Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2023: 2
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Javed, Hira | Sufyan Beg, M.M. | Akhtar, Nadeem | Alroobaea, Roobaea
Article Type: Research Article
Abstract: Vlogs, Recordings, news, sport coverages are huge sources of multimodal information that do not just limit to text but extend to audio, images and videos. Applications such as summary generation, image/video captioning, multimodal sentiment analysis, cross modal retrieval requires Computer Vision along with Natural Language Processing techniques to extract relevant information. Information from different modalities must be leveraged in order to extract quality content. Hence, reducing the gap between different modalities is of utmost importance. Image to text conversion is an emerging field and employs the use of encoder decoder architecture. Deep CNNs extract the feature of images and sequence …to sequence models are used to generate text description. This paper is a contribution towards the growing body of research in multimodal information retrieval. In order to generate the textual description of images, we have performed 5 experiments using the benchmark Flickr8k dataset. In these experiments we have utilized different architectures - simple sequence to sequence model, attention mechanism, transformer-based architecture to name a few. The results have been evaluated using BLEAU score. Results show that the best descriptions are attained by making use of transformer architecture. We have also compared our results with the pretrained visual model vit-gpt2 that incorporates visual transformer. Show more
Keywords: Multimodal, captioning, summarization, etc
DOI: 10.3233/JIFS-219394
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Kostiuk, Yevhen | Tonja, Atnafu Lambebo | Sidorov, Grigori | Kolesnikova, Olga
Article Type: Research Article
Abstract: In this paper, we investigate the issue of hate speech by presenting a novel task of translating hate speech into non-hate speech text while preserving its meaning. As a case study, we use Spanish texts. We provide a dataset and several baselines as a starting point for further research in the task. We evaluated our baseline results using multiple metrics, including BLEU scores. We used a cross-validation approach and an average of the metrics per fold for evaluation. We achieved a 0.236 sentenceBLEU score on four folds. This study aims to contribute to developing more effective methods for reducing the …spread of hate speech in online communities. Show more
Keywords: Hate speech, translation, Spanish
DOI: 10.3233/JIFS-219348
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: George, Neetha | Ramachandran, Sivakumar | Jiji, C.V.
Article Type: Research Article
Abstract: Macula is the part of retina responsible for sharp and clear vision. Macular edema is caused by the accumulation of intraretinal fluid (IRF) in the macula, which is further distinguished by the compromised integrity of the blood-retinal barrier, particularly evident in the retinal vasculature. This results in swelling, that may lead to vision impairment and is the dominant sign of several ocular diseases, including age-related macular degeneration, diabetic retinopathy, etc. Quantitative analysis of the fluid regions in macular edema helps in ascertaining the severity as well as the response to treatment of the diseases. Optical coherence tomography (OCT) is a …major tool used by ophthalmologists for visualizing edema. The prevalent practice for diagnosing and treating macular edema involves measuring Central Retinal Thickness (CRT). Segmenting the IRF in OCT images offers the potential for a more accurate and better quantification of macular edema. This paper proposes a novel method combining convolutional neural network (CNN) and active contour model for segmenting the IRF to ascertain the severity of macular edema. The IRF region is initially segmented using an encoder-decoder architecture. Contour evolution is then performed on this segmented image to demarcate the IRF boundaries. The advantage of the method is that it does not require precisely labeled images for training the CNN. A comparison of the experimental results with models employing CNN alone and with other state-of-the art methods demonstrates the superior performance and consistency of the proposed method. Show more
Keywords: edema segmentation, convolutional neural network, active contour model
DOI: 10.3233/JIFS-219401
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-9, 2024
Authors: Wu, Donghui | Wang, Jinfeng | Zhao, Wanwan | Geng, Xin | Liu, Guozhi | Qiu, Sen
Article Type: Research Article
Abstract: Gesture recognition based on wearable sensors has received extensive attention in recent years. This paper proposes a gesture recognition model (CGR_ATT) based on Convolutional Neural Network (CNN) and Gated Recurrent Unit (GRU) fused attention mechanism to improve accuracy rate of wearable sensors. First, CNN serves as a feature extractor, learning features automatically from sensor data by performing multiple layers of convolution and pooling operations, capturing spatial features of gestures. Furthermore, a temporal modeling unit GRU is introduced to capture the temporal dynamics in gesture sequences. By controlling the information flow through gate mechanisms, it effectively handles the temporal relationships in …sensor data. Finally, an attention mechanism is introduced to assign different weights to the hidden state of the GRU. By calculating the attention weights for each time period, the model automatically selects key time periods related to gesture movements. The GR-dataset proposed in this paper involves 910 sets of training parameters. The model achieves an ultimate accuracy of 97.57% . In compare with CLA-net, CLT-net, CGR, GRU, LSTM and CNN, the experimental results demonstrate that the proposed method has superior accuracy. Show more
Keywords: Wearable gesture recognition system, CGR_ATT model, deep learning, wearable devices
DOI: 10.3233/JIFS-240427
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Visvanathan, P. | Durai Raj Vincent, P.M.
Article Type: Research Article
Abstract: A Stroke is a sudden loss of blood circulation in certain parts of the brain that results in a loss of neurological function. To save a patient from stroke, an immediate diagnosis and treatment plan must be implemented. Artificial intelligence-based machine learning algorithms play a major role in the prediction. To predict a person likely to have a stroke, stroke healthcare data records must be accessed, which is very sensitive. Data shared for machine learning training pose security risks and have concerns about privacy. To overcome this issue, Genetic Algorithm and Federated Learning (GA-FL) –based hybridization approach is proposed to …predict the risk of stroke in a person. Federated Learning was developed by Google, which can provide security to the data during the training process because every client participating in this training process needs to exchange only the training parameters without sharing the data. In addition to the security features, a genetic algorithm was used to optimize the parameters required to train a model using the perceptron neural network model. The experimental results show that our proposed research model (GA-FL) provides security and predicts the risk of stroke more accurately than any other existing algorithm. Show more
Keywords: Federated learning, genetic algorithm, stroke risk, perceptron neural network
DOI: 10.3233/JIFS-236354
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Hu, Junhua | Zhou, Yingling | Li, Huiyu | Liang, Pei
Article Type: Research Article
Abstract: To enhance infection diseases interval prediction, an improved model is proposed by integrating neighborhood fuzzy information granulation (NNIG) and spatial-temporal graph neural network (STGNN). Additionally, the NNIG model can efficiently extract the most representative features from the time series data and identifies the support upper and lower bounds. NNIG model transfers time series data from numerical level to granular level, and processes data feed it into STGNN for interval prediction. Finally, experiments are conducted for evaluation based on the COVID-19 data. The results demonstrate that the NNIG outperforms baseline models. Further, it proves beneficial in offering a valuable approach for …policy-making. Show more
Keywords: Time series, fuzzy information granulation, interval prediction, spatial-temporal graph neural network
DOI: 10.3233/JIFS-236766
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Hossain, AKM B. | Salam, Md. Sah Bin Hj. | Alam, Muhammad S. | Hossain, AKM Bellal
Article Type: Research Article
Abstract: Semantic segmentation is crucial for the treatment and prevention of brain cancers. Several neural network–based strategies were rapidly presented by research groups to enhance brain tumor thread segmentation. The tumor’s uneven form necessitates the usage of neural networks for its detection. Therefore, improved patient outcomes may be achieved with precise segmentation of brain tumor. Brain tumors can range widely in size, form, and position, making diagnosis difficult. Thus, this work offers a Multi-level U-Net (MU-Net) approach for analyzing the brain tumor data augmentation for improved segmentation. Therefore, a significant amount of data augmentation is employed to successfully train the recommended …system, removing the problem of a lack of data when using MR images for the diagnosis of multi-grade brain cancers. Here, we presented the “Multi-Level Pyramidal Pooling (MLPP)” component, where a new pyramidal pool will be employed to capture contextual data for augmentation. The “High-Grade Glioma” (HGG) datasets from the Kaggle and BraTs2021 were used to assess the proposed MU-Net. Overall Tumor (OT), Enhancing Core (EC), and Tumor Core (TC) were the three main designations to be segmented. The dice score was used to contrast the results empirically. The suggested MU-Net fared better than most existing methods. Researchers in the fields of bioinformatics and medicine might greatly benefit from the high-performance MU-Net. Show more
Keywords: Brain tumor, Data Augmentation (DA), Multi-level U-Net (MU-Net), Multi-Level Pyramidal Pooling (MLPP), Adaptive Curvelet Transform (ACT), wavelet threshold
DOI: 10.3233/JIFS-232782
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Wu, Jie | Hou, Mengshu
Article Type: Research Article
