Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2023: 2
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Vallabhaneni, Nagalakshmi | Prabhavathy, Panneer
Article Type: Research Article
Abstract: Numerous people are interested in learning yoga due to the increased tension levels in the modern lifestyle, and there are a variety of techniques or resources available. Yoga is practiced in yoga centers, by personal instructors, and through books, the Internet, recorded videos, etc. As the aforementioned resources may not always be available, a large number of people will opt for self-study in fast-paced lifestyles. Self-learning makes it impossible to recognize an incorrect posture. Incorrect poses will have a negative effect on the patient’s health, causing severe agony and long-term chronic issues. Computer vision (CV)-related techniques derive pose features and …conduct pose analysis using non-invasive CV methods. The application of machine learning (ML) and artificial intelligence (AI) techniques to an inter-disciplinary field like yoga becomes quite difficult. Due to its potent feature learning ability, deep learning (DL) has recently achieved an impressive level of performance in classifying yoga poses. In this paper, an artificial algae optimizer with hybrid deep learning-based yoga pose estimation (AAOHDL-YPE) model is presented. The presented AAOHDL-YPE model analyzes yoga video clips to estimate pose. Utilizing Part Confidence Map and Part Affinity Field with bipartite equivalent and parsing, OpenPose can be employed to determine the joint location. The deep belief network (DBN) model is then used for Yoga recognition. Finally, the AAO algorithm is utilized to enhance the EfficientNet model’s recognition performance. The results of a comprehensive experimentation analysis reveal that the AAOHDL-YPE technique produces superior results in comparison to existing methods. Show more
Keywords: Yoga posture, activity recognition, deep learning, metaheuristics, computer vision
DOI: 10.3233/JIFS-233583
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2023
Authors: Sendhil, R. | Arulmurugan, A. | Jose Moses, G. | Kaviarasan, R. | Ramadoss, P.
Article Type: Research Article
Abstract: Occult peritoneal metastasis often emerges in sick persons having matured gastric cancer (GC) and is inexpertly detected with presently feasible instruments. Due to the existence of peritoneal metastasis that prevents the probability of healing crucial operation, there relies upon a discontented requirement for an initial diagnosis to accurately recognize sick persons having occult peritoneal metastasis. The proffered paradigm of this chapter identifies the initial phases of occult peritoneal metastasis in GC. The initial phase accompanies metabolomics for inspecting biomarkers. If the sick person undergoes the initial signs of occult peritoneal metastasis in GC, early detection is conducted. Yet, the physical …prognosis of this cancer cannot diagnose it, and so, automated detection of the images by dissecting the preoperational Computed Tomography (CT) images by conditional random fields accompanying Pro-DAE (Post-processing Denoising Autoencoders) and the labeling in the images is rid by denoising strainers; later, the ensued images and the segmented images experience the Graph Convolutional Networks (GCN), and the outcome feature graph information experience the enhanced categorizer (Greywold and Cuckoo Search Naïve Bayes categorizer) procedure that is employed for initial diagnosis of cancer. Diagnosis of cancer at the initial phase certainly lessens the matured phases of cancer. Hence, this medical information is gathered and treated for diagnosing the sickness. Show more
Keywords: Gastric Cancer, MIoT, Greywold and Cuckoo Search Naïve Bayes categorizer, Cuckoo-Grey Wolf search Correlative Naïve Bayes categorizer
DOI: 10.3233/JIFS-233510
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2023
Authors: Priya, S. Baghavathi | Rani, P. Sheela | Chokkalingam, S.P. | Prathik, A. | Mohan, M. | Anitha, G. | Thangavel, M. | Suthir, S.
Article Type: Research Article
Abstract: Traditional testimony and electronic endorsements are extremely challenging to uphold and defend, and there is a problem with challenging authentication. The identity of the student is typically not recognized when it comes to requirements for access to a student’s academic credentials that are scattered over numerous sites. This is an issue with cross-domain authentication methods. On the one hand, whenever the volume of cross-domain authentication requests increases dramatically, the response time can become intolerable because of the slow throughput associated with blockchain mechanisms. These systems still do not give enough thought to the cross-domain scenario’s anonymity problem. This research proposes …an effective cross-domain authentication mechanism called XAutn that protects anonymity and integrates seamlessly through the present Certificate Transparency (CT) schemes. XAutn protects privacy and develops a fast response correctness evaluation method that is based on the RSA (Rivest, Shamir, and Adleman) cryptographic accumulator, Zero Knowledge Proof Algorithm, and Proof of Continuous work consensus Algorithm (POCW). We also provide a privacy-aware computation authentication approach to strengthen the integrity of the authentication messages more securely and counteract the discriminatory analysis of malevolent requests. This research is primarily used to validate identities in a blockchain network, which makes it possible to guarantee their authenticity and integrity while also increasing security and privacy. The proposed technique greatly outperformed the current methods in terms of authentication time, period required for storage, space for storage, and overall processing cost. The proposed method exhibits a speed gain of authentication of roughly 9% when compared to traditional blockchain systems. The security investigation and results from experiments demonstrate how the proposed approach is more reliable and trustworthy. Show more
Keywords: Zero Knowledge Proof, RSA accumulator, educational certificates, cross-domain authentication, blockchain
DOI: 10.3233/JIFS-235140
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2023
Authors: Lakshmi Narayanan, K. | Naresh, R.
Article Type: Research Article
Abstract: Vehicular Ad-Hoc Network (VANET) Technology is advancing due to the convergence of VANET and cloud computing technologies, Vehicular Ad-Hoc Network (VANET) entities can benefit from the cloud service provider’s favourable storage and computing capabilities. Cloud computing, the processing and storage capabilities provided by various cloud service providers, would be available to all VANET enterprises. Digital Twin helps in creating a digital view of the Vehicle. It focuses on the physical behaviour of the Vehicle as well as the software it alerts when it finds issues with the performance. The representation of the Vehicle is created using intelligent sensors, which are …in OBU of VANET that help collect info from the product. The author introduces the Cloud-based three-layer key management for VANET in this study. Because VANET connections can abruptly change, critical negotiation verification must be completed quickly and with minimal bandwidth. When the Vehicles are in movement, we confront the difficulty in timely methods, network stability, and routing concerns like reliability and scalability. We must additionally address issues such as fair network access, inappropriate behaviour identification, cancellation, the authentication process, confidentiality, and vehicle trustworthiness verification. The proposed All-Wheel Control (AWC) method in this study may improve the safety and efficiency of VANETs. This technology would also benefit future intelligent transportation systems. The Rivest–Shamir–Adleman (RSA) algorithm and Chinese Remainder Theorem algorithms generate keys at the group, subgroup, and node levels. The proposed method produces better results than the previous methods. Show more
Keywords: Cloud computing, VANET, RSA, CRT, AWC
DOI: 10.3233/JIFS-233527
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2023
Authors: Zhao, Liang | Wang, Jiawei | Liu, Shipeng | Yang, Xiaoyan
Article Type: Research Article
Abstract: Tunnels water leakage detection in complex environments is difficult to detect the edge information due to the structural similarity between the region of water seepage and wet stains. In order to address the issue, this study proposes a model comprising a multilevel transformer encoder and an adaptive multitask decoder. The multilevel transformer encoder is a layered transformer to extract the multilevel characteristics of water leakage information, and the adaptive multitask decoder comprises the adaptive network branches. The adaptive network branches generate the ground truths of wet stains and water seepage through the threshold value and transmit them to the network …for training. The converged network, the U-net, fuses coarse images from the adaptive multitask decoder, and the fusion images are the final segmentation results of water leakage in tunnels. The experimental results indicate that the proposed model achieves 95.1% Dice and 90.4% MIOU, respectively. This proposed model demonstrates a superior level of precision and generalization when compared to other related models. Show more
Keywords: Water leakage, multilevel transformer encoder, adaptive multitask decoder, adaptive network branches, converged network
DOI: 10.3233/JIFS-224315
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2023
Authors: Zhou, Xiao-Guang | Chen, Ya-Nan | Ji, Jia-Xi
Article Type: Research Article
Abstract: The multi-attribute decision-making (MADM) methods can deeply mine hidden information in data and make a more reliable decision with actual needs and human cognition. For this reason, this paper proposes the bipolar N -soft PROMETHEE (preference ranking organization method for enrichment of evaluation) method. The method fully embodies the advantages of the PROMETHEE method, which can limit the unconditional compensation between attribute values and effectively reflect the priority between attribute values. Further, by introducing an attribute threshold to filter research objects, the proposed method not only dramatically reduces the amount of computation but also considers the impact of the size …of the attribute value itself on decision-making. Secondly, the paper proposes the concepts of attribute praise, attribute popularity, total praise, and total popularity for the first time, fully mining information from bipolar N -soft sets, which can effectively handle situations where attribute values have different orders of magnitude. In addition, this paper presents the decision-making process of the new method, closely integrating theoretical models with real life. Finally, this paper analyses and compares the proposed method with the existing ones, further verifying the effectiveness and flexibility of the proposed method. Show more
Keywords: PROMETHEE method, bipolar N-soft set, attribute praise, attribute popularity, multi-attribute decision-making
DOI: 10.3233/JIFS-236404
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Wang, Jinxin | Wu, Zhanwen | Yang, Longzhi | Hu, Wei | Song, Chaojun | Zhu, Zhaolong | Guo, Xiaolei | Cao, Pingxiang
Article Type: Research Article
