a lightweight transformer block was designed to enhance the local feature extraction and global modeling ability. Finally, a lightweight pose estimation network— U-shaped Hybrid Vision Transformer, UViT— …was developed. The minimal network UViT-T achieved a 3.9% improvement in AP scores on the COCO validation set with fewer model parameters and computational complexity compared with the best-performing V2 version of the MobileNet series. Specifically, with an input size of 384×288, UViT-T achieves an impressive AP score of 70.2 on the COCO test-dev set, with only 1.52 M parameters and 2.32 GFLOPs. The inference speed is approximately twice that of general-purpose networks. This study provides an efficient and lightweight design idea and method for the human pose estimation task and provides theoretical support for its deployment on edge devices. Show more
Keywords: Pose estimation, multi-branch structure, lightweight network, context enhancement, attention mechanism
DOI: 10.3233/JIFS-231440
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8345-8359, 2024
Authors: Yu, Bengong | Ji, Xiaohan
Article Type: Research Article
Abstract: Sarcasm is a rhetorical device commonly used in social media and is prevalent on some social platforms, such as Twitter and Reddit, to dismiss, criticize or ridicule people or events using metaphors and exaggeration. With the rapid growth of social media and internet technology, the way people express their emotions and feelings is not limited to text. Therefore, a multi-modal sarcasm detection task is crucial to understanding people’s real feelings and beliefs. However, most existing models often use implicit fusion and do not significantly align the emotions between modalities explicitly, neglecting the significant role of emotional words in sarcasm detection. …In this paper, a model was proposed based on emotion perception and cross-modality attention fusion for multi-modal sarcasm detection. Specifically, an external emotional knowledge was introduced for emotional information enhancement. In addition, the dual-channel BERT-based module and cross-modality interaction fusion were proposed based on an attention mechanism. The experimental results on a public multi-modal sarcasm detection dataset based on Twitter demonstrate the superiority of the proposed model. Show more
Keywords: Multimodality, sarcasm detection, emotion perception, attention
DOI: 10.3233/JIFS-233163
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8361-8374, 2024
Authors: Atef, Shimaa | El-Seidy, Essam | Reda, Naglaa M.
Article Type: Research Article
Abstract: Decisions in many dilemmas are based on a combination of factors, including as incentive, punishment, reputation, and memory. The impact of memory information on cooperative evolution in multi-round games is a decision-making process in group evolution. The iterated prisoner’s dilemma is an excellent model for the development of cooperation amongst the payoff-maximizing individuals. Since tit-for-tat proved successful in Axelrod’s repeated prisoner’s dilemma tournaments, there has been a great deal of interest in creating new strategies. Every iterative prisoner’s dilemma method bases its decision-making on a specific duration of past contacts with the opponent, which is referred to as the memory’s …size. This study examines the impact of strategy memory size on the evolutionary stability of n-person iterated prisoner’s dilemma strategies. In this paper, we address the role that memory plays in decision-making. We interested in the model of the Iterated Prisoner’s Dilemma game for three players with memory two, and we will look at strategies with similar behavior, such as Tit-For-Tat (TFT) strategies as well as Win Stay-Lose Shift (WSLS) strategies. As a result of this paper, we have shown that the effect of memory length is almost non-existent in the competitions of strategies that we studied. Show more
Keywords: Memory-Two, Tit-For-Tat strategies (TFT), three-players iterated prisoner’s dilemma game (3P-IPD), transition matrix, Win Stay-Lose Shift strategies (WSLS)
DOI: 10.3233/JIFS-233690
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8375-8388, 2024
Authors: Chen, Jie | Yin, Chuancun
Article Type: Research Article
Abstract: Probabilistic linguistic term sets (PLTSs) provide a flexible tool to express linguistic preferences, and several multi-criteria decision models based on PLTSs have been recently developed. In this framework, distortion risk measures are extensively used in finance and insurance applications, but are rarely applied in fuzzy systems. In this paper, distortion risk measures are applied to fuzzy tail decisions. In particular, three tail risk measurement methods are put forward, referred to as probabilistic linguistic VaR (PLVaR), expected probability linguistic VaR (EPLVaR), and Wang tail risk measure and extensively study their properties. Our novel methods help to clarify the connections between distortion …risk measure and fuzzy tail decision-making. In particular, the Wang tail risk measure is characterized by consistency and stability of decision results. The criteria and expert weights are unknown or only partially known during the decision making process, and the maximising PLTSs deviations are showed how to determine them. The theoretical results are showcased on an optimal stock fund selection problem, where the three tail risk measures are compared and analyzed. Show more
Keywords: Probabilistic linguistic term sets, probabilistic linguistic VaR, expected probability linguistic VaR, Wang tail risk measure, maximizing deviation method
DOI: 10.3233/JIFS-234218
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8389-8409, 2024
Authors: Li, Yaqin | Zhang, Ziyi | Yuan, Cao | Hu, Jing
Article Type: Research Article
Abstract: Traffic sign detection technology plays an important role in driver assistance systems and automated driving systems. This paper proposes DeployEase-YOLO, a real-time high-precision detection scheme based on an adaptive scaling channel pruning strategy, to facilitate the deployment of detectors on edge devices. More specifically, based on the characteristics of small traffic signs and complex background, this paper first of all adds a small target detection layer to the basic architecture of YOLOv5 in order to improve the detection accuracy of small traffic signs.Then, when capturing specific scenes with large fields of view, higher resolution and richer pixel information are preserved …instead of directly scaling the image size. Finally, the network structure is pruned and compressed using an adaptive scaling channel pruning strategy, and the pruned network is subjected to a secondary sparse pruning operation. The number of parameters and computations is greatly reduced without increasing the depth of the network structure or the influence of the input image size, thus compressing the model to the minimum within the compressible range. Experimental results show that the model trained by Experimental results show that the model trained by DeployEase-YOLO achieves higher accuracy and a smaller size on TT100k, a challenging traffic sign detection dataset. Compared to existing methods, DeployEase-YOLO achieves an average accuracy of 93.3%, representing a 1.3% improvement over the state-of-the-art YOLOv7 network, while reducing the number of parameters and computations to 41.69% and 59.98% of the original, respectively, with a compressed volume of 53.22% of the previous one. This proves that the DeployEase-YOLO has a great deal of potential for use in the area of small traffic sign detection. The algorithm outperforms existing methods in terms of accuracy and speed, and has the advantage of a compressed network structure that facilitates deployment of the model on resource-limited devices. Show more
Keywords: Small target, deep learning, model compression, traffic sign detection
DOI: 10.3233/JIFS-235135
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8411-8424, 2024
Authors: Zhou, Xiao-Guang | Chen, Ya-Nan | Ji, Jia-Xi
Article Type: Research Article
Abstract: The multi-attribute decision-making (MADM) methods can deeply mine hidden information in data and make a more reliable decision with actual needs and human cognition. For this reason, this paper proposes the bipolar N -soft PROMETHEE (preference ranking organization method for enrichment of evaluation) method. The method fully embodies the advantages of the PROMETHEE method, which can limit the unconditional compensation between attribute values and effectively reflect the priority between attribute values. Further, by introducing an attribute threshold to filter research objects, the proposed method not only dramatically reduces the amount of computation but also considers the impact of the size …of the attribute value itself on decision-making. Secondly, the paper proposes the concepts of attribute praise, attribute popularity, total praise, and total popularity for the first time, fully mining information from bipolar N -soft sets, which can effectively handle situations where attribute values have different orders of magnitude. In addition, this paper presents the decision-making process of the new method, closely integrating theoretical models with real life. Finally, this paper analyses and compares the proposed method with the existing ones, further verifying the effectiveness and flexibility of the proposed method. Show more
Keywords: PROMETHEE method, bipolar N-soft set, attribute praise, attribute popularity, multi-attribute decision-making
DOI: 10.3233/JIFS-236404
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8425-8440, 2024
Authors: Dagal, Idriss | Akín, Burak | Dari, Yaya Dagal
Article Type: Research Article
Abstract: In this paper, an improved constant current step based on the grey wolf optimization (CCS-GWO) algorithm for photovoltaic systems is investigated. The development of grey wolf optimization has been widely spread over photovoltaic applications. This method is one of the metaheuristic swarm optimization algorithm groups inspired by an optimum means of chasing prey by grey wolves. The proposed technique applies constant current steps to the pack of wolves (alpha, beta, and omega) by monitoring the average of the internal current step and external current step in order to target the leader alpha wolf position. Moreover, the proposed technique solves the …convergence process issues, low convergence speed, and premature local optima problems of the traditional GWO algorithm. This CCS-GWO algorithm accurately tracks the maximum power point from the photovoltaic systems for load charging in different partial shading conditions (PSCs). A number of standard benchmark functions are presented with low average cost functions and their corresponding standard deviation values. The simulation results revealed that the proposed CCS-GWO approach outperforms the existing GWO and GA algorithms in terms of efficiency (98.55%) and tracking time (0.3 s). Show more
Keywords: Grey wolf optimization, metaheuristics, photovoltaics, maximum power point
DOI: 10.3233/JIFS-224535
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8441-8460, 2024
Authors: Gao, Shengxiang | He, Zhilei | Yu, Zhengtao | Zhu, Enchang | Wu, Shaoyang
Article Type: Research Article
Abstract: Cross-lingual event retrieval is an information retrieval task aimed at cross-lingual event retrieval among multiple languages to find text or documents related to a specific event. Specific to Chinese-Vietnamese cross-language event retrieval, it involves using Chinese as a query to retrieve Vietnamese documents related to the query event. The critical issue is how to efficiently align query and document representations with limited resources. Existing cross-language pre-training models are trained on large-scale multilingual corpora, but their training goals do not include explicit language alignment tasks. Due to the uneven distribution of training corpora between different languages, these models have The problem …of language bias. Therefore, this linguistic bias is also inherited in cross-lingual retrieval based on these models. To solve this problem, this paper proposes a Chinese-Vietnamese cross-lingual event retrieval method based on knowledge distillation. This approach enables the model to learn good query-document matching features from monolingual retrieval by transferring knowledge from high-resource to low-resource languages. By enhancing the alignment between queries and documents in different languages in a shared semantic space, the method improves the performance of Chinese-Vietnamese cross-lingual event retrieval. Show more
Keywords: Cross-lingual, event retrieval, knowledge distillation, language bias
DOI: 10.3233/JIFS-235749
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8461-8475, 2024
Authors: Xu, Dongsheng | Chen, Chuanming | Jin, Qi | Zheng, Ming | Ni, Tianjiao | Yu, Qingying
Article Type: Research Article
Abstract: Abnormal-trajectory detection can be used to detect fraudulent behavior of taxi drivers transporting passengers. Aiming at the problem that existing methods do not fully consider abnormal fragments of trajectories, this paper proposes an abnormal-trajectory detection method based on sub-trajectory classification and outlier-factor acquisition, which effectively detects abnormal sub-trajectories and further detects abnormal trajectories. First, each trajectory is reconstructed using the turning angles and is divided into multiple sub-trajectories according to the turning angle threshold and trajectory point original acceleration. The sub-trajectories are then classified according to the extracted directional features. Finally, the multivariate distances between angular adjacent segments are calculated …to obtain the outlier factor, and abnormal sub-trajectories are detected. The sum of the lengths of the abnormal sub-trajectories is used to calculate the outlier score and identify abnormal trajectories. Based on experimental results using real trajectory datasets, it has been found that the proposed method performs better at detecting abnormal trajectories than other similar methods. Show more
Keywords: Abnormal-trajectory detection, trajectory reconstruction, directional feature, outlier factor, sub-trajectory classification
DOI: 10.3233/JIFS-236508
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8477-8496, 2024
Authors: Yu, Jie | Zhang, Jubin