Abstract: Table-based fact verification (TFV) is a binary classification task that requires understanding and reasoning about both table and text. This task poses many challenges, such as table parsing, text comprehension, and numerical reasoning. However, existing methods tend to depend solely on pre-trained models for tables, treating all types of reasoning equally and disregarding the importance of identifying logic types in inference process. In this regard, we propose MoETFV, an efficient and explanatory approach to solving TFV, which is based on a Mixture-of-Experts (MoE) framework. This approach can detect the underlying logic types of statements and leverage multiple independent experts to …emulate diverse logical reasoning. It consists of one shared expert for general semantic understanding and several specific experts with distinct responsibilities for different logical inferences. Moreover, the practical applications of the MoE method in TFV are thoroughly investigated. This model doesn’t necessitate any table pre-trained models, and aligns closely with human cognitive processes in addressing such issues. Experimental results demonstrate the innovation and feasibility of the proposed approach. Show more
Keywords: Tabular data, fact verification, mixture-of-experts, logical reasoning, natural language processing
DOI: 10.3233/JIFS-238142
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Chen, Longkai | Huang, Jingjing
Article Type: Research Article
Abstract: Urban traffic accidents impose a significant threat to public safety because of its frequent occurrence and potential for severe injuries and fatalities. Hence, an effective analysis of accident patterns is crucial for designing accident prevention strategies. Recent advancement in data analytics have provided opportunities to improve the pattern of urban traffic accidents. However, the existing works face several challenges in adapting the complex dynamics, and heterogeneity of the accident data. To overcome these challenges, we proposed an innovative solution by combining the K-means clustering and Support Vector Machine to precisely predict the traffic accident patterns. By leveraging the efficiencies of …clustering technique and machine learning, this work intends to identify the intricate patterns within the traffic database. Initially, a traffic accident database was collected and fed into the system. The collected database was pre-processed to improve and standardize the raw dataset. Further, cluster analysis is employed to identify distinct patterns within the dataset and group similar accidents into clusters. This clustering enables the system to recognize common accident scenarios and identify recent accident trends. Subsequently, a Support Vector Machine is deployed to classify accidents into distinct categories through intensive training with identified clusters. The combination enables the system to understand the complex relationships among diverse accident variables, making it an effective framework for real-time pattern recognition. The proposed strategy is implemented in Python and validated using the publicly available traffic accident database. The experimental results manifest that the proposed method achieved 99.65% accuracy, 99.53% precision, 99.62% recall, and 99.57% f-measure. Finally, the comparison with the existing techniques shows that the developed strategy offers improved accuracy, precision, recall, and f-measure compared to existing ones. shows that the developed strategy offers improved accuracy, precision, recall, and f-measure compared to existing ones. Show more
Keywords: Support vector machine, traffic accident pattern recognition, cluster analysis, machine learning
DOI: 10.3233/JIFS-241018
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Liu, Fei
Article Type: Research Article
Abstract: In China, aesthetic education at the college level is essential for students’ quality because it improves their understanding of art, helps them progress in their professional career development, and helps them comprehend more fully the attractiveness of creative creations. As a result, it needs to prioritize aesthetic education at the institution and endeavor to nurture students’ feelings progressively and improve their aesthetic abilities at different levels. Artificial intelligence (AI) is used in this project to create a novel, interdisciplinary teaching technique that will maximize students’ artistic and intellectual potential and help them make more, better art. In this research, the …Osprey Optimization method improves the interdisciplinary teaching technique for aesthetic education based on a light Exclusive gradient-boosting mechanism (OOM-LEGBM). The exploration-exploitation dynamics of the OOM are incorporated into LEGBM, providing the students with a tangible and relatable technique to understand complex-solving processes. This research develops an enhanced quality framework for college aesthetic education based on the multi-model data fusion system about the implication and necessity of aesthetic education. The influence of college aesthetic education on students’ creative capacity and artistic literacy was investigated to inform instructional activities better to develop students’ aesthetic skills. The experimental findings suggest that the proposed approach achieved an improved accuracy of 99.90%, higher precision of 99.88%, and greater recall of 99.91%. Moreover, it obtained a minimum Root Mean Square Error (RMSE) of 0.26% and a lower Mean Absolute Error (MAE) of 0.34%, showing that the suggested model greatly improved preference learning accuracy while keeping overall accuracy at an identical level. Innovation capacity building in college aesthetic education can help students become more self-aware, improve their study habits, visually literate, and more comprehensive. Show more
Keywords: Interdisciplinary teaching, aesthetic education, curriculum, multimodal data fusion, artificial intelligence, and big data
DOI: 10.3233/JIFS-240723
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Zhou, Yancong | Xu, Chenheng | Chen, Yongqiang | Li, Shanshan | Guo, Zhen
Article Type: Research Article
Abstract: Due to the complexity of the products from the ethanol coupling reaction, the C4 olefin yield tends to be low. Finding the optimal ethanol reaction conditions requires repeated manual experiments. In this paper, a novel learning framework based on least squares support vector machine and tree-structured parzen estimator is proposed to solve the optimization problem of C4 olefin production conditions. And shapley value is introduced to improve the interpretation ability of modeling method. The experimental results show that the proposed learning framework can obtain the combination of ethanol reaction conditions that maximized the C4 olefin yield It is nearly 17.30% …higher compared to the current highest yield of 4472.81% obtained from manual experiments. Show more
Keywords: C4 olefin production, complex problem optimization, model interpretability, LSSVM, SHAP, TPE
DOI: 10.3233/JIFS-235144
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Muthu Thiruvengadam, P. | Gnanavadivel, J.
Article Type: Research Article
Abstract: The Power solutions have become indispensable for all the devices in recent years with an appropriate power conversion circuitries and control methods to ensure good dynamic response, improved stability, reliability and efficiency. The main intent of this article is to impart the designing of interval type-2 fuzzy logic controller (IT2FLC) based interleaved Sepic power factor correction (PFC) converter. This work also involves the careful design of the robust controller with enhanced precision and good power quality (PQ) performance at the AC mains. In addition, the development of IT2FLC based power solution improves the overall power conversion with stabilized output in …the perspective of its quick rise time, less overshoot and fast settling time in comparison to other traditional controllers. Further, the uncertainties and issues associated with the conventional proportional integral (PI) and fuzzy logic controllers (FLCs) are handled effectively by the proposed IT2FLC controller. Moreover, this preferred converter is modeled with an internal parasitics and its performances are evaluated and compared with other conventional Zeigler Nicholas (ZN) tuned PI controller and FLC by dint of MATLAB/Simulink platform. Finally, the experimental test bench set up of 250 W, 48 V power circuitry is devised and the test outcomes confirm the excellent transient behavior and PQ performances of the modeled power solution. Show more
Keywords: Power quality, interval type-2 fuzzy logic controller, total harmonic distortion, power factor correction, discontinuous conduction mode and continuous conduction mode
DOI: 10.3233/JIFS-230325
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Belal, Mohamad Mulham | Sundaram, Divya Meena
Article Type: Research Article
Abstract: Visualization-based malware detection gets more and more attention for detecting sophisticated malware that traditional antivirus software may miss. The approach involves creating a visual representation of the memory or portable executable files (PEs). However, most current visualization-based malware classification models focus on convolution neural networks instead of Vision transformers (ViT) even though ViT has a higher performance and captures the spatial representation of malware. Therefore, more research should be performed on malware classification using vision transformers. This paper proposes a multi-variants vision transformer-based malware image classification model using multi-criteria decision-making. The proposed method employs Multi-variants transformer encoders to show different …visual representation embeddings sets of one malware image. The proposed architecture contains five steps: (1) patch extraction and embeddings, (2) positional encoding, (3) multi-variants transformer encoders, (4) classification, and (5) decision-making. The variants of transformer encoders are transfer learning-based models i.e., it was originally trained on ImageNet dataset. Moreover, the proposed malware classifier employs MEREC-VIKOR, a hybrid standard evaluation approach, which combines multi-inconsistent performance metrics. The performance of the transformer encoder variants is assessed both on individual malware families and across the entire set of malware families within two datasets i.e., MalImg and Microsoft BIG datasets achieving overall accuracy 97.64 and 98.92 respectively. Although the proposed method achieves high performance, the metrics exhibit inconsistency across some malware families. The results of standard evaluation metrics i.e., Q, R, and U show that TE3 outperform the TE1, TE2, and TE4 variants achieving minimal values equal to 0. Finally, the proposed architecture demonstrates a comparable performance to the state-of-the-art that use CNNs. Show more