Abstract: Distributed flexible flowshop scheduling is getting more important in the large-scale panel furniture industry. It is vital for a higher manufacturing efficiency and economic profit. The distributed scheduling problem with lot-streaming in a flexible flow shop environment is investigated in this work. Furthermore, the actual constraints of packaging collaborative and machine setup times are considered in the proposed approach. The average order waiting time for packaging and average order delay rate is used as objectives. Non-dominated sorting method is used to handle this bi-objective optimization problem. An improved encoding method was proposed to address the large-scale orders that need to …be divided into sub-lots based on genetic algorithm. The proposed approach is firstly validated by benchmark with other multi-objectives evolutionary algorithms. The results found that the proposed approach had a good convergence and diversity. Besides, the influence of the proportion of large-scale orders priority level and sub-lot size was investigated in a panel furniture manufacturing scenario. The results can be concluded that the enterprise could obtain shorter order average waiting time and delay rate when the sub-lot sizes were set as two and the order priority level was allocated in the proportion of 1:2:3:4:5. Show more
Keywords: Distributed flexible flow shop scheduling, Panel furniture manufacturing, Lot-streaming, Packaging collaborative, Setup time
DOI: 10.3233/JIFS-237378
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Ding, Huafeng | Shang, Junyan | Zhou, Guohua
Article Type: Research Article
Abstract: Emotional state recognition is an important part of emotional research. Compared to non-physiological signals, the electroencephalogram (EEG) signals can truly and objectively reflect a person’s emotional state. To explore the multi-frequency band emotional information and address the noise problem of EEG signals, this paper proposes a robust multi-frequency band joint dictionary learning with low-rank representation (RMBDLL). Based on the dictionary learning, the technologies of sparse and low-rank representation are jointly integrated to reveal the intrinsic connections and discriminative information of EEG multi-frequency band. RMBDLL consists of robust dictionary learning and intra-class/inter-class local constraint learning. In robust dictionary learning part, RMBDLL …separates complex noise in EEG signals and establishes clean sub-dictionaries on each frequency band to improve the robustness of the model. In this case, different frequency data obtains the same encoding coefficients according to the consistency of emotional state recognition. In intra-class/inter-class local constraint learning part, RMBDLL introduces a regularization term composed of intra-class and inter-class local constraints, which are constructed from the local structural information of dictionary atoms, resulting in intra-class similarity and inter-class difference of EEG multi-frequency bands. The effectiveness of RMBDLL is verified on the SEED dataset with different noises. The experimental results show that the RMBDLL algorithm can maintain the discriminative local structure in the training samples and achieve good recognition performance on noisy EEG emotion datasets. Show more
Keywords: Multi-frequency band, dictionary learning, electroencephalogram, noise data, low-rank representation
DOI: 10.3233/JIFS-233753
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Wei, Jiaxin | Yang, Jin | Liu, Xinyang
Article Type: Research Article
Abstract: Due to intensified off-balance sheet disclosure by regulatory authorities, financial reports now contain a substantial amount of information beyond the financial statements. Consequently, the length of footnotes in financial reports exceeds that of the financial statements. This poses a novel challenge for regulators and users of financial reports in efficiently managing this information. Financial reports, with their clear structure, encompass abundant structured information applicable to information extraction, automatic summarization, and information retrieval. Extracting headings and paragraph content from financial reports enables the acquisition of the annual report text’s framework. This paper focuses on extracting the structural framework of annual report …texts and introduces an OpenCV-based method for text framework extraction using computer vision. The proposed method employs morphological image dilation to distinguish headings from the main body of the text. Moreover, this paper combines the proposed method with a traditional, rule-based extraction method that exploits the characteristic features of numbers and symbols at the beginning of headings. This combination results in an optimized framework extraction method, producing a more concise text framework. Show more
Keywords: OpenCV, dilation operation, text structure extraction
DOI: 10.3233/JIFS-234170
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2024
Authors: Yu, Peng | Song, Huxiong | Liu, Hui
Article Type: Research Article
Abstract: How to expand the variable domain and monotonicity of aggregation functions to generate new aggregation functions is an important research content in aggregation functions. In this work, the concept of interval-valued pre-(quasi-)grouping functions is given by relaxing the interval monotonicity of interval-valued (quasi-)grouping functions to interval directional monotonicity. Then, some basic properties of interval-valued pre-(quasi-)grouping functions and the relationship between interval-valued pre-(quasi-)grouping functions and pre-(quasi-)grouping functions are presented. Accordingly, several construction methods of interval-valued pre-(quasi-)grouping functions are proposed. Finally, the concept of ( I G , IN ) -interval-valued directional monotonic fuzzy implications and QL …-interval-valued directional monotonic operations are introduced on the basis of interval-valued pre-(quasi-)grouping functions I G , interval-valued overlap functions IO and interval-valued fuzzy negations IN . In addition, related studies were conducted on the basic properties of ( I G , IN ) -interval-valued directional monotonic fuzzy implications and QL -interval-valued directional monotonic operations. Show more
Keywords: Interval mathematics, Aggregation functions, Pre-(quasi-)grouping functions, Interval-valued directional monotonic fuzzy implications
DOI: 10.3233/JIFS-233318
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-28, 2024
Authors: Li, Wuke | Wang, Xingzhu | Tang, Minli
Article Type: Research Article
Abstract: Aiming at the problem of inaccurate transformer fault diagnosis in dissolved gas analysis, this paper proposes a novel diagnostic method that integrates an enhanced honey badger algorithm (EHBA) with an ensemble learning-based deep hybrid kernel extreme learning machine (DHKELM). First, kernel principal component analysis (KPCA) was deployed for feature fusion of the gas data, thus extracting more effective features. The DHKELM, combining polynomial and RBF kernel functions, was used as a base learning to build a powerful classifier with Adaboost framework. The EHBA introduces information sharing and firefly perturbation strategies based on HBA. This EHBA was harnessed to optimize the …DHKELM’s critical parameters, establishing the EHBA-DHKELM-Adaboost transformer fault diagnosis model. Finally, the features garnered by KPCA were fed into the model, simulating and validating various fault diagnosis models. The findings reveal that EHBA-DHKELM-Adaboost achieves 98.75% diagnostic accuracy in transformer faults, surpassing other models. Show more
Keywords: Transformer fault diagnosis, dissolved gas analysis, deep hybrid kernel extreme learning machine, adaboost, enhanced honey badger algorithm
DOI: 10.3233/JIFS-235563
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Qin, Xiwen | Zhang, Siqi | Dong, Xiaogang | Shi, Hongyu | Yuan, Liping
Article Type: Research Article
Abstract: The research of biomedical data is crucial for disease diagnosis, health management, and medicine development. However, biomedical data are usually characterized by high dimensionality and class imbalance, which increase computational cost and affect the classification performance of minority class, making accurate classification difficult. In this paper, we propose a biomedical data classification method based on feature selection and data resampling. First, use the minimal-redundancy maximal-relevance (mRMR) method to select biomedical data features, reduce the feature dimension, reduce the computational cost, and improve the generalization ability; then, a new SMOTE oversampling method (Spectral-SMOTE) is proposed, which solves the noise sensitivity problem …of SMOTE by an improved spectral clustering method; finally, the marine predators algorithm is improved using piecewise linear chaotic maps and random opposition-based learning strategy to improve the algorithm’s optimization seeking ability and convergence speed, and the key parameters of the spectral-SMOTE are optimized using the improved marine predators algorithm, which effectively improves the performance of the over-sampling approach. In this paper, five real biomedical datasets are selected to test and evaluate the proposed method using four classifiers, and three evaluation metrics are used to compare with seven data resampling methods. The experimental results show that the method effectively improves the classification performance of biomedical data. Statistical test results also show that the proposed PRMPA-Spectral-SMOTE method outperforms other data resampling methods. Show more
Keywords: Biomedical data, mRMR, spectral clustering, SMOTE, marine predators algorithm
DOI: 10.3233/JIFS-237538
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2024
Authors: Xu, Dongsheng | Chen, Chuanming | Jin, Qi | Zheng, Ming | Ni, Tianjiao | Yu, Qingying
Article Type: Research Article
Abstract: Abnormal-trajectory detection can be used to detect fraudulent behavior of taxi drivers transporting passengers. Aiming at the problem that existing methods do not fully consider abnormal fragments of trajectories, this paper proposes an abnormal-trajectory detection method based on sub-trajectory classification and outlier-factor acquisition, which effectively detects abnormal sub-trajectories and further detects abnormal trajectories. First, each trajectory is reconstructed using the turning angles and is divided into multiple sub-trajectories according to the turning angle threshold and trajectory point original acceleration. The sub-trajectories are then classified according to the extracted directional features. Finally, the multivariate distances between angular adjacent segments are calculated …to obtain the outlier factor, and abnormal sub-trajectories are detected. The sum of the lengths of the abnormal sub-trajectories is used to calculate the outlier score and identify abnormal trajectories. Based on experimental results using real trajectory datasets, it has been found that the proposed method performs better at detecting abnormal trajectories than other similar methods. Show more
Keywords: Abnormal-trajectory detection, trajectory reconstruction, directional feature, outlier factor, sub-trajectory classification
DOI: 10.3233/JIFS-236508
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2024
Authors: Arunagirinathan, Sumithara | Subramanian, Chitra
Article Type: Research Article