Article Type: Research Article
Abstract: The rapid growth of the Internet of Things (IoT) brings sweeping changes in various industries. Healthcare industries have become a prime example where the Internet of Healthcare Things (IoHT) is making significant progress, particularly in how we approach real-time patient care. Traditional systems for monitoring older people and people with special needs are frequently expensive, require a large workforce, and fall short of providing real-time data. This paper introduces the “3-Tier Health Care Architecture,” an integrated approach to mitigating these issues. This architecture capitalizes on IoHT technologies and is constructed around three principal tiers: Sensor, Fog, and Cloud. The Sensor …Tier employs Health Metrics Acquisition Units (HMAUs) fitted with an nRF5340 Development Kit, capturing an extensive range of health-related metrics via wearable sensors. These metrics are then relayed to the Local Processing Units (LPUs) in Fog Tier, which operates on Raspberry Pi Zero 2 W microprocessors for the initial data processing before forwarding to the cloud. The Cloud Tier uses a hybrid CNN-LSTM Machine Learning (ML) model to perform Real-Time Healthcare Monitoring (RTHM) status assessments and includes an Early Warning System for immediate alert issuance. The proposed architecture is resilient, scalable, and efficient, serving as a fortified and all-encompassing solution for RTHM. This enables quick medical interventions, thus elevating healthcare quality and potentially life-saving. Show more
Keywords: IoT, machine learning, internet of healthcare things, healthcare monitoring, CNN, LSTM
DOI: 10.3233/JIFS-237483
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8497-8512, 2024
Authors: Wu, Guizhou | Wu, Junfeng | Zhang, Xinyu
Article Type: Research Article
Abstract: Optimization of the routing represents an important challenge when considering the rapid development of Wireless Sensor Networks (WSN), which involve efficient energy methods. Applying the effectiveness of a Deep Neural Network (DNN) and a Gaussian Mixture Model (GMM), the present article proposes an innovative method for attaining Energy-Efficient Routing (EER) in WSN. When it comes to dealing with dynamic network issues, conventional routing protocols generally conflict, resulting in unsustainable Energy consumption (EC). By applying algorithms based on data mining to adapt routing selections in an effective procedure, the GMM + DNN methodology that has been developed is able to successfully address this …problem. The GMM is a fundamental Feature Extraction (FE) method for accurately representing the features of statistical analysis associated with network parameters like signal frequency, the amount of traffic, and channel states. By learning from previous data collection, the DNN, which relies on these FE, provides improved routing selections, resulting in more efficient use of energy. Since routing paths are constantly optimized to ensure dynamic adaptation, where less energy is used, networks last longer and perform more efficiently. Network simulations highlight the GMM + DNN method’s effectiveness and depict how it outperforms conventional routing methods while preserving network connectivity and data throughput. The GMM + DNN’s adaptability to multiple network topologies and traffic patterns and its durability make it an efficient EER technique in the diverse WSN context. The GMM + DNN achieves an EC of 0.561 J, outperforming the existing state-of-the-art techniques. Show more
Keywords: Sensor Node, WSN, gaussian mixture, CNN, energy consumption, routing
DOI: 10.3233/JIFS-238711
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8513-8527, 2024
Authors: Allouche, Moez | Dahech, Karim | Gaubert, Jean-Paul
Article Type: Research Article
Abstract: This paper proposes a multi-objective H2 /H ∞ maximum power tracking control of a variable speed wind turbine to minimize the H2 tracking error and ensure the H ∞ model reference-tracking performance, simultaneously. The optimal condition is obtained via a boost converter use, which adapts the load impedance to the wind turbine generator. Thus, based on the fuzzy T-S model, a multi-objective Maximum Power Point Tracking (MPPT) controller is developed, ensuring maximum power transfer, despite wind speed variation and system uncertainty. To specify the optimal trajectory to follow, a TS reference model is proposed taking as input the optimal …rectified DC current. The conditions of stability and stabilization are expressed in terms of linear matrix inequality (LMI) for uncertain and disturbed T-S models leading to determining the controller gains. Finally, an example of MPP tracking applied to a Wind Energy Conversion System (WECS) illustrates the effectiveness of the proposed fuzzy control law. Show more
Keywords: Multi-objective fuzzy tracking control, maximum power point tracking (MPPT), linear matrix inequalities (LMIs), robust control, T-S fuzzy model
DOI: 10.3233/JIFS-222887
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8529-8541, 2024
Authors: Sharma, Itika | Gupta, Sachin Kumar
Article Type: Research Article
Abstract: UAVs or Drones can be used to support wireless communication by acting as flying or mobile Base Stations for the accumulation of the different types of data to train the models. However, in traditional or DL-based UAVs, the raw data is sent from the devices to the centralized server, which causes problems in terms of the privacy of the devices and the UAVs’ communication resources or limited processing. Therefore, the issue with DL-based UAVs is that sending the original data to the centralized body raises questions about security and privacy. The transmission of distributed, unprocessed data from the drones to …the cloud, including interactive media information data types, requires a significant amount of network bandwidth and more energy, which has an enormous effect on several trade-offs, including communication rates and computation latencies. Data packet loss caused by asynchronous transmission, which doesn’t prevent peer-to-peer communication, is a concern with AFL-based UAVs. Therefore, in order to address the aforementioned issues, we have introduced SFL-based UAVs that focus on creating algorithms in which the models simultaneously update the server as they wait for all of the chosen devices to communicate. The proposed framework enables a variety of devices, including mobile and UAV devices, to train or learn their algorithms for machine learning before updating the models and parameters simultaneously to servers or manned aerial data centers for model buildup without transferring their original private information. This decreases packet loss and privacy threats while also enhancing round effectiveness as well as model accuracy. The comparative analysis of AFL and SFL techniques in terms of accuracy, global rounds, and communication rounds are offered. Simulation findings suggest that the proposed methodology improves in terms of global rounds and accuracy. Show more
Keywords: UAV, training, raw data, FL, AFL, SFL etc
DOI: 10.3233/JIFS-235275
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8543-8562, 2024
Authors: Pandey, Vibha | Choubey, Siddhartha | Patra, Jyotiprakash | Mall, Shachi | Choubey, Abha
Article Type: Research Article
Abstract: Automated reading of license plate and its detection is a crucial component of the competent transportation system. Toll payment and parking management e-payment systems may benefit from this software’s features. License plate detection and identification algorithms abound, and each has its own set of strengths and weaknesses. Computer vision has advanced rapidly in terms of new breakthroughs and techniques thanks to the emergence and proliferation of deep learning principles across several branches of AI. The practice of automating the monitoring process in traffic management, parking management, and police surveillance has become much more effective thanks to the development of Automatic …License Plate Recognition (ALPR). Even though license plate recognition (LPR) is a technology that is extensively utilized and has been developed, there is still a significant amount of work to be done before it can achieve its full potential. In the last several years, there have been substantial advancements in both the scientific community’s methodology and its level of efficiency. In this era of deep learning, there have been numerous developments and techniques established for LPR, and the purpose of this research is to review and examine those developments and approaches. In light of this, the authors of this study suggest a four-stage technique to automated license plate detection and identification (ALPDR), which includes, image pre-processing, license plate extraction, character segmentation, and character recognition. And the first three phases are known as “extraction,” “pre-processing,” and “segmentation,” and each of these processes has been shown to benefit from its own unique technique. In light of the fact that character recognition is an essential component of license plate identification and detection, the Convolution Neural Network (CNN), MobileNet, Inception V3, and ResNet 50 have all been put through their paces in this regard. Show more
Keywords: Data security, secure image analysis, automatic license plate recognition, segmentation, image classification, convolution neural network, character recognition
DOI: 10.3233/JIFS-235400
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8563-8585, 2024
Authors: Sakthimohan, M. | Deny, J. | Rani, G. Elizabeth
Article Type: Research Article
Abstract: In general, wireless sensor networks are used in various industries, including environmental monitoring, military applications, and queue tracking. To support vital applications, it is crucial to ensure effectiveness and security. To prolong the network lifetime, most current works either introduce energy-preserving and dynamic clustering strategies to maintain the optimal energy level or attempt to address intrusion detection to fix attacks. In addition, some strategies use routing algorithms to secure the network from one or two attacks to meet this requirement, but many fewer solutions can withstand multiple types of attacks. So, this paper proposes a secure deep learning-based energy-efficient routing …(SDLEER) mechanism for WSNs that comes with an intrusion detection system for detecting attacks in the network. The proposed system overcomes the existing solutions’ drawbacks by including energy-efficient intrusion detection and prevention mechanisms in a single network. The system transfers the network’s data in an energy-aware manner and detects various kinds of network attacks in WSNs. The proposed system mainly comprises two phases, such as optimal cluster-based energy-aware routing and deep learning-based intrusion detection system. Initially, the cluster of sensor nodes is formed using the density peak k-mean clustering algorithm. After that, the proposed system applies an improved pelican optimization approach to select the cluster heads optimally. The data are transmitted to the base station via the chosen optimal cluster heads. Next, in the attack detection phase, the preprocessing operations, such as missing value imputation and normalization, are done on the gathered dataset. Next, the proposed system applies principal component analysis to reduce the dimensionality of the dataset. Finally, intrusion classification is performed by Smish activation included recurrent neural networks. The proposed system uses the NSL-KDD dataset to train and test it. The proposed one consumes a minimum energy of 49.67 mJ, achieves a better delivery rate of 99.92%, takes less lifetime of 5902 rounds, 0.057 s delay, and achieves a higher throughput of 0.99 Mbps when considering a maximum of 500 nodes in the network. Also, the proposed one achieves 99.76% accuracy for the intrusion detection. Thus, the simulation outcomes prove the superiority of the proposed SDLEER system over the existing schemes for routing and attack detection. Show more
Keywords: Wireless sensor networks, optimal cluster-based energy aware routing, intrusion detection system, cluster head selection, routing, dimensionality reduction, and deep learning
DOI: 10.3233/JIFS-235512
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8587-8603, 2024
Authors: Zhao, Xiaoqing | Xu, Miaomiao | Li, Yanbing | Huang, Hao | Silamu, Wushour
Article Type: Research Article
Abstract: This research focuses on Scene Text Recognition (STR), a crucial component in various applications of artificial intelligence such as image retrieval, office automation, and intelligent traffic systems. Recent studies have shown that semantic-aware approaches significantly improve the performance of STR tasks, with context-aware STR methods becoming mainstream. Among these, the fusion of visual and language models has shown remarkable effectiveness. We propose a novel method (PABINet) that incorporates three key components: a Visual-Language Decoder, a Language Model, and a Fusion Model. First, during training, the Visual-Language Decoder masks the original labels in the Transformer decoder using permutation masks, with each …mask being unique. This enhances word memorization and learning through contextual semantic information, resulting in robust semantic knowledge. During the inference stage, the Visual-Language Decoder employs autonomous Autoregressive model (AR) inference to generate results. Subsequently, the Language Model scrutinizes and corrects the output of the Visual-Language Encoder using a cloze mask approach, achieving context-aware, autonomous, bidirectional inference. Finally, the Fusion Model concatenates and refines the outputs of both models through iterative layers.Experimental results demonstrate that our PABINet performs exceptionally well when handling various quality images. When trained with synthetic data, PABINet achieves a new STR benchmark (average accuracy of 92.41%), and when trained with real data, it establishes new state-of-the-art results (average accuracy of 96.28%). Show more
Keywords: Scene text recognition, language model, visual-language decoder
DOI: 10.3233/JIFS-237135
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8605-8616, 2024
Authors: Arunagirinathan, Sumithara | Subramanian, Chitra