Keywords: Vision transformer, MCDM, VIKOR, MEREC, image malware classifier
DOI: 10.3233/JIFS-235154
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-21, 2024
Authors: Wang, R | Yu, F.S | Zhao, L.Y
Article Type: Research Article
Abstract: This paper demonstrates a fuzzy decentralized dynamic surface control (DSC) scheme for switched large-scale interconnected nonlinear systems under arbitrary switching, which contains non-strict feedback form and unknown input saturation uncertainties. An auxiliary design system is established to handled input saturation. Uncertainties of non-strict feedback form are learned by fuzzy logic systems (FLSs) approximators, DSC method is designed to conquer “explosion of complexity” inherented by repeated differential of virtute controller in backstepping approach. Ii is shown that based on common Lyapunov function (CLF) design and analysis scheme, all the closed-loop systems signals are uniformly ultimately bounded (UUB), simulation results are provided …to demonstrate the effectiveness of this proposed strategy. Show more
Keywords: DSC scheme, large-scale switched nonlinear systems(LSSNs), input saturation, non-strict feedback (NSF) form
DOI: 10.3233/JIFS-238024
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Hassan, Shabbir
Article Type: Research Article
Abstract: The CPU scheduling technique influences the performance and efficiency of operating systems. Round-robin scheduling algorithm is ideal for time-shared systems, but it is not optimal for real-time operating systems since it yields more context switching, longer waiting time, and high turnaround time. The performance of the algorithm is predominantly influenced by the designated time quantum; however, determining a suitable time quantum is extremely challenging. This paper presents a CPU scheduling algorithm that provides a better tradeoff between waiting time, turnaround time, response time, and number of context switch by using hypothesis-based quanta generation approach. It combines the CPU burst …requirements of actual processes with some noisy data and plots them against the presumed CPU quanta to get quanta densities so that a polynomial regression model can fit the data points with the highest adjusted R-squared. Then applying some complex inferential statistic, the required quanta is obtained. The scheduling is dynamic in nature because it generates the next CPU quanta in reference to the quanta that have been used in the previous cycle with remaining CPU burst requirements of the process, and it is also adaptive in nature because, at each cycle, it uses ‘d’ (5, 5, 4, 3, 2) degree of freedom to calculate the Jarque-Bera Statistics to accept/reject the hypothesis. The algorithm is implemented in ‘R’ and the performance has been evaluated on a sample size of five processes with some noisy data which outperforms the conventional RR and significantly reduces the performance parameters mentioned above. Implementing this algorithm to a time-sharing or distributed environment will undoubtedly improve system performance and will help to avoid issues like thrashing, incorporate aging, CPU affinity, and starvation. Since the proposed algorithm is work-conservative, therefore can be implemented in network packet switching, statistical multiplexing, and real-time systems. Show more
Keywords: Adaptive scheduling, context switching, CPU burst, jarque-bera, kernel density estimation, kurtosis, quanta, thrashing
DOI: 10.3233/JIFS-238624
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Alqaissi, Eman | Alotaibi, Fahd | Ramzan, Muhammad Sher | Algarni, Abdulmohsen
Article Type: Research Article
Abstract: The influenza virus can spread easily, causing significant public health concern. Despite the existence of different techniques for rapid detection and prevention of influenza, their efficiency varies significantly. Additionally, there is currently a lack of a comprehensive, interoperable, and reusable real-time model for detecting influenza infection and predicting relationships within the field of influenza analysis. This study proposed a comprehensive, real-time model for rapid and early influenza detection using symptoms. Further, new relationships in the influenza field were discovered. Multiple data sources were used for the influenza knowledge graph (KG). Throughout this study, various graph algorithms were utilized to extract …significant nodes and relationship features and multiple influenza detection machine learning (ML) models were compared. Node classification and link prediction methods were employed on a multi-layer perceptron (MLP) model. Furthermore, the hyperparameters of the model were automatically tuned. The proposed MLP model demonstrated the lowest rate of loss and the highest specificity, accuracy, recall, precision, and F1-score compared to state-of-the-art ML models. Moreover, the Matthews correlation coefficient was promising. This study shows that graph data science can improve MLP model detection and assist in discovering hidden connections in influenza KG. Show more
Keywords: Influenza detection, knowledge graph, graph multi-layer perceptron model, graph algorithms, automatic tuning, real-time analysis
DOI: 10.3233/JIFS-233381
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-22, 2024
Authors: Chen, Sian | Zuo, Yajuan | Wang, Rui
Article Type: Research Article
Abstract: Traditional rule-based and statistical methods have limitations when dealing with complex language structures and semantics. In neural network machine translation algorithms, the objective function is usually to improve the accuracy of n-ary words. However, this does not guarantee a more natural and accurate translation. To overcome these challenges, this paper proposes an optimization algorithm for English natural translation processing based on neural networks, which combines Generative Adversarial Network (GAN) and Transformer models. In GAN, the generative model uses the Transformer model to generate false samples, while the discriminative model uses a binary classifier based on convolutional neural networks and attention …mechanisms to distinguish between true and false samples. During the training process, reinforcement learning algorithms are added to evaluate and adjust the generated sentences, and the parameters of the generated model are updated. The classification results of the discriminative model are used together with the Bilingual Evaluation Basis Value (BLEU) objective function to evaluate false samples, and the results are fed back to the generating model to guide parameter updates and optimization. Extensive experiments were conducted on a standard English-Chinese machine translation dataset to evaluate our method. Compared with the benchmark model that only uses supervised learning methods, our neural network-based optimization algorithm for English natural translation processing has achieved significant improvements in translation quality. According to statistical comparison, compared with the Transformer model (BLUE = 33.63 and AP = 90%) and the deep learning model based on long-term and short-term memory (BLUE = 30.26 and AP = 83%), the GAN and Transformer models proposed as the best framework exhibit better performance in bilingual evaluation deficiency (BLEU) (34.35) and accuracy (AP = 95%). Show more
Keywords: Artificial neural network, English translation, GAN, generator, discriminator, transformer model; Adam optimization algorithm, reinforcement learning method
DOI: 10.3233/JIFS-237181
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Kannan, Jeevitha | Jayakumar, Vimala | Pethaperumal, Mahalakshmi | Shanmugam, Nithya Sri
Article Type: Research Article
Abstract: Every day, the globe becomes more contemporary and industrialized. As a result, the number of vehicles and engines is growing. However, the energy sources utilized in these engines are scarce and dwindling over time. This circumstance prompts the search for alternate fuel. As civilization develops, transportation becomes a need for daily living. The largest issue is the diminishing supply of fossil fuels and the expanding population. As a result, everyone needs alternate energy sources for their automobiles. Therefore, in this investigation, we identify the best substitute for petrol. We offer the similarity measure(SM) for a hybrid structure of a Linear …Diophantine Multi-Fuzzy Soft Set(LDMFSS) with the goal of determining this issue. Because the range of grade values has been expanded, decision-makers now have greater freedom in selecting their grade. An exemplary case study is illustrated that shows the appropriateness of our recommended approach. A comparative analysis is provided to show the outcomes of the proposed method are more achievable and beneficial than those of the existing methodologies. Additionally, its applicability and attainability are evaluated by comparing its structure to those of the already used procedures. Show more
Keywords: Linear diophantine multi-fuzzy soft set, similarity measures, fossil fuels, alternative fuel, fuel specifications
DOI: 10.3233/JIFS-219415
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Duan, Wenbiao | Yang, Mingjin | Sun, Weiliang | Xia, Mingmin | Zhu, Hui | Gu, Chijiang | Zhang, Haiqiang
Article Type: Research Article