Abstract: This paper presents a hybrid approach for optimizing the maximum power point tracking of photovoltaic (PV) systems in electric vehicles. The hybrid technique involves the simultaneous utilization of the Gannet Optimization Algorithm (GOA) and Quantum Neural Network (QNN), collectively referred to as the GOA-QNN technique. The primary aim is to enhance the efficiency and maximize the power output of PV systems. The proposed hybrid methodology boosts the performance of the photovoltaic system by managing the power interface. A high step-up DC/DC converter is employed to adjust the photovoltaic source power and load, ensuring optimal power transfer under various operating conditions. …The proposed method optimally determines the duty cycle of the converter. Subsequently, the model is implemented in the MATLAB/Simulink platform, and its execution is evaluated using established procedures. The results clearly demonstrate the superiority of the proposed method over existing approaches in terms of power quality, settling time, and controller stability. The proposed technique achieves an impressive efficiency level of 95%, exceeding the efficiency of other existing techniques. Show more
Keywords: MPPT, Photovoltaic, high-gain converter, Gannet Optimization Algorithm, Quantum Neural Network, EV
DOI: 10.3233/JIFS-237734
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-21, 2024
Authors: Wu, Guizhou | Wu, Junfeng | Zhang, Xinyu
Article Type: Research Article
Abstract: Optimization of the routing represents an important challenge when considering the rapid development of Wireless Sensor Networks (WSN), which involve efficient energy methods. Applying the effectiveness of a Deep Neural Network (DNN) and a Gaussian Mixture Model (GMM), the present article proposes an innovative method for attaining Energy-Efficient Routing (EER) in WSN. When it comes to dealing with dynamic network issues, conventional routing protocols generally conflict, resulting in unsustainable Energy consumption (EC). By applying algorithms based on data mining to adapt routing selections in an effective procedure, the GMM + DNN methodology that has been developed is able to successfully address this …problem. The GMM is a fundamental Feature Extraction (FE) method for accurately representing the features of statistical analysis associated with network parameters like signal frequency, the amount of traffic, and channel states. By learning from previous data collection, the DNN, which relies on these FE, provides improved routing selections, resulting in more efficient use of energy. Since routing paths are constantly optimized to ensure dynamic adaptation, where less energy is used, networks last longer and perform more efficiently. Network simulations highlight the GMM + DNN method’s effectiveness and depict how it outperforms conventional routing methods while preserving network connectivity and data throughput. The GMM + DNN’s adaptability to multiple network topologies and traffic patterns and its durability make it an efficient EER technique in the diverse WSN context. The GMM + DNN achieves an EC of 0.561 J, outperforming the existing state-of-the-art techniques. Show more
Keywords: Sensor Node, WSN, gaussian mixture, CNN, energy consumption, routing
DOI: 10.3233/JIFS-238711
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Lei, Fan | Cai, Qiang | Wei, Guiwu
Article Type: Research Article
Abstract: The development and application of blockchain provides technical support for supply chain technological innovation and industrial innovation. Integrating the decentralized, independent, open, traceable and tamper-proof features of the blockchain into the supply chain can effectively improve the problems of unstable supply chain structure, low security, low privacy, low collaboration ability and high operating costs. Establishing probabilistic double hierarchy linguistic multi-attribute decision-making (PDHL-MADM) model to evaluate the performance of blockchain is an effective measure to optimize blockchain performance and improve supply chain stability. Therefore, this thesis first takes the processing efficiency, cost, security performance, update and improvement ability as evaluation attributes. …Then the IDOCRIW weight method is used to calculate the objective weight of attributes. Based on Aczel-Alsina t-norm (AATN) and Aczel-Alsina t-conorm (AATCN), four operations of probabilistic double hierarchy linguistic term set (PDHLTS) are defined, and PDHLAAWA operator, PDHLAAOWA operator, PDHLAAHA operator, PDHLAAHM operator, PDHLAAWHM operator and their dual operators are proposed, and a series of corresponding PDHL operator models are constructed. In addition, the sensitivity and stability of this series of operator models are analyzed in depth. Finally, the new model proposed in this thesis is compared with the existing model to verify its scientific and superiority. Show more
Keywords: Probabilistic double hierarchy linguistic term set (PDHLTS), Multi-attribute decision-making (MADM), PDHLAAWA operator and PDHLAAWHM operator, evaluate the performance of blockchain
DOI: 10.3233/JIFS-235215
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-36, 2024
Authors: Sugin Lal, G. | Porkodi, R.
Article Type: Research Article
Abstract: The term “educational data mining” refers to a field of study where information from academic environments is predicted using data mining, machine learning, and statistics. Education is the act of giving or receiving knowledge to or from someone who is formally studying and developing a natural talent. Over time, scholars have used data mining techniques to uncover hidden information in educational statistics and other external elements. This study suggests a unique method for analysing academic student performance that is based on data mining and machine learning. Here, the input is gathered as a dataset of student academic performance and is …processed for normalisation and noise reduction. Then, using the Boltzmann deep learning model coupled with linear kernel principal component analysis, this data’s characteristics were retrieved and chosen. Based on weights, information gain, and the Gini index, the characteristics are assessed and optimised. Following the selection of the pertinent data, conditional random field-based probabilistic clustering model is performed using RNN-based training, and the academic performance of the students is then examined using voting classifiers and sparse features. Experimental results are carried out for students academic performance dataset based on subjects in terms of training accuracy, validation accuracy, mean average precision, mean square error and correlation evaluation. Proposed technique attained accuracy of 96%, precision of 95%, Correlation Evaluation of 92% . Show more
Keywords: Student performance analysis, data mining, machine learning, clustering model, academic performance
DOI: 10.3233/JIFS-235350
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Hoang, Dinh Linh | Tran Thi, Luong
Article Type: Research Article
Abstract: The XOR operator is a simple yet crucial computation in computer science, especially in cryptography. In symmetric cryptographic schemes, particularly in block ciphers, the AddRoundKey transformation is commonly used to XOR an internal state with a round key. One method to enhance the security of block ciphers is to diversify this transformation. In this paper, we propose some straightforward yet highly effective techniques for generating t-bit random XOR tables. One approach is based on the Hadamard matrix, while another draws inspiration from the popular intellectual game Sudoku. Additionally, we introduce algorithms to animate the XOR transformation for generalized block ciphers. …Specifically, we apply our findings to the AES encryption standard to present the key-dependent AES algorithm. Furthermore, we conduct a security analysis and assess the randomness of the proposed key-dependent AES algorithm using NIST SP 800-22, Shannon entropy based on the ENT tool, and min-entropy based on NIST SP 800-90B. Thanks to the key-dependent random XOR tables, the key-dependent AES algorithm have become much more secure than AES, and they also achieve better results in some statistical standards than AES. Show more
Keywords: Random XOR table, AES, key-dependent block cipher, randomness, Shannon entropy
DOI: 10.3233/JIFS-236998
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Chen, Yong | Xie, Xiao-Zhu | Weng, Wei
Article Type: Research Article
Abstract: Graph-structured data is ubiquitous in real-world applications, such as social networks, citation networks, and communication networks. Graph neural network (GNN) is the key to process them. In recent years, graph attention networks (GATs) have been proposed for node classification and achieved encouraging performance. It focuses on the content associated on nodes to evaluate the attention weights, and the rich structure information in the graph is almost ignored. Therefore, we propose a multi-head attention mechanism to fully employ node content and graph structure information. The core idea is to introduce the interactions in the topological structure into the existing GATs. This …method can more accurately estimate the attention weights among nodes, thereby improving the convergence of GATs. Second, the mechanism is lightweight and efficient, requires no training to learn, can accurately analyze higher-order structural information, and can be strongly interpreted through heatmaps. We name the proposed model content- and structure-based graph attention network (CSGAT). Furthermore, our proposed model achieves state-of-the-art performance on a number of datasets in node classification. The code and data are available at https://github.com/CroakerShark/CSGAT. Show more
Keywords: Graph neural network, graph attention network, node classification, graph-structured data
DOI: 10.3233/JIFS-223304
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Gao, Shengxiang | He, Zhilei | Yu, Zhengtao | Zhu, Enchang | Wu, Shaoyang
Article Type: Research Article
Abstract: Cross-lingual event retrieval is an information retrieval task aimed at cross-lingual event retrieval among multiple languages to find text or documents related to a specific event. Specific to Chinese-Vietnamese cross-language event retrieval, it involves using Chinese as a query to retrieve Vietnamese documents related to the query event. The critical issue is how to efficiently align query and document representations with limited resources. Existing cross-language pre-training models are trained on large-scale multilingual corpora, but their training goals do not include explicit language alignment tasks. Due to the uneven distribution of training corpora between different languages, these models have The problem …of language bias. Therefore, this linguistic bias is also inherited in cross-lingual retrieval based on these models. To solve this problem, this paper proposes a Chinese-Vietnamese cross-lingual event retrieval method based on knowledge distillation. This approach enables the model to learn good query-document matching features from monolingual retrieval by transferring knowledge from high-resource to low-resource languages. By enhancing the alignment between queries and documents in different languages in a shared semantic space, the method improves the performance of Chinese-Vietnamese cross-lingual event retrieval. Show more
Keywords: Cross-lingual, event retrieval, knowledge distillation, language bias
DOI: 10.3233/JIFS-235749
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Brintha, K. | Joseph Jawhar, S.