Article Type: Research Article
Abstract: This paper presents a hybrid approach for optimizing the maximum power point tracking of photovoltaic (PV) systems in electric vehicles. The hybrid technique involves the simultaneous utilization of the Gannet Optimization Algorithm (GOA) and Quantum Neural Network (QNN), collectively referred to as the GOA-QNN technique. The primary aim is to enhance the efficiency and maximize the power output of PV systems. The proposed hybrid methodology boosts the performance of the photovoltaic system by managing the power interface. A high step-up DC/DC converter is employed to adjust the photovoltaic source power and load, ensuring optimal power transfer under various operating conditions. …The proposed method optimally determines the duty cycle of the converter. Subsequently, the model is implemented in the MATLAB/Simulink platform, and its execution is evaluated using established procedures. The results clearly demonstrate the superiority of the proposed method over existing approaches in terms of power quality, settling time, and controller stability. The proposed technique achieves an impressive efficiency level of 95%, exceeding the efficiency of other existing techniques. Show more
Keywords: MPPT, Photovoltaic, high-gain converter, Gannet Optimization Algorithm, Quantum Neural Network, EV
DOI: 10.3233/JIFS-237734
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8617-8637, 2024
Authors: Karthika, K. | Rangasamy, Devi Priya
Article Type: Research Article
Abstract: In today’s digital era, the security of sensitive data such as Aadhaar data is of utmost importance. To ensure the privacy and integrity of this data, a conceptual framework is proposed that employs the Diffie-Hellman key exchange protocol and Hash-based Message Authentication Code (HMAC) to enhance the security. The proposed system begins with the preprocessing phase, which includes removing noise, standardizing formats and validating the integrity of the data. Next, the data is segmented into appropriate sections to enable efficient storage and retrieval in the cloud. Each segment is further processed to extract meaningful features, ensuring that the relevant information …is preserved while reducing the risk of unauthorized access. For safeguarding the stored Aadhaar data, the system employs the Diffie-Hellman key exchange protocol which allows the data owner and the cloud service provider to establish a shared secret key without exposing it to potential attackers. Additionally, HMAC is implemented to verify the identity of users during the login process. HMAC enhances security by leveraging cryptographic hash functions and a shared secret key to produce a distinct code for each login attempt. This mechanism effectively protects the confidentiality and integrity of stored data. The combination of Diffie-Hellman key exchange and HMAC authentication provides a robust security framework for Aadhaar data. It ensures that the data remains encrypted and inaccessible without the secret key, while also verifying the identity of users during the login process. This comprehensive approach helps preventing unauthorized access thereby protecting against potential attacks, instilling trust and confidence in the security of Aadhaar data stored in the cloud. Results of the article depict that the proposed scheme achieve 0.19 s of encryption time and 0.05 s of decryption time. Show more
Keywords: Hash based message authentication code (HMAC), cryptographic hash functions, Diffie Hellman, communications
DOI: 10.3233/JIFS-234641
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8639-8658, 2024
Authors: Wu, Chengding | Xu, Zhaoping | Liu, Liang | Yang, Tao
Article Type: Research Article
Abstract: There are limitations of personalization in Advanced Driver Assistance Systems (ADAS) that have a serious impact on driver acceptance and satisfaction. This study investigates driving style recognition method to achieve personalization of longitudinal driving behavior. Currently, driving style recognition algorithms for Personalized Adaptive Cruise Control (PACC) rely on integrated recognition. However, disturbances in the driving cycle may lead to changes in a driver’s integrated driving style. Therefore, the integrated driving style cannot accurately and comprehensively reflect the driver’s driving style. To solve this problem, a new driving style recognition method for PACC is proposed, which considers integrated driving style and …driving cycle. Firstly, the method calculates the constructed feature parameters of driving cycle and style, and then reduces the dimensionality of the feature parameter matrix by principal component analysis (PCA). Secondly, a two-stage clustering algorithm with self-organizing mapping networks and K-means clustering (SOM-K-means) is used to obtain the type labels. Then, a transient recognition model based on random forest (RF) is established and the hyperparameters of this model are optimized by sparrow search algorithm (SSA). Based on this, a comprehensive driving style recognition model is established using analytic hierarchy process (AHP). Finally, the validity of the proposed method is verified by a natural dataset. The method incorporates the driving cycle into driving style recognition and provides guidance for improving the personalization of adaptive cruise control system. Show more
Keywords: Personalized adaptive cruise control, SOM-K-means two-stage clustering, random forest (RF), sparrow search algorithm (SSA), driving style recognition
DOI: 10.3233/JIFS-235045
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8659-8675, 2024
Authors: Wan, Huanyu | Qiu, Dong
Article Type: Research Article
Abstract: In order to explore effective management strategies in the context of epidemics, this study introduces a novel concept: Trapezoidal type-2 fuzzy linguistic intuitionistic fuzzy set (TrT2FLIFS) and proposes a trapezoidal type-2 fuzzy linguistic intuitionistic fuzzy matrix game (TrT2FLIFMG). Subsequently, employing sentiment analysis based on the BosonNLP sentiment lexicon, the study extracts comment data from Weibo related to epidemics made by users and calculates their textual scores. These two methods are integrated and applied to policy selection in epidemic management, along with the introduction of a new ranking function to compare the importance of alternative policies. Finally, a comparative analysis with …existing methods is conducted to validate the effectiveness of the proposed approach. Show more
Keywords: Matrix game, sentiment analysis, trapezoidal type-2 fuzzy linguistic intuitionistic fuzzy number, ranking function, pandemic management
DOI: 10.3233/JIFS-237319
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8677-8695, 2024
Authors: Wang, Jinxin | Wu, Zhanwen | Yang, Longzhi | Hu, Wei | Song, Chaojun | Zhu, Zhaolong | Guo, Xiaolei | Cao, Pingxiang
Article Type: Research Article
Abstract: Distributed flexible flowshop scheduling is getting more important in the large-scale panel furniture industry. It is vital for a higher manufacturing efficiency and economic profit. The distributed scheduling problem with lot-streaming in a flexible flow shop environment is investigated in this work. Furthermore, the actual constraints of packaging collaborative and machine setup times are considered in the proposed approach. The average order waiting time for packaging and average order delay rate is used as objectives. Non-dominated sorting method is used to handle this bi-objective optimization problem. An improved encoding method was proposed to address the large-scale orders that need to …be divided into sub-lots based on genetic algorithm. The proposed approach is firstly validated by benchmark with other multi-objectives evolutionary algorithms. The results found that the proposed approach had a good convergence and diversity. Besides, the influence of the proportion of large-scale orders priority level and sub-lot size was investigated in a panel furniture manufacturing scenario. The results can be concluded that the enterprise could obtain shorter order average waiting time and delay rate when the sub-lot sizes were set as two and the order priority level was allocated in the proportion of 1:2:3:4:5. Show more
Keywords: Distributed flexible flow shop scheduling, Panel furniture manufacturing, Lot-streaming, Packaging collaborative, Setup time
DOI: 10.3233/JIFS-237378
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8697-8707, 2024
Authors: Qin, Xiwen | Zhang, Siqi | Dong, Xiaogang | Shi, Hongyu | Yuan, Liping
Article Type: Research Article
Abstract: The research of biomedical data is crucial for disease diagnosis, health management, and medicine development. However, biomedical data are usually characterized by high dimensionality and class imbalance, which increase computational cost and affect the classification performance of minority class, making accurate classification difficult. In this paper, we propose a biomedical data classification method based on feature selection and data resampling. First, use the minimal-redundancy maximal-relevance (mRMR) method to select biomedical data features, reduce the feature dimension, reduce the computational cost, and improve the generalization ability; then, a new SMOTE oversampling method (Spectral-SMOTE) is proposed, which solves the noise sensitivity problem …of SMOTE by an improved spectral clustering method; finally, the marine predators algorithm is improved using piecewise linear chaotic maps and random opposition-based learning strategy to improve the algorithm’s optimization seeking ability and convergence speed, and the key parameters of the spectral-SMOTE are optimized using the improved marine predators algorithm, which effectively improves the performance of the over-sampling approach. In this paper, five real biomedical datasets are selected to test and evaluate the proposed method using four classifiers, and three evaluation metrics are used to compare with seven data resampling methods. The experimental results show that the method effectively improves the classification performance of biomedical data. Statistical test results also show that the proposed PRMPA-Spectral-SMOTE method outperforms other data resampling methods. Show more
Keywords: Biomedical data, mRMR, spectral clustering, SMOTE, marine predators algorithm
DOI: 10.3233/JIFS-237538
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8709-8728, 2024
Authors: Ren, Shujun | Wang, Yuanhong
Article Type: Research Article
Abstract: Image segmentation is critical in medical image processing for lesion detection, localisation, and subsequent diagnosis. Currently, computer-aided diagnosis (CAD) has played a significant role in improving diagnostic efficiency and accuracy. The segmentation task is made more difficult by the hazy lesion boundaries and uneven forms. Because standard convolutional neural networks (CNNs) are incapable of capturing global contextual information, adequate segmentation results are impossible to achieve. We propose a multiscale feature fusion network (MTC-Net) in this paper that integrates deep separable convolution and self-attentive modules in the encoder to achieve better local continuity of images and feature maps. In the decoder, …a multi-branch multi-scale feature fusion module (MSFB) is utilized to improve the network’s feature extraction capability, and it is integrated with a global cooperative aggregation module (GCAM) to learn more contextual information and adaptively fuse multi-scale features. To develop rich hierarchical representations of irregular forms, the suggested detail enhancement module (DEM) adaptively integrates local characteristics with their global dependencies. To validate the effectiveness of the proposed network, we conducted extensive experiments, evaluated on the public datasets of skin, breast, thyroid and gastrointestinal tract with ISIC2018, BUSI, TN3K and Kvasir-SEG. The comparison with the latest methods also verifies the superiority of our proposed MTC-Net in terms of accuracy. Our code on https://github.com/gih23/MTC-Net. Show more
Keywords: Medical image segmentation, multi-scale features, detail enhancement, feature fusion, deep learning
DOI: 10.3233/JIFS-237963
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8729-8740, 2024
Authors: Yue, Lizhu | Wang, Qian
Article Type: Research Article
Abstract: With the rapid development of big data and continuous optimization of online shopping platforms, personalized recommendation has become a standard feature of recommendation methods. In order to effectively provide personalized recommendations to customers, improve recommendation accuracy, and customer satisfaction, it is necessary to consider customers’ preferences for multiple product attributes when making product recommendations. However, existing recommendation methods require precise calculation of product attribute weights, which is computationally expensive, complex, and often results in unstable weight values. This paper proposes a multi-attribute recommendation method based on consumer decision preference information that overcomes the need for weights and reflects personalized customer …preferences. Based on the acquisition of customer product attribute preference sequences, a partial order relation for recommended products is constructed using partial order set theory. Finally, the recommended products are determined through the partial order Hasse diagram, where the top layer elements of the Hasse diagram represent the recommended product set. This method addresses challenges that traditional content-based recommendations cannot overcome. The experiment in this paper uses a dataset of 30,000 records from Beeradvocate beer reviews. The experimental results show that, compared to traditional multi-attribute recommendation methods, this method only requires decision-maker preference information to complete product recommendations, requiring less information and having lower computational costs, resulting in more robust results. Show more
Keywords: Multi-attribute recommendation, partial order set, decision preference, hasse diagram, personalization
DOI: 10.3233/JIFS-231724
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8741-8754, 2024
Authors: Badshah, Noor | Begum, Nasra | Rada, Lavdie | Ashfaq, Muniba | Atta, Hadia
Article Type: Research Article
