Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2024: 1.7
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Zhan, Qiuyan | Saeid, A. Borumand | Davvaz, Bijan
Article Type: Research Article
Abstract: The aim of this paper is to investigate several operators on L -algebras. At first, closure (interior) operators on L -algebras are defined and some properties of them are obtained. Then, existential operators and universal operators on L -algebras are studied, a one-to-one correspondence between the set of all quantifier operators and the set of all relative complete subalgebras of CKL -algebras is constructed. Furthermore, very true operators on L -algebras are investigated and by giving a very true ideal of a very true L -algebra, quotient structures on very true L -algebras are established.
Keywords: L-algebra, closure (interior) operator, existential (universal) operator, very true operator
DOI: 10.3233/JIFS-234370
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 10231-10241, 2024
Authors: Ajitha Gladis, K.P. | Srinivasan, R. | Sugashini, T. | Ananda Raj, S.P.
Article Type: Research Article
Abstract: Visual impairment people have many difficulties in everyday life, including communicating and getting information, as well as navigating independently and safely. Using auditory alerts, our study hopes to improve the lives of visually impaired individuals by alerting them to items in their path. In this research, a Video-based Smart object detection model named Smart YOLO Glass has been proposed for visually impaired persons. A Paddling - Paddling Squeeze and Attention YOLO Network model is trained with multiple images to detect outdoor objects to assist visually impaired people. In order to calculate the distance between a blind person and obstacles when …moving from one location to another, the proposed method additionally included a distance-measuring sensor. The visually impaired will benefit from this system’s information about around objects and assistance with independent navigation. Recall, accuracy, specificity, precision, and F-measure were among the metrics used to evaluate the proposed strategy. Because there is less time complexity, the user can see the surrounding environment in real time. When comparing the proposed technique to Med glasses, DL smart glass, and DL-FDS, the total accuracy is improved by 7.6%, 4.8%, and 3.1%, respectively. Show more
Keywords: Visual impairment, deep learning, outdoor object detection, wearable system, YOLO network
DOI: 10.3233/JIFS-234453
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 10243-10256, 2024
Authors: Yu, Dan | Wu, Jun | He, Yongling
Article Type: Research Article
Abstract: The distributed robust optimal allocation method for multi-microgrid interconnected systems usually involves a large number of variables and constraints, and the computational complexity is high in practical applications, which makes it difficult to solve the problem. Therefore, a distributed robust optimal allocation method for multi-microgrid interconnection systems based on multi-objective swarm algorithm is proposed. A distributed robust optimization configuration constraint index model for multi-microgrid interconnection system is established. Considering the influence of energy storage technology operation characteristics on its service life, a micro-grid hybrid energy storage capacity optimization configuration model with the minimum annual comprehensive energy storage cost as the …objective function is established with charge and discharge power and residual power as the constraint conditions. The multi-objective swarm algorithm is used to realize the optimization model of distributed robust configuration microgrid interconnection system. By determining the power capacity configuration of the optimal energy storage system and the corresponding frequency dividing points, the power capacity configuration of the optimal energy storage system and the corresponding frequency dividing points are determined. The hybrid energy storage configuration model of multi-microgrid interconnection system is established with the minimum alternative operating cost as the objective function, so as to realize the distributed robust optimal configuration of multi-microgrid interconnection system. The simulation results show that the distributed configuration of multi-microgrid interconnection system with the proposed method has good robustness and strong optimization control ability. Show more
Keywords: Multi-objective bee colony algorithm, multi-microgrid, interconnection system, robust allocation
DOI: 10.3233/JIFS-235092
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 10257-10268, 2024
Authors: Mohan, Prakash | Aishwarya, S.