Article Type: Research Article
Abstract: Automated railway security systems prevent train collisions with trackside obstructions that cause accidents in high-speed railways. Rail safety is being improved and accident rates reduced through continuous research. A rapid advancement in deep learning has promoted new possibilities for research in this field. In this work, a novel deep learning-based FOD-YOLO net is proposed for detecting the fasteners faults and objects in the railway tracks. There are two basic components in the deep learning-based YOLOv8: the backbone and the head. YOLOv8 utilizes an improved version of the CSPDarknet53 network for detecting objects on the railway track. The head of YOLOv8 …consists of EfficientNet with various convolutional layers with squeeze and excitation blocks for detecting any defect in the track fasteners. These layers are liable for detecting the objectness scores, bounding boxes and class probabilities structured with fully connected layers for the objects and faults in tracks. Based on the results from the Yolo network, the alert message is sent to the loco pilot to avoid accidents using fuzzy logic. The experimental fallouts of proposed FOD-YOLO net achieve higher accuracy and yields better evaluation results with 98.14% accuracy, 98.84% precision and 95.94% recall. From the experimental results, the FOD-YOLO net improves the overall accuracy range by 5.44%, 4.72%, 0.73%, and 13.18% better than Fast RCNN, YOLOv5s-VF, YOLO-GD, and 2D-SSA + Deep network respectively. Show more
Keywords: Railway track, object detection, fault detection, deep learning, Yolo network, fuzzy logic
DOI: 10.3233/JIFS-236445
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Dagal, Idriss | Akín, Burak | Dari, Yaya Dagal
Article Type: Research Article
Abstract: In this paper, an improved constant current step based on the grey wolf optimization (CCS-GWO) algorithm for photovoltaic systems is investigated. The development of grey wolf optimization has been widely spread over photovoltaic applications. This method is one of the metaheuristic swarm optimization algorithm groups inspired by an optimum means of chasing prey by grey wolves. The proposed technique applies constant current steps to the pack of wolves (alpha, beta, and omega) by monitoring the average of the internal current step and external current step in order to target the leader alpha wolf position. Moreover, the proposed technique solves the …convergence process issues, low convergence speed, and premature local optima problems of the traditional GWO algorithm. This CCS-GWO algorithm accurately tracks the maximum power point from the photovoltaic systems for load charging in different partial shading conditions (PSCs). A number of standard benchmark functions are presented with low average cost functions and their corresponding standard deviation values. The simulation results revealed that the proposed CCS-GWO approach outperforms the existing GWO and GA algorithms in terms of efficiency (98.55%) and tracking time (0.3 s). Show more
Keywords: Grey wolf optimization, metaheuristics, photovoltaics, maximum power point.
DOI: 10.3233/JIFS-224535
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2024
Authors: Teng, Wei | Li, Yan | Sun, Hongxing | Chen, Haojie
Article Type: Research Article
Abstract: In the present study, three hybrid models include support vector regression-salp swarm optimization (SVR-SSO), support vector regression-biogeography-based (SVR-BBO), and support vector regression-phasor particle swarm optimization (SVR- PPSO) was applied to forecast pond ash’s CBR value modified with lime sludge (LS) and lime (LI). In the developed models, five variables were selected as inputs. It can result that the developed integrated models have R2 bigger than 0.9952. It means the agreement between observed and forecasted values by hybrid models is mainly similar to represent the highest accuracy. In both the training and testing stages, PSO-SVR results from better performance than the …BBO-SVR model, with R2, RMSE, MAE, and PI equal to 0.9983, 0.6439, 0.3181, and 0.0081 for training data, and 0.9975, 0.7319, 0.4135, and 0.0141 for testing data, respectively. So, by considering the OBJ index, the OBJ value for PSO-SVR is 12.966, lower than BBO-SVR at 16.9957. Therefore, the PSO-SVR model outperforms another model to estimate the CBR of pond ash modified with LI and LS, consequently being recognized as the proposed model that makes it to be used for practical applications. Show more
Keywords: California bearing ratio, phasor particle swarm optimization, biogeography-based optimization, salp swarm optimization, support vector regression
DOI: 10.3233/JIFS-220745
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Li, Biao | Tang, Shoufeng | Li, Wenyi
Article Type: Research Article
Abstract: Pose estimation plays a crucial role in human-centered vision applications and has advanced significantly in recent years. However, prevailing approaches use extremely complex structural designs for obtaining high scores on the benchmark dataset, hampering edge device applications. In this study, an efficient and lightweight human pose estimation problem is investigated. Enhancements are made to the context enhancement module of the U-shaped structure to improve the multi-scale local modeling capability. With a transformer structure, a lightweight transformer block was designed to enhance the local feature extraction and global modeling ability. Finally, a lightweight pose estimation network— U-shaped Hybrid Vision Transformer, UViT— …was developed. The minimal network UViT-T achieved a 3.9% improvement in AP scores on the COCO validation set with fewer model parameters and computational complexity compared with the best-performing V2 version of the MobileNet series. Specifically, with an input size of 384×288, UViT-T achieves an impressive AP score of 70.2 on the COCO test-dev set, with only 1.52 M parameters and 2.32 GFLOPs. The inference speed is approximately twice that of general-purpose networks. This study provides an efficient and lightweight design idea and method for the human pose estimation task and provides theoretical support for its deployment on edge devices. Show more
Keywords: Pose estimation, multi-branch structure, lightweight network, context enhancement, attention mechanism
DOI: 10.3233/JIFS-231440
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Bala, B. Kiran | Sekhar, J.C. | Al Ansari, Mohammed Saleh | Rao, Vuda Sreenivasa
Article Type: Research Article
Abstract: A plant disease that attacks the leaf causes significant yield and market value losses. A professional plant pathologist should be able to visually identify the disease by looking at the affected plant leaves, but this is unlikely to result in a more accurate diagnosis. Disease symptoms should be immediately recognisable in order to stop the spread of the illness. To find plant diseases, steps should be taken using computer assisted technologies. Numerous methods for identifying plant diseases using machine learning (ML) and deep learning (DL) have been developed and tested in numerous studies. Machine learning has the disadvantages of having …a small dataset, taking longer, and requiring more time for results interpretation. Deep learning is suggested as a solution to this. This study compares the effectiveness of both ML&DL for plant leaf disease identification with more recent investigations. The common deep learning technique involves utilising the Krill Herd Optimisation Algorithm (KHO) to segment images and the Speeded up Robust Features (SURF) to extract the images. The Artificial Bee Colony (ABC) then chooses the features. Then, a Deep Belief Network (DBN) can be used to classify the chosen image. Multiple diseases can be identified on the same leaf using this method. This study demonstrates that deep learning outperforms machine learning in terms of results. The outcome demonstrates that the deep learning method is superior for the diagnosis of plant disease when there is sufficient data available. Using this technique, the validity and consistency were also examined. Show more
Keywords: Krill herd algorithm, artificial bee colony, deep learning, SURF, machine learning, DBN
DOI: 10.3233/JIFS-234864
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Myithili, K.K. | Beulah, R.D.