Abstract: Joint segmentation and registration of images is a focused area of research nowadays. Jointly segmenting and registering noisy images and images having weak boundaries/intensity inhomogeneity is a challenging task. In medical image processing, joint segmentation and registration are essential methods that aid in distinguishing structures and aligning images for precise diagnosis and therapy. However, these methods encounter challenges, such as computational complexity and sensitivity to variations in image quality, which may reduce their effectiveness in real-world applications. Another major issue is still attaining effective joint segmentation and registration in the presence of artifacts or anatomical deformations. In this paper, a …new nonparametric joint model is proposed for the segmentation and registration of multi-modality images having weak boundaries/noise. For segmentation purposes, the model will be utilizing local binary fitting data term and for registration, it is utilizing conditional mutual information. For regularization of the model, we are using linear curvature. The new proposed model is more efficient to segmenting and registering multi-modality images having intensity inhomogeneity, noise and/or weak boundaries. The proposed model is also tested on the images obtained from the freely available CHOAS dataset and compare the results of the proposed model with the other existing models using statistical measures such as the Jaccard similarity index, relative reduction, Dice similarity coefficient and Hausdorff distance. It can be seen that the proposed model outperforms the other existing models in terms of quantitatively and qualitatively. Show more
Keywords: Image segmentation, , , , , image registration, linear curvature (LC), conditional mutual information (CMI), Jaccard similarity index (JSI)
DOI: 10.3233/JIFS-233306
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8755-8770, 2024
Authors: Chen, Zhipeng | Liu, Xiao | Qin, Jianhua
Article Type: Research Article
Abstract: To solve the problem that the walking jitter of quadruped robots leads to the degradation of clarity of visual imaging, a quadruped robot visual imaging jitter compensation algorithm based on the theory of walking jitter is proposed. The D-H coordinate transformation method is used to establish the coordinate system of each joint of the leg. The kinetic equations of the leg are derived from the relationship between the rotational velocity and the moment of the leg joint, and the kinetic equilibrium equations of the quadruped robot body are established based on the spatial moment equilibrium theorem; the spring-mass model of …the leg of the quadruped robot is used to construct the kinetic equations of the leg jittering, and the kinetic equations of the body jittering are derived using the moment equilibrium condition of the body center of gravity position and under the effect of the leg and body jitter to obtain the visual imaging device jitter quantity; finally, the tremor quantity is combined with the jitter quantity and rotation matrix to derive the walking jitter mathematical model of the quadruped robot visual imager, and the jitter compensation algorithm of quadruped robot visual imager is verified. The experimental results show that compared with the traditional Wiener filter algorithm for jitter compensation and the BP neural network jitter compensation algorithm, this algorithm improves the visual imaging by 10.8% and 3.3% in the two evaluation indexes of peak signal-to-noise ratio and structural similarity, respectively, and the de-jittering effect is better. Show more
Keywords: Quadruped robot, visual imaging, walking jitter, compensation algorithm
DOI: 10.3233/JIFS-235345
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8771-8782, 2024
Authors: Xiong, Haoyu | Yang, Leixin | Fang, Gang | Li, Junwei | Xiang, Yu | Zhang, Yaping
Article Type: Research Article
Abstract: Test-time augmentation (TTA) has become a widely adopted technique in the computer vision field, which can improve the prediction performance of models by aggregating the predictions of multiple augmented test samples without additional training or hyperparameter tuning. While previous research has demonstrated the effectiveness of TTA in visual tasks, its application in natural language processing (NLP) tasks remains challenging due to complexities such as varying text lengths, discretization of word elements, and missing word elements. These unfavorable factors make it difficult to preserve the label invariance of the standard TTA method for augmented text samples. Therefore, this paper proposes a …novel TTA technique called Defy, which combines nearest-neighbor anomaly detection algorithm and an adaptive weighting network architecture with a bidirectional KL divergence entropy regularization term between the original sample and the aggregated sample, to encourage the model to make more consistent and reliable predictions for various augmented samples. Additionally, by comparing with Defy, the paper further explores the problem that common TTA methods may impair the semantic meaning of the text during augmentation, leading to a shift in the model’s prediction results from correct to corrupt. Extensive experimental results demonstrate that Defy consistently outperforms existing TTA methods in various text classification tasks and brings consistent improvements across different mainstream models. Show more
Keywords: Test-time augmentation, test-time robustification, text classification, language model, anomaly detection
DOI: 10.3233/JIFS-236010
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8783-8798, 2024
Authors: Vijaya Lakshmi, A. | Vaitheki, K. | Suresh Joseph, K.
Article Type: Research Article
Abstract: Over the years, numerous optimization problems have been addressed utilizing meta-heuristic algorithms. Continuing initiatives have always been to create and develop new, practical algorithms. This work proposes a novel meta-heuristic approach employing the slender Loris optimization algorithm (SLOA), miming slender Loris behavior. The behavior includes foraging, hunting, migration and communication with each other. The ultimate goal of the devised algorithm is to replicate the food-foraging behaviour of Slender Loris (SL) and the quick movement of SL when threatened (i.e.) their escape from predators and also mathematically modelled the special communication techniques of SL using their urine scent smell. SLOA modelled …SL’s slow food foraging behaviour as the exploitation phase, and moving between the tree and escaping from a predator is modelled as the exploration phase. The Eyesight of slender Loris plays a vital role in food foraging during nighttime in dim light. The operator’s Eyesight is modelled based on the angle of inclination of SL. The urine scent intensity is used here to be instrumental in preventing already exploited territory activities, which improves algorithm performance. The suggested algorithm is assessed and tested against nineteen benchmark test operations and evaluated for effectiveness with standard widely recognized meta-heuristics algorithms. The result shows SLOA performing better and achieving near-optimal solutions and dominance in exploration–exploitation balance in most cases than the existing state-of-the-art algorithms. Show more
Keywords: Slender loris optimization algorithm, exploitation and exploration, optimization problems, swarm intelligence algorithm, metaheuristic
DOI: 10.3233/JIFS-236737
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8799-8810, 2024
Authors: Chen, Junzhuo | Lu, Zonghan | Kang, Shitong
Article Type: Research Article
Abstract: In the wake of the global spread of monkeypox, accurate disease recognition has become crucial. This study introduces an improved SE-InceptionV3 model, embedding the SENet module and incorporating L2 regularization into the InceptionV3 framework to enhance monkeypox disease detection. Utilizing the Kaggle monkeypox dataset, which includes images of monkeypox and similar skin conditions, our model demonstrates a noteworthy accuracy of 96.71% on the test set, outperforming conventional methods and deep learning models. The SENet module’s channel attention mechanism significantly elevates feature representation, while L2 regularization ensures robust generalization. Extensive experiments validate the model’s superiority in precision, recall, and F1 score, …highlighting its effectiveness in differentiating monkeypox lesions in diverse and complex cases. The study not only provides insights into the application of advanced CNN architectures in medical diagnostics but also opens avenues for further research in model optimization and hyperparameter tuning for enhanced disease recognition. Show more
Keywords: CNN, InceptionV3, SENet, L2 regularization, monkeypox disease, deep learning
DOI: 10.3233/JIFS-237232
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8811-8828, 2024
Authors: Zhou, Yinwei | Hu, Jun
Article Type: Research Article
Abstract: The rough set model has been extended to interval rough number decision systems, but the existing studies do not consider interval rough number decision systems with missing values. To this end, a rough set model of incomplete interval rough number decision systems (IIRNDSs) is proposed, and its uncertainty measures are investigated. Firstly, the similarity of two incomplete interval rough numbers (IIRNs) are defined by calculating their optimistic and pessimistic distances of the lower and upper approximation intervals of IIRNs. Then, the rough sets in IIRNDSs are constructed by the induced similarity relation. Next, four uncertainty measures, including approximation accuracy, approximation …roughness, conditional entropy, and decision rough entropy are given, which exhibit a monotonic variation with changes in the size of attribute sets, α, and θ. Finally, the experimental results demonstrate the proposed rough set model of IIRNDSs is feasible and effective. Show more
Keywords: Incomplete interval rough number decision systems, interval rough number, similarity relation, uncertainty measure, rough sets
DOI: 10.3233/JIFS-237320
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8829-8843, 2024
Authors: Guo, Hong | Yang, Jin | Yang, Jun
Article Type: Research Article
Abstract: This paper proposes a method of using machine learning and an evolutionary algorithm to solve the flexible job shop problem (FJSP). Specifically, a back propagation (BP) neural network is used as the machine learning method, the most widely used genetic algorithm (GA) is employed as the optimized object to address the machine-selection sub-problem of the FJSP, and particle swarm optimization (PSO) is utilized to solve the operation-order sub-problem of the FJSP. At present, evolutionary algorithms such as the GA, PSO, ant colony algorithm, simulated annealing algorithm, and their optimization algorithms are widely used to solve the FJSP; however, none of …them optimizes the initial solutions. Because each of these algorithms only focuses on solving a single FJSP, they can only use randomly generated initial solutions and cannot determine whether the initial solutions are good or bad. Based on these standard evolutionary algorithms and their optimized versions, the JSON object was introduced in this study to cluster and reconstruct FJSPs such that the machine learning strategies can be used to optimize the initial solutions. Specifically, the BP neural networks are trained so that the generalization of BP neural networks can be used to judge whether the initial solutions of the FJSPs are good or bad. This approach enables the bad solutions to be filtered out and the good solutions to be maintained as the initial solutions. Extensive experiments were performed to test the proposed algorithm. They demonstrated that it was feasible and effective. The contribution of this approach consists of reconstructing the mathematical model of the FJSP so that machine learning strategies can be introduced to optimize the algorithms for the FJSP. This approach seems to be a new direction for introducing more interesting machine learning methodologies to solve the FJSP. Show more
Keywords: Flexible job shop scheduling problem, mechanical engineering, evolutionary algorithms, machine learning
DOI: 10.3233/JIFS-224021
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8845-8863, 2024
Authors: Wang, Tianxiong | Xu, Mengmeng | Yang, Liu | Zhou, Meiyu | Sun, Xin
Article Type: Research Article
Abstract: Kansei Engineering (KE) is a product design method that aims to develop products to meet users’ emotional preferences. However, traditional KE faces the problem that the acquisition of Kansei factors does not represent the real consumers demands based on manual and reports, and using traditional methods to calculate relationship between Kansei factors and specific design elements, which can lead to the omission of key information. To address these problems, this study adopts text mining and backward propagation neural networks (BPNN) to propose a product form design method from a multi-objective optimization perspective. Firstly, Term Frequency-Inverse Document Frequency (TF-IDF) and WordNet …are used to extract key user Kansei requirements from online review texts to obtain more accurate Kansei knowledge. Secondly, the BPNN is used to establish the non-linear relationship between product Kansei factors and specific design elements, and a preference mapping prediction model is constructed. Finally, BPNN is transformed into an iterative prediction value of non-dominated sorting genetic algorithm-II (NSGA-II), and the model is solved through multi-objective evolutionary algorithm (MOEA) to obtain the Pareto optimal solution set that satisfies the user’s multiple emotional needs, and the fuzzy Delphi method is used to obtain the best product form design scheme that meets the user’s multiple emotional images. Using the example of electric bicycle form design could show that this proposed method can effectively complete multi-objective product solutions innovation design. Show more
Keywords: Text mining, Back propagation neural network (BPNN), Multi-objective evolutionary algorithm (MOEA), Non-dominated sorting genetic algorithm-II (NSGA-II), Kansei engineering
DOI: 10.3233/JIFS-230668
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8865-8885, 2024
Authors: Maleki, Monavareh | Ebrahimi, Mohamad | Davvaz, B.