Abstract: OBJECTIVE: A comprehensive evaluation of studies using DNA microarray datasets for screening and identifying key genes in gastric cancer is the goal of this systematic review and meta-analysis. To better understand the molecular environment associated with stomach cancer, this study aims to provide a quantitative synthesis of findings. PURPOSE: Using DNA microarray databases in a systematic manner, this study aims to analyze gastric cancer (GC) screening and gene identification efforts. Through a literature review spanning 2002–2022, this research aims to identify key genes associated with GC and develop strategies for screening and prognosis based on these …findings. METHODS: The following databases were searched extensively: Science Direct, NCKI, Web of Science, Springer, and PubMed. Fifteen studies met the inclusion and exclusion criteria; 10,134 tissues served as controls and 11,724 as GCs. The levels of critical genes, including COL1A1, COL1A2, THBS2, SPP1, SPARC, COL6A3, and COL3A1, were compared in normal and GC tissues. Rev Man 5.3 was used to do the meta-analysis. While applying models with fixed or random effects, 95% confidence intervals and weighted mean differences were computed. RESULTS According to the meta-analysis, GC tissues exhibited substantially elevated levels of important genes when contrasted with the control group. In particular, there were statistically significant increases in COL1A1 (MD = 2.43, 95% CI: 1.84–3.02), COL1A2 (MD = 2.75, 95% CI: 1.09–4.41), THBS2 (MD = 2.54, 95% CI: 1.66–3.41), SPP1 (MD = 3.64, 95% CI: 3.40–3.88), SPARC (MD = 1.57, 95% CI: 0.37–2.77), COL6A3 (MD = 2.31, 95% CI: 2.02–2.60), and COL3A1 (MD = 2.21, 95% CI: 1.59–2.82). CONCLUSIONS: The COL1A1, THBS2, SPP1, COL6A3, and COL3A1 genes were shown to have potential use in germ cell cancer screening and prognosis, according to this research. Clinical assessment and prognosis of heart failure patients may be theoretically supported by the results of this study. Show more
Keywords: DNA microarray database, gastric cancer, key genes, meta-analysis
DOI: 10.3233/JIFS-236416
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Li, Tao | Zhang, Zhongyu | Tao, Zhigang | Jia, Xinyu | Wang, Xiaolong | Wang, Jian
Article Type: Research Article
Abstract: Rock crack is one of the main factors responsible for rock failure. Uniaxial compression creep tests are performed using acoustic emission techniques, a high-sensitivity, non-radiative, non-destructive testing method to understand the influence of crack number on the precursor characteristics of short-term creep damage in the fractured rock mass. Based on the Grassberger-Procaccia (G-P) algorithm, the calculation step size for the correlation dimension value (D 2 ) of the acoustic emission ringing count rate is consistent with that for the acoustic emission b -value. The influence of the number of pre-cracks on the Acoustic emission precursor characteristics of red sandstone …creep is analyzed. The results show that near the destabilization of the specimen, the Acoustic emission accumulative ringing count surges in a stepwise manner, the Acoustic emission b -value decreases, the D 2 -value increases, the Acoustic emission amplitude shows high intensity and high frequency, and the ringing count increases sharply, all with the characteristics of failure precursors. During the accelerated creep stage of the specimens, with the increase of pre-cracks number, the precursory time points of acoustic emission b -value and D 2 -value advance, and their acoustic emission ringing counts increase sharply. Show more
Keywords: Acoustic emission, b-value, correlation dimension value (D2), precursor information, pre-cracks
DOI: 10.3233/JIFS-238964
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Hou, Xiaoyu | Luo, Chao | Gao, Baozhong
Article Type: Research Article
Abstract: Candlesticks are widely used as an effective technical analysis tool in financial markets. Traditionally, different combinations of candlesticks have formed specific bullish/bearish patterns providing investors with increased opportunities for profitable trades. However, most patterns derived from subjective expertise without quantitative analysis. In this article, combining bullish/bearish patterns with ensemble learning, we present an intelligent system for making stock trading decisions. The Ensemble Classifier through Multimodal Perturbation (ECMP) is designed to generate a diverse set of precise base classifiers to further determine the candlestick patterns. It achieves this by: first, introducing perturbations to the sample space through bootstrap sampling; second, employing …an attribute reduction algorithm based on neighborhood rough set theory to select relevant features; third, perturbing the feature space through random subspace selection. Ultimately, the trading decisions are guided by the classification outcomes of this procedure. To evaluate the proposed model, we apply it to empirical investigations within the context of the Chinese stock market. The results obtained from our experiments clearly demonstrate the effectiveness of the approach. Show more
Keywords: Trading system, ensemble learning, multimodal perturbation method, neighborhood rough set theory
DOI: 10.3233/JIFS-237087
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-19, 2024
Authors: Zhao, Bin | Cao, Wei | Zhang, Jiqun | Gao, Yilong | Li, Bin | Chen, Fengmei
Article Type: Research Article
Abstract: Aiming at the issue that the current click-through rate prediction methods ignore the varying impacts of different input features on prediction accuracy and exhibit low accuracy when dealing with large-scale data, a click-through rate prediction method (GBIFM) which combines Gradient Boosting Decision Tree (GBDT) and Input-aware Factorization Machine (IFM) is proposed in this paper. The proposed GBIFM method employs GBDT for data processing, which can flexibly handle various types of data without the need for one-hot encoding of discrete features. An Input-aware strategy is introduced to refine the weight vector and embedding vector of each feature for different instances, adaptively …learning the impact of each input vector on feature representation. Furthermore, a fully connected network is incorporated to capture high-order features in a non-linear manner, enhancing the method’s ability to express and generalize complex structured data. A comprehensive experiment is conducted on the Criteo and Avazu datasets, the results show that compared to typical methods such as DeepFM, AFM, and IFM, the proposed method GBIFM can increase the AUC value by 10% –12% and decrease the Logloss value by 6% –20%, effectively improving the accuracy of click-through rate prediction. Show more
Keywords: Click-through rate estimation, GBIFM, GBDT, IFM
DOI: 10.3233/JIFS-234713
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Wang, Shuo | Yang, Jing | Yang, Yue
Article Type: Research Article
Abstract: Personalized recommendation systems fundamentally assess user preferences as a reflection of their emotional responses to items. Traditional recommendation algorithms, focusing primarily on numerical processing, often overlook emotional factors, leading to reduced accuracy and limited application scenarios. This paper introduces a collaborative filtering recommendation method that integrates features of facial information, derived from emotions extracted from such data. Upon user authorization for camera usage, the system captures facial information features. Owing to the diversity in facial information, deep learning methods classify these features, employing the classification results as emotional labels. This approach calculates the similarity between emotional and item labels, reducing …the ambiguity inherent in facial information features. The fusion process of facial information takes into account the user’s emotional state prior to item interaction, which might influence the emotions generated during the interaction. Variance is utilized to measure emotional fluctuations, thereby circumventing misjudgments caused by sustained non-interactive emotions. In selecting the nearest neighboring users, the method considers not only the similarity in user ratings but also in their emotional responses. Tests conducted using the Movielens dataset reveal that the proposed method, modeling facial features, more effectively aligns recommendations with user preferences and significantly enhances the algorithm’s performance. Show more
Keywords: Collaborative filtering algorithm, facial information features, emotional factors, non-interactive emotion
DOI: 10.3233/JIFS-232718
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2024
Authors: Zhai, Shanshan | Fan, Jianping | Liu, Lin
Article Type: Research Article
Abstract: Neutrosophic cubic set (NCS) can process complex information by choosing both interval value and single value membership and indeterminacy and falsehood components. The aggregation operators based on Aczel-Alsina t-norm and t-corm are quite effective for evaluating the interrelationship among attributes. The purpose of this paper is to diagnose the interrelationship among attributes with neutrosophic cubic information, and propose a multi-attribute decision-making(MADM) method for supplier selection problem with unknown weight under neutrosophic cubic environment. We defined neutrosophic cubic Aczel-Alsina (NC-AA) operator and neutrosophic cubic Aczel–Alsina weighted arithmetic average (NCAAWAA) operator, then we discussed various important results and some properties of the …proposed operators. Additionally, we proposed a MADM method under the presence of the NC-AAWAA operator. When the weights of attributes are unknown, we use the MEREC method to determine the weights. Later, the NC-AAWAA operator and MEREC method are applied to address the supplier selection problem. Finally, a sensitivity analysis and a comparative analysis are conducted to illustrate the stability and superiority of the proposed method. The results show the NC-AAWAA operator can handle the interrelationship among complex information more effectively, and MEREC method can weight the attributes based on the removal effect of a neutrosophic cubic attribute. Show more
Keywords: Multi-attribute decision-making (MADM), neutrosophic cubic set (NCS), Aczel-Alsina aggregation operators, MEREC method
DOI: 10.3233/JIFS-235274
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-22, 2024
Authors: Hong, Yuntao
Article Type: Research Article
Abstract: Obsessive-compulsive disorder (OCD) is a chronic disease and psychosocial disorder that significantly reduces the quality of life of patients and affects their personal and social relationships. Therefore, early diagnosis of this disorder is of particular importance and has attracted the attention of researchers. In this research, new statistical differential features are used, which are suitable for EEG signals and have little computational load. Hilbert-Huang transform was applied to EEGs recorded from 26 OCD patients and 30 healthy subjects to extract instant amplitude and phase. Then, modified mean, variance, median, kurtosis and skewness were calculated from amplitude and phase data. Next, …the difference of these statistical features between various pairs of EEG channels was calculated. Finally, different scenarios of feature classification were examined using the sparse nonnegative least squares classifier. The results showed that the modified mean feature calculated from the amplitude and phase of the interhemispheric channel pairs produces a high accuracy of 95.37%. The frontal lobe of the brain also created the most distinction between the two groups among other brain lobes by producing 90.52% accuracy. In addition, the features extracted from the frontal-parietal network produced the best classification accuracy (93.42%) compared to the other brain networks examined. The method proposed in this paper dramatically improves the accuracy of EEG classification of OCD patients from healthy individuals and produces much better results compared to previous machine learning techniques. Show more