Article Type: Research Article
Abstract: The concept of intuitionistic fuzzy soft set is applied to generalize the theory of transversals in hypergraphs. The notion of transversals of an Intuitionistic Fuzzy Soft Hypergraphs (IFSHGs) and locally minimal transversals of IFSHGs are pioneered with some of its specifications. It is also proved that H ˜ is (μ, ν )-tempered IFSHGs if H ˜ is support simple, elementary and simply ordered. Then, an algorithm is developed and proposed to find the minimal transversals of IFSHGs. An application is also identified in selecting appropriate location for the …installation of wind turbines. Finally the proposed algorithm works in finding the suitable place for wind turbine installation. As a result the proposed algorithm is helpful in making decisions. Show more
Keywords: Transversals, locally minimal transversals, (μ, ν)-tempered IFSHGs
DOI: 10.3233/JIFS-222714
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-8, 2024
Authors: Yu, Jie | Zhang, Jubin
Article Type: Research Article
Abstract: The rapid growth of the Internet of Things (IoT) brings sweeping changes in various industries. Healthcare industries have become a prime example where the Internet of Healthcare Things (IoHT) is making significant progress, particularly in how we approach real-time patient care. Traditional systems for monitoring older people and people with special needs are frequently expensive, require a large workforce, and fall short of providing real-time data. This paper introduces the “3-Tier Health Care Architecture,” an integrated approach to mitigating these issues. This architecture capitalizes on IoHT technologies and is constructed around three principal tiers: Sensor, Fog, and Cloud. The Sensor …Tier employs Health Metrics Acquisition Units (HMAUs) fitted with an nRF5340 Development Kit, capturing an extensive range of health-related metrics via wearable sensors. These metrics are then relayed to the Local Processing Units (LPUs) in Fog Tier, which operates on Raspberry Pi Zero 2 W microprocessors for the initial data processing before forwarding to the cloud. The Cloud Tier uses a hybrid CNN-LSTM Machine Learning (ML) model to perform Real-Time Healthcare Monitoring (RTHM) status assessments and includes an Early Warning System for immediate alert issuance. The proposed architecture is resilient, scalable, and efficient, serving as a fortified and all-encompassing solution for RTHM. This enables quick medical interventions, thus elevating healthcare quality and potentially life-saving. Show more
Keywords: IoT, machine learning, internet of healthcare things, healthcare monitoring, CNN, LSTM
DOI: 10.3233/JIFS-237483
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Chen, Jie | Yin, Chuancun
Article Type: Research Article
Abstract: Probabilistic linguistic term sets (PLTSs) provide a flexible tool to express linguistic preferences, and several multi-criteria decision models based on PLTSs have been recently developed. In this framework, distortion risk measures are extensively used in finance and insurance applications, but are rarely applied in fuzzy systems. In this paper, distortion risk measures are applied to fuzzy tail decisions. In particular, three tail risk measurement methods are put forward, referred to as probabilistic linguistic VaR (PLVaR), expected probability linguistic VaR (EPLVaR), and Wang tail risk measure and extensively study their properties. Our novel methods help to clarify the connections between distortion …risk measure and fuzzy tail decision-making. In particular, the Wang tail risk measure is characterized by consistency and stability of decision results. The criteria and expert weights are unknown or only partially known during the decision making process, and the maximising PLTSs deviations are showed how to determine them. The theoretical results are showcased on an optimal stock fund selection problem, where the three tail risk measures are compared and analyzed. Show more
Keywords: Probabilistic linguistic term sets, probabilistic linguistic VaR, expected probability linguistic VaR, Wang tail risk measure, maximizing deviation method
DOI: 10.3233/JIFS-234218
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-21, 2024
Authors: Cao, Heling | Han, Dong | Chu, Yonghe | Tian, Fangchao | Wang, Yun | Liu, Yu | Jia, Junliang | Ge, Haoyang
Article Type: Research Article
Abstract: Automatic program repair (APR) is crucial to improve software quality. Recently, neural machine translation (NMT) based modeling for bug fixes has demonstrated great potential. However, these approaches still have two major challenges. One is that their search space is limited due to the out-of-vocabulary (OOV) problem. The other is that the NMT-based APR models tend to ignore past translation information, which often leads to over-translation and under-translation. To address the above challenges, we propose MNRepair, a new NMT-based APR approach that combines multiple mechanisms to fix bugs in source code. Specifically, we devise an encoder-decoder NMT framework with the attention …mechanism. Our framework combines the copy mechanism to overcome the OOV problem that occurs with source code. To deal with the over-translation and under-translation, we utilize a coverage mechanism to record past translation information. MNRepair is able to capture a wide range of repair operators and fix 26 bugs in Defects4J. Our evaluation shows the effectiveness of multiple mechanisms in the repair process. Show more
Keywords: Automatic program repair, neural machine translation, multiple mechanisms
DOI: 10.3233/JIFS-234037
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Kalaimathi, M. | Balamurugan, B.J. | Nagar, Atulya K.
Article Type: Research Article
Abstract: Let G = (V , E ) be a simple graph. A 1-1 function f : V → ℕ , where ℕ is the set of natural numbers, is said to induce a k -Zumkeller graph G if the induced edge function f * : E → ℕ defined by f * (xy ) = f (x ) f (y ) satisfies the following conditions:(i) f * (xy ) is a Zumkeller number for every xy ∈ E . (ii) …The total number of distinct Zumkeller numbers on the edges of G is k . A Mycielski transformation of a graph is a larger graph having more vertices and edges. In this article, the Mycielski transformation of a graphs such as path, cycle and star graphs have been computed and their k -Zumkeller graphs have been investigated by reducing the number of distinct Zumkeller numbers. AMS Subject Classification: 05C78 f * (xy ) is a Zumkeller number for every xy ∈ E . The total number of distinct Zumkeller numbers on the edges of G is k . Show more
Keywords: Zumkeller numbers, k-Zumkeller graph, Mycielski transformation
DOI: 10.3233/JIFS-231095
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Mohan, M. | Tamizhazhagan, V. | Balaji, S.