Article Type: Research Article
Abstract: The concept of entropy and information gain of BE-algebras in scientific disciplines such as information theory, data science, supply chain and machine learning assists us to calculate the uncertanity of the scientific processes of phenomena. In this respect the notion of filter entropy for a transitive BE-algebra is introduced and its properties are investigated. The notion of a dynamical system on a transitive BE-algebra is introduced. The concept of the entropy for a transitive BE-algebra dynamical system is developed and, its characteristics are considered. The notion of equivalent transitive BE-algebra dynamical systems is defined, and it is proved the fact …that two equivalent BE-algebra dynamical systems have the same entropy. Theorems to help calculate the entropy are given. Specifically, a new version of Kolmogorov– Sinai Theorem has been proved. The study introduces the concept of information gain of a transitive BE-algebra with respect to its filters and investigates its properties. This study proposes the use of filter entropy to approximate the level of risk introduced by a BE-algebra dynamical system. This aim is reached by defining the information gain with respect to the filters of a BE-algebra. This methodology is well developed for use in engineering, especially in industrial networks. This paper proposes a novel approach to assess the quantity of uncertainty, and the impact of information gain of a BE-algebra dynamical system. Show more
Keywords: Generator, transitive BE-algebra, dynamical system, entropy, information gain
DOI: 10.3233/JIFS-232363
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8887-8901, 2024
Authors: Ma, Ping | Ni, Zhengwei
Article Type: Research Article
Abstract: Time series forecasting has a wide range of applications in various fields. To eliminate the need for time series data volume, a meta-learning-based few-shot time series forecasting method is proposed. This method uses a residual stack module as its backbone and connects the residuals forward and backward through a multilayer fully connected network so that the model and the meta-learning framework can be seamlessly combined. The Empirical knowledge of different time-sequence tasks is obtained through meta-training. To enable fast adaptation to new prediction tasks, a small meta-network is introduced to adaptively and dynamically generate the learning rate and weight decay …coefficient of each step in the network. This method can use sequences of different data distribution characteristics for cross-task learning, and each training task only needs a small number of time series to achieve sequence prediction for the target task. The results show that compared with the two baselines, the proposed method has improved performance on 67.07% and 58.53% of the evaluated tasks. Thus, this method can effectively alleviate the problems caused by insufficient data during training and has broad application prospects in the field of time series. Show more
Keywords: Time series forecasting, few-shot learning, meta learning, residual stack model
DOI: 10.3233/JIFS-233520
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8903-8916, 2024
Authors: Gul, Rimsha | Bashir, Maryam
Article Type: Research Article
Abstract: As the volume of data continues to grow, the significance of text classification is on the rise. This vast amount of data majorly exists in the form of texts. Effective data preparation is essential to extract sentiment data from this vast amount of text, as irrelevant and redundant information can impede valuable insights. Feature selection is an important step in the data preparation phase as it eliminates irrelevant and insignificant features from the huge features set. There exist a large body of work related to feature selection for image processing but limited research is done for text data. While some …studies recognize the significance of feature selection in text classification, but there is still need for more efficient sentiment analysis models that optimize feature selection and reduce computational. This manuscript aims to bridge these gaps by introducing a hybrid multi-objective evolutionary algorithm as a feature selection mechanism, combining the power of multiple objectives and evolutionary processes. The approach combines two feature selection techniques within a binary classification model: a filter method, Information Gain (IG), and an evolutionary wrapper method, Binary Multi-Objective Grey Wolf Optimizer (BMOGWO). Experimental evaluations are conducted across six diverse datasets. It achieves a reduction of over 90 percent in feature size while improving accuracy by nearly nine percent. These results showcase the model’s efficiency in terms of computational time and its efficacy in terms of higher classification accuracy which improves sentiment analysis performance. This improvement can be beneficial for various applications, including recommendation systems, reviews analysis, and public opinion observation. However, it’s crucial to acknowledge certain limitations of this study. These encompass the need for broader classifier evaluation, and scalability considerations with larger datasets. These identified limitations serve as directions for future research and the enhancement of the proposed approach. Show more
Keywords: Feature selection, sentiment analysis, multi-objective optimization, evolutionary algorithms
DOI: 10.3233/JIFS-234615
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8917-8932, 2024
Authors: Yang, Jiyun | Gui, Can
Article Type: Research Article
Abstract: Malware attack is a growing problem on the Android mobile platform due to its popularity and openness. Although numerous malware detection approaches have been proposed, it still remains challenging for malware detection due to a large amount of constantly mutating apps. The opcode, as the most fundamental part of Android app, possesses good resistance against obfuscation and Android version updates. Due to the large number of opcodes, most opcode-based methods employ statistical-based feature selection, which disrupts the correlation and semantic information among opcodes. In this paper, we propose an Android malware detection framework based on sensitive opcodes and deep reinforcement …learning. Firstly, we extract sensitive opcode fragments based on sensitive elements and then encode the features using n -gram. Next, we use deep reinforcement learning to select the optimal subset of features. During the process of handling opcodes, we focus on preserving semantic information and the correlation among opcodes. Finally, our experimental results show an accuracy of 0.9670 by using the 25 opcode features we obtained. Show more
Keywords: Android malware, deep reinforcement learning, feature selection, machine learning
DOI: 10.3233/JIFS-235767
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8933-8942, 2024
Authors: Chen, Hongan | Zhang, Zongfu | Luo, Qingjia | Chen, Rongbin | Zhao, Yang
Article Type: Research Article
Abstract: Existing methods for recognizing partial discharge patterns in power cables do not utilize fuzzy clustering of the discharge signals, resulting in poor quality and low recall and precision of the pattern recognition. To address this, we propose a new approach for partial discharge pattern recognition in cables using Gustafson-Kessel(GK) Fuzzy Clustering. The method involves acquiring signals from a power cable partial discharge monitoring system and then processing the signals with GK fuzzy clustering. The clustered discharge signals are filtered with wavelet packet transforms before input into an improved adaptive resonance theory(ART) neural network for final pattern recognition. Experiments demonstrate the …new technique achieves up to 98.7% recall and 85.6% precision for discharge pattern recognition, with discharge signal Signal Noise Ratio(SNR) between 55 dB and 62 dB and maximum recognition accuracy reaching 98%. The proposed fuzzy clustering-based pattern recognition approach significantly enhances partial discharge diagnostics for power cable monitoring. Show more
Keywords: Gustafson-Kessel(GK) fuzzy clustering, power cable, partial discharge, pattern recognition, wavelet packet transform
DOI: 10.3233/JIFS-235945
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8943-8959, 2024
Authors: Jianping, Liu | Yingfei, Wang | Jian, Wang | Meng, Wang | Xintao, Chu
Article Type: Research Article
Abstract: To better understand users’ behavior patterns in web search, numerous click models are proposed to extract the implicit interaction feedback. Most existing click models are heavily based on the implicit information to model user behaviors, ignoring the impact of explicit information between queries and documents in search sessions. In this paper, we fully consider the topic relevance between queries and documents in search sessions and propose a novel topic relevance-aware click model (TRA-CM) for web search. TRA-CM consists of a relevance estimator and an examination predictor. The relevance estimator consists of a topic relevance predictor and a click context encoder. …In the topic relevance predictor, we utilize the pre-trained BERT model to model the content information of queries and documents in search sessions. Meanwhile, we use transformer to encode users’ click behaviors in the click context encoder. We further apply a two-stage fusion strategy to obtain the final relevance scores. The examination predictor estimates the examination probability of each document. We further utilize learnable filters to attenuate log noise and obtain purer input features in both relevance estimator and examination predictor, and investigate different combination functions to integrate relevance scores and examination probabilities into click prediction. Extensive experiment results on two real-world session datasets prove that TRA-CM outperforms existing click models in both click prediction and relevance estimation tasks. Show more
Keywords: BERT, click model, click prediction, deep learning, web search
DOI: 10.3233/JIFS-236894
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8961-8974, 2024
Authors: Sharmila Joseph, J. | Vidyarthi, Abhay
Article Type: Research Article
Abstract: One of the most common types of cancer is Laryngeal cancer, which has a high mortality rate. The primary malignant tumor responsible for this disease is squamous cell carcinoma (SCC). Early diagnosis is very important to avoid experiencing morbidity and mortality. Various tools and techniques are used to detect and monitor laryngeal cancers. Unfortunately, these tools and techniques have various limitations, for example, Existing tools and approaches Mask R-CNN for identifying laryngeal cancer have various performance limitations. These include the inability to accurately identify the disease in its early stages, the complexity of the computational environment, and the time-consuming process …of conducting patient screenings by utilizing diverse image datasets, but it lagging to detect large dataset. In this paper, we present a hybrid deep-learning model which can be used to analyze and monitor the different symptoms of laryngeal cancers. Proposed model takes Laryngeal cancer dataset as input; preprocessing is done using median filter, then data augmentation is applied to increase data diversity, then feature extraction is performed using LBP-KNN, finally cancer identification/classification is done using Mask-RCNN. Proposed model attains Accuracy:99.3%; Precision:97.99%; Recall:98.09% and F-measure: 97.01%. This method could be useful in providing clinical support to radiologists and doctors. The proposed model can be used to detect minor malignancies in patients in a fast and accurate manner. It can also help improve the efficiency of the clinical process by allowing clinicians to screen more patients. Show more
Keywords: Laryngeal cancer, squamous cell carcinoma, Mask R-CNN, local binary pattern, K-nearest neighbors (KNN)
DOI: 10.3233/JIFS-231154
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8975-8992, 2024
Authors: Alqudah, Rajaa | Al-Mousa, Amjed | Faza, Ayman
Article Type: Research Article
Abstract: Traffic on highways has increased significantly in the past few years. Consequently, this has caused delays for the drivers in reaching their final destination and increased the highway’s congestion level. Many options have been proposed to ease these issues. In this paper, a model of the highway drivers’ population was built based on several factors, including the behavioral patterns of the drivers, like drivers’ time flexibility to reach the destination, their carpool eligibility, and their tolerance to pay the toll price, in addition to the traffic information from the system. A fuzzy logic decision-making model is presented to emulate how …drivers would choose the lane to use based on the aforementioned factors and the current congestion levels of all the lanes on the highway. The presented model, along with the simulation results from applying the model to different simulation scenarios, show the usefulness of such a model in predicting an optimal toll value. Such optimal value would reduce congestion on the highway at one end while maximizing the revenue for the toll company. Show more
Keywords: Fuzzy logic, decision-making, probabilistic model, toll pricing, traffic management
DOI: 10.3233/JIFS-231352
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 8993-9006, 2024
Authors: Singh, Surender | Sharma, Sonam
Article Type: Research Article
Abstract: A Single-valued neutrosophic set (SVNS) has recently been explored as a comprehensive tool to assess uncertain information due to varied human cognition. This notion stretches the domain of application of the classical fuzzy set and its extended versions. Various comparison measures based on SVNSs like distance measure, similarity measure, and, divergence measure have practical significance in the study of clustering analysis, pattern recognition, machine learning, and computer vision-related problems. Existing measures have some drawbacks in terms of precision and exclusion of information and produce unreasonable results in categorization problems. In this paper, we propose a generic method to define new …divergence measures based on common aggregation operators and discuss some algebraic properties of the proposed divergence measures. To further appreciate the proposed divergence measures, their application to pattern recognition has been investigated in conjunction with the prominent existing comparison measures based on SVNSs. The comparative assessment sensitivity analysis of the proposed measures establishes their edge over the existing ones because of appropriate classification results. Show more
Keywords: Single-valued neutrosophic set, aggregation operator, pattern recognition, divergence measure
DOI: 10.3233/JIFS-232369
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 9007-9020, 2024
Authors: Dai, Songsong
Article Type: Research Article
Abstract: The well-known iterative boolean-like law a →(a → b ) = a → b can be generalized to the functional equation I (x , I (x , y )) = I (x , y ), where I is a fuzzy implication. In this paper, we discuss an approximation of the equation, I (x , I (x , y )) ≈ I (x , y ), i.e., the law is approximately valid. Furthermore, we study the property of approximation preserving with respect to compositions of fuzzy implications. Finally, we give a necessary condition and a sufficient condition for the approximate equation of (S , N )-implications.