Keywords: Obsessive-compulsive disorder (OCD), Electroencephalogram (EEG), Hilbert-Huang transform, statistical features, classification
DOI: 10.3233/JIFS-237946
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Zhao, Xixi | Gu, Liang | Duan, Xiaorong | Wang, Liguo | Li, Zhenxi
Article Type: Research Article
Abstract: Cloud storage attribute libraries usually store a large amount of sensitive data such as personal information and trade secrets. Attackers adopt diverse and complex attack methods to target the cloud storage attribute database, which makes the defense work more challenging. In order to realize the secure storage of information, an attribute based cloud storage anti-attack algorithm based on dynamic authorization access is proposed. According to the characteristic variables of the sample, the data correlation matrix is calculated, and the principal component analysis method is adopted to reduce the dimension of the data, build the anti-attack code model, simulate the dynamic …authorization access rights, and calculate the packet loss rate according to the anti-attack flow. Design the initialization stage, cluster stage and cluster center update stage to realize the attack prevention of cloud storage attribute database. The experimental results show that the proposed algorithm can accurately classify the anti-attack code, has good packet processing ability, relatively short page request time, and anti-attack success rate is higher than 90%, which can effectively ensure the stability of the algorithm. Show more
Keywords: Dynamic authorization access, cloud storage attributes, basic anti-attack algorithm, anti-attack code model, access permissions
DOI: 10.3233/JIFS-237409
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Mahendran, S. | Gomathy, B.
Article Type: Research Article
Abstract: This study addresses the escalating energy demands faced by global industries, exerting pressure on power grids to maintain equilibrium between supply and demand. Smart grids play a pivotal role in achieving this balance by facilitating bidirectional energy flow between end users and utilities. Unlike traditional grids, smart grids incorporate advanced sensors and controls to mitigate peak loads and balance overall energy consumption. The proposed work introduces an innovative deep learning strategy utilizing bi-directional Long Short Term Memory (b-LSTM) and advanced decomposition algorithms for processing and analyzing smart grid sensor data. The application of b-LSTM and higher-order decomposition in the analysis …of time-series data results in a reduction of Mean Absolute Percentage Error (MAPE) and Minimal Root Mean Square (RMSE). Experimental outcomes, compared with current methodologies, demonstrate the model’s superior performance, particularly evident in a case study focusing on hourly PV cell energy patterns. The findings underscore the efficacy of the proposed model in providing more accurate predictions, thereby contributing to enhanced management of power grid challenges. Show more
Keywords: Smart grids, deep learning, PV cells, error rate and absolute error, prediction
DOI: 10.3233/JIFS-238850
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Ning, Yi | Liu, Meiyu | Guo, Xifeng | Liu, Zhiyong | Wang, Xinlu
Article Type: Research Article
Abstract: Accurate load forecasting is an important issue for safe and economic operation of power system. However, load data often has strong non-stationarity, nonlinearity and randomness, which increases the difficulty of load forecasting. To improve the prediction accuracy, a hybrid short-term load forecasting method using load feature extraction based on complete ensemble empirical mode decomposition with adaptive noise (CEEMDAN) and refined composite multi-scale entropy (RCMSE) and improved bidirectional long short time memory (BiLSTM) error correction is proposed. Firstly, CEEMDAN is used to separate the detailed information and trend information of the original load series, RCMSE is used to reconstruct the feature …information, and Spearman is used to screen the features. Secondly, an improved butterfly optimization algorithm (IBOA) is proposed to optimize BiLSTM, and the reconstructed components are predicted respectively. Finally, an error correction model is constructed to mine the hidden information contained in error sequence. The experimental results show that the MAE, MAPE and RMSE of the proposed method are 645 kW, 0.96% and 827.3 kW respectively, and MAPE is improved by about 10% compared with other hybrid models. Therefore, the proposed method can overcome the problem of inaccurate prediction caused by data and inherent defects of models and improve the prediction accuracy. Show more
Keywords: Short-term load forecasting, complete ensemble empirical mode decomposition with adaptivenoise, refined composite multi-scale entropy, improved butterfly optimization algorithm, bidirectional long short time memory neural network
DOI: 10.3233/JIFS-237993
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Limei, Nong | Dongfan, Wu | Bo, Zhang
Article Type: Research Article
Abstract: Garden landscape is the combination of nature and humanity, with high aesthetic value, ecological value and cultural value, has become an important part of people’s life. Modern people have a higher pursuit for the spiritual food such as garden landscape after the material life is satisfied, which brings new challenges to the construction of urban garden landscape. As an advanced type of machine learning, deep learning applied to landscape image recognition can solve the problem of low quality and low efficiency of manual recognition. Based on this, this paper proposes a garden landscape image recognition algorithm based on SSD (Single …Shot Multibox Detector), which realizes accurate extraction and recognition of image features by positioning the target, and can effectively improve the quality and efficiency of landscape image recognition. In order to test the feasibility of the algorithm proposed in this paper, experimental analysis was carried out in the CVPR 2023 landscape data set. The experimental results show that the algorithm has a high recognition accuracy for landscape images, and has excellent performance compared with traditional image recognition algorithms. Show more
Keywords: Deep learning, garden landscape, image recognition, target detection; image analysis
DOI: 10.3233/JIFS-239654
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Ramkumar, N. | Karthika Renuka, D.
Article Type: Research Article
Abstract: In recent times, the rapid advancement of deep learning has led to increased interest in utilizing Electroencephalogram (EEG) signals for automatic speech recognition. However, due to the significant variation observed in EEG signals from different individuals, the field of EEG-based speech recognition faces challenges related to individual differences across subjects, which ultimately impact recognition performance. In this investigation, a novel approach is proposed for EEG-based speech recognition that combines the capabilities of Long Short Term Memory (LSTM) and Graph Attention Network (GAT). The LSTM component of the model is designed to process sequential patterns within the data, enabling it to …capture temporal dependencies and extract pertinent features. On the other hand, the GAT component exploits the interconnections among data points, which may represent channels, nodes, or features, in the form of a graph. This innovative model not only delves deeper into the connection between connectivity features and thinking as well as speaking states, but also addresses the challenge of individual disparities across subjects. The experimental results showcase the effectiveness of the proposed approach. When considering the thinking state, the average accuracy for single subjects and cross-subject are 65.7% and 67.3% respectively. Similarly, for the speaking state, the average accuracies were 65.4% for single subjects and 67.4% for cross-subject conditions, all based on the KaraOne dataset. These outcomes highlight the model’s positive impact on the task of cross-subject EEG speech recognition. The motivations for conducting cross subject are real world applicability, Generalization, Adaptation and personalization and performance evaluation. Show more
Keywords: Electroencephalography, recurrent neural network, long short term memory, gated recurrent unit, graph convolution network and graph attention network
DOI: 10.3233/JIFS-233143
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Peng, Weishi | Fang, Yangwang | Ma, Yongzhong
Article Type: Research Article
Abstract: Although many scholars say that their algorithms are better than others in the state estimation problem, only a fewer convincing algorithms were applied to engineering practices. The reason is that their algorithms outperform others only in some aspects such as the estimation accuracy or the computation load. To solve the problem of performance evaluation of state estimation algorithms, in this paper, the comprehensive evaluation measures (CEM) for evaluating the nonlinear estimation algorithm (NEA) is proposed, which can comprehensively reflect the performance of the NEAs. First, we introduce three types of the NEAs. Second, the CEM combining the flatness, estimation accuracy …and computation time of the NEAs, is designed to evaluate the above NEAs. Finally, the superiority of the CEM is verified by a numerical example, which helps decision makers of nonlinear estimation algorithms theoretically and technically. Show more
Keywords: Performance evaluation, nonlinear estimation algorithm, comprehensive metrics, error spectrum, EKF, UKF, PF
DOI: 10.3233/JIFS-231376
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Valdez-Rodríguez, José E. | Rangel, Nahum | Moreno-Armendáriz, Marco A.