Article Type: Research Article
Abstract: Price changes in construction materials have a significant impact on building construction projects. Such price variations occur at random and at varying rates over time. A system that can estimate the magnitude and quantity of the change in material prices with reasonable accuracy is required. The primary goal is to create a machine-learning model that can predict the type of building material chosen based on environmental factors. The compressive strength of concrete is critical in defining its mechanical qualities. Long laboratory testing is needed to determine the compressive strength of concrete. The capacity of powerful machine learning algorithms to forecast …concrete compressive strength speeds up these lengthy experimental methods while also lowering expenses. This study provides abilities to precisely anticipate and categorize numerous qualities and traits of distinct materials. The framework includes a broad dataset that details materials, composition, and performance characteristics. Machine learning algorithms such as logistic regression (LR), decision trees (DT), and random forests (RF) train models on the training data. The models are hyper-parameter tweaked and feature developed to achieve the most outstanding performance. The k-fold method is used throughout the training and assessment phase to guarantee robustness and reduce bias. The F1 score and Receiver Operating Characteristic-Area Under Curve (ROC-AUC) curve are two performance measures used to measure how accurate and predictive the trained models are. The study findings provide insights into the qualities of the materials, facilitating improved material selection, quality assurance, and decision-making in the building sector. In the analyses, the best accuracy value was 99.92%, and the precision value was 88.83% using the LR algorithm. As a result, it was determined that the LR algorithm had the least execution 57.826 ms, and is thus the most suitable for use in concrete compressive strength estimation. Show more
Keywords: Building materials, machine learning algorithms, feature selection, model training, K-fold, performance evaluation
DOI: 10.3233/JIFS-236111
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 10269-10285, 2024
Authors: Shrivastava, Ankit | Poonkuntran, S.
Article Type: Research Article
Abstract: Ensuring real-time performance while leveraging pedestrian detection is a crucial prerequisite for intelligent driving technology. The development of lightweight models with good detection accuracy is also crucial. This work proposes a novel method, the Attention Digital Filter with Anchor-Free Feature Pyramid Learning Model (ADFAFPLM), to meet these needs. The suggested method consists of combining two networks: one is a digital filter based on an attention network that eliminates noise and other picture distortions. The attention-based residual network digital filters are chosen for their enhanced filtering performance, adaptability, efficient learning through residual connections, noise suppression, interpretability, and generalization capabilities. Next, from …the input crowded and occluded photos, the pedestrian is identified using an anchor-free feature pyramid network. The Eurocity person dataset was used to train the model, and it was also tested on other datasets like CityPersons, INRIA, PennFudan, and Eurocity. The investigation was expanded to include images in hazy, noisy, and occlusion environments, among other environmental conditions. The image resolutions were also considered for analysis and it was observed that with increasing image resolution, the mAP increases. Based on the ablation study, the ADF-AFPLM adopted YOLOv8n with batch size 16, and image size 640 is considered for efficient result with different testing datasets. The model achieved a mean average precision (mAP) of approx. 87% and shows its efficacy over state-of-art models. Show more
Keywords: Object detection, pedestrian, deep learning, feature pyramid network, YOLO
DOI: 10.3233/JIFS-237639
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 10287-10303, 2024
Authors: Tang, Sicong | Wang, Hailong
Article Type: Research Article
Abstract: With the continuous deepening of the urbanization process and the progress of science and technology, people transform nature and develop nature on a larger and larger scale, among which the most iconic transformation is a variety of building structures built by people. And with the passage of time, the building structure in the perennial wind and sun, there will be signs of “illness”, if not timely treatment, it will have a huge impact on the stability and safety of the building structure. Based on this, in this paper, according to the characteristics of crack identification on the surface of concrete …structure, background subtraction algorithm is selected for image noise reduction processing. Through three steps of digital image noise reduction, crack extraction and crack parameter identification, the quantitative recognition of cracks is completed and a complete system of crack parameter identification is formed. The experimental results show that the machine learning model of building structure health monitoring and damage recognition algorithm proposed in this paper has excellent statistical performance, and the relative error accuracy of recognition can be controlled within 10%. Show more
Keywords: Image processing, building structure, health monitoring, damage identification, crack identification
DOI: 10.3233/JIFS-239655
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 10305-10314, 2024
Authors: Wang, Yu-Lin | Wang, Jin-Heng
Article Type: Research Article