Keywords: Functional equation, iterative boolean-like law, fuzzy implication, (S, N)-implication
DOI: 10.3233/JIFS-233435
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 9021-9028, 2024
Authors: Li, Xiaoli | Du, Linhui | Yu, Xiaowei | Wang, Kang | Hu, Yongkang
Article Type: Research Article
Abstract: During the operation of HVAC (Heating, Ventilation, and Air-Conditioning) systems, precise energy consumption prediction plays an important role in achieving energy savings and optimizing system performance. However, the HVAC system is a complex and dynamic system characterized by a large number of variables that exhibit significant changes over time. Therefore, it is inadequate to rely on a fixed offline model to adapt to the dynamic changes in the system that consume tremendous computation time. To solve this problem, a deep neural network (DNN) model based on Just-in-Time learning with hyperparameter R (RJITL) is proposed in this paper to predict …HVAC energy consumption. Firstly, relevant samples are selected using Euclidean distance weighted by Spearman coefficients. Subsequently, local models are constructed using deep neural networks supplemented with optimization techniques to enable real-time rolling energy consumption prediction. Then, the ensemble JITL model mitigates the influence of local features, and improves prediction accuracy. Finally, the local models can be adaptively updated to reduce the training time of the overall model by defining the update rule (hyperparameter R ) for the JITL model. Experimental results on energy consumption prediction for the HVAC system show that the proposed DNN-RJITL method achieves an average improvement of 5.17% in accuracy and 41.72% in speed compared to traditional methods. Show more
Keywords: HVAC, energy consumption, weighted similarity measure, deep neural network, Just-in-Time learning
DOI: 10.3233/JIFS-233544
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 9029-9042, 2024
Authors: Mohammed Mustafa, M. | Kalpana Devi, S. | Althaf Ali, A. | Gunavathie, M.A.
Article Type: Research Article
Abstract: Wireless body sensor networks have gained significant importance across diverse fields, including environmental monitoring, healthcare, and sports. This research is concentrated on sports applications, specifically exploring the viability of a wireless body area network tailored for high-performing athletes. The paper is divided into three sections. First, the design of the node location that is used for real-time monitoring of a sportsperson in which the node position, such as the human thigh, foot, arm, wrist, and chest, was estimated and the best position was selected. Second, the accuracy of an application when related to the other schemes such as TDMA with …ZigBee and RA-TDMA & PA-TDMA was done. The reliability using RA-TDMA performed well and showed approximately 98% reliability. Finally, the features of wireless communiqués that affect the presentation of the network for RA-TDMA were estimated, such as delay and jitter. These findings collectively contribute to advancing the understanding of optimizing wireless body sensor networks for sports applications, with notable achievements including the identification of the arm as the optimal sensor placement, achieving a 98% success rate, and surpassing alternative techniques in network performance parameters like packet delivery rate. Show more
Keywords: Location points, real time scheduling, RATDMA, BSN
DOI: 10.3233/JIFS-234275
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 9043-9055, 2024
Authors: Qu, Ying | Wang, Xuming
Article Type: Research Article
Abstract: In order to effectively prevent and control accidents, it is essential to trace back the causes of gas explosions in cities. The DT-AR(decision tree-association rule) algorithm is proposed as a quantitative analysis of gas accident features and causality. First, 210 gas explosion accident investigation reports were taken as samples. The gas accident causation system is divided into three aspects, including environmental factors, management factors and physical factors. Management factors were sorted into organizational-level and individual-level factors from the investigation reports. Second, the CART decision tree model was used to compare location features, organizational causality features, and individual causality features of …the piped and bottled gas accidents, and a decision tree model with the gas system fault site as the root node was built to filter the key feature variables. In order to reveal factor correlations and deep-level causation, the Apriori algorithm is used to mine accident association rules. The combinations on the branches of the decision tree are used as constraints to filter the critical causality rule, which improves the efficiency of association rule screening and enhances prediction accuracy. The results demonstrate that the DT-AR algorithm can evaluate the importance of variables, quickly locate effective combinations of factors, and mine the complete causal chain. The association rule is screened based on the constraint of the key element combination of the decision tree, which compensates for the low efficiency of the Apriori algorithm for association rule mining. In addition, the accident-caused excavation results provide an effective path for gas companies, outsourced service companies and administrative departments to implement gas safety chain supervision, which can address the problem of gas accident safety management failures and provide decision support for accident prevention. Show more
Keywords: 24model, decision tree model, association rule, gas explosion
DOI: 10.3233/JIFS-234372
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 9057-9068, 2024
Authors: Tomy, Navin | Johnson, T.P.
Article Type: Research Article
Abstract: This paper deals with lattice isomorphic L -topological spaces. We are concerned with a question: Under what conditions will a lattice isomorphic L -topological spaces be L -homeomorphic. We give contributions to this question in three different ways.
Keywords: L-homeomorphism, quasi L-homeomorphism, lattice isomorphism, pL-homeomorphism
DOI: 10.3233/JIFS-234375
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 9069-9082, 2024
Authors: Liu, Gan | Qi, Guirong | Wan, Sanyu
Article Type: Research Article
Abstract: Imbalanced data is a serious binary classification difficulty in forecasting the well-being of the elderly. This paper improves the Smote algorithm from the algorithm and sample dimensions to tackle the issue of imbalanced distribution of questionnaire data. The k-means Smote is combined with RBFNN as K-RBFNN Smote in the algorithm dimension and add FCM link to resample the minority set in the sample dimension as FCM K-RBFNN Smote. In order to improve the generalization of models, the RUS module is added to the algorithm. Experiments are carried out on four improved Smote technologies and two existing Smote technologies combined with …XGBoost, which is superior than the other five conventional classification models. The experimental results indicate that the performance order is RUS FCM K-RBFNN Smote > K-RBFNN Smote > FCM K-RBFNN Smote > RUS K-RBFNN Smote > K-Means Smote > FCM Smote. The RUS FCM K-RBFNN method has been identified as the optimal approach for enhancing performance, resulting in a 98.58% accuracy rate. In conclusion, Smote algorithm undergoes the implementation of K-RBFNN shows greater performance and the enhancement of FCM and RUS relies on the structure of sampling. Show more
Keywords: RUS FCM K-RBFNN Smote, XGBoost, imbalanced data, elderly well-being classification
DOI: 10.3233/JIFS-235213
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 9083-9102, 2024
Authors: Abraham, Asha | Kayalvizhi, R. | Mohideen, Habeeb Shaik
Article Type: Research Article
Abstract: Nowadays, cancer has become more alarming. This paper discusses the most significant Ovarian Cancer, Epithelial Ovarian Cancer (EOC), due to the low survival rate. The proposed algorithm for this work is a ‘Multi classifier ShapRFECV based EOC’ (MSRFECV-EOC) subtype analysis technique that utilized the EOC data from the National Centre for Biotechnology Information and Cancer Cell Line Encyclopedia websites for early identification of EOC using Machine Learning Techniques. This approach increases the data size, balances different classes of the data, and cuts down the enormous number of features unrelated to the disease of interest to prevent overfitting. To incorporate these …functionalities, in the data preprocessing stage, OC-related gene names were taken from the Cancermine database and other OC-related works. Moreover, OC datasets were merged based on OC genes, and missing values of EOC subtypes were identified and imputed using Iterative Logistic Imputation. Synthetic Minority Oversampling Technique with an Edited Nearest Neighbors approach is applied to the imputed dataset. Next, in the Feature Selection phase, the most significant features for subtypes of EOC were identified by applying the Shapley Additive Explanations based on the Recursive Feature Elimination Cross-Validation (ShapRFECV) algorithm, preserving predefined features while selecting new EOC features. Eventually, an accuracy of 97% was achieved with Optuna-optimized Random Forest, which outperformed the existing models. SHAP plotted the most prominent features behind the classification. The Pickle tool saves much training time by preserving hidden parameter values of the model. In the final phase, by using the Stratified K Fold Stacking Classifier, the accuracy was improved to 98.9%. Show more
Keywords: Machine learning, Ovarian cancer, Pickle, multi classification, Random Forest
DOI: 10.3233/JIFS-236197
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 9103-9117, 2024
Authors: Jumde, Amol | Keskar, Ravindra
Article Type: Research Article
Abstract: With tremendous evolution in the internet world, the internet has become a household thing. Internet users use search engines or personal assistants to request information from the internet. Search results are greatly dependent on the entered keywords. Casual users may enter a vague query due to lack of knowledge of the domain-specific words. We propose a query reformulation system that determines the context of the query, decides on keywords to be replaced and outputs a better-modified query. We propose strategies for keyword replacements and metrics for query betterment checks. We have found that if we project keywords into the vector …space of word projection using word embedding techniques and if the keyword replacement is correct, clusters of a new set of keywords become more cohesive. This assumption forms the basis of our proposed work. To prove the effectiveness of the proposed system, we applied it to the ad-hoc retrieval tasks over two benchmark corpora viz TREC-CDS 2014 and OHSUMED corpus. We indexed Whoosh search engine on these corpora and evaluated based on the given queries provided along with the corpus. Experimental results show that the proposed techniques achieved 9 to 11% improvement in precision and recall scores. Using Google’s popularity index, we also prove that the reformulated queries are not only more accurate but also more popular. The proposed system also applies to Conversational AI chatbots like ChatGPT, where users must rephrase their queries to obtain better results. Show more
Keywords: Query reformulation, WordNet, word embedding, whoosh, TREC
DOI: 10.3233/JIFS-236296
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 9119-9137, 2024
Authors: Selvakumar, B. | Abinaya, P. | Lakshmanan, B. | Sheron, S. | Smitha Rajini, T.