Article Type: Research Article
Abstract: Cloud computing is a new technology that provides services to customers anywhere, anytime, under varying conditions and managed by a third-party cloud provider. Even though cloud computing has progressed a lot, some attacks still happen. The recent anomalous and signature attacks use clever strategies such as low-rate attacks and attacking as an authenticated user. In this paper, a novel Attack Detection and Prevention (ADAPT) method is proposed to overcome this issue. The proposed system consists of three stages. An Intrusion Detection System is initially used to check whether there is an attack or not by comparing the IP address in …the Blacklist IP Database. If an attack occurs, the IP address will be added to the Blacklist IP database and blocked. The second stage uses Bi-directional LSTM and Bi-directional GRU to check the anomalous and signature attack. In the third stage, classified output is sent to reinforcement learning, if any attack occurs the IP address is added to the blacklist IP database otherwise the packets are forwarded to the user. The proposed ADAPT technique achieves a higher accuracy range than existing techniques. Show more
Keywords: Cloud computing, Bi-directional LSTM, Bi-directional GRU, IP address, and reinforcement learning
DOI: 10.3233/JIFS-236371
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Article Type: Research Article
Abstract: A consistency fuzzy set is composed of mean values and consistency degrees of fuzzy sequences in the transformation process of a fuzzy multiset (FM), but lacks confidence intervals in relation to a confidence level of fuzzy sequences, which shows its deficiency. To solve this deficiency, this paper aims to propose an improved transformation approach from FM to a confidence consistency fuzzy cubic set (CCFCS) and to develop an exponential similarity measure of CCFCSs for modeling piano performance evaluation (PPE) in a FM scenario. Consequently, this study includes the following context. First, a transformation approach from FM to CCFCS is proposed …in terms of mean values, consistency degrees (the complement of standard deviation), and confidence intervals of fuzzy sequences subject to a confidence level and normal distribution. Second, the exponential similarity measure of CCFCSs is proposed in the scenario of FMs. Third, a PPE model is developed based on the proposed similarity measure of CCFCSs in the FM scenario. Finally, the developed model is applied to a piano performance competition organized by Shaoxing University in China as an actual evaluation example, and then the rationality and validity of the proposed model in the scenario of FMs are verified through sensitivity and comparison analysis. Show more
Keywords: Fuzzy multiset, confidence consistency fuzzy cubic set, exponential similarity measure, confidence level, piano performance evaluation
DOI: 10.3233/JIFS-235084
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Zakaria, Aliya Syaffa | Shafi, Muhammad Ammar | Mohd Zim, Mohd Arif | Musa, Aisya Natasya
Article Type: Research Article
Abstract: Lung cancer constituted 12.2% of newly diagnosed cancer cases globally in 2020. The high fatality rate of the condition is attributed to delayed diagnosis and inadequate symptom recognition. In Malaysia, the incidence of lung cancer is estimated to be 1 in 60 males and 1 in 138 females, with a median age of 70 years or above. Most lung cancer cases were detected during advanced stages, specifically stages III and IV, with a prevalence exceeding 90% for both genders. In Malaysia, most patients are diagnosed in stages III and IV, which are associated with a lower likelihood of long-term survival. …Many cases are identified at a late stage, characterized by significant tumor expansion or the spread of cancer cells to areas that cannot be treated surgically. Malaysians are unaware of cancer symptoms; hence the situation is common. To improve survival and reduce mortality, Malaysians must recognize the symptoms of lung cancer. Fuzzy linear regression and multiple linear regression models have been compared to predict high-risk lung cancer symptoms in Malaysia. The fuzzy linear regression model analyses secondary data, eliminates irrelevant information and enhances precision in the results. Lung cancer patients at Al-Sultan Abdullah Hospital (UiTM Hospital) in Selangor provided data for this study. Data from 124 lung cancer patients were analyzed using Microsoft Excel, SPSS, and MATLAB. To improve data accuracy, the study used cross-validation measurement error (MSE and RMSE). According to data analysis, hemoptysis and chest pain are high-risk symptoms with MSE and RMSE values of 1.549 and 1.245, respectively. Show more
Keywords: Lung cancer, symptoms of lung cancer, fuzzy linear regression, prediction data, statistical error
DOI: 10.3233/JIFS-233714
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Tian, Huaqiang | Yu, Long | Tian, Shengwei | Long, Jun | Zhou, Tiejun | Wang, Bo | Li, Yuhuan
Article Type: Research Article
Abstract: A spect-B ased S entiment A nalysis (ABSA ) has been the focus of increasing study in recent years. Previous research has demonstrated that incorporating syntactic information, such as dependency trees, can enhance ABSA performance. Despite the widespread use of metaphors in daily life to express emotions more vividly, few studies have integrated this literary device into ABSA. In this paper, we propose a novel ABSA model that utilizes M etaphor I dentification P rocedure (MIP ) to encode both the sentence and aspect word as a single unit, thereby overcoming these limitations. Our experimental results demonstrate that our …model achieves competitive performance in ABSA. Show more
Keywords: Aspect-based sentiment analysis, metaphorical sentiment analysis, transformer, deep learning
DOI: 10.3233/JIFS-233077
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Yuan, Weijin | Deng, Yunfeng
Article Type: Research Article
Abstract: This paper improves the visual change-based personnel evacuation model by considering the evacuees’ gravity. Specifically, first, the new model incorporates the gravity formula in the model’s mechanic part to consider the influence of gravity. Second, the new model involves rules for determining the visual range of personnel moving in the stairwell. Third, the proposed model investigates the influence of the angle and width of the stairwell, the number of people, and other factors during personnel evacuation under the influence of gravity. The model is developed in Python and is compared with actual results, revealing that the proposed model is more …realistic considering the evacuation time compared to current models. Indeed, under a fixed number of people, when the stairwell angle is less than 34°, the evacuation time decreases as the angle increases, and when the stairwell angle exceeds 34°, the evacuation time is almost unchanged. Additionally, under a fixed number of evacuees, the evacuation time decreases as the width of the stairwell increases, and due to stairwell width space redundancy, the evacuation time tends to stabilize. The results of the new model research provide reference for the design of building safety evacuation, thereby improving the safety of buildings. Show more
Keywords: Stair angle, stair width, view, pedestrian evacuation
DOI: 10.3233/JIFS-236008
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Li, Yaqin | Zhang, Ziyi | Yuan, Cao | Hu, Jing
Article Type: Research Article
Abstract: Traffic sign detection technology plays an important role in driver assistance systems and automated driving systems. This paper proposes DeployEase-YOLO, a real-time high-precision detection scheme based on an adaptive scaling channel pruning strategy, to facilitate the deployment of detectors on edge devices.More specifically, based on the characteristics of small traffic signs and complex background, this paper first of all adds a small target detection layer to the basic architecture of YOLOv5 in order to improve the detection accuracy of small traffic signs.Then, when capturing specific scenes with large fields of view, higher resolution and richer pixel information are preserved instead …of directly scaling the image size.Finally, the network structure is pruned and compressed using an adaptive scaling channel pruning strategy, and the pruned network is subjected to a secondary sparse pruning operation. The number of parameters and computations is greatly reduced without increasing the depth of the network structure or the influence of the input image size, thus compressing the model to the minimum within the compressible range.Experimental results show that the model trained by Experimental results show that the model trained by DeployEase-YOLO achieves higher accuracy and a smaller size on TT100k, a challenging traffic sign detection dataset.Compared to existing methods, DeployEase-YOLO achieves an average accuracy of 93.3%, representing a 1.3% improvement over the state-of-the-art YOLOv7 network, while reducing the number of parameters and computations to 41.69% and 59.98% of the original, respectively, with a compressed volume of 53.22% of the previous one.This proves that the DeployEase-YOLO has a great deal of potential for use in the area of small traffic sign detection.The algorithm outperforms existing methods in terms of accuracy and speed, and has the advantage of a compressed network structure that facilitates deployment of the model on resource-limited devices. Show more
Keywords: Small target, deep learning, model compression, traffic sign detection
DOI: 10.3233/JIFS-235135
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Özlü, Şerif | Al-Quran, Ashraf | Riaz, Muhammad
Article Type: Research Article
Abstract: This paper aims to present Bipolar valued probabilistic hesitant fuzzy sets (BVPHFSs) by combining bipolar fuzzy sets and probabilistic hesitant fuzzy sets (PHFSs). PHFSs are a strong version of hesitant fuzzy sets (HFSs) in terms of evaluated as probabilistic of each element. Probabilistic hesitant fuzzy sets (PHFSs) are a set structure that argues that each alternative should be evaluated probabilistically. In this framework, the proposed cluster allows probabilistic evaluation of decision- makers’ opinions as negative. Thus, this case proposes flexibility about selection of an element and aids to overcome with noise channels. Furthermore, some new aggregation operators are discussed called …bipolar valued probabilistic hesitant fuzzy weighted average operator (BVPHFWA), Generalized bipolar valued probabilistic hesitant fuzzy weighted average operator (GBVPHFWA), bipolar valued probabilistic hesitant fuzzy weighted geometric operator (BVPHFWG), Generalized bipolar valued probabilistic hesitant fuzzy weighted geometric operator (GBVPHFWG), bipolar valued probabilistic hesitant fuzzy hybrid weighted arithmetic and geometric operator (BVPHFHWAG) and Generalized bipolar valued probabilistic hesitant fuzzy hybrid weighted arithmetic and geometric (GBVPHFHWAG) and some basic properties are presented. A score function is defined ranking alternatives. Moreover, two different algorithms are put forward with helping to TOPSIS method and by using aggregation operators over BVPHFSs. The validity of proposed operators are analyzed with an example and results are compared in their own. Show more
Keywords: Probabilistic hesitant fuzzy sets, bipolar valued probabilistic hesitant fuzzy sets, generalized hybrid operators, decision-making
DOI: 10.3233/JIFS-238331