Article Type: Research Article
Abstract: Visual detection of fingering on the trumpet is an increasingly interesting topic in music research. The ability to recognize and track the movements of the trumpet player’s fingers during the performance of a musical piece can provide valuable information for analyzing and improving instrument technique. However, this is a largely unexplored task, as most works focus on audio quality rather than instrument fingering techniques. Developing techniques for identifying essential finger positions on a musical instrument is crucial, as poor fingering techniques can harm instrument performance. In this work, we propose the visual detection of this fingering using convolutional neural networks …with a proprietary dataset created for this purpose. Additionally, to improve the results and focus on the essential parts of the instrument, we use self-attention mechanisms by extracting these features automatically. Show more
Keywords: Fingering detection, Convolutional Neural Networks, Self-attention mechanisms, Visual detection, Trumpet
DOI: 10.3233/JIFS-219342
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-9, 2024
Authors: Ganesh, M.A. | Saravana Perumaal, S. | Gomathi Sankar, S.M.
Article Type: Research Article
Abstract: The current framework for detecting Fake License Plates (FLP) in real-time is not robust enough for patrol teams. The objective of this paper is to develop a robust license plate authentication framework, based on the Vehicle Make and Model Recognition (VMMR) and the License Plate Recognition (LPR) algorithms that is implementable at the edge devices. The contributions of this paper are (i) Development of license plate database for 547 Indian cars, (ii) Development of an image dataset with 3173 images of 547 Indian cars in 8 classes, (iii) Development of an ensemble model to recognize vehicle make and model from …frontal, rear, and side images, and (iv) Development of a framework to authenticate the license plates with frontal, rear, and side images. The proposed ensemble model is compared with the state-of-the-art networks from the literature. Among the implemented networks for VMMR, the Ensembling model with a size of 303.2 MB achieves the best accuracy of 89% . Due to the limited memory size, Easy OCR is chosen to recognize license plate. The total size of the authentication framework is 308 MB. The performance of the proposed framework is compared with the literature. According to the results, the proposed framework enhances FLP recognition due to the recognition of vehicles from side images. The dataset is made public at https://www.kaggle.com/ganeshmailecture/datasets . Show more
Keywords: Vehicle make and model recognition, fake license plate detection, license plate authentication, intelligent transportation system
DOI: 10.3233/JIFS-230607
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-27, 2024
Authors: Yin, Songyi | Wang, Yu | Fu, Yelin
Article Type: Research Article
Abstract: The environmental, social, and governance (ESG) rating method is a powerful tool that can help investors to judge the investment value of companies based on the information disclosure. However, mainstream ESG rating methods ignore the distinction between companies with incomplete information disclosure and companies without information disclosure, which decreases the initiative and enthusiasm of companies to disclose information. In this study, a self-disclosure ESG (SDESG) rating method is proposed to evaluate companies’ ESG performance capabilities. First, based on the fuzzy set, fuzzy data is defined and applied to the SDESG rating method. Second, analogous to the academic reward system of …a university, a reward mechanism of disclosure is used in the SDESG rating method. Finally, the effectiveness and reliability of the SDESG rating method are demonstrated through Refinitiv’s case. The results show that the SDESG rating method can distinguish companies with incomplete information disclosure from companies without information disclosure and allow companies that proactively disclose information to obtain better ESG scores under each industry. The implications of the study would increase companies’ enthusiasm to disclose information and maintain transparency within a company. Show more
Keywords: ESG rating method, information disclosure, fuzzy set, reward mechanism
DOI: 10.3233/JIFS-230777
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Wang, Dan | Yao, Jingfa | Zhang, Yanmin
Article Type: Research Article
Abstract: Nowadays, automatic human activity recognition from video images is necessary for monitoring applications and caring for disabled people. The use of surveillance cameras and the processing of the obtained images leads to the achievement of a smart, accurate system for the recognition of human behavior. Since human detection in different scenes is associated with many challenges, several approaches have been implemented to detect human activity from video image processing. Due to the complexity of human activities, background noises and other factors affect the detection. For the solution of these problems, two deep learning-based algorithms have been described in the current …article. According to the convolutional neural networks, the LSTM + CNN method and the 3D CNN method have been used to recognize the human activities in the images of the video. Each algorithm is explained and analyzed in detail. The experiments designed in this paper are performed by two datasets: the HMDB-51 dataset and the UCF101 dataset. In the HMDB-51 dataset, the highest obtained accuracy for CNN + LSTM method was equal to 70.2 and for method 3D CNN equal to 54.4. In the UCF101 dataset, the highest obtained accuracy for CNN + LSTM method was equal to 95.1 and for method 3D CNN equal to 90.8. Show more
Keywords: Long short-term memory (LSTM), video processing, deep learning, human activity recognition, convolutional neural network (CNN)
DOI: 10.3233/JIFS-236068
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Viet, Hoang Huu | Uyen, Nguyen Thi | Cao, Son Thanh | Nguyen, Long Giang
Article Type: Research Article
Abstract: The Student-Project Allocation with preferences over Projects problem is a many-to-one stable matching problem that aims to assign students to projects in project-based courses so that students and lecturers meet their preference and capacity constraints. In this paper, we propose an efficient two-heuristic algorithm to solve this problem. Our algorithm starts from an empty matching and iteratively constructs a maximum stable matching of students to projects. At each iteration, our algorithm finds an unassigned student and assigns her/his most preferred project to her/him to form a student-project pair in the matching. If the project or the lecturer who offered the …project is over-subscribed, our algorithm uses two heuristic functions, one for the over-subscribed project and the other for the over-subscribed lecturer, to remove a student-project pair in the matching. To reach a stable matching of a maximum size, our two heuristics are designed such that the removed student has the most opportunities to be assigned to some project in the next iterations. Experimental results show that our algorithm is efficient in execution time and solution quality for solving the problem. Show more
Keywords: Approximation algorithm, heuristic search, matching problem, student-project allocation problem
DOI: 10.3233/JIFS-236300
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Huang, Jinsong | Hou, Hecheng | Li, Xiaoying | Zhang, Ziyi | Jia, Qi
Article Type: Research Article
Abstract: In the context of the digital era, the factors influencing the cognitive load of the full ecological smart home on the elderly are mostly interconnected. Most existing studies have conducted single correlation analyses, ignoring the fact that cognitive load is the result among multiple interactions of multiple factors. Furthermore, the color, material and Finishing of the product design can also impact on the user’s perceptual needs. Therefore, exploring the grouping dynamics of cognitive load and users’ perceptual needs for color (C), material (M), and Finishing (F) of smart products can provide insights for inclusive design of smart homes. The article …analyzes the asymmetric multiple concurrent causal effects of full ecological smart homes on the cognitive load of the elderly from a histological perspective using fuzzy set Qualitative Comparative Analysis (fsQCA) based on the four elements of Innovation Diffusion Theory. At the same time, principal component analysis and quantitative theory I class method are used to explore the quantitative relationship between color, material, Finishing and users’ perceptual imagery of the product. The results of the study showed that there were no necessary conditions leading to high or low cognitive load in the fsQCA analysis, indicating that the problem was the result of the interaction of multiple conditions, and the final analysis yielded three histological pathways leading to low cognitive load and one pathway leading to high load in older adults. Moreover, the study identifies the combination of colors, materials, and finishes that best represent user preferences. This study establishes a dialogue between theory, results, and cases in analyzing of the group dynamics of the impact of full ecological smart homes on the cognitive load of the elderly. It provides a theoretical basis for the development of digital inclusion enhancement strategies. Show more
Keywords: Smart home, cognitive load, diffusion of innovation, qualitative comparative analysis (QCA), human-computer interaction
DOI: 10.3233/JIFS-237212
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Jansi Sophia Mary, C. | Mahalakshmi, K.