Article Type: Research Article
Abstract: Security and privacy are major concerns in this modern world. Medical documentation of patient data needs to be transmitted between hospitals for medical experts opinions on critical cases which may cause threats to the data. Nowadays most of the hospitals use electronic methods to store and transmit data with basic security measures, but these methods are still vulnerable. There is no perfect solution that solves the security problems in any industry, especially healthcare. So, to cope with the arising need to increase the security of the data from being manipulated the proposed method uses a hybrid image encryption technique to …hide the data in an image so it becomes difficult to sense the presence of data in the image while transmission. It combines Least Significant Bit (LSB) Algorithm using Arithmetic Division Operation along with Canny edge detection to embed the patient data in medical images. The image is subsequently encrypted using keys of six different chaotic maps sequentially to increase the integrity and robustness of the system. Finally, an encrypted image is converted into DNA sequence using DNA encoding rule to improve reliability. The experimentation is done on the Chest XRay image, Knee Magnetic Resonance Imaging (MRI) image, Neck MRI image, Lungs Computed Tomography (CT) Scan image datasets and patient medical data with 500 characters, 1000 characters and 1500 characters. And, it is evaluated based on time coefficient of encryption and decryption, histogram, entropy, similarity score (Mean Square Error), quality score (peak signal-to-noise ratio), motion activity index (number of changing pixel rate), unified average changing intensity, image similarity score (structure similarity index measurement) between original and encrypted images. Also, the proposed technique is compared with other recent state of arts methods for 500 characters embedding and performed better than those techniques. The proposed method is more stable and embeds comparatively more data than other recent works with lower Mean Square Error value of 4748.12 which is the main factor used to determine how well the data is hidden and cannot be interpreted easily. Also, it achieved a Peak Signal-Noise Ratio (PSNR) value of 71.34 dB, which is superior than other recent works, verifying that the image quality remains uncompromising even after being encrypted. Show more
Keywords: Hybrid image encryption, least significant bit algorithm, arithmetic division operation, canny edge detection algorithm, chaotic maps, DNA encoding
DOI: 10.3233/JIFS-236637
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 9139-9153, 2024
Authors: Zhong, Yu | Shen, Bo | Wang, Tao
Article Type: Research Article
Abstract: Document-level relation extraction aims to uncover relations between entities by harnessing the intricate information spread throughout a document. Previous research involved constructing discrete syntactic matrices to capture syntactic relationships within documents. However, these methods are significantly influenced by dependency parsing errors, leaving much of the latent syntactic information untapped. Moreover, prior research has mainly focused on modeling two-hop reasoning between entity pairs, which has limited applicability in scenarios requiring multi-hop reasoning. To tackle these challenges, a syntax-enhanced multi-hop reasoning network (SEMHRN) is proposed. Specifically, the approach begins by using a dependency probability matrix that incorporates richer grammatical information instead of …a sparse syntactic parsing matrix to build the syntactic graph. This effectively reduces syntactic parsing errors and enhances the model’s robustness. To fully leverage dependency information, dependency-type-aware attention is introduced to refine edge weights based on connecting edge types. Additionally, a part-of-speech prediction task is included to regularize word embeddings. Unrelated entity pairs can disrupt the model’s focus, reducing its efficiency. To concentrate the model’s attention on related entity pairs, these related pairs are extracted, and a multi-hop reasoning graph attention network is employed to capture the multi-hop dependencies among them. Experimental results on three public document-level relation extraction datasets validate that SEMHRN achieves a competitive F1 score compared to the current state-of-the-art methods. Show more
Keywords: Attention mechanism, document-level relation extraction, syntactic information, multi-hop reasoning
DOI: 10.3233/JIFS-237167
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 9155-9171, 2024
Authors: Amiri-Bideshki, M. | Hoskova-Mayerova, S. | Ameri, R.
Article Type: Research Article
Abstract: The purpose of this paper is to study some properties of modular hyperlattices. We state and prove some propositions (theorems) of [2 ] with a stronger condition(modularity) than distributivity. We prove that if hyperlattice L with bottom element 0 is modular, then 0 ∨ 0 =0 and there exists no element in x ∨ x greater than x . Also, we study pentagonal hyperlattice that is non-modular. Finally, some results of fundamental relation are given.
Keywords: Hyperlattice, modular element, pentagonal hyperlattice
DOI: 10.3233/JIFS-237912
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 9173-9178, 2024
Authors: Khan, Younas | Ashraf, Shahzaib | Farman, Muhammad | Abdallah, Suhad Ali Osman
Article Type: Research Article
Abstract: Achieving household food security is the tumbling issue of the century. This article explores the factors affecting household food security and solutions by utilizing a synergy of statistical and mathematical models. The methodology section is divided into two portions namely sociological and mathematical methods. Sociologically, 379 household heads were interviewed through structured questions and further analyzed in terms of descriptive and binary logistic regression. The study found that 4 independent variables (poverty, poor governance, militancy, and social stratification) showed a significant association (P = 0.000) to explain variations in the dependent variable (household FS). The Omnibus test value (χ2 = 102.386; P … = 0.000) demonstrated that the test for the entire model against constant was statistically significant. Therefore, the set of predictor variables could better distinguish the variation in household FS. The Nagelkerke’s R Square (R2 = .333) helps to interpret that the prediction variable and the group variables had a strong relationship. Moreover, 23% to 33% variation in FS was explained by the grouping variables (Cox and Snell R2 = 0.237 and Nagelkerke’s R2 = 0.333). The significant value of Wald test results for each variable confirmed that the grouping variables (poor governance P = 0.004, militancy P = 0.000, social stratification P = 0.021 and poverty P = 0.000) significantly predicted FS at the household level. Mathematically, all the statistics were validated further through the application of spherical fuzzy mathematics (TOPIS and MADM) to explore what factors are affecting household FS. Thus, the study found that F 3 (poverty ) > F 2 (militancy) > F 4 (social stratification) > F 1 (poor governance) respectively. Thus, it could be concluded from these findings that the prevalence of poverty dysfunctional all the channels of household FS at the macro and micro levels. Therefore, a sound and workable model to eradicate poverty in the study area by ensuring social safety nets for the locals was put forward some of the policy implications for the government are the order of the day. Show more
Keywords: Food security, militancy, poor governance, social stratification, poverty, logistic regression, TOPIS, MADM, spherical fuzzy set
DOI: 10.3233/JIFS-237938
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 9179-9195, 2024
Authors: Seethappan, K. | Premalatha, K.
Article Type: Research Article
Abstract: Even though various features have been investigated in the detection of figurative language, oxymoron features have not been considered in the classification of sarcastic content. The main objective of this work is to present a system that can automatically classify sarcastic phrases in multi-domain data. This multi-domain dataset consisting of 67850 sarcastic and non-sarcastic data is collected from various websites to identify sarcastic or non-sarcastic utterances. Multiple approaches are examined in this work to improve sarcasm identification: 1. A Combination of fasttext embedding, syntactic, semantic, lexical n-gram, and oxymoron features 2. TF-IDF feature weighting scheme 3. Three machine learning algorithms …(SVM, Multinomial Naïve Bayes, and Random Forest), three deep learning algorithms (CNN, LSTM, MLP), and one ensemble model (CNN + LSTM) The CNN + LSTM model achieves a Precision of 91.32%, Recall of 92.85%, F-Score of 92.08%, accuracy of 92.01%, and Kappa of 0.84 by combining the fasttext embedding, bigram, syntactic, semantic, and oxymoron features with TF-IDF method. These experimental results show CNN + LSTM with a combination of all features outperforms the other algorithms in classifying the sarcasm in both datasets. The sarcasm classification performance of our dataset and another sarcasm news dataset was compared while applying the above model. Show more
Keywords: Natural language processing, sarcasm, figurative language, deep learning, CNN, oxymoron
DOI: 10.3233/JIFS-224110
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 9197-9207, 2024
Authors: Sangeetha, R. | Kuriakose, Bessy M. | Naveen, V. Edward | Jenefa, A. | Lincy, A.
Article Type: Research Article
Abstract: Classifying VoIP (Voice over Internet Protocol) traffic is vital for optimizing network performance and Quality of Service (QoS). This study introduces the Multivariate Statistical-Based Classification (MVSC) system, designed to classify network traffic with high accuracy and efficiency. As traditional methods struggle in the diverse and complex landscape of today’s network traffic, which includes voice, video, gaming, and data, the MVSC algorithm rises to the challenge. It employs Statistical Dissemination and leverages various statistical features such as Packet Size, Inter-Arrival Statistics, Packet and Data rates, Flow Length, and Five-tuple information to create nuanced profiles of network traffic packets. These packets are …then grouped into distinct clusters based on their statistical attributes through Application Flow Cluster Grouping. A unique aspect of the MVSC system is its approach to representing each application flow as points in a two-dimensional space, where distances to predefined application profiles are calculated. The nearest profile then determines the type of VoIP traffic. Experimental results using university traffic data (KU-IDS) underscore the system’s high accuracy, consistently around 98-99%. These findings affirm the system’s suitability for real-time deployment. In summary, the MVSC system offers a robust and efficient solution for VoIP traffic classification, significantly boosting network performance and QoS, and proving to be an invaluable asset in contemporary network management. Show more
Keywords: Statistical dissemination, artificial intelligence, clustering algorithms, semi-supervised models, statistical analysis, VoIP traffic
DOI: 10.3233/JIFS-231113
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 9209-9223, 2024
Authors: Rezaei, Reza | Shahidi, Seyed-Ahmad | Abdollahzadeh, Sohrab | Ghorbani-Hasansaraei, Azade | Raeisi, Shahram Naghizadeh | Hayati, Jamileh
Article Type: Research Article
Abstract: Proper and systematic management of food industry failures can improve the quality of products and save a lot on the costs of organizations and people’s health. One of the conventional methods for risk assessment is the Failure Modes and Effects Analysis (FMEA) which is often performed in a phase or stage. Compared to the combined methods, this method is less accurate due to similar priorities of failure in the evaluation and the lack of consideration of the interaction between risks. The current research has applied an integrated approach based on two techniques, FMEA and Fuzzy Cognitive Map (FCM), in a …multi-stage manner to increase assessment accuracy and ranking of failures. By considering the risks of an industry in an uncertain environment and the causal relationships between failures, this approach can evaluate the industry’s risks better than conventional methods. In the research method, the initial prioritization of failures by the FMEA method is used as the input of the multi-stage FCM. The cause-and-effect relationship between the failures is determined by experts and the functional records of the processes, and the FCM is prepared. Since no research evaluates the risks of the malting industry step by step and considers the causal relationships between the risks, the present study has improved risk evaluation in the malting industry by using a multi-stage FCM. The ranking results with the proposed hybrid approach and its comparison with the conventional methods showed that the rating became more accurate, and the multiple priorities were improved. Managers of the malt beverage industry can make effective investment decisions to reduce or better control the risks of this industry by using the results of applying the proposed approach. Show more
Keywords: Fuzzy cognitive map, beverage industry failures, risk evaluation, FMEA
DOI: 10.3233/JIFS-233277
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 9225-9247, 2024
Authors: Vasanthamani, K. | Pavai Madheswari, S.