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2024
Authors: Wang, Chishe | Li, Jun | Wang, Jie | Zhao, Weikang
Article Type: Research Article
Abstract: Rapid urbanization has made road construction and maintenance imperative, but detecting road diseases has been time-consuming with limited accuracy. To overcome these challenges, we propose an efficient YOLOv7 road disease detection model. Our approach involves integrating MobilieNetV3 as the backbone feature extraction network to reduce the network’s parameters and computational requirements. Additionally, we introduce the BRA attention module into the spatial pyramid pooling module to eliminate redundant information and enhance the network’s feature representation capability. Moreover, we utilize the F-ReLU activation function in the backbone network, expanding the convolutional layers’ receptive field range. To optimize the model’s boundary loss, we …employ the Wise-IoU loss function, which places more emphasis on the quality of ordinary samples and enhances the overall performance and generalization ability of the network. Experimental results demonstrate that our improved detection algorithm achieves a higher recall rate and mean average precision (mAP) on the public dataset (RDD) and the NJdata dataset in Nanjing’s urban area. Specifically, compared to YOLOv7, our model increases the recall rate and mAP on RDD by 3.3% and 2.6%, respectively. On the NJdata dataset, our model improves the recall rate and mAP by 1.9% and 1.3%, respectively. Furthermore, our model reduces parameter and computational requirements by 30% and 22.5%, respectively, striking a balance between detection accuracy and speed. In conclusion, our road disease detection model presents an effective solution to address the challenges associated with road disease detection in urban areas. It offers improved accuracy, efficiency, and generalization capabilities compared to existing models. Show more
Keywords: Yolov7, lightweight, MobilieNetV3, BRA, F-ReLU, Wise-IoU
DOI: 10.3233/JIFS-239289
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Ratmele, Ankur | Thakur, Ramesh
Article Type: Research Article
Abstract: As more people express their thoughts on products on various online shopping platforms, the feelings expressed in these opinions are becoming a significant source of information for marketers and buyers. These opinions have a big impact on consumers’ decision to buy the best quality product. When there are too many features or a small number of records to analyze, the decision-making process gets difficult. A recent stream of study has used the conventional quantitative star score ratings and textual content reviews in this context. In this research, a decision-making framework is proposed that relies on feature-based opinions to analyze the …textual content of reviews and classify buyer’s opinions, thereby assisting consumers in making long-term purchases. The framework is proposed in this paper for product purchase decision making based on feature-based opinions and deep learning. Framework consists of four components: i) Pre-processing, ii) Feature extraction, iii) Feature-based opinion classification, and iv) Decision-making. Web scraping is used to obtain the dataset of Smartphone reviews, which is subsequently clean and pre-processed using tokenization and POS tagging. From the tagged dataset, noun labeled words are retrieved, and then the probable product’s features are extracted. These feature-based sentences or reviews are processed using a word embedding to generate review vectors that identify contextual information. These word vectors are used to construct hidden vectors at the word and sentence levels using a hierarchical attention method. With respect to each feature, reviews are divided into five classes: extremely positive, positive, extremely negative, negative, and neutral. The proposed method may readily detect a customer’s opinion on the quality of a product based on a certain attribute, which is beneficial in making a purchase choice. Show more
Keywords: Opinions, Opinion Extraction (OE), product features, decision making, hierarchical attention mechanism, GloVe
DOI: 10.3233/JIFS-235389
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Ding, Yahui | Wang, Hongjuan | Liu, Nan | Li, Tong
Article Type: Research Article
Abstract: Traditional Chinese painting (TCP), culturally significant, reflects China’s rich history and aesthetics. In recent years, TCP classification has shown impressive performance, but obtaining accurate annotations for these tasks is time-consuming and expensive, involving professional art experts. To address this challenge, we present a semi-supervised learning (SSL) method for traditional painting classification, achieving exceptional results even with a limited number of labels. To improve global representation learning, we employ the self-attention-based MobileVit model as the backbone network. Furthermore, We present a data augmentation strategy, Random Brushwork Augment (RBA), which integrates brushwork to enhance the performance. Comparative experiments confirm the effectiveness of …TCP-RBA in Chinese painting classification, demonstrating outstanding accuracy of 88.27% on the test dataset, even with only 10 labels, each representing a single class. Show more
Keywords: Traditional chinese paintings, brushwork, semi-supervised learning, image classification
DOI: 10.3233/JIFS-236533
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: You, Miaona | Zhuang, Sumei | Luo, Ruxue
Article Type: Research Article
Abstract: This study proposes a weighted composite approach for grey relational analysis (GRA) that utilizes a numerical weather prediction (NWP) and support vector machine (SVM). The approach is optimized using an improved grey wolf optimization (IGWO) algorithm. Initially, the dimension of NWP data is decreased by t-distributed stochastic neighbor embedding (t-SNE), then the weight of sample coefficients is calculated by entropy-weight method (EWM), and the weighted grey relational of data points is calculated for different weather numerical time series data. At the same time, a new weighted composite grey relational degree is formed by combining the weighted cosine similarity of NWP …values of the historical day and to be measured day. The SVM’s regression power prediction model is constructed by the time series data. To improve the accuracy of the system’s predictions, the grey relational time series data is chosen as the input variable for the SVM, and the influence parameters of the ideal SVM are discovered using the IGWO technique. According to the simulated prediction and analysis based on NWP, it can be observed that the proposed method in this study significantly improves the prediction accuracy of the data. Specifically, evaluation metrics such as root mean squared error (RMSE), regression correlation coefficient (r 2 ), mean absolute error (MAE) and mean absolute percent error (MAPE) all show corresponding enhancements, while the computational burden remains relatively low. Show more
Keywords: t-SNE, power forecasting, IGWO, NWP
DOI: 10.3233/JIFS-237333
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Amsaprabhaa, M.
Article Type: Research Article
Abstract: Human pose recognition from videotapes has become an emerging research topic for tracking human movements. The objective of this work is to develop a deep multimodal Spatio-Temporal Harris Hawk Optimized Pose Recognition (STHHO-PR) framework for self-learning fitness exercises. The presented STHHO-PR framework uses audio modality and visual modality to classify the different poses. In audio modality, the VGG-16 network paradigm is used to extract the audio traits for fitness pose recognition. In visual modality, Harris Hawks Optimization (HHO) along with the Minimum Cross Entropy (MCE) method is employed to find out the optimum threshold values for body parts segmentation. These …segmented body parts highlight the human joint points that are connected through the skeletonization process to extract the skeletal information. The extracted spatio-temporal features from audio modality and visual modality are optimally fused and used in the classification process. Weighted Majority Voting Ensemble (WMVE) classifier is adopted to build the classification model. This work is experimented with yoga videos acquired from publicly available datasets. The results show that the presented STHHO-PR framework outperforms other state-of-art procedures in terms of prediction accuracy. Show more
Keywords: Harris Hawks Optimization, Minimum Cross Entropy, Weighted Majority Voting Ensemble classifier, yoga video, yoga poses classification
DOI: 10.3233/JIFS-233286
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-23, 2024
Authors: Li, Zheming | Chen, Yidan | Yang, Bo | Li, Chenwei | Zhang, Shihua | Li, Wei | Zhang, Hengwei
Article Type: Research Article
Abstract: Abstract Adversarial examples are often used to test and evaluate the security and robustness of image classification models. Though adversarial attacks under white-box setting can achieve a high attack success rate, due to overfitting, the success rate of black-box attacks is relatively low. To this end, this paper proposes diversified input strategies to improve the transferability of adversarial examples. In this method, various transformation methods are applied to randomly transform the original image multiple times, thereby generating a batch of transformed images. Then, in the process of back-propagation, the loss function gradient of the transformed images is calculated, and a weighted …average of the obtained gradient values is performed to generate adversarial perturbation, which is iteratively added to the original image to generate adversarial examples. Meanwhile, by increasing the variety of data augmentation transformation types and the number of input images, the proposed method effectively alleviates overfitting and improves the transferability of adversarial examples. Extensive experiments on the ImageNet dataset indicate that the proposed method can perform black-box attacks better than benchmark methods, with an average of 97.2% success rate attacking multiple models simultaneously. Show more
Keywords: Deep neural network, image classification, adversarial examples, black-box attacks, diversified input
DOI: 10.3233/JIFS-223584
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Lan, Zhiqiang | Wu, Guoyao | Wu, Jiacheng | Li, Jiaqi | Pan, Fan
Article Type: Research Article
Abstract: In the application of new energy consumption system engineering, in order to evaluate the contribution of electric power industry expansion, an evaluation model of electric power industry expansion contribution considering the influencing factors of new energy consumption is constructed. In the process of power industry expansion, the growth of new energy installed capacity, power system regulation ability, power grid interconnection and electricity demand are the core factors that affect the change of power contribution to power industry expansion. Using the characteristic extraction method of power consumption behavior of users with industrial expansion, after extracting two characteristics, namely, the utilization hours …of user’s industrial expansion capacity and the proportion of new energy load put into operation under the change of four major factors, the monthly industrial expansion power consumption of typical users is predicted by the monthly industrial expansion power consumption forecasting method of users considering industrial expansion capacity, and then the growth curve of user’s industrial expansion power consumption is drawn. Based on the forecast method of monthly industry expansion electricity generated by industry expansion quantity, the industry expansion quantity of typical individual users is calculated, and the industry expansion quantity is input into RBF network model trained by particle swarm optimization algorithm to complete the forecast of monthly industry expansion electricity; Finally, the contribution ratio of each influencing factor is calculated, and the evaluation of power industry expansion contribution considering the influencing factors of new energy consumption is completed. After testing, this model can be used as an available model for evaluating the contribution of electric power industry under the condition of considering the influencing factors of new energy consumption. Show more