Article Type: Research Article
Abstract: Intrusion Detection (ID) in cloud environments is vital to maintain the safety and integrity of data and resources. However, the presence of class imbalance, where normal samples significantly outweigh intrusive instances, poses a challenge in constructing a potential ID system. Deep Learning (DL) methods, with their capability to automatically study complex patterns and features, present a promising solution in various ID tasks. Such methods can automatically learn intricate features and patterns from the input dataset, making them suitable for detecting anomalies and finding intrusions in cloud environments. Therefore, this study proposes a Class Imbalance Data Handling with an Optimal Deep …Learning-Based Intrusion Detection System (CIDH-ODLIDS) in a cloud computing atmosphere. The CIDH-ODLIDS technique leverages optimal DL-based classification and addresses class imbalance. Primarily, the CIDH-ODLIDS technique preprocesses the input data using a Z-score normalization approach to ensure data quality and consistency. To handle class imbalance, the CIDH-ODLIDS technique employs oversampling techniques, particularly focused on synthetic minority oversampling techniques such as Adaptive Synthetic (ADASYN) sampling. ADASYN generates synthetic instances for the minority class depending on the available data instances, effectively balancing the class distribution and mitigating the impact of class imbalance. For the ID process, the CIDH-ODLIDS technique utilizes a Fuzzy Deep Neural Network (FDNN) model, and its tuning procedure is performed using the Chaotic Tunicate Swarm Algorithm (CTSA). CTSA is employed to choose the learning rate of the FDNN methods optimally. The experimental assessment of the CIDH-ODLIDS method is extensively conducted on three IDS datasets. The comprehensive comparison results confirm the superiority of the CIDH-ODLIDS algorithm over existing techniques. Show more
Keywords: Cloud computing, security, deep learning, intrusion detection system, tunicate swarm algorithm, class imbalance data
DOI: 10.3233/JIFS-237900
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Lomas-Barrie, Victor | Reyes-Camacho, Michelle | Neme, Antonio
Article Type: Research Article
Abstract: Horizontal gene transference is a biological process that involves the donation of DNA or RNA from an organism to a second, unrelated organism. This process is different from the more common one, vertical transference, which is present whenever an organism or pair of organisms reproduce and transmit their genetic material to the descendants. The identification of segments of genetic material that are the result of horizontal transference is relevant to construct accurate phylogenetic trees, on one hand, and to detect possible drug-resistance mechanisms, on the other, since this movement of genetic material is the main cause behind antibiotic resistance in …bacteria. Here, we describe a novel algorithm able to detect sequences of foreign origin, and thus, possible acquired via horizontal transference. The general idea of our method is that within the genome of an organism, there might be sequences that are different from the vast majority of the remaining sequences from the same organism. The former are candidate anomalies, and thus, their origin may be explained by horizontal transference. This approach is equivalent to a particular instance of the authorship attribution problem, that in which from a set of texts or paragraphs, almost all of them were written by the same author, whereas a minority has a different authorship. The constraint is that the author of each text is not known, so the algorithm has to attribute the authorship of each one of the texts. The texts detected to be written by a different author are the equivalent of the sequences of foreign origin for the case of genetic material. We describe here a novel method to detect anomalous sequences, based on interpretable embeddings derived from a common attention mechanism in humans, that of identifying novel tokens within a given sequence. Our proposal achieves novel and consistent results over the genome of a well known organism. Show more
Keywords: Horizontal gene transference, anomaly detection, embeddings, natural language processing, genomics
DOI: 10.3233/JIFS-219337
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Weng, Zhi | Bai, Rongfei | Zheng, Zhiqiang
Article Type: Research Article
Abstract: Cattle detection and counting is one of the most important topics in the development of modern agriculture and animal husbandry. The traditional manual monitoring methods are inefficient and constrained by factors such as site. To solve the above problems, a SCS-YOLOv5 cattle detection and counting model for complex breeding scenarios is proposed. The original SPPF module is replaced in the YOLOv5 backbone network with a CSP structured SPPFCSPC. A CA (Coordinate Attention) mechanism is added to the neck network, as well as the SC (Standard Convolution) of the Neck network is replaced with a light convolution GSConv and Slim Neck …is introduced, and training strategies such as multi-scale training are also employed. The experimental results show that the proposed method enhances the feature extraction ability and feature fusion ability, balances the localization accuracy and detection speed, and improves the use effect in real farming scenarios. The Precision of the improved network model is improved from 93.2% to 95.5%, [email protected] is improved from 94.5% to 95.2%, the RMSE is reduced by about 0.03, and the FPS reaches 88. Compared with other mainstream algorithms, the comprehensive performance of SCS-YOLOv5 s is in a leading position, with fewer missed and false detections, and the strong robustness and generalization ability of this model are proved on multi-category public datasets. Applying the improvement ideas in this paper to YOLOv8 s also yields an increase in accuracy. The improved method in this study can greatly improve the accuracy of cattle detection and counting in complex environments, and has good real-time performance, so as to provide technical support for large-scale cattle breeding. Show more
Keywords: Cattle detection, counting, attention mechanism, occlusion, complex environments
DOI: 10.3233/JIFS-237231
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Lugo-Torres, Gerardo | Valdez-Rodríguez, José E. | Peralta-Rodríguez, Diego A.
Article Type: Research Article
Abstract: The use of generative models in image synthesis has become increasingly prevalent. Synthetic medical imaging data is of paramount importance, primarily because medical imaging data is scarce, costly, and encumbered by legal considerations pertaining to patient confidentiality. Synthetic medical images offer a potential answer to these issues. The predominant approaches primarily assess the quality of images and the degree of resemblance between these images and the original ones employed for their generation.The central idea of the work can be summarized in the question: Do the performance metrics of Frechet Inception Distance(FID) and Inception Score(IS) in the Cycle-consistent Generative Adversarial Networks …(CycleGAN) model are adequate to determine how real a generated chest x-ray pneumonia image is? In this study, a CycleGAN model was employed to produce artificial images depicting 3 classes of chest x-ray pneumonia images: general(any type), bacterial, and viral pneumonia. The quality of the images were evaluated assessing and contrasting 3 criteria: performance metric of CycleGAN model, clinical assessment of respiratory experts and the results of classification of a visual transformer(ViT). The overall results showed that the evaluation metrics of the CycleGAN are insufficient to establish realism in generated medical images. Show more
Keywords: Synthetic chest x-ray, cycle generative adversarial network, pneumonia, image-to-image translation, visual transformer
DOI: 10.3233/JIFS-219373
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Ramírez-Martínez, Angel | Chong-Quero, J. Enrique | Cervantes-Culebro, Héctor | Cruz-Villar, Carlos A.
Article Type: Research Article
Abstract: This paper presents a data-driven control approach for a five-bar robot with compliant joints. The robot consists of a parallel mechanism with compliant elements that introduce uncertainties in modeling and control. To address this fact, it is implemented a model-less data-driven controller based on a Feedforward Neural Network Module (FNNM) that identifies the inverse dynamics of the robot. The FNNM is incorporated into a coordination of Feedforward Control Method (CFCM) to achieve precise trajectory tracking. Experiments compare the compliant joints robot to a bearing-joint robot performing pick-and-place tasks from 0.15 to 3.15 Hz. Results show the compliant robot maintaining trajectory tracking …up to 1.25 Hz with a Root Mean Square Error (RMSE) of 9.02 mm. Show more
Keywords: Data-driven, five-bar robot, compliant joints, vision-based
DOI: 10.3233/JIFS-219364
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-7, 2024
Authors: Chen, Kang | Song, Changming | Cheng, Dongxu | Li, Hao
Article Type: Research Article
Abstract: Video anomaly detection (VAD) has garnered substantial attention from researchers due to its broad applications, including fire detection, drop detection, and vibration detection. In the current context of VAD, existing methods prioritize detection efficiency but overlook the impact of motion and appearance information. Additionally, achieving accurate predictions while retaining motion and appearance information poses a significant challenge. This paper proposes a novel semi-supervised method for VAD based on Generative Adversarial Network (GAN) structures with dual generators and dual discriminators, namely Dual-GAN. The future frame generator utilizes an improved encoder-decoder network to preserve more spatial information. Motion information for the future …flow generator is obtained by estimating optical flow between reconstruction frames, complementing the optical flow between prediction frames. The introduction of a frame discriminator and a motion discriminator against the frame generator enhances the realism of prediction frames, which facilitates the identification of unexpected abnormal events. This method significantly outperforms comparative approaches in synthesizing video frames and predicting future flows, showcasing its effectiveness in handling diverse video data. Extensive experiments are performed on four publicly available datasets to ensure a comprehensive evaluation of the model performance. Further exploration could include refining the model architecture, exploring additional datasets, and adapting the methodology to specific application domains. Show more
Keywords: Anomaly detection, generative adversarial network, dual discriminators, future flow
DOI: 10.3233/JIFS-237831
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Karthikeyan, M. | Colak, Ilhami | Sagar Imambi, S. | Joselin Jeya Sheela, J. | Nair, Sruthi | Umarani, B. | Alagusabai, Andril | Suriyakrishnaan, K. | Rajaram, A.