Article Type: Research Article
Abstract: This paper deals with a discrete-time Geo/G/1 queue with repeated attempts and starting failure. If the server fails to start, it is sent for repair. During a repair process, alterations in the repair times is permitted based on current requirements. Customers are served on priority by the pre-emptive resume queue discipline. The distributions of the various system states when the system is in stable are analysed using the generating function technique. Analytical expressions are supported by numerical illustrations to exhibit the influence of the various parameters of the system on the performancemeasures.
Keywords: Discrete-time retrial queues, general retrial times, unreliable server, impatience, priority, replacement in repair times
DOI: 10.3233/JIFS-233406
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 9249-9259, 2024
Authors: Selvy, R. | Vinod Kumar, P.B.
Article Type: Research Article
Abstract: It is observed that IFSs are defined based on the concept that the iterates take only an integer number of times. This work studies the dynamics of functions, where a function can iterate r times for every r ∈ R . Utilizing concepts from fuzzy sets, r -times iterates of a function are defined for r ∈ R . The study demonstrates that the chaotic property can be generalized to this new iterative concept. The chaotic behavior of a function is then extended using this iterative concept.
Keywords: Iterated function systems, fuzzy functions, chaotic functions
DOI: 10.3233/JIFS-236563
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 9261-9270, 2024
Authors: Arunkumar, N. | Nagaraj, Balakrishnan | Keziah, M. Ruth
Article Type: Research Article
Abstract: Parkinson disease (PD) is a type of neurodegenerative disorder that affects the motor movement of the patient. But each technique has its own advantages or disadvantages. In gene, speech and handwriting data model, the feature extraction and reduction is an important step for efficient classification. These two steps require proper attention for selection and also require high processing time as compared to other data model like images. Because in image modality, the deep learning algorithm can be applied that can perform all process and automate the classification. As compared to these domains, the signal produces better and best results. Because …the electroencephalogram (EEG) signal are taken from the brain using electrodes and it helps to observe the brain signals effectively and immediately as compared to the other data modals. Hence, in this paper, the wavelet transform will be used to decompose the signals and statistical features will be extracted from the transformed signal. Here, the satin bower bird optimization will be used for both type of wavelet selection and feature reduction process for final classification. The reduced feature set will be classified using Ensemble Neural Network type including InceptionV3, DenseNet, MobileNet, Xception, and NasNet) recently proposed for medical image classification. The whole process will be realized using MATLAB R2021a software and its performance will be evaluated in terms of Accuracy and is compared against Automated Tunable Q-wavelet transform performance. The proposed ensemble method, employing EEG signal processing and neural networks, achieved a 97% success rate in discriminating PD datasets, surpassing Convolutional Neural Network (CNN) and Machine Learning (ML) classifications (88% –92%). Utilizing MATLAB R2021a, its superiority over Q-wavelet transform was evident, signifying improved PD dataset discrimination. Show more
Keywords: Parkinson diseases, EEG signals, wavelet transform, features, optimization, classifier
DOI: 10.3233/JIFS-236145
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 9271-9290, 2024
Authors: Huang, Mengtao | Wang, Jiaxuan
Article Type: Research Article
Abstract: Pedestrian trajectory prediction plays a crucial role in autonomous driving, as its accuracy directly affects the autonomous driving system’s comprehension of the environment and subsequent decision-making processes. Current trajectory prediction methods tend to oversimplify pedestrians to mere point coordinates, utilizing positional information to infer interactions among individuals while overlooking the temporal correlations between them, thereby excessively simplifying pedestrian characteristics. To address the aforementioned issues, this paper proposes a trajectory prediction model for autonomous driving applications, that takes into account both pedestrian motion characteristics and scene interaction. The model optimizes the LSTM unit structure twice, serving to learn correlations among long …trajectories of pedestrians and to integrate multiple forms of information into the neighborhood interaction module. Furthermore, our model introduces dual attention mechanisms for individuals and scenes, focusing on the key motion points of individual pedestrians and their interactive behavior with others in busy scenarios. The efficacy of the model was validated on the MOT16 pedestrian dataset and the Daimler pedestrian path prediction dataset, outperforming mainstream methods with 8% and 10% reductions in Average Displacement Error and Final Displacement Error respectively. Show more
Keywords: Trajectory prediction, automated driving, CNN-LSTM, deep learning
DOI: 10.3233/JIFS-236271
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 9291-9310, 2024
Authors: Wu, Hui-Yong | Zhou, Zi-Wei | Li, Hong-Kun | Yang, Tong-Tong
Article Type: Research Article
Abstract: In order to enhance the accuracy and reliability of fault diagnosis in chemical processes, this paper proposes a methodology for chemical process fault diagnosis based on an improved SE-ResNet-BiGRU neural network. Initially, the ResNet model is enhanced by incorporating the SENet mechanism, enabling the extraction of features from input data and selectively enhancing them, thereby strengthening the model’s ability to capture crucial features. Subsequently, the BiGRU model is employed to perform temporal modeling on the extracted features, allowing for better capture of dynamic changes in fault signals. In order to validate the effectiveness of this approach, experiments are conducted using …the TE chemical process dataset. The results are analyzed using methods such as ROC-AUC, confusion matrix, and t-SNE visualization. The improved SE-ResNet-BiGRU model achieves a testing accuracy of 97.78% and an average fault diagnosis rate of 97.24%. Compared to other deep learning methods, this methodology exhibits significant improvements in fault diagnosis rate and reliability. It holds promising potential as an essential tool for fault diagnosis in chemical processes, contributing to enhanced production safety, efficiency, and reduced risk of accidents. Show more
Keywords: Fault diagnosis, residual neural network, bidirectional gate recurrent unit, squeeze-and-excitation network, t-distributed Stochastic neighbor embedding
DOI: 10.3233/JIFS-236948
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 9311-9328, 2024
Authors: Huang, Jui-Chan | Shu, Ming-Hung | Lin, Hsiang-Tsen | Day, Jen-Der
Article Type: Research Article
Abstract: With the fast advances of new energy vehicles, the EV battery technology needs to be further improved to follow the step. How to effectively diagnose the electric vehicle’s lithium battery fault becomes a hotspot in the academic circle. This study has proposed new method that uses the state of charge of the battery and self-coder depth to detect faults in the lithium battery group of electric vehicles. First, the study investigates the single lithium battery faults. Then, it builds a lithium battery group fault diagnosis model by integrating the battery charge state and denoising converter network. Finally, it uses a …dataset and retired battery group to validate the model’s performance. The results show that the proposed model achieves an accuracy of 93.18% and a recall rate of 93.73% in identifying the faults in the lithium batteries of the electric vehicles and its F1 value is as high as 0.95. Moreover, the modeling method has the lowest prediction error, indicating its high accuracy and robustness in diagnosing the faults of battery packs. This study aims to provide an effective solution for the fault diagnosis of lithium battery packs in electric vehicles. Show more
Keywords: Transformer framework, DAE, electric vehicle, lithium battery, fault diagnosis
DOI: 10.3233/JIFS-237796
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 9329-9341, 2024
Authors: Razzaque, Huzaira | Ashraf, Shahzaib | Sohail, Muhammad | Abdeljawad, Thabet
Article Type: Research Article
Abstract: Spherical q-linear Diophantine fuzzy sets (Sq-LDFSs) showed a significant improvement to handling uncertainty in multi-criteria decision-making (MADM). It is advantageous for two-parametric data as well as for data with three variable parameters. One of the most crucial functions of supply chain management is to increase competitive pressure. The study’s standout innovation, Multi-Attributive Ideal Real Comparative Analysis (MAIRCA), has been implemented to give powerful group decision-making. An ecological perspective is becoming more prevalent due to the competitive climate and customer perception. Green supplier selection (GSS) has become a significant issue. In this study, we address the problem of GSS, which aims …for flexibility, robustness, ecological sensitivity, leanness, and feasibility. The feasibility criteria in recycling, environmental, carbon footprints, and water consumption are different from those in standard supplier selection. The aim of our work is to introduced the weighted Average/Geometric aggregation operators based on Sq-LDFSs. For this we defined some operational rules as a foundation of aggregation operators. Secondly we proposed a MAIRCA approach for Sq-LDFSs to address these issues. The MAIRCA strategy, which uses multi-criteria group decision-making (MCGDM) to evaluate and choose traditional and environmental conventionalities, is used to reduce instability and ambiguity. The spherical q-linear Diophantine fuzzy MAIRCA approach provides comparative analysis of decision-makers and criteria. By merging Sq-LDFS and MAIRCA, a hybrid strategy is formed, successfully selecting the best provider among options based on the order of significance. These numerical examples demonstrate the suggested MCGDM approaches that were applied in actual situations, giving a realistic appreciation of their efficacy. The comparative study of the final ranking further supports the idea that these strategies are dependable in decision-making processes in addition to being practical and usable. Show more
Keywords: Spherical q-linear Diophantine fuzzy set, MAIRCA technique, Spherical q-linear Diophantine fuzzy weighted aggregation operators based on algebraic norms, decision making
DOI: 10.3233/JIFS-235397
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 9343-9366, 2024
Authors: Li, Chunling | Zhang, Yi
Article Type: Research Article
Abstract: The existing negative selection algorithms can not improve their detection performance by human intervention during the testing process. This paper proposes a negative selection algorithm with human-in-the-loop for anomaly detection. It uses self-sample clusters to train detectors with a nonrandom strategy. Its detectors and self-sample clusters fully cover state space without overlapping each other. It locally adjusts detectors and self-sample clusters with human intervention to improve its detection performance during the testing process. Experiments were performed on two synthetic datasets and the Iris dataset from the UCI repository to assess its performance. The results show that it outperforms the other …anomaly detection methods in most cases. Show more
Keywords: Negative selection algorithm, human-in-the-loop, anomaly detection, artificial immune algorithm, artificial immune system
DOI: 10.3233/JIFS-235724
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 9367-9380, 2024
Authors: Wu, Xiaogang
Article Type: Research Article
Abstract: The similarity measure of intuitionistic fuzzy sets is a primary method for dealing with uncertainty and fuzzy problems and is commonly used in fuzzy decision-making and pattern recognition. The current mainstream similarity measure is based on the classical fuzzy set with only one negation, which often violates the intuitionistic problem in applications because the actual semantics of multiple negations are not considered. To solve the inconsistency and irrationality problems in the classical similarity methods, we introduce three negations (contradiction negation, opposition negation, and mediation negation) in the intuitionistic fuzzy set to obtain the generalized intuitionistic fuzzy set and prove its …related property theorem. On this basis, our similarity measure adopts a mediational negation to represent non-membership, which fully utilizes the multiple negation information of non-membership and hesitancy and avoids the loss of fuzzy information. We verify the method’s rationality, validity, and originality through pattern recognition experiments and numerical examples, which improves the performance of intuitionistic fuzzy set similarity in practical applications and provides a new approach for future research on intuitionistic fuzzy inference. Show more
Keywords: Generalized intuitionistic fuzzy sets (GIFS), three kinds of negation, similarity measure, fuzzy decision
DOI: 10.3233/JIFS-236510
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 9381-9391, 2024
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]