Keywords: New energy consumption, influencing factors, power industry expansion, contribute electricity, evaluation model, industry expansion capacity
DOI: 10.3233/JIFS-236907
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Song, Can
Article Type: Research Article
Abstract: The development and utilization of network big data is also accompanied by data theft and destruction, so the monitoring of network security is particularly important. Based on this, the study applies the fuzzy C-mean clustering algorithm to the network security model, however, the algorithm has major defects in discrete data processing and the influence of feature weights. Therefore, the study introduces the concept of local density and optimizes the initial clustering center to solve its sensitive defects as well as empirical limitations; at the same time, the study introduces the adaptive methods of fuzzy indicators and feature weighting, and uses …the concepts such as fuzzy center-of-mass distribution to avoid problems such as the model converging too fast and not being able to handle discrete data. Finally, the study does a simulation analysis of the performance of each module, and the comparison of the overall algorithm with the rest of the models. The experimental results show that in the comparison of the overall algorithm, its false detection rate decreases by 8.57% in the IDS Dataset dataset, compared to the particle swarm algorithm. Therefore, the adaptive weighted fuzzy C-Means algorithm based on local density proposed in the study can effectively improve the network intrusion detection performance. Show more
Keywords: Local density, fuzzy clustering, adaptive, hybrid weighting, network security
DOI: 10.3233/JIFS-235082
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Duan, Chunyan | Zhu, Mengshan | Wang, Kangfan
Article Type: Research Article
Abstract: Along with the booming of intelligent manufacturing, the reliability management of intelligent manufacturing systems appears to be becoming more significant. Failure mode and effects analysis (FMEA) is a prospective reliability management instrument extensively utilized to manage failure modes of systems, products, processes, and services in various industries. However, the conventional FMEA method has been criticized for its inherent limitations. Machine learning can handle large amounts of data and has merits in reliability analysis and prediction, which can help in failure mode classification and risk management under limited resources. Therefore, this paper devises a method for complex systems based on an …improved FMEA model combined with machine learning and applies it to the reliability management of intelligent manufacturing systems. First, the structured network of failure modes is constructed based on the knowledge graph for intelligent manufacturing systems. Then, the grey relation analysis (GRA) is applied to determine the risk prioritization of failure modes. Hereafter, the k-means algorithm in unsupervised machine learning is employed to cluster failure modes into priority classes. Finally, a case study and further comparative analysis are implemented. The results demonstrate that failure modes in system security, production quality, and information integration are high-risk and require more resources for prevention. In addition, recommendations for risk prevention and monitoring of intelligent manufacturing systems were given based on the clustering results. In comparison to the conventional FMEA method, the proposed method can more precisely capture the coupling relationship between the failure modes compared with. This research provides significant support for the reliability and risk management of complex systems such as intelligent manufacturing systems. Show more
Keywords: Failure mode and effects analysis, reliability analysis, intelligent manufacturing systems, machine learning
DOI: 10.3233/JIFS-232712
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Cui, Hongzhen | Zhang, Longhao | Zhu, Xiaoyue | Guo, Xiuping | Peng, Yunfeng
Article Type: Research Article
Abstract: Extracting and digitizing drug attributes from medical literature is the first step to build a knowledge computing system for precision disease treatment. In order to build a cardiovascular drug knowledge base, this paper proposes a multi-label text classification method for cardiovascular drug attributes from the Chinese drug guideline. The drug attributes are characterized by a BERT pre-trained model, and a dual-feature extraction structure is proposed based on the BiGRU neural network to capture high-level semantic information. Label categorization of cardiovascular drug attributes, such as indications and mode of administration, is accomplished. The F1 score of 0.8431 was obtained using 5-fold …cross-validation. Comparing KNN and Naïve bayes, and conducting CNN and BiGRU control experiments on the basis of Word2Vec characterization of medication guidelines, the proposed multi-label text classification method is effective and the F1 value is significantly improved. Proved by analysis of ablation and crossover experiments, the proposed method can achieve a high accuracy rate averaged at 0.8339. Show more
Keywords: Multi-label text classification, cardiovascular drug attributes, BERT, BiGRU, dual feature extraction
DOI: 10.3233/JIFS-236115
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Zhang, Bei | Cao, Yuan | Wang, Changqing | Wang, Meng
Article Type: Research Article
Abstract: To address the challenges of dense scenarios with densely distributed small-scale faces, severe occlusions, and unclear features leading to inaccurate detection and high miss rates, we propose a lightweight small-scale face detection algorithm based on YOLOv5. The aim is to enhance the accuracy and precision of target detection. Firstly, we introduce the Convolutional Block Attention Module (CBAM) into the existing backbone network, obtaining more detailed features by comprehensively considering both spatial and channel dimensions. Next, in the Neck network, we embed involution to enhance channel information and weight distribution. Finally, a new feature fusion layer is added to improve the …capture capability of feature information for smaller pixels and smaller targets in visible areas by integrating deep semantic information with shallow semantic information. The experimental results demonstrate that the improved model exhibits an increase in the average precision across all three subsets of the public WIDER FACE dataset, with improvements of 3.2%, 3.4%, and 2.6% respectively. The detection frame rate reaches 87 frames per second (FPS), significantly enhancing the detection performance of facial targets. This improvement meets the accuracy and real-time requirements for detecting small-scale facial targets in dense scenarios. Show more
Keywords: Dense scenarios, small-scale faces, CBAM, involution, feature fusion layer
DOI: 10.3233/JIFS-238575
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Maddali, Deepika
Article Type: Research Article
Abstract: A rising number of edge devices, like controllers, sensors, and robots, are crucial for Industrial Internet of Things (IIoT) networks for collecting data for communication, storage, and processing. The security of the IIoT could be compromised by any malicious or unusual behavior on the part of any of these devices. They may also make it possible for malicious software placed on end nodes to enter the network and perform unauthorized activities. Existing anomaly detection techniques are less effective due to the increasing diversity of the network and the complexity of cyberattacks. In addition, most strategies are ineffective for devices with …limited resources. Therefore, this work presents an effective deep learning based Malware Detection framework to make the edge based IIoT network more secure. This multi-stage system begins with the Deep Convolutional Generative Adversarial Networks (DCGAN) based data augmentation method to overcome the issue of data imbalance. Next, a ConvNeXt-based method extracts the features from the input data. Finally, an optimized Enhanced Elman Spike Neural Network (EESNN) based deep learning is utilized for malware recognition and classification. Using two distinct datasets— MaleVis and Malimg— the generalizability of the suggested model is clearly demonstrated. With an accuracy of 99.24% for MaleVis and 99.31% for the Malimg dataset, the suggested strategy demonstrated excellent results and surpassed all other existing methods. It illustrates how the suggested strategy outperforms alternative models and offers numerous benefits. Show more
Keywords: IIoT, deep learning, ConvNeXt, Malimg, EESNN, DCGAN, MaleVis
DOI: 10.3233/JIFS-234897
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Mi, Xiaodong | Luo, Qifang | Zhou, Yongquan
Article Type: Research Article
Abstract: Panchromatic and multi-spectral image fusion, called panchromatic sharpening, is the process of combining the spatial and spectral information of the source image into the fused image to give the image a higher spatial and spectral resolution. In order to improve the spatial resolution and spectral information quality of the image, an adaptive multi-spectral image fusion method based on an improved arithmetic optimization algorithm is proposed. This paper proposed improved arithmetic optimization algorithm, which uses dynamic stochastic search technique and oppositional learning operator, to perform local search and behavioral complementation of population individuals, and to improve the ability of population individuals …to jump out of the local optimum. The method combines adaptive methods to calculate the weights of linear combinations of panchromatic and multi-spectral gradients to improve the quality of fused images. This study not only improves the quality and effect of image fusion, but also focuses on optimizing the operation efficiency of the algorithm to have real-time and high efficiency. Experimental results show that the proposed method exhibits strong performance on different datasets, improves the spatial resolution and spectral information quality of the fused images, and has good adaptability and robustness. The source code is available at: https://github.com/starboot/IAOA-For-Image-Fusion . Show more
Keywords: Image fusion, multi-spectral image, panchromatic image, oppositional learning operator, arithmetic optimization algorithm, meta-heuristic
DOI: 10.3233/JIFS-235607
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-33, 2024
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]