Abstract: Virtual machine (VM) consolidation and migration that only consider current workload can result in excessive unnecessary migrations. To address this issue, a VM consolidation algorithm based on resource utilization prediction is proposed. An improved K-nearest neighbor (KNN) classification algorithm weighted by attribute inconsistency is proposed to predict the workload of both the host and the VMs. Firstly, two distributions are partitioned according to the neighboring relationship for comparing consistency. Then, an inconsistency evaluation function based on earth mover’s distance (EMD) is designed to measure the inconsistency between the neighboring sample set of each sample under each attribute and the equivalent …partition refined by the decision attribute. Finally, the inconsistency level of the neighboring samples is transformed into the importance of the corresponding attribute to implement the attribute weighting KNN classifier. When selecting the source host and target host for VM migration, both current and predicted overloads are considered to avoid unnecessary VM migrations. Simulation tests were performed with random and realistic workloads, and the results show that the proposed method can reduce the overall energy consumption of the host, while also reducing service level agreement (SLA) violations and VM migration. Show more
Keywords: Cloud computing, virtual machine consolidation, improved K-nearest neighbor regression, earth mover’s distance, attribute weighting
DOI: 10.3233/JIFS-239851
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 10315-10328, 2024
Authors: Li, Zhigang | Nian, Wenhao | Sun, Xiaochuan | Li, Shujie
Article Type: Research Article
Abstract: Military object military object detection technology serves as the foundation and critical component for reconnaissance and command decision-making, playing a significant role in information-based and intelligent warfare. However, many existing military object detection models focus on exploring deeper and more complex architectures, which results in models with a large number of parameters. This makes them unsuitable for inference on mobile or resource-constrained combat equipment, such as combat helmets and reconnaissance Unmanned Aerial Vehicles (UAVs). To tackle this problem, this paper proposes a lightweight detection framework. A CSP-GhostnetV2 module is proposed in our method to make the feature extraction network more …lightweight while extracting more effective information. Furthermore, to fuse multiscale information in low-computational scenarios, GSConv and the proposed CSP-RepGhost are used to form a lightweight feature aggregation network. The experimental results demonstrate that our proposed lightweight model has significant advantages in detection accuracy and efficiency compared to other detection algorithms. Show more
Keywords: Deep learning, convolutional neural network, lightweight network, military object detection
DOI: 10.3233/JIFS-234127
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 10329-10343, 2024
Authors: Saichand, N. Venkata | Naik, S. Gopiya
Article Type: Research Article
Abstract: Epilepsy is considered a most general neurological disorder related to brain activity disruption. In epileptic seizures detection and classification, EEG (Electroencephalogram) measurements that record the brain’s electrical activities are used frequently. Generally, physicians investigate the abnormalities in the brain. However, this technique is time-consuming, faced complexity in seizure detection, and poor consistency because of data imbalance. To overcome these difficulties, Improved Empirical Mode Decomposition for feature extraction and Improved Weight Updated KNN (K-Nearest Neighbor) algorithm for classification are proposed. In the case of pre-processing, a rule-based filter, namely a wiener scalar filter with integer wavelet transform is used for multiple …channels conversion and further signal to noise ratio is increased. Further in feature extraction, better features are extracted using an improved empirical mode decomposition-based bandpass filter. By using the Improved Weight updated KNN, feature extracted samples are classified incorrect manner, avoiding data imbalance issues. Feature vectors’ effective classification is performed attains higher computational speed and sensitivity. The EEG input signal of the proposed study utilizing the BONN dataset and different performance metrics such as accuracy, sensitivity, specificity, recall, f-score, and error values were performed and compared with various existing studies. From the results, it is clear that the proposed method provides effective detection for seizure and non-seizure patients compared with existing studies. Show more
Keywords: Seizure detection, bandpass filter, rule-based filter, improved empirical mode decomposition, improved weight updated KNN
DOI: 10.3233/JIFS-222960
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 10345-10358, 2024
Authors: Li, Zheming | Chen, Yidan | Yang, Bo | Li, Chenwei | Zhang, Shihua | Li, Wei | Zhang, Hengwei
Article Type: Research Article
Abstract: Abstract Adversarial examples are often used to test and evaluate the security and robustness of image classification models. Though adversarial attacks under white-box setting can achieve a high attack success rate, due to overfitting, the success rate of black-box attacks is relatively low. To this end, this paper proposes diversified input strategies to improve the transferability of adversarial examples. In this method, various transformation methods are applied to randomly transform the original image multiple times, thereby generating a batch of transformed images. Then, in the process of back-propagation, the loss function gradient of the transformed images is calculated, and a weighted …average of the obtained gradient values is performed to generate adversarial perturbation, which is iteratively added to the original image to generate adversarial examples. Meanwhile, by increasing the variety of data augmentation transformation types and the number of input images, the proposed method effectively alleviates overfitting and improves the transferability of adversarial examples. Extensive experiments on the ImageNet dataset indicate that the proposed method can perform black-box attacks better than benchmark methods, with an average of 97.2% success rate attacking multiple models simultaneously. Show more
Keywords: Deep neural network, image classification, adversarial examples, black-box attacks, diversified input
DOI: 10.3233/JIFS-223584
Citation: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 4, pp. 10359-10373, 2024
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]