Article Type: Research Article
Abstract: This research paper introduces a cutting-edge approach to electric demand forecasting by incorporating the Temporal Fusion Transformer (TFT). As the landscape of demand forecasting becomes increasingly intricate, precise predictions are vital for effective energy management. To tackle this challenge, we leverage the sequential and temporal patterns in an extensive electric demand dataset spanning from 2003 to 2014. Our proposed Temporal Fusion Transformer model combines attention mechanisms with the transformer architecture, enabling it to adeptly capture intricate temporal dependencies. Thorough data preprocessing, including temporal embedding and external features, enhances prediction accuracy. Through rigorous evaluation, the TFT model surpasses existing forecasting techniques, …showcasing its capacity for accurate, resilient, and adaptive predictions. This research contributes to the advancement of electric demand forecasting, harnessing the TFT’s capabilities to excel in capturing diverse temporal patterns. The findings hold the potential to enhance energy management and support decision-making in the energy sector, bridging the gap between innovation and practical utility. Show more
Keywords: Electric demand forecasting, temporal fusion transformer, energy management, time-series analysis, transformer architecture
DOI: 10.3233/JIFS-236036
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Arenas Muñiz, Andrés Antonio | Mújica-Vargas, Dante | Rendón Castro, Arturo | Luna-Álvarez, Antonio | Vela-Rincón, Virna V.
Article Type: Research Article
Abstract: The selection of an appropriate trajectory for self-driving vehicles involves the analysis of several criteria that describe the generated trajectories. This problem evolves into an optimization problem when it is desired to increase or decrease the values for a specific criterion. The contribution of this thesis is to explore the use and optimization of another technique for decision-making, such as TOPSIS, with a sufficiently robust method that allows the inclusion of multiple parameters and their proper optimization, incorporating human experience. The proposed approach showed significantly higher safety and comfort performance, with about 20% better efficiency and 80% fewer safety violations …compared to other state-of-the-art methods, and in some cases outperforming in comfort by about 30.43%. Show more
Keywords: Decision-making, human experience, trajectory selection, self-driving
DOI: 10.3233/JIFS-219365
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Téllez-Velázquez, Arturo | Delice, Pierre A. | Salgado-Leyva, Rafael | Cruz-Barbosa, Raúl
Article Type: Research Article
Abstract: This paper performs an analysis comparing two evolutionary explainable fuzzy models that make inferences in a pipeline with a blood test data set for COVID-19 classification. Firstly, data is preprocessed by the following stages: cleaning, imputation and ranking feature selection. Later, we perform a comparative analysis between several clustering methods used in an Evolutionary Clustering-Structured Fuzzy Classifier (ECSFC) to solve this classification problem using the Differential Evolution (DE) algorithm. Complementarily, we find that the Fuzzy Decision Tree model produces similar performance when is tuned with the DE algorithm (EFDT). The obtained results show that, simpler models are easier to explain …qualitatively, i.e., increasing the number of clusters in ECSFC model or the maximum depth of the tree in EFDT model, does not necessarily help to obtain simplified and accurate models. In addition, although the EFDT model is by itself an intuitively explainable model, the ECSFC, with the help of the proposed Weighted Stacked Features Plot, generates more intuitive models that allow not only highlighting the features and the linguistic terms that defines a patient with COVID-19, but also allows users to visualize in a single graph and in specific colors the analyzed classes. Show more
Keywords: COVID-19, blood tests, fuzzy classifier, fuzzy decision tree, clustering, differential evolution
DOI: 10.3233/JIFS-219372
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Yao, Ziyang
Article Type: Research Article
Abstract: The traditional multi-task Takagi-Sugeno-Kang (TSK) fuzzy system modeling methods pay more attention to utilizing the inter-task correlation to learn the consequent parameters but ignore the importance of the antecedent parameters of the model. To this end, we propose a novel multi-task TSK fuzzy system modeling method based on multi-task fuzzy clustering. This method first proposes a novel multi-task fuzzy c-means clustering method that learns multiple specific clustering centers for each task and some common clustering centers for all tasks. Secondly, for the consequent parameters of the fuzzy system, the novel low-rank and row-sparse constraints are proposed to better implement multi-task …learning. The experimental results demonstrate that the proposed model shows better performance compared with other existing methods. Show more
Keywords: Multi-task fuzzy clustering, TSK fuzzy system, low-rank, row-sparsity, joint learning
DOI: 10.3233/JIFS-232312
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Gao, Lijun | Liu, Kai | Liu, Wenjun | Wu, Jiehong | Jin, Xiao
Article Type: Research Article
Abstract: As machine learning models become increasingly integrated into practical applications and are made accessible via public APIs, the risk of model extraction attacks has gained prominence. This study presents an innovative and efficient approach to model extraction attacks, aimed at reducing query costs and enhancing attack effectiveness. The method begins by leveraging a pre-trained model to identify high-confidence samples from unlabeled datasets. It then employs unsupervised contrastive learning to thoroughly dissect the structural nuances of these samples, constructing a dataset of high quality that precisely mirrors a variety of features. A mixed information confidence strategy is employed to refine the …query set, effectively probing the decision boundaries of the target model. By integrating consistency regularization and pseudo-labeling techniques, reliance on authentic labels is minimized, thus improving the feature extraction capabilities and predictive precision of the surrogate models. Evaluation on four major datasets reveals that the models crafted through this method bear a close functional resemblance to the original models, with a real-world API test success rate of 62.35%, which vouches for the method’s validity. Show more
Keywords: Model extraction, unsupervised learning, selection of strategies, active learning
DOI: 10.3233/JIFS-239504
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Yu, Xiaobing | Zhang, Yuexin | Wang, Xuming
Article Type: Research Article
Abstract: Sensors are often deployed in harsh environments, in which some threats may endanger the safety of sensors. In this paper, a sensor deployment model is developed in Wireless Sensor Networks (WSNs), in which the coverage rate and the threat risk are considered simultaneously. The model is established as an optimization problem. An adaptive ranking teaching learning-based optimization algorithm (ARTLBO) is proposed to solve the problem. Learners are divided into inferior and superior groups. The teacher phase is boosted by replacing the teacher with the top three learners, and the learner phase is improved by providing some guidance for inferior learners. …The experimental results show that the proposed ARTLBO algorithm can effectively optimize the model. The fitness values of the proposed model found by the proposed ARTLBO are 0.4894, 0.4886, which are better than its competitors. The algorithm can provide a higher coverage rate and lower threat risk. Show more
Keywords: WSNs, teaching-learning-based optimization, sensor deployment, coverage rate
DOI: 10.3233/JIFS-240215
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Zhang, Lixin | Yin, Hongtao | Li, Ang | Hu, Longbiao
Article Type: Research Article
Abstract: In large-scale scenes, how to quickly obtain paths while ensuring the shortest possible path length is a key issue. Rapidly-exploring Random Tree (RRT) have the characteristic of quickly exploring the state space, but it is often difficult to obtain a short path. To overcome this problem, this paper proposes an improved RRT algorithm based on equidistance retention strategy and A* local search(ERRRT-A*). First, RRT is used for large-step global fast exploration to obtain approximate paths. Then, an equidistance retention strategy is used to discard most of the points and retain a small number of key points. Finally, A* is used …to search between each segment to obtain a new path. The ERRRT-A* algorithm is compared with other commonly used algorithms on maps of different size in terms of path length and planning time. Simulation results indicate that compared with other algorithms, this algorithm achieves fast planning in large-scale scenes while obtaining short path length, which can effectively balance the path length and planning time. Show more
Keywords: Path planning, large-scale scenes, unmanned vehicles, RRT
DOI: 10.3233/JIFS-238695
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]