Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2024: 1.7
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Prasath, N. | Arun, A. | Saravanan, B. | Kamaraj, Kanagaraj
Article Type: Research Article
Abstract: Intelligent Fuzzy Edge Computing (IFEC) has emerged as an innovative technology to enable real-time decision-making in Internet of Things (IoT)-based Digital Twin environments. Digital Twins provide virtual models of physical systems, facilitating predictive maintenance and optimization. However, implementing real-time decision-making in these environments is challenging due to massive data volumes and need for quick response times. IFEC addresses this by offering a flexible, scalable and efficient platform for real-time decision-making. This paper presents an overview of key aspects of IFEC including fuzzy logic, edge computing and Digital Twins. The use of fuzzy logic in IFEC provides an adaptive framework for …handling uncertainties in data. Edge computing enables localized processing, reducing latency. The integration of Digital Twins allows system monitoring, analysis and optimization. Potential applications of IFEC are highlighted in domains such as manufacturing, healthcare, energy management and transportation. Recent advancements in IFEC are also discussed, covering new fuzzy inference systems, edge computing architectures, Digital Twin modeling techniques and security mechanisms. Overall, IFEC shows great promise in enabling real-time decision-making in complex IoT-based Digital Twin environments across various industries. Further research on IFEC will facilitate the ongoing digital transformation of industrial systems. Show more
Keywords: Intelligent fuzzy edge computing, real-time decision making, IoT-based digital twins, predictive maintenance, fuzzy logic, edge computing
DOI: 10.3233/JIFS-233495
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2023
Authors: Vishnukumar, Ravula | Ramaiah, Mangayarkarasi
Article Type: Research Article
Abstract: The Internet’s evolution resulted in a massive amount of data. As a result, the internet has become more sophisticated and vulnerable to massive attacks. The attack detection system is a key feature for system security in modern networks. The IDS might be signature-based or detect anomalous behavior. Researchers recently created several detection algorithms for identifying network intrusions in vehicular network security, but they failed to detect intrusions effectively. For this reason, the optimal Deep Learning approach, namely Political Fractional Dingo Optimizer (PFDOX)-based Deep belief network is introduced for attack detection in network security for vehicles. The Internet of Vehicle simulation …is done initially, and then the input data is passed into the pre-processing phase, which removes noise present in the data. Then, the feature extraction module receives the pre-processed data. The Deep Maxout Network is trained using the Fractional Dingo optimizer (FDOX)is utilized to detect normal and abnormal behavior. Fractional calculus and Dingo optimizer (DOX) are combined to create the proposed FDOX. Finally, intruder/attack types are classified using the Deep Belief Network, which is tuned using the PFDOX. The PFDOX is created by the assimilation of the DOX, Fractional Calculus, and Political Optimizer (PO). The experimental result shows that the designed PFDOX_DBN for attack type classification offers a better result based on f-measure, precision, and recall with the values of 0.924, 0.916, and 0.932, for the CIC-IDS2017 dataset. Show more
Keywords: Deep maxout network, intrusion detection, deep belief network, dingo optimizer, fractional calculus, political optimizer
DOI: 10.3233/JIFS-233581
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2023
Authors: Nandipati, Bhagya Lakshmi | Devarakonda, Nagaraju
Article Type: Research Article
Abstract: Lung cancer incidence and mortality continue to rise rapidly around the world. According to the American Cancer Society, the five-year survivability for individuals in the metastasis phases is significantly lower, highlighting the importance of early lung cancer diagnosis for effective therapy and improved quality of life. To achieve this, it is crucial to combine PET’s sensitivity for recognizing abnormal regions with CT’s anatomical localization for evaluating PET-CT images in computer-assisted detection implementations. Current PET-CT image evaluation methods either run each modality independently or aggregate the data from both, but they often overlook the fact that different visual features encode different …types of data from different modalities. For instance, high atypical PET uptake within the lungs is more crucial for identifying tumors compared to physical PET uptake in the heart. To address the challenges of fine-grained issues during feature extraction and fusion, we propose an interpretable deep learning-based solution for lung cancer diagnosis using CT and PET images. This involves building an Optimal Adversarial Network for merging and an Optimal Attention-based Generative Adversarial Network with Classifier (Opt_att-GANC) to augment the classification of the existence and nonexistence of lung cancer based on extracted features. The performance of the Opt_att-GANC is compared with existing methodologies like global-feature encoding U-Net (GEU-Net), 3D Dense-Net, and 3D Convolutional Neural Network Technique (3D-CNN). Results show that the proposed Opt_att-GANC achieves an F1-score of 67.08%, 93.74% accuracy, 92% precision, 92.1% recall, and 93.74% recall. The prospective study aims to enhance the precision degree with reduced duration by incorporating an ensemble neural network paradigm for feature extraction. Show more
Keywords: Lung cancer, fuzzy fusion, feature extraction, classification, neural networks, Adversarial network, PET
DOI: 10.3233/JIFS-233491
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2023
Authors: Arulmurugan, A. | Jose Moses, G. | Gandhi, Ongole | Sheshikala, M. | Arthie, A.
Article Type: Research Article
Abstract: In the current scenario, feature selection (FS) remains one of the very important functions in machine learning. Decreasing the feature set (FSt) assists in enhancing the classifier’s accuracy. Because of the existence of a huge quantity of data within the dataset (DS), it remains a colossal procedure for choosing the requisite features out of the DS. Hence, for resolving this issue, a new Chaos Quasi-Oppositional-based Flamingo Search Algorithm with Simulated Annealing Algorithm (CQOFSASAA) has been proffered for FS and for choosing the optimum FSt out of the DSs, and, hence, this lessens the DS’ dimension. The FSA technique can be …employed for selecting the optimal feature subset out of the DS. Generalized Ring Crossover has been as well embraced for selecting the very pertinent features out of the DS. Lastly, the Kernel Extreme Learning Machine (KELM) classifier authenticates the chosen features. This proffered paradigm’s execution has been tested by standard DSs and the results have been correlated with the rest of the paradigms. From the experimental results, it has been confirmed that this proffered CQOFSASAA attains 93.74% of accuracy, 92% of sensitivity, and 92.1% of specificity. Show more
Keywords: Quasi-oppositional, feature selection, Flamingo Search Algorithm, Simulated Annealing, convergence rate
DOI: 10.3233/JIFS-233557
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2023
Authors: Harikumar, Yedhu | Muthumeenakshi, M.
Article Type: Research Article
Abstract: The Indian stock market is a dynamic, complicated system that is impacted by many different variables, making it difficult to anticipate its future. The utilization of deep learning and optimization techniques to forecast stock market movements has gained popularity in recent years. To foresee the Indian stock market, an innovative approach is presented in this study that combines the Grey Wolf Optimization algorithm with a hybrid Convolutional Neural Network (CNN) and Bi-Directional Long-Short Term Memory (Bi-LSTM) framework. The stock market information is first pre-processed utilizing a CNN to extract pertinent features. The Bi-LSTM system, that is intended to capture the …long-term dependencies and temporal correlations of the stock market statistics, is then fed the CNN’s outcome. The model parameters are then optimized utilizing the Grey Wolf Optimization (GWO) technique, which also increases forecasting accuracy. The findings demonstrate that, in terms of forecasting accuracy, the suggested method outperforms a number of contemporary methods, including conventional time series models, neural networks, and evolutionary algorithms. Thus, the suggested methodology provides an effective way to forecast the Indian stock market by combining deep learning and optimization approaches. Show more
Keywords: Indian stock market, grey wolf optimization, deep learning approach, bi-directional long-short term memory, convolutional neural network
DOI: 10.3233/JIFS-233716
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2023
Authors: Vallabhaneni, Nagalakshmi | Prabhavathy, Panneer
Article Type: Research Article
Abstract: Numerous people are interested in learning yoga due to the increased tension levels in the modern lifestyle, and there are a variety of techniques or resources available. Yoga is practiced in yoga centers, by personal instructors, and through books, the Internet, recorded videos, etc. As the aforementioned resources may not always be available, a large number of people will opt for self-study in fast-paced lifestyles. Self-learning makes it impossible to recognize an incorrect posture. Incorrect poses will have a negative effect on the patient’s health, causing severe agony and long-term chronic issues. Computer vision (CV)-related techniques derive pose features and …conduct pose analysis using non-invasive CV methods. The application of machine learning (ML) and artificial intelligence (AI) techniques to an inter-disciplinary field like yoga becomes quite difficult. Due to its potent feature learning ability, deep learning (DL) has recently achieved an impressive level of performance in classifying yoga poses. In this paper, an artificial algae optimizer with hybrid deep learning-based yoga pose estimation (AAOHDL-YPE) model is presented. The presented AAOHDL-YPE model analyzes yoga video clips to estimate pose. Utilizing Part Confidence Map and Part Affinity Field with bipartite equivalent and parsing, OpenPose can be employed to determine the joint location. The deep belief network (DBN) model is then used for Yoga recognition. Finally, the AAO algorithm is utilized to enhance the EfficientNet model’s recognition performance. The results of a comprehensive experimentation analysis reveal that the AAOHDL-YPE technique produces superior results in comparison to existing methods. Show more
Keywords: Yoga posture, activity recognition, deep learning, metaheuristics, computer vision
DOI: 10.3233/JIFS-233583
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2023
Authors: Sendhil, R. | Arulmurugan, A. | Jose Moses, G. | Kaviarasan, R. | Ramadoss, P.
Article Type: Research Article
Abstract: Occult peritoneal metastasis often emerges in sick persons having matured gastric cancer (GC) and is inexpertly detected with presently feasible instruments. Due to the existence of peritoneal metastasis that prevents the probability of healing crucial operation, there relies upon a discontented requirement for an initial diagnosis to accurately recognize sick persons having occult peritoneal metastasis. The proffered paradigm of this chapter identifies the initial phases of occult peritoneal metastasis in GC. The initial phase accompanies metabolomics for inspecting biomarkers. If the sick person undergoes the initial signs of occult peritoneal metastasis in GC, early detection is conducted. Yet, the physical …prognosis of this cancer cannot diagnose it, and so, automated detection of the images by dissecting the preoperational Computed Tomography (CT) images by conditional random fields accompanying Pro-DAE (Post-processing Denoising Autoencoders) and the labeling in the images is rid by denoising strainers; later, the ensued images and the segmented images experience the Graph Convolutional Networks (GCN), and the outcome feature graph information experience the enhanced categorizer (Greywold and Cuckoo Search Naïve Bayes categorizer) procedure that is employed for initial diagnosis of cancer. Diagnosis of cancer at the initial phase certainly lessens the matured phases of cancer. Hence, this medical information is gathered and treated for diagnosing the sickness. Show more
Keywords: Gastric Cancer, MIoT, Greywold and Cuckoo Search Naïve Bayes categorizer, Cuckoo-Grey Wolf search Correlative Naïve Bayes categorizer
DOI: 10.3233/JIFS-233510
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2023
Authors: Priya, S. Baghavathi | Rani, P. Sheela | Chokkalingam, S.P. | Prathik, A. | Mohan, M. | Anitha, G. | Thangavel, M. | Suthir, S.
Article Type: Research Article
Abstract: Traditional testimony and electronic endorsements are extremely challenging to uphold and defend, and there is a problem with challenging authentication. The identity of the student is typically not recognized when it comes to requirements for access to a student’s academic credentials that are scattered over numerous sites. This is an issue with cross-domain authentication methods. On the one hand, whenever the volume of cross-domain authentication requests increases dramatically, the response time can become intolerable because of the slow throughput associated with blockchain mechanisms. These systems still do not give enough thought to the cross-domain scenario’s anonymity problem. This research proposes …an effective cross-domain authentication mechanism called XAutn that protects anonymity and integrates seamlessly through the present Certificate Transparency (CT) schemes. XAutn protects privacy and develops a fast response correctness evaluation method that is based on the RSA (Rivest, Shamir, and Adleman) cryptographic accumulator, Zero Knowledge Proof Algorithm, and Proof of Continuous work consensus Algorithm (POCW). We also provide a privacy-aware computation authentication approach to strengthen the integrity of the authentication messages more securely and counteract the discriminatory analysis of malevolent requests. This research is primarily used to validate identities in a blockchain network, which makes it possible to guarantee their authenticity and integrity while also increasing security and privacy. The proposed technique greatly outperformed the current methods in terms of authentication time, period required for storage, space for storage, and overall processing cost. The proposed method exhibits a speed gain of authentication of roughly 9% when compared to traditional blockchain systems. The security investigation and results from experiments demonstrate how the proposed approach is more reliable and trustworthy. Show more
Keywords: Zero Knowledge Proof, RSA accumulator, educational certificates, cross-domain authentication, blockchain
DOI: 10.3233/JIFS-235140
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2023
Authors: Lakshmi Narayanan, K. | Naresh, R.
Article Type: Research Article
Abstract: Vehicular Ad-Hoc Network (VANET) Technology is advancing due to the convergence of VANET and cloud computing technologies, Vehicular Ad-Hoc Network (VANET) entities can benefit from the cloud service provider’s favourable storage and computing capabilities. Cloud computing, the processing and storage capabilities provided by various cloud service providers, would be available to all VANET enterprises. Digital Twin helps in creating a digital view of the Vehicle. It focuses on the physical behaviour of the Vehicle as well as the software it alerts when it finds issues with the performance. The representation of the Vehicle is created using intelligent sensors, which are …in OBU of VANET that help collect info from the product. The author introduces the Cloud-based three-layer key management for VANET in this study. Because VANET connections can abruptly change, critical negotiation verification must be completed quickly and with minimal bandwidth. When the Vehicles are in movement, we confront the difficulty in timely methods, network stability, and routing concerns like reliability and scalability. We must additionally address issues such as fair network access, inappropriate behaviour identification, cancellation, the authentication process, confidentiality, and vehicle trustworthiness verification. The proposed All-Wheel Control (AWC) method in this study may improve the safety and efficiency of VANETs. This technology would also benefit future intelligent transportation systems. The Rivest–Shamir–Adleman (RSA) algorithm and Chinese Remainder Theorem algorithms generate keys at the group, subgroup, and node levels. The proposed method produces better results than the previous methods. Show more
Keywords: Cloud computing, VANET, RSA, CRT, AWC
DOI: 10.3233/JIFS-233527
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2023
Authors: Kadry, Heba | Samak, Ahmed H. | Ghorashi, Sara | Alhammad, Sarah M. | Abukwaik, Abdulwahab | Taloba, Ahmed I. | Zanaty, Elnomery A.
Article Type: Research Article
Abstract: Coronavirus is a new pathogen that causes both the upper and lower respiratory systems. The global COVID-19 pandemic’s size, rate of transmission, and the number of deaths is all steadily rising. COVID-19 instances could be detected and analyzed using Computed Tomography scanning. For the identification of lung infection, chest CT imaging has the advantages of speedy detection, relatively inexpensive, and high sensitivity. Due to the obvious minimal information available and the complicated image features, COVID-19 identification is a difficult process. To address this problem, modified-Deformed Entropy (QDE) algorithm for CT image scanning is suggested. To enhance the number of training …samples for effective testing and training, the suggested method utilizes QDE to generate CT images. The retrieved features are used to classify the results. Rapid innovations in quantum mechanics had prompted researchers to use Quantum Machine Learning (QML) to test strategies for improvement. Furthermore, the categorization of corona diagnosed, and non-diagnosed pictures is accomplished through Quanvolutional Neural Network (QNN). To determine the suggested techniques, the results are related with other methods. For processing the COVID-19 imagery, the study relates QNN with other existing methods. On comparing with other models, the suggested technique produced improved outcomes. Also, with created COVID-19 CT images, the suggested technique outperforms previous state-of-the-art image synthesis techniques, indicating possibilities for different machine learning techniques such as cognitive segmentation and classification. As a result of the improved model training/testing, the image classification results are more accurate. Show more
Keywords: Coronavirus, quantum machine learning, quanvolutional neural network, Q-deformed entropy
DOI: 10.3233/JIFS-233633
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2023
Authors: Pradeep, M. | Sivaji, U. | Nithya, B. | Kadiravan, G. | Preethi, D. | Painam, Ranjith Kumar
Article Type: Research Article
Abstract: The mapping function must identify the reference model and detect coordinate arrangement by observing a repository with deep learning. Progression model with coordinate arrangement composition should have various positional displacements from one location to another. A prerogative classification model is an evolution of factor accomplishment in a repository method. Coordinate arrangement with calculation method must formulate a model locality twirl in classification method of a reference in dominance factor of perpetuity position observation by procession of reference localities. In a procession model observation by location, tendency method should be rotated from locality position into another coordinate method, with a PDD …factor measuring DPA of cadent RFT with an origin of 92.6, a cadent DS intermediate factor of 95.2, culmination factor of cadent RFT of 94.1. The docile exploratory arrangement of heuristic parameters is used in existing system to perceive phenomena such as sprout, enrollment discernment, demeanour, gravest perforation measure, Model of a heretic in apprehension method by premonition incongruity. Annotation should identify classification process using a proposed model to obtain massive measure of imputation function, In PDD measure of DPA in Cadent DS, with inception of 96.1, intercession of Cadent RFT in 92.6, with crowning of Cadent RFT in 96.4, 93.2 Show more
Keywords: MRCAI, Goin Twirl, maginot, idiosyncrasy outline, coffer atavism, flocculent utter eminence kedge
DOI: 10.3233/JIFS-234739
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2023
Authors: Ahamed, Ayoobkhan Mohamed Uvaze | Joel Devadass Daniel, D.J. | Seenivasan, D. | Rukumani Khandhan, C. | Radhakrishnan, S. | Daya Sagar, K.V. | Bhardwaj, Vivek | Nishant, Neerav
Article Type: Research Article
Abstract: Time-sensitive programs that are linked to smart services, such as smart healthcare as well as smart cities, are supported in large part by the fog computing domain. Due to the increased speed limitation of the cloud, Cloud Computing (CC) is a competent platform for fog in data processing, but it is unable to meet the demands of time-sensitive programs. The procedure of resource provisioning, as well as allocation in either a fog-cloud structure, takes into account dynamic changes in user requirements, and resources with limited access in fog devices are more difficult to manage. Due to the continual changes in …user requirement factors, the deadline represents the biggest obstacle in the fog computing structure. Hence the objective is to minimize the total cost involved in scheduling by maximizing resource utilization. For dynamic scheduling in the fog-cloud computing model, the efficiency of hybridization of the Grey Wolf Optimizer (GWO) and Lion Algorithm (LA) is developed in this study. In terms of energy costs, processing costs, and communication costs, the created GWOMLA-based Deep Belief Network (DBN) performed better and outruns the other traditional models. Show more
Keywords: Fog-cloud computing environment, deep learning, deep belief network (DBN), lion algorithm (LA), grey wolf optimizer (GWO).
DOI: 10.3233/JIFS-234030
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2023
Authors: Kalaipriya, O. | Dhandapani, S.
Article Type: Research Article
Abstract: Lung cancer is one of the leading causes of mortality from cancer. Lung cancer is a kind of malignant lung tumor characterized by uncontrolled cell proliferation in lung tissues. Even though CT scans are the most often used imaging technology in medicine, clinicians find it challenging to interpret and diagnose cancer from CT scan pictures. As a result, computer-aided diagnostics can assist clinicians in precisely identifying malignant cells. Many computer-aided approaches were explored and applied, including image processing and machine learning. A comparison of the various classification methodologies will assist in enhancing the accuracy of lung cancer detection systems that …employ robust segmentation and classification algorithms presented in this research. This research proposed to enhance existing segmentation and classification-basedmethodsof human lung cancer detection with optimization in techniques. The workflow includes initial preprocessing of medical images, for segmentation a novel hybrid methodology is developed by combining enhanced k-means clustering and random forest and classification with an Artificial neural network enhanced with PSO parameter and feature optimization. Show more
Keywords: Machine learning, K-means, ANN, random forest, PSO, image processing technique
DOI: 10.3233/JIFS-233845
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2023
Authors: Wang, Jing | Gao, Tingting | Du, Hongxu | Tu, Chuang
Article Type: Research Article
Abstract: To address the issue of final delivery route planning in the community group purchase model, this study takes into full consideration logistics vehicles of different energy types. With the goal of minimizing the sum of vehicle operating costs, delivery timeliness costs, goods loss costs, and carbon emissions costs, a multi-objective optimization model for community group purchase final delivery route planning is constructed. An improved genetic algorithm with a hill-climbing algorithm is utilized to enhance adaptive genetic operators, preventing the algorithm from getting stuck in local optima and improving the solution efficiency. Finally, a case study simulation is conducted to validate …the feasibility of the model and algorithm. Experimental results indicate that currently, among the three types of vehicles, fuel logistics vehicles still have an advantage in terms of vehicle usage cost. Electric logistics vehicles exhibit the poorest performance with the highest cost per hundred kilometers, but their sole advantage lies in their high energy release efficiency, enabling optimal low-carbon vehicle performance. Battery-swapping logistics vehicles perform the best in terms of carbon emissions, combining the advantages of both fuel-based and electric logistics vehicles. Therefore, battery-swapping logistics vehicles are a favorable choice for replacing fuel-based logistics vehicles in the future, offering promising prospects for future development. Show more
Keywords: Community group-buying, the route problem of end-distribution, improved genetic algorithm, carbon emission cost
DOI: 10.3233/JIFS-234773
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Gao, Dongling | Ma, Suhong | Kong, Xiangchuan
Article Type: Research Article
Abstract: In today’s Higher Education System (HES), Smart Learning (SL), also known as Intelligent Learning (IL) or Adaptive Learning (AL), plays an increasingly vital role. No longer is the traditional, one-size-fits-all method of education suitable for filling the several demands of students. Using SL technologies powered by Artificial Intelligence (AI) and Machine Learning (ML) algorithms can potentially revolutionize the HES. An emerging area of study, edge-based SL helps use Edge Computing (EC) to provide learners with instantaneous, specialized, and context-aware learning. Internet of Things (IoT) devices are becoming increasingly well-liked, and data is proliferating. Using video data as a primary source …of learning content and delivering it via EC infrastructure is what is referred to as “Video Streaming (VS)” in Edge-Based Learning (EBL). By examining the importance of providing mobile video clients with a high-quality visual experience—especially considering that video streaming (VS) traffic makes up a significant amount of mobile network traffic—the research gap is filled. The proposed Content Delivery Scheme (CDS), which is based on long short-term memory, is intended to improve security and privacy protocols, accelerate network service response times, and increase application intelligence. The project intends to close the current gap in edge-based Smart Learning (SL) technologies, namely in the distribution of video material for adaptive learning in higher education, by concentrating on these elements. Given that VS traffic forms a considerable portion of mobile network traffic, this paper aims to investigate the significance of delivering a performing visual experience to mobile video clients. Fast network service response, enhanced application intelligence, and enhanced security and privacy are all made possible by the proposed LSTM-based Content Delivery Scheme (CDS). The proposed approach attains minimal stall time of 2347 ms, which outperforms the existing techniques. Show more
Keywords: Higher education system, IoT, machine learning, e-Learning, edge computing, content delivery scheme, security
DOI: 10.3233/JIFS-237485
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Ayub, Mohammed | El-Alfy, El-Sayed M.
Article Type: Research Article
Abstract: Energy is a critical resource for daily activities and lifestyles with direct impacts on the economy, health and environment. Therefore, monitoring its efficient use is essential to reduce energy waste and lessen related concerns such as global warming and climate change. One of the prominent and evolving solutions is Non-Intrusive Load Monitoring (NILM) smart meters, which enables consumers to track their per-appliance energy consumption more effectively. Some recent approaches have proposed deep learning as a powerful tool for energy disaggregation. However, it is difficult to employ these models in resource-constrained end devices for effective energy monitoring. In this paper, we …explore and evaluate a lightweight improved model for multi-target non-intrusive load monitoring based on MobileNet architectures. With extensive experiments using the ENERTALK dataset, the results show that MobileNetV3-large is the most appealing for energy disaggregation as it requires about 55% less storage for trained model and about 6% less training time than MobileNetV2 with almost the same performance. On average, version 3 large has a 17.63% reduction in SAE and requires 54.21% and 8.93% less space and less training time than version 2, respectively. Moreover, the average performance is boosted using an ensemble multi-target MobileNet model across all houses, leading to significant reduction of MAE, SAE, and RMSE errors of about 6%, 48%, and 4%, respectively. In comparison to other work, the proposed MMNet-NILM shows superior performance for the majority of appliances in terms of all considered evaluation metrics. Show more
Keywords: Multi-target MobileNet, ENERTALK, Lightweight NILM, energy disaggregation, ensemble MobileNet
DOI: 10.3233/JIFS-219426
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-22, 2024
Authors: Yang, Yeling
Article Type: Research Article
Abstract: Vocal music training for college students impacts the social and emotional aspects of better learning. This impact must be classified progressively to improve the social and musical connectivity coinciding with real-time emotions. Therefore, an intermittent analysis of music learning is required for augmenting socio-emotional changes to the learning method. This article introduces Impact-centric Learning Analysis (ILA) using the Fuzzy Control Algorithm (FCA) for the purpose above. The control algorithm operates in two linear stages: in the first stage, the socio-emotional impact of the learning on the students is analyzed, pursued by the learning changes in the second stage. This first …stage inputs student activity scores based on real-time implications. The lowest scores are classified independently in the second stage, and learning changes are carried out. The learning change is targeted to meet the maximum (optimal) impact score from the first stage using fuzzy differentiations based on training sessions and student performance. Therefore, the proposed algorithm generates an optimal impact for the considered features (socio-emotional), preventing trivial vocal music sessions. Show more
Keywords: Fuzzy control, impact optimization, socio-emotional learning, vocal music
DOI: 10.3233/JIFS-233922
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Sindge, Renuka Sambhaji | Dutta, Maitreyee | Saini, Jagriti
Article Type: Research Article
Abstract: Video Super Resolution (VSR) applications extensively utilize deep learning-based methods. Several VSR methods primarily focus on improving the fine-patterns within reconstructed video frames. It frequently overlooks the crucial aspect of keeping conformation details, particularly sharpness. Therefore, reconstructed video frames often fail to meet expectations. In this paper, we propose a Conformation Detail-Preserving Network (CDPN) named as SuperVidConform. It focuses on restoring local region features and maintaining the sharper details of video frames. The primary focus of this work is to generate the high-resolution (HR) frame from its corresponding low-resolution (LR). It consists of two parts: (i) The proposed model decomposes …confirmation details from the ground-truth HR frames to provide additional information for the super-resolution process, and (ii) These video frames pass to the temporal modelling SR network to learn local region features by residual learning that connects the network intra-frame redundancies within video sequences. The proposed approach is designed and validated using VID4, SPMC, and UDM10 datasets. The experimental results show the proposed model presents an improvement of 0.43 dB (VID4), 0.78 dB (SPMC), and 0.84 dB (UDM10) in terms of PSNR. Further, the CDPN model set new standards for the performance of self-generated surveillance datasets. Show more
Keywords: Super-resolution, image super-resolution, video super-resolution, recurrent network, residual learning
DOI: 10.3233/JIFS-219393
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Ezeji, Ijeoma Noella | Adigun, Matthew | Oki, Olukayode
Article Type: Research Article
Abstract: The rise of decision processes in various sectors has led to the adoption of decision support systems (DSSs) to support human decision-makers but the lack of transparency and interpretability of these systems has led to concerns about their reliability, accountability and fairness. Explainable Decision Support Systems (XDSS) have emerged as a promising solution to address these issues by providing explanatory meaning and interpretation to users about their decisions. These XDSSs play an important role in increasing transparency and confidence in automated decision-making. However, the increasing complexity of data processing and decision models presents computational challenges that need to be investigated. …This review, therefore, focuses on exploring the computational complexity challenges associated with implementing explainable AI models in decision support systems. The motivations behind explainable AI were discussed, explanation methods and their computational complexities were analyzed, and trade-offs between complexity and interpretability were highlighted. This review provides insights into the current state-of-the-art computational complexity within explainable decision support systems and future research directions. Show more
Keywords: Explainable decision support systems, computational complexity, optimization, explainable artificial intelligence, review
DOI: 10.3233/JIFS-219407
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Liu, Fuchen | Zhou, Sijia | Zhang, Dezhou | Wang, Xiaocui
Article Type: Research Article
Abstract: Deep learning has demonstrated remarkable advantages in the field of human pose estimation. However, traditional methods often rely on widening and deepening networks to enhance the performance of human pose estimation, consequently increasing the parameter count and complexity of the networks. To address this issue, this paper introduces Ghost Attentional Down network, a lightweight human pose estimation network based on HRNet. This network leverages the fusion of features from high-resolution and low-resolution branches to boost performance. Additionally, GADNet utilizes GaBlock and GdBlock, which incorporate lightweight convolutions and attention mechanisms, for feature extraction, thereby reducing the parameter count and computational complexity …of the network. The fusion of relationships between different channels ensures the optimal utilization of informative feature channels and resolves the issue of feature redundancy. Experimental results conducted on the COCO dataset, with consistent image resolution and environmental settings, demonstrate that employing GADNet leads to a reduction of 60.7% in parameter count and 61.2% in computational complexity compared to the HRNet network model, while achieving comparable accuracy levels. Moreover, when compared to commonly used human pose estimation networks such as Cascaded Pyramid Network (CPN), Stacked Hourglass Network, and HRNet, GADNet achieves high-precision detection of human keypoints even with fewer parameters and lower computational complexity, our network has higher accuracy compared to MobileNet and ShuffleNet. Show more
Keywords: Human pose estimation, high-resolution network, attention mechanism, feature redundancy
DOI: 10.3233/JIFS-233501
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Vusirikkayala, Gowthami | Madhu Viswanatham, V.
Article Type: Research Article
Abstract: Detecting communities within a network is a critical component of network analysis. The process involves identifying clusters of nodes that exhibit greater similarity to each other compared to other nodes in the network. In the context of Complex networks (CN), community detection becomes even more important as these clusters provide relevant information of interest. Traditional mathematical and clustering methods have limitations in terms of data visualization and high-dimensional information extraction. To address these challenges, graph neural network learning methods have gained popularity in community detection, as they are capable of handling complex structures and multi-dimensional data. Developing a framework for …community detection in complex networks using graph neural network learning is a challenging and ongoing research objective. Therefore, it is essential for researchers to conduct a thorough review of community detection techniques that utilize cutting-edge graph neural network learning methods [102 ], in order to analyze and construct effective detection models. This paper provides a brief overview of graph neural network learning methods based on community detection methods and summarizes datasets, evaluation metrics, applications, and challenges of community detection in complex networks. Show more
Keywords: Community detection (CD), complex networks (CN), graph neural network (GNN), deep learning (DL), communities, clusters
DOI: 10.3233/JIFS-235913
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-24, 2024
Authors: Abu-Sharkh, Osama M.F. | Surkhi, Ibrahim | Zabin, Hamzah | Alhasan, Maher
Article Type: Research Article
Abstract: As the entire world is becoming increasingly a global village, the need for reliable, smooth, and easy-to-use applications that facilitate the communication process between people speaking different languages worldwide becomes essential, especially in the tourism industry. While numerous online and mobile applications attempt to bridge the linguistic gap using text-to-text, text-to-voice, or voice-to-text-to-voice translators, they often fall short due to constraints such as the need for a single shared device, manual setup of speaker’s gender and preferred language, and an inability to communicate from a distance. These applications struggle to mimic the practical nature of real-time multilingual conversations where immediate …and clear communication is paramount. This paper introduces an intelligent peer-to-peer polyglot voice-to-voice mobile application to facilitate the communication of people speaking different languages worldwide transparently mimicking a live conversation whether the involved parties are close to each other or at a nearby distance. People can interact with others transparently using their preferred language, irrespective of others’ languages, while the application automatically recognizes the language, gender of the speaker, and spoken words with very high accuracy. Five languages were implemented in the developed application as a proof-of-concept, and it is designed to smoothly and simply adapt more in future updates. Show more
Keywords: Multilingual, intelligent, text-to-voice, translation, voice-to-text
DOI: 10.3233/JIFS-219388
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Tariq, Sana | Amin, Asjad
Article Type: Research Article
Abstract: The emergence of machine learning in the recent decade has excelled in determining new potential features and nonlinear relationships existing between the data derived from the DNA sequences of genetic diseases. Machine learning also enhances the process of handling data with maximum predicted variables compared to observations during the data mining process of prediction. In this context, our study presents a deep learning model for predicting Transcription Factor Binding Sites (TFBS) in DNA sequences, with a focus on features within genetic data associated with diseases. Transcription Factors (TFs) play a crucial role in modulating gene expression by binding to TFBS. …The accurate prediction of TFBS is essential for understanding genome function and evolution. Thus, we develop an efficient deep learning model that considers TFBS prediction as a nucleotide-level binary classification task. In our proposed model, first we create an input matrix using the original DNA sequences. Next, we encode these DNA sequences using one-hot encoding, representing them as a sequence of numerical values. We then employ three convolutional layers, allowing our model to capture intricate patterns and motif features over a larger spatial range. To capture important features within the DNA sequence and to focus on them, we incorporate an attention layer. Finally, a dense layer, consisting of two fully connected layers and a dropout layer, calculates the probability of TF binding site occurrence based on the features learned by the proposed model. Our experimental results, using in-vivo datasets obtained from Chip-seq, demonstrate the superior performance of our proposed deep learning model in TFBS prediction compared to other existing state-of-the-art methods. The improvement in accuracy is due to additional layers of CNN and then an attention layer in the model. Thus, this result in a better performance of our approach in predicting the transcription factor binding sites and enhancing our understanding of gene regulation and genome function. Show more
Keywords: Transcription factor binding sites, one-hot encoding, convolutional layer, attention layer
DOI: 10.3233/JIFS-238159
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Vu, Hoai Nam | Nguyen, Quang Dung | Nguyen, Thuy Linh | Tran-Anh, Dat
Article Type: Research Article
Abstract: In the real world, the appearance of similar rice varieties depends on various factors such as resolution, angle, lighting conditions, and perspective. Additionally, complex environmental factors and characteristics of each rice type, such as enhanced light intensity, cross-polarization, and shading, rice background color, and image similarity, play a role. This indicates that the data augmentation process may enhance the accuracy of crop identification, particularly in the context of self-supervised machine learning. The aim of this research is to develop a precise rice segmentation method based on the improved Mask R-CNN (Region-based Convolutional Neural Network) with multitask data augmentation. The Mask …R-CNN model is enhanced by incorporating multitask input to improve feature extraction for rice. Experimental results demonstrate that the improved Mask R-CNN model can accurately segment various rice types under different conditions, such as different background colors and varying sizes of rice grains. The achieved precision, recall, F1 score, and segmentation mean Average Precision (mAP) are 95.5%, 96.3%, 95.9%, and 0.924, respectively. The average runtime on the test set is 0.35 seconds per image. Our method outperforms two comparative approaches, showcasing its ability to accurately segment rice in the market deployment phase with near real-time performance. This study establishes the foundation for the accurate detection of valuable agricultural products. Show more
Keywords: Multi-augmentation, deep learning, Mask RCNN, rice recognition, fusion metric
DOI: 10.3233/JIFS-241133
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Wang, Lin | Ye, Hongling | Wang, Pengfei | Xu, Chi | Qian, Aiwen
Article Type: Research Article
Abstract: To enhance the control performance of semi-active suspension systems, this research proposes a particle swarm optimization algorithm (PSO) with adaptive nonlinear correction of inertia weights, which is then integrated with a proportional integral differential (PID) algorithm. To this end, this research establishes quarter semi-active and passive suspension models of automobiles by utilizing the Matlab/Simulink simulation platform. In this foundation, this research further compares the advantages and disadvantages regarding performance indexes of semi-active suspension controlled by the adaptive inertia weighted particle swarm optimization (APSO) algorithm and the PID algorithm, as well as the PID-controlled semi-active suspension and passive suspension through simulation. …Simulation results indicate that performance indicator values for different suspension types increase with higher pavement grades. Compared with passive suspension, the semi-active suspension controlled by APSO and PID algorithms presents significantly improved performance indexes, with reductions of at least 31.61% in root mean square (RMS) concerning body vertical acceleration, 1.78% in suspension dynamic deflection, and 22.13% in tire dynamic loads. Moreover, analysis of suspension system frequency response characteristics demonstrates a significant decrease in droop acceleration transmission rate for the semi-active suspension with APSO and PID algorithms across the whole frequency range compared with that of the PID-controlled suspension and passive suspension. On the same note, despite the higher values of suspension dynamic deflection and tire dynamic load transfer rate in certain frequency bands, they are generally within acceptable suspension limits. Simply put, the findings confirm the feasibility of applying the APSO algorithm in PID-controlled semi-active suspension systems, which effectively improves both vehicle ride comfort and handling stability. Show more
Keywords: Semi-active suspension, PID control, improved particle swarm optimization algorithm
DOI: 10.3233/JIFS-234812
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Wang, Xiao | Wang, Dan | Zhou, Jincheng
Article Type: Research Article
Abstract: The correspondence between the decision space and the objective space is often many-to-one in multi-objective optimization problems. Therefore, a class of problems with such mapping relationships is defined as a MMOPs. For these problems, how to ensure the final solution converges to each Pareto solution set and guarantees the diversity of the algorithm is an urgent problem. The method of the paper with opposition-based strategy, a multimodal multi-objective optimization algorithm, is proposed. The algorithm proposed is called MMODE_OP, which is framed by a differential evolutionary algorithm, and opposition-based learning is applied to the initialization phase and generation-hopping phase to filter …out the more promising individuals in the population for iteration to enhance the global search capability and the diversity of population. In addition, different Gaussian perturbation strategies are adopted with iteration to achieve the search of the neighborhood, which can further not only improve the quality of the Pareto solution set but also enable the convergence of the Pareto solution set quickly. This method improves the algorithm’s local and global search ability, and enables multiple the Pareto solution set and improving the convergence. In the meantime, adaptive scaling factors and crossover factors are designed in this paper to enhance the improved search capability. Finally, the experiment results of MMODE_OP and other excellent algorithms on 13 test problems corroborate the proposed methods have superior performance. Show more
Keywords: Multimodal, multi-objective, differential evolutionary algorithm, opposition-based learning
DOI: 10.3233/JIFS-233826
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Du, Baigang | Rong, Yuying | Guo, Jun
Article Type: Research Article
Abstract: Quality Function Deployment (QFD) is a powerful approach for improving product quality that can transform customer requirements (CRs) into engineering characteristics (ECs) during product manufacturing. The limitations of traditional QFD methods lead to imprecise quantification of CRs and difficulty in accurately mapping customer needs. To address these issues, this paper introduces an innovative QFD approach that integrates extended hesitant fuzzy linguistic term sets (EHFLTSs), CRITIC, and cumulative prospect theory. The method expresses the subjectivity and hesitancy of decision makers when evaluating the relationship between ECs and CRs using EHFLTSs, considering the conflicts among CRs. The CRITIC is used to comprehensively …evaluate the comparison strength and conflict between indicators, and the cumulative prospect theory is utilized to derive the prioritization of ECs. A case study is presented to demonstrate the effectiveness of the proposed approach. Show more
Keywords: Extended hesitant fuzzy linguistic term set, cumulative prospect theory, quality function deployment, CRITIC
DOI: 10.3233/JIFS-237217
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Martín-del-Campo-Rodríguez, C. | Batyrshin, Ildar | Sidorov, Grigori
Article Type: Research Article
Abstract: Word embeddings have been successfully used in diverse tasks of Natural Language Processing, including sentiment analysis and emotion classification, even though these embeddings do not contain any emotional or sentimental information. This article proposes a method to refine pre-trained embeddings with emotional and sentimental content. To this end, a Multi-output Neural Network is proposed to learn emotions and sentiments simultaneously. The resulting embeddings are tested in emotion classification and sentiment analysis tasks, showing an improvement compared with the pre-trained vectors and other proposes in the state-of-the-art for fine-grained emotion classification.
Keywords: Word embedding, multi-output neural network, VAD, polarity, emotion classification
DOI: 10.3233/JIFS-219354
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-8, 2024
Authors: Mathi, Senthilkumar | Jothi, Uma | Saravanan, G. | Ramalingam, Venkadeshan | Sreejith, K.
Article Type: Research Article
Abstract: Mobile devices have risen due to internet growth in recent years. The next generation of internet protocol is evolving for mobile devices to generate their addresses and get continuous services across networks to support the enormous number of addresses in network-based mobility. The mobile device updates its current location to its home network and the correspondent users through a binding update scheme in the visited network. Numerous studies have investigated binding update schemes to verify the reachability of the mobile device at its home network. However, most schemes endure security threats due to the incompetence of authenticating user identity and …concealing the temporary location of mobile devices. To address these issues, this paper proposes a secure and efficient binding update scheme (One-CLU) by incorporating a one-key-based cryptographically generated address (CGA) to validate and conceal the address ownership of mobile devices with minimal computations. The security correctness of the proposed One-CLU scheme is verified using AVISPA – a model checker. Finally, the simulation and the numerical results showthat the proposed scheme significantly reduces communication payloads and costs for the binding update, binding refresh, and packet delivery. Show more
Keywords: Mobile communication, routing, privacy, cryptography, communication security
DOI: 10.3233/JIFS-219422
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Al-Azani, Sadam | Almeshari, Ridha | El-Alfy, El-Sayed
Article Type: Research Article
Abstract: Speaker demographic recognition and segmentation analytics play a key role in offering personalized experiences across different automated industries and businesses. This paper aims at developing a multi-label demographic recognition system for Arabic speakers from audio and associated textual modalities. The system can detect age groups, genders, and dialects, but it can be easily extended to incorporate more demographic traits. The proposed method is based on deep learning for feature learning and recognition. Representations of audio modality are learned through 3D spectrogram and AlexNet CNN-based architecture. An AraBERT transformer is employed for learning representations of the textual modality. Additionally, a method …is provided for fusing audio and textual representations. The effectiveness of the proposed method is evaluated using the Saudi Audio Dataset for Arabic (SADA), which is a recently published database containing audio recordings of TV shows in different Arabic dialects. The experimental findings show that when using models with standalone modalities for multi-label demographic classification, textual modality using AraBERT performed better than the audio modality represented using 3D spectrogram along with AlexNet CNN-based architecture. Furthermore, when combining both modalities, audio and textual, significant improvement has been attained for all demographic traits. Show more
Keywords: Demographic, 3D spectrogram, AraBERT, multi-label classification, Arabic LLMs, multimodal deep learning
DOI: 10.3233/JIFS-219389
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Midula, P. | Shine, Linu | George, Neetha
Article Type: Research Article
Abstract: Fabrication of semiconductor wafers is a complex process and chances of defect wafers are high. Because of defective wafers the circuit patterns will not be created correctly and it is necessary to identify them. Manual identification of defects are time consuming and expensive. Deep learning methods are widely used for defect detection. In this paper we propose a simple Convolutional Neural Network (CNN) model for classification of nine defects in wafers. A custom CNN consisting of 9 layers is used for the classification of defects as Center, Donut, Edge-Loc, Edge-Ring, Loc, Random, Scratch, Near-full, and None. Performance of the model …is evaluated using WM-811K dataset. Results shows that the model classifies the defects with high confidence score and an accuracy of 99.1% is achieved using this method. Further, the convolution operation in the CNN is realized using Coordinate Rotation Digital Computer (CORDIC) algorithm. The model is implemented in Field Programmable Gate Arrays (FPGA) and proved less complex method and consume less computational power than conventional methods. Show more
Keywords: CNN, CORDIC, FPGA, wafer maps
DOI: 10.3233/JIFS-219430
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-9, 2024
Authors: Kaur, Amandeep | Rama Krishna, C. | Patil, Nilesh Vishwasrao
Article Type: Research Article
Abstract: Software-Defined Networking (SDN) is a modern networking architecture that segregates control logic from data plane and supports a loosely coupled architecture. It provides flexibility in this advanced networking paradigm for any changes. Further, it controls the complete network in a centralized using controller(s). However, it comes with several security issues: Exhausting bandwidth and flow tables, Distributed Denial of Service (DDoS) attacks, etc. DDoS is a powerful attack for Internet-based applications and services, traditional and SDN paradigms. In the case of the SDN environment, attackers frequently target the central controller(s). This paper proposes a Kafka Streams-based real-time DDoS attacks classification approach …for the SDN environment, named KS-SDN-DDoS. The KS-SDN-DDoS has been designed using highly scalable H2O ML techniques on the two-node Apache Hadoop Cluster (AHC). It consists of two modules: (i) Network Traffic Capture (NTCapture) and (ii) Attack Detection and Traffic Classification (ADTClassification). The NTCapture is deployed on the two nodes Apache Kafka Streams Cluster (AKSC-1). It captures incoming network traffic, extracts and formulates attributes, and publishes significant network traffic attributes on the Kafka topic. The ADTClassification is deployed on the two nodes Apache Kafka Streams Cluster (AKSC-2). It consumes network flows from the Kafka topic, classifies it based on the ten attributes, and publishes it to the decision Kafka topic. Further, it saves attributes with outcome to the Hadoop Distributed File System (HDFS). The KS-SDN-DDoS approach is designed and validated using the recent “DDoS Attack SDN dataset”. The result shows that the proposed system gives better classification accuracy (100%). Show more
Keywords: Control plane, real-time, dynamic network, Apache Hadoop, data plane, Kafka streams
DOI: 10.3233/JIFS-219405
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Xu, Ying | Ji, Xinrong | Zhu, Zhengyang
Article Type: Research Article
Abstract: With the increasing penetration of distributed energy resources (DER) in microgrids, DER power inverters have become a critical asset for providing power support to these microgrids. Meanwhile, the grid-forming (GFM) inverters, among these DER inverters, have gained significant attention in microgrid applications for their capability to enable the DERs to operate in different microgrid conditions and various operation modes. Moreover, with the implementation of these GFM inverters, smooth operation mode transition, GFM functions as well as black start functions can be obtained to improve the operation of the microgrid systems. In this article, a generalized control method for a single-phase …GFM inverter is developed for community microgrid applications, facilitating smooth operation behavior in both operation modes with grid support functions and stable transition for different microgrid conditions. The control design procedure and function analysis of the proposed control method are explained in detail based on the community microgrid system. The effectiveness of the method in this paper is demonstrated on a 10 kW single-phase GFM inverter prototype with comparison to a model predictive method in recent literature. Show more
Keywords: Grid-forming inverter, microgrid, grid-support function, stable transition
DOI: 10.3233/JIFS-236902
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Tian, Jing | Zhao, Ziqi | Lin, Zheng | Zhang, Fengling | Chen, Renzhen
Article Type: Research Article
Abstract: Inter-shaft bearings are an essential component of aircraft engines, and their operational status determines the safety of aircraft engine operation. Therefore, to improve the accuracy of fault type prediction and enrich the feature information in vibration signals of aircraft engine inter-shaft bearings, this paper proposes an STFT-CNN model based on the AlexNet architecture, extending its application to the research of aircraft engine inter-shaft bearing fault diagnosis. This approach addresses the common reliance on personnel experience for fault type diagnosis in traditional aircraft engine inter-shaft bearing fault diagnosis. Firstly, real vibration fault signals from inter-shaft bearings are collected through experiments to …enrich feature information in non-stationary signals using STFT time-frequency methods. Secondly, utilizing the high interpretability of the STFT-CNN model, fault feature data from inter-shaft bearings under various operating conditions are extracted to refine our understanding of fault feature information. Finally, leveraging the robustness of the STFT-CNN model, fault types are classified and predicted. The training process involves comparative analysis using different pooling algorithms, time-frequency analysis methods, and various deep learning network models. The results demonstrate that the STFT-CNN model, employing the maximum pooling algorithm, outperforms other models in predicting inter-shaft bearing faults, achieving an average fault prediction accuracy of 98.8% . Show more
Keywords: Inter-shaft bearings, STFT-CNN model, pooling algorithms, feature extraction, classification prediction
DOI: 10.3233/JIFS-240044
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Li, Yibing | Jiang, Shijin | Wang, Lei
Article Type: Research Article
Abstract: With explosive growth of industrial big data, workshop scheduling faces problems such as high complexity, multi-dimensionality and low stability. Recent years, the wide application of deep learning provides new idea for scheduling problem. In this paper, a hybrid deep convolution network and differential evolution algorithm is proposed to solve the non-permutation flow shop scheduling problem with the goal of minimizing total completion time. Mining relationship between job attributes and process priority by deep convolutional network is core idea of this method. In this paper, differential evolution algorithm is used to obtain the data set for deep learning, and neighborhood search …algorithm is used to optimize scheduling solution. Additionally, a method combining k-means algorithm and data statistics is proposed, which provides a reasonable way for priority division. The experimental results show that this method can greatly improve scheduling efficiency. Show more
Keywords: Differential evolution algorithm, convolutional neural network, K-means algorithm; priority, flow shop scheduling
DOI: 10.3233/JIFS-236874
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Duvvuri, Kavya | Kanisettypalli, Harshitha | Masabattula, Teja Nikhil | Amudha, J. | Krishnan, Sajitha
Article Type: Research Article
Abstract: Glaucoma is an eye disease that requires early detection and proper diagnosis for timely intervention and treatment which can help slow down further progression and to manage intraocular pressure. This paper aims to address the problem by proposing a novel approach that combines a model-based Reinforcement Learning (RL) approach, called DynaGlaucoDetect, with ocular gaze data. By leveraging the RL algorithms to simulate and predict the dynamics of glaucoma, a model-based approach can improve the accuracy and efficiency of glaucoma detection by enabling better preservation of visual health. The RL agent is trained using real experiences and synthetic experiences which are …generated using the model-based algorithm Dyna-Q. Two different Q-table generation methods have been discussed: the Direct Synthesis Method (DSM) and the Indirect Synthesis Method (IdSM). The presence of glaucoma has been detected by comparing the reward score a patient obtains with the threshold values obtained through the performed experimentation. The scores obtained using DSM and IdSM have been compared to understand the learning of the agent in both cases. Finally, hyperparameter tuning has been performed to identify the best set of hyperparameters. Show more
Keywords: Glaucoma detection, model-based RL, Dyna-Q algorithm, reward system
DOI: 10.3233/JIFS-219400
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Ameen, Zanyar A. | Mohammed, Ramadhan A. | Al-shami, Tareq M. | Asaad, Baravan A.
Article Type: Research Article
Abstract: This paper introduces a new fuzzy structure named “fuzzy primal.” Then, it studies the essential properties and discusses their basic operations. By applying the q-neighborhood system in a primal fuzzy topological space and the Łukasiewicz disjunction, we establish a fuzzy operator (·) ⋄ on the family of all fuzzy sets, followed by its core characterizations. Next, we use (·) ⋄ to investigate a further fuzzy operator denoted by Cl ⋄ . To determine a new fuzzy topology from the existing one, the earlier fuzzy operators are explored. Such a new fuzzy topology is called primal fuzzy topology. Various properties of …primal fuzzy topologies are found. Among others, the structure of a fuzzy base that generates a primal fuzzy topology. Furthermore, the concept of compatibility between fuzzy primals and fuzzy topologies is introduced, and some equivalent conditions to that concept are examined. It is shown that if a fuzzy primal is compatible with a fuzzy topology, then the fuzzy base that produces the primal fuzzy topology is itself a fuzzy topology. Show more
Keywords: Fuzzy primal, fuzzy grill, fuzzy ideal, primal fuzzy topology, fuzzy ideal topology
DOI: 10.3233/JIFS-238408
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Deepak Raj, D.M. | Arulmurugan, A. | Shankar, G. | Arthi, A. | Panthagani, Vijaya Babu | Sandeep, C.H.
Article Type: Research Article
Abstract: The technique of determining the borders between several objects or regions in an image is known as edge detection. The edges of an object in an image serve as the object’s limits and can reveal crucial details about the object’s size, shape, and position. The pre-processing stage of edge detection is crucial because it can increase the precision and effectiveness of edge detection algorithms. As low-density or low-pixel values muddy the image, detecting edges in low-resolution images is difficult. This paper aims to introduce LRED, an improved edge detection model for low-resolution images based on Gaussian smoothing. Also used for …image pre-processing and smoothing is the Gaussian filter. The Gaussian smoothing method works well for spotting edges in images. Additionally, we have presented a comprehensive comparison of our proposed approach with three modern, cutting-edge detection approaches and algorithms. Investigations have been conducted on several images in addition to low-quality images to discover edges. RMSE and PSNR are two different evaluation metrics used to measure proposed methods. LRED achieved 90.25% MSE, which is slightly better than the other three approaches which show more reliable outcomes. Show more
Keywords: Edge detection, image pre-processing, image smoothing, low resolution image, metrics
DOI: 10.3233/JIFS-235332
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2023
Authors: Niyasudeen, F. | Mohan, M.
Article Type: Research Article
Abstract: With the growing reliance on cloud computing, ensuring robust security and data protection has become a pressing concern. Traditional cryptographic methods face potential vulnerabilities in the post-quantum era, necessitating the development of advanced security frameworks. This paper presents a fuzzy-enhanced adaptive multi-layered cloud security framework that leverages artificial intelligence, quantum-resistant cryptography, and fuzzy systems to provide comprehensive protection in cloud environments. The proposed framework incorporates data encryption, access control, and intrusion detection mechanisms, with fuzzy logic systems augmenting the decision-making process for threat detection and response. The integration of artificial intelligence and quantum-resistant cryptographic techniques enhances the framework’s adaptability and …resilience against emerging threats. The implementation of fuzzy systems further improves the accuracy and efficiency of the security mechanisms, ensuring robust protection in the face of uncertainty and evolving attack vectors. The fuzzy-enhanced adaptive multi-layered cloud security framework offers a comprehensive, adaptable, and efficient solution for securing cloud infrastructures, safeguarding sensitive data, and mitigating the risks associated with the post-quantum era. Show more
Keywords: Cloud security, artificial intelligence, quantum-resistant cryptography, fuzzy systems, adaptive multi-layered framework
DOI: 10.3233/JIFS-233462
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2023
Authors: Kandan, M. | Durai Murugan, A. | Ramu, Gandikota | Ramu, Gandikota | Gnanamurthy, R.K. | Bordoloi, Dibyahash | Rawat, Swati | Murugesan, | Prasad, Pulicherla Siva
Article Type: Research Article
Abstract: Privacy-Preserving Fuzzy Commitment Schemes (PPFCS) have emerged as a promising solution for secure Internet of Things (IoT) device authentication, addressing the critical need for privacy and security in the rapidly growing IoT ecosystem. This paper presents a novel PPFCS-based authentication mechanism that protects sensitive user data and ensures secure communication between IoT devices. The proposed scheme leverages error-correcting codes (ECC) and cryptographic hash functions to achieve reliable and efficient authentication. The PPFCS framework allows IoT devices to authenticate themselves without revealing their true identity, preventing unauthorized access and preserving users’ privacy. Furthermore, our PPFCS-based authentication mechanism is resilient against various …attacks, such as replay, man-in-the-middle, and brute-force attacks, by incorporating secure random nonce generation and timely key updates. We provide extensive experimental results and comparative analysis, demonstrating that the proposed PPFCS significantly outperforms existing authentication schemes in terms of security, privacy, and computational efficiency. As a result, the PPFCS offers a viable and effective solution for ensuring secure and privacy-preserving IoT device authentication, mitigating the risks associated with unauthorized access and potential data breaches in the IoT ecosystem. Show more
Keywords: Privacy-preserving, fuzzy commitment, IoT device authentication, error-correcting codes, cryptographic hash functions
DOI: 10.3233/JIFS-234100
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-9, 2023
Authors: Ganesh, Aurobind | Ramachandiran, R.
Article Type: Research Article
Abstract: Globally, the two main causes of young people dying are mental health issues and suicide. A mental health issue is a condition of physiological disorder that inhibits with the vital process of the brain. The amount of individuals with psychiatric illnesses has considerably increased during the past several years. The majority of individuals with mental disorders reside in India. The mental illness can have an impact on a person’s health, thoughts, behaviour, or feelings. The capacity of controlling one’s thoughts, emotions, and behaviour might help an individual to deal with challenging circumstances, build relationships with others, and navigate life’s problems. …With a primary focus on the healthcare domain and human-computer interaction, the capacity to recognize human emotions via physiological and facial expressions opens up important research ideas as well as application-oriented potential. Affective computing has recently become one of the areas of study that has received the greatest interest from professionals and academics in a variety of sectors. Nevertheless, despite the rise in articles published, the reviews of a particular aspect of affective computing in mental health still are limited and have certain inadequacies. As a result, a literature survey on the use of affective computing in India to make decisions about mental health issues is discussed. As a result, the paper focuses on how traditional techniques used to monitor and assess physiological data from humans by utilizing deep learning and machine learning approaches for humans’ affect recognition (AR) using Affective computing (AfC) which is a combination of computer science, AI, and cognitive science subjects (such as psychology and psychosocial). Show more
Keywords: Affective computing, mental Health, decision making, machine learning, deep learning
DOI: 10.3233/JIFS-235503
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2023
Authors: Prasad, Mal Hari | Swarnalatha, P.
Article Type: Research Article
Abstract: The model-based methods were utilized in order to produce the test cases for the behavioral model of a software system. Run test cases habitually or physically facilitates premature identification of requirement errors. Regression test suite design is thought-provoking as well as significant task in this automated test design. General techniques of regression testing comprise rerunning formerly accomplished tests as well as inspecting whether program behavior has modified as well as formerly fixed faults have recurred. Regression testing is carried out with the intension of assessing a system skillfully by means of logically picking the right least set of tests essential …to suitably cover a particular modification. Then again, the relapse testing occasions of experiment prioritization, test suite decrease, and relapse test choice are commonly focused on conditions, which recognize the experiments to pick or the experiment to run thusly in independent framework. As indicated by experiment prioritization, experiments are very much arranged ward upon some condition just as experiments with greatest need are run first to achieve a presentation objective. If there should be an occurrence of test suite decrease/minimization, experiment, which end up being ended over the long haul are dismissed from the test suite with the intension of making a minor arrangement of experiments. In the event of relapse test determination, from a prevalent unique suite, a subset of experiments is picked. Show more
Keywords: Test case prioritization, test criteria, generalized predictive control, rudder performance testing system
DOI: 10.3233/JIFS-233547
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2023
Authors: Famila, S. | Jawahar, A. | Arthi, A. | Supriya, N. | Ramadoss, P.
Article Type: Research Article
Abstract: The maximization of lifetime in Wireless Sensor Networks (WSNs) is always made feasible by conserving energy and maintaining synchronization in the connectivity between its nodes. The selection of Cluster head (CH) methodology used during data dissemination process from the CH to the BS determines the energy conversation which is necessary for extending the network’s lifetime. Initially, the nodes are localized using Graphical Recurrent Neural Network. In this research, a hybrid monarchy butterfly and chicken swarm optimization based cluster head selection (HMB-CSO-CHS) method is used to enhance the lifespan of sensor networks. This suggested HMB-CSO-CHS Scheme uses the benefits of the …Hybrid Monarchy butterfly and chicken swarm optimization algorithm for the efficient selection of cluster heads by establishing reliable tradeoffs between their exploitation and exploration potentials with optimized convergence rate. The simulation-based investigation of the suggested HMB-CSO-CHS Scheme confirms its effectiveness in reducing the rate of mortality among the sensor nodes such that remarkable improvement in lifetime can be realized in the network When analyzing HMB-CSO-CHS method, it is noted that energy consumption and packet delivery ratio is completely reduced when comparing with existing methods. Show more
Keywords: Monarchy butterfly, chicken swarm optimization, cluster head selection, exploitation, exploration, best individual solution
DOI: 10.3233/JIFS-233681
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2023
Authors: Venkata Vidyalakshmi, Guggilam | Gopikrishnan, S.
Article Type: Research Article
Abstract: In the realm of Internet of Things (IoT) sensor data, missing patterns often occur due to sensor glitches and communication problems. Conventional missing data imputation methods struggle to handle multiple missing patterns, as they fail to fully leverage the available data as well as partially imputed data. To address this challenge, we propose a novel approach called Univariate data Imputation using Fast Similarity Search (UIFSS). The proposed method solved the missing data problem of IoT data using fast similarity search that can suits different patterns of missingness. Exploring similarities between data elements, a problem known as all-pairs-similarity-search, has been extensively …studied in fields like text analysis. Surprisingly, applying this concept to time series subsequences hasn’t seen much progress, likely due to the complexity of the task. Even for moderately sized datasets, the traditional approach can take a long time, and common techniques to speed it up only help a bit. Notably, for very large datasets, our algorithm can be easily adapted to produce high-quality approximate results quickly. UIFSS consists of two core components:Sensor sorting with Similar Node Clustering (SSNC) and Imputation Estimator using Fast Similarity Search(IEFSS). The SSNC, encompassing missing sensor sorting depending on their entropy to guide the imputation process. Subsequently, IEFSS uses global similar sensors and captures local region volatility, prioritizing data preservation while improving accuracy through z-normalized query based similarity search. Through experiments on simulated and bench mark datasets, UIFSS outperforms existing methods across various missing patterns. This approach offers a promising solution for handling missing IoT sensor data and with improved imputation accuracy. Show more
Keywords: Data imputation, internet of things, spatial correlation, univariate data, data quality, similarity search
DOI: 10.3233/JIFS-233446
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-19, 2023
Authors: Praba, M.S. Bennet | Subashka Ramesh, S.S.
Article Type: Research Article
Abstract: A unique system that offers traffic management, mobility management, and proactive vulnerability identification is the vehicular ad hoc network (VANET). With the use of efficient deep learning algorithms, intrusion prevention practices can improve their reliability. Many assaults, like Sybil, Blackhole, Wormhole, DoS attack, etc. expose them to risk. These intrusions compromise efficiency and dependability by taking advantage of network connectivity. The use of amazingly precise learning models to anticipate a variety of threats in VANET has not yet been thoroughly explored. To categorize numerous attacks on the VANET scenario, we develop a novel efficient integrated Long Short Term Memory (LSTM) …paradigm. The system employs the Panthera Leo Hunting Optimization (PLHO) method to modify the hyper-parameters of the systems to enhance the LSTM model’s detection rate under different threat situations. SUMO-OMNET++and Veins, two well-known modeling programs were utilized to gather the various VANET variables for both normal and malicious scenarios. The improved LSTM model was evaluated using actual information that had been recorded. The outcomes from the various learning models were merged with performance measures to show the algorithm’s efficiency and individuality. As the space between nearer vehicles reduces abruptly, a collision happens. So, to provide a realistic collision prevention system, it is necessary to collect exact and detailed information on the distance between every vehicle and all of the nearby vehicles. We suggest using a Carbon Nanotube Network (CNT) combined with the other Nanodevices to achieve reliability on the scale of millimeters. Modeling findings that the proposed novel approach succeeded with strong recognition capabilities. Show more
Keywords: Vehicular ad-hoc networks, traffic management, long short term memory, panthera leo hunting, nanotechnology devices
DOI: 10.3233/JIFS-234401
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2023
Authors: Elangovan, D. | Subedha, V.
Article Type: Research Article
Abstract: Opinion Mining and Sentiment Analysis acts as a pivotal role in facilitating businesses to actively operate on enhancing the business strategies and accomplish detailed insights of the consumer’s feedback regarding the products. In recent times, deep learning (DL)technique has been used for many sentiment analysis tasks and has attained effective outcomes. Huge quantity of product reviews is being posted by the customer on different e-commerce and social networking platforms which can assist the developers to improve the quality of the products. The study focuses on the design of Sentiment Classification on Online Product Reviews using Dwarf Mongoose Optimization with Attention …based Deep Learning (DMO-ABDL) model. The proposed DMO-ABDL technique analyzes the product reviews for the identification of sentiments. To accomplish this, the DMO-ABDL technique performs different stages of preprocessing to transform the actual data into suitable format. Furthermore, the Glove technique is employed for word embedding process. Moreover, attention based long short-term memory (ALSTM) approach was exploited for sentiment classification and its hyperparameters can be optimally chosen by the DMO technique. A comprehensive set of experiments were performed in order to guarantee the enhanced sentiment classification performance of the DMO-ABDL algorithm. A brief comparative study highlighted the supremacy of the DMO-ABDL technique over other existing approaches under different measures. Show more
Keywords: Sentiment analysis, natural language processing, hybrid models, deep learning, hyperparameter optimization
DOI: 10.3233/JIFS-233611
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2023
Authors: Abd Algani, Yousef Methkal | Babu, K. Suresh | Beram, Shehab Mohamed | Al Ansari, Mohammed Saleh | Tapia-Silguera, Ruben Dario | Borda, Ricardo Fernando Cosio | Bala, B. Kiran
Article Type: Research Article
Abstract: Growing older is a phenomenon that is associated with increasingly complex health situations as a result of the coexistence of several chronic diseases. As a result, there is a downward tendency in both older people and their caretakers’ quality of life, which frequently results in frailty. There are numerous solutions available to treat the issue, which primarily affects older people. The basic and most popular imaging method for predicting cognitive impairment is magnetic resonance imaging. Furthermore, few of the earlier models had a definite level of accuracy when diagnosing the condition. Further, there is a critical need to put in …place a stronger, more reliable approach to precise prediction. When compared to other procedures, using magnetic resonance images to predict cognitive decline is the safest and most straightforward. The advanced concept for a better optimized strategy to predict cognitive impairment at an early stage is presented in this research. The hybrid krill herd and grey wolf optimization method is offered as a solution to address the challenges in locating the impacted area. In a short amount of time, a significant number of MRI images are analyzed, and the results show a more precise or higher rate of recognition. Show more
Keywords: Fuzzy model, soft computing, cognitive impairment, dementia, fuzzy C-Means clustering
DOI: 10.3233/JIFS-233695
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2023
Authors: Sivaranjani, N. | Senthil Ragavan, V.K. | Jawaherlalnehru, G.
Article Type: Research Article
Abstract: Industry experts are motivated to collect, collate, and analyse historical data in the legal sector in attempt to predict court case outcomes as the amount of historical data available in this field has increased over time. But using judicial data to predict and defend court judgements is no simple undertaking. Using Machine Learning (ML) models and traditional approaches for categorical feature encoding, previous research on predicting court outcomes using limited experimental datasets produced a number of unexpected predictions. The paper proposes an ensemble model combining Convolutional Neural Network (CNN), attention mechanism and eXtreme Gradient Boosting (XGB) algorithm. This model is …primarily based on a self-attention network, which could simultaneously capture linguistic relationships over lengthy sequences like RNN (Recurrent Neural Network) and is nevertheless speedy to train like CNN. C-XGB can obtain accuracy that surpasses the state-of-art model on numerous classification/prediction tasks simultaneously as being twice as speedy to train. The proposed C-XGB model is designed to process the documents hierarchically and calculates the attention weights. Two convolutional layers are used to calculate the attention weights, one at the word level and another at the sentence level. And finally, at the last layer, the XGB algorithm predicts the input case file’s outcome. The experimental results shows that the proposed model outperforms the existing model with 4.67% improvement in accuracy value. Show more
Keywords: Neural Networks, machine learning, legal judgment prediction, Indian Supreme Court
DOI: 10.3233/JIFS-235936
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Sugin Lal, G. | Porkodi, R.
Article Type: Research Article
Abstract: The term “educational data mining” refers to a field of study where information from academic environments is predicted using data mining, machine learning, and statistics. Education is the act of giving or receiving knowledge to or from someone who is formally studying and developing a natural talent. Over time, scholars have used data mining techniques to uncover hidden information in educational statistics and other external elements. This study suggests a unique method for analysing academic student performance that is based on data mining and machine learning. Here, the input is gathered as a dataset of student academic performance and is …processed for normalisation and noise reduction. Then, using the Boltzmann deep learning model coupled with linear kernel principal component analysis, this data’s characteristics were retrieved and chosen. Based on weights, information gain, and the Gini index, the characteristics are assessed and optimised. Following the selection of the pertinent data, conditional random field-based probabilistic clustering model is performed using RNN-based training, and the academic performance of the students is then examined using voting classifiers and sparse features. Experimental results are carried out for students academic performance dataset based on subjects in terms of training accuracy, validation accuracy, mean average precision, mean square error and correlation evaluation. Proposed technique attained accuracy of 96%, precision of 95%, Correlation Evaluation of 92% . Show more
Keywords: Student performance analysis, data mining, machine learning, clustering model, academic performance
DOI: 10.3233/JIFS-235350
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Bala, B. Kiran | Sekhar, J.C. | Al Ansari, Mohammed Saleh | Rao, Vuda Sreenivasa
Article Type: Research Article
Abstract: A plant disease that attacks the leaf causes significant yield and market value losses. A professional plant pathologist should be able to visually identify the disease by looking at the affected plant leaves, but this is unlikely to result in a more accurate diagnosis. Disease symptoms should be immediately recognisable in order to stop the spread of the illness. To find plant diseases, steps should be taken using computer assisted technologies. Numerous methods for identifying plant diseases using machine learning (ML) and deep learning (DL) have been developed and tested in numerous studies. Machine learning has the disadvantages of having …a small dataset, taking longer, and requiring more time for results interpretation. Deep learning is suggested as a solution to this. This study compares the effectiveness of both ML&DL for plant leaf disease identification with more recent investigations. The common deep learning technique involves utilising the Krill Herd Optimisation Algorithm (KHO) to segment images and the Speeded up Robust Features (SURF) to extract the images. The Artificial Bee Colony (ABC) then chooses the features. Then, a Deep Belief Network (DBN) can be used to classify the chosen image. Multiple diseases can be identified on the same leaf using this method. This study demonstrates that deep learning outperforms machine learning in terms of results. The outcome demonstrates that the deep learning method is superior for the diagnosis of plant disease when there is sufficient data available. Using this technique, the validity and consistency were also examined. Show more
Keywords: Krill herd algorithm, artificial bee colony, deep learning, SURF, machine learning, DBN
DOI: 10.3233/JIFS-234864
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Mohan, M. | Tamizhazhagan, V. | Balaji, S.
Article Type: Research Article
Abstract: Cloud computing is a new technology that provides services to customers anywhere, anytime, under varying conditions and managed by a third-party cloud provider. Even though cloud computing has progressed a lot, some attacks still happen. The recent anomalous and signature attacks use clever strategies such as low-rate attacks and attacking as an authenticated user. In this paper, a novel Attack Detection and Prevention (ADAPT) method is proposed to overcome this issue. The proposed system consists of three stages. An Intrusion Detection System is initially used to check whether there is an attack or not by comparing the IP address in …the Blacklist IP Database. If an attack occurs, the IP address will be added to the Blacklist IP database and blocked. The second stage uses Bi-directional LSTM and Bi-directional GRU to check the anomalous and signature attack. In the third stage, classified output is sent to reinforcement learning, if any attack occurs the IP address is added to the blacklist IP database otherwise the packets are forwarded to the user. The proposed ADAPT technique achieves a higher accuracy range than existing techniques. Show more
Keywords: Cloud computing, Bi-directional LSTM, Bi-directional GRU, IP address, and reinforcement learning
DOI: 10.3233/JIFS-236371
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Yu, Xingping | Yang, Yang
Article Type: Research Article
Abstract: The rapid advancement of communication and information technology has led to the expansion and blossoming of digital music. Recently, music feature extraction and classification have emerged as a research hotspot due to the difficulty of quickly and accurately retrieving the music that consumers are looking for from a large volume of music repositories. Traditional approaches to music classification rely heavily on a wide variety of synthetically produced aural features. In this research, we propose a novel approach to selecting the musical genre from user playlists by using a classification and feature selection machine learning model. To filter, normalise, and eliminate …missing variables, we collect information on the playlist’s music genre and user history. The characteristics of this data are then selected using a convolutional belief transfer Gaussian model (CBTG) and a fuzzy recurrent adversarial encoder neural network (FRAENN). The experimental examination of a number of music genre selection datasets includes measures of training accuracy, mean average precision, F-1 score, root mean squared error (RMSE), and area under the curve (AUC). Results show that this model can both create a respectable classification result and extract valuable feature representation of songs using a wide variety of criteria. Show more
Keywords: Music genre selection, user playlists, machine learning, classification, feature selection
DOI: 10.3233/JIFS-235478
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Prabu Sankar, N. | Usha, D.
Article Type: Research Article
Abstract: This research paper presents a novel approach to improving healthcare services in rural areas by leveraging the potential of Fuzzy Intelligence Systems, Internet of Bodies (IoB) devices, and Blockchain technology. It begins by exploring the design and development of a Blockchain-based Patients Record System (BPRS), which ensures secure, transparent, and tamper-proof storage of patient medical records. The paper then delves into the fabrication of advanced IoB devices, specifically designed to study and monitor the health of rural populations. These devices, integrated with Fuzzy Intelligence Systems, provide efficient and reliable data capture, interpretation, and decision-making support. The highlight of the study …is the innovative integration of the IoB enabled Patient Monitoring System with the BPRS, which ensures real-time data synchronization and secure access to patient data for authorized personnel. The system collectively promotes efficient healthcare delivery, data privacy, and patient safety in rural areas. Show more
Keywords: Fuzzy intelligence systems, blockchain-based patients record system, internet of bodies devices, rural health monitoring, integrated healthcare system
DOI: 10.3233/JIFS-233752
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-9, 2024
Authors: Kexing, Zhang | Jiang, He
Article Type: Research Article
Abstract: Recent developments in wireless networking, big data technologies including 5G networks, healthcare big data analytics, the Internet of Things (IoT), sophisticated wearable technologies, and artificial intelligence (AI) have made it possible to design intelligent illness diagnostic models. In addition to its critical function in e-health applications, 5G-IoT is becoming a standard feature of intelligent software. Intelligent systems and architectures are necessary for e-health applications to counteract threats to the privacy of patients’ medical information. Using machine learning and IoMT, this research suggests a new approach to cloud data analysis using the 5G network in the context of a recommendation model. …This application of the 5G cloud network to the monitoring and analysis of healthcare data makes use of variational adversarial transfer convolutional neural networks. The treatment plan for abnormalities in a tolerant body is derived from this clustered outcome. Experiment analysis was performed for a number of healthcare datasets with respect to training precision, network efficiency, F-1 score, root-mean-squared error, and mean average precision as the metrics of interest. Show more
Keywords: 5G network, cloud data analysis, recommendation model, machine learning, internet of medical things (IoMT)
DOI: 10.3233/JIFS-235064
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-7, 2024
Authors: Rao, Bommaraju Srinivasa | Banerjee, Kakoli | Anand Deva Durai, C. | Balu, S. | Sahoo, Ashok Kumar | Priyadharshini, A. | Rama Krishna, Paladugu | Kakade, Revannath Babanrao
Article Type: Research Article
Abstract: In recent years, the Internet of Things (IoT) has rapidly emerged as an essential technology, enabling seamless communication between billions of interconnected devices. These devices generate a massive amount of data that requires efficient management to ensure optimum performance in IoT environments. Dynamic load balancing (DLB) is a crucial technique employed to distribute workloads evenly across multiple computing resources, thereby reducing latency and increasing the overall efficiency of IoT networks. This paper presents a novel DLB approach based on type-2 fuzzy logic systems (T2FLS) to enhance the performance and reliability of IoT environments. The proposed T2FLS-based DLB technique addresses the …inherent uncertainties and imprecisions in IoT networks by considering various parameters, such as workload, processing capability, and communication latency. A comprehensive performance evaluation is carried out to compare the proposed method with traditional DLB approaches. Simulation results demonstrate that the T2FLS-based DLB technique significantly improves the network’s response time, throughput, and energy efficiency, while also providing better adaptability and robustness to dynamic changes in IoT environments. This study contributes to the advancement of DLB techniques in IoT networks and lays the groundwork for further research in this field. Show more
Keywords: Dynamic load balancing, internet of things, type-2 fuzzy logic systems, performance evaluation, energy efficiency
DOI: 10.3233/JIFS-234105
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-9, 2024
Authors: Ma, Nana | Wang, Lili | Long, Yuting
Article Type: Research Article
Abstract: Music has been utilized throughout history as a medium for cultural communication and artistic expression, embodying various nations’ and societies’ ideologies and experiences. Music culture communication is crucial for encouraging cultural diversity and understanding and developing social cohesion and community building among people. Music teaching management is the process of setting up, arranging, and executing music education programs in a manner that successfully teaches students the essential skills and information necessary for becoming proficient musicians. Users’ exact preferences for various areas of attraction cannot be determined, nor are users’ choices for traditional music recommendations sufficiently accurate. A recommender system estimates …or anticipates people’s preferences and offers appropriate recommendations. First, the sparsity problem emerges when insufficient data is accessible for the recommendation, and the coverage is one of the key drawbacks of social labeling. Cold start issues might be difficult since new music learners might not have given sufficient details about their musical tastes. Hence, the Hybridized Fuzzy logic-based Content and Collaborative Music Recommendation (HFC2MR) system is proposed to create personalized music teaching plans that are effective and engaging for each student based on their music preferences and learning outcomes. Enhanced Fuzzy C-Means clustering is used in collaborative recommendations to group users based on their shared musical tastes and to provide each user with more individualized, accurate music recommendations based on other users’ listening habits and preferences in the same cluster. Subsequently, an assessment of the recommender system using parameters like accuracy, precision, f1-score, and recall ratio is shown with optimal cluster selection. The coverage ratio is used to compare experimental data based on skill capacity covered through the assessment of music teaching. RMSE metric is used to evaluate the accuracy of students’ performance based on music attributes related to teaching goals. Show more
Keywords: Music teaching management, fuzzy logic, recommender system, clustering and similarity
DOI: 10.3233/JIFS-232422
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Zhou, Yue | Chen, Qiwei
Article Type: Research Article
Abstract: Studying the evolution of karst rocky desertification (KRD) in control areas of diverse geomorphologic types and its correlation with land use provides valuable insights for identifying priority areas and implementing effective treatment measures. Employing Remote Sensing (RS) and GIS, this research quantitatively examines the evolution of KRD and its relationship with land use in the karst mountain and gorge areas of Guizhou Province over the period 2010 to 2020. The findings reveal continuous improvement in KRD across the study areas, albeit with noticeable regional disparities. Notably, the karst mountain region exhibited significantly higher change areas and rates of KRD, non-KRD, …light KRD, and moderate KRD compared to the gorge area, underscoring better desertification control in the former region. A discernible correlation emerges between different karst geomorphologic types, the distribution and changes in land use types, and the evolution of KRD. Land use change emerges as a pivotal factor influencing the improvement of KRD in these areas. Changes in land use patterns corresponded with a decrease in KRD in dry land, other woodland, grassland, and bare land across both regions. However, the response of KRD to land use patterns varied across control areas with different geomorphologic environments, resulting in geographical differentiation in KRD evolution. Key land use conversions, notably from shrubland to forestland and dry land to garden land in the gorge, and shrubland to forestland in the mountain, contributed significantly to KRD dynamics in these regions. Notably, in the gorge area, KRD primarily occurred in garden land, other woodland, dry land, and grassland. In contrast, in the mountain area, KRD was prevalent in shrubland, dry land, and grassland, highlighting distinct responses and contributions to its evolution. The study observes substantial land use change in KRD-improved areas, particularly in the gorge region. Notably, the responsiveness of KRD to woodland conversions (shrubland, forestland, other woodland) varied across different geomorphologic environments. The dynamics of rocky desertification occurrence (RDO) and the occurrence structure of KRD in various land use types exhibited significant differences between the two regions. The gorge area demonstrated generally higher RDO, with a relatively stable and simpler occurrence structure of KRD compared to the more dynamic and varied structure observed in the mountain area. The sequencing of KRD occurrence in both areas displayed stability in specific land use types, with varying intensities noted between them. Show more
Keywords: Karst, rocky desertification, land use, evolution, geomorphology
DOI: 10.3233/JIFS-241536
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Qin, Hao | Zou, Yanli | Yu, Guoliang | Liu, Huipeng | Tan, Yufei
Article Type: Research Article
Abstract: In the process of mapping outdoor undulating and flat roads, existing LiDAR SLAM systems often encounter issues such as map distortion and ghosting. These problems arise due to the low vertical resolution of multi-line LiDAR, which easily leads to the occurrence of odometry height drift during the mapping process. To address this challenge, this study propose a novel LiDAR SLAM system named SOHD-LOAM, designed specifically to suppress odometry height drift. This system encompasses several critical components, including data preprocessing, front-end LiDAR odometry, back-end LiDAR mapping, loop detection, and graph optimization. SOHD-LOAM leverages the road gradient limitation algorithm and the height …smoothing algorithm as its core, while also integrating the Kalman filter, loop detection, and graph optimization techniques. To evaluate the performance of SOHD-LOAM, the comprehensive experiments are conducted with using KITTI datasets and real-world scenes. The experimental results demonstrate that SOHD-LOAM achieves superior accuracy and robustness in global odometry compared to the state-of-the-art LEGO-LOAM. Specifically, the height error of the sequences 00, 05 experiment was found to be 40.62% and 61.92% lower than that of LEGO-LOAM. Additionally, the maps generated by SOHD-LOAM exhibit no distortion or ghosting, thereby significantly enhancing map quality. Show more
Keywords: Autonomous driving, SLAM, odometry height drift, road gradient limitation, height smoothing, loop detection
DOI: 10.3233/JIFS-235708
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Wei, YuHan | Kim, Young-Ju
Article Type: Research Article
Keywords: Camel herd algorithm (CHA), camel-bat swarm optimization (CBSO), cultural and creative product (CCP) Design, graphic design
DOI: 10.3233/JIFS-236320
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Lalitha, S. | Sridevi, N. | Deekshitha, Devarasetty | Gupta, Deepa | Alotaibi, Yousef A. | Zakariah, Mohammed
Article Type: Research Article
Abstract: Speech Emotion Recognition (SER) has advanced considerably during the past 20 years. Till date, various SER systems have been developed for monolingual, multilingual and cross corpus contexts. However, in a country like India where numerous languages are spoken and often humans converse in more than one language, a dedicated SER system for mixed-lingual scenario is more crucial to be established which is the focus of this work. A self-recorded database that includes speech emotion samples with 11 diverse Indian languages has been developed. In parallel, a mixed-lingual database is formed with three popular standard databases of Berlin, Baum and SAVEE …to represent mixed-lingual environment for western background. A detailed investigation of GeMAPS (Geneva Minimalistic Acoustic Parameter Set) feature set for mixed-lingual SER is performed. A distinct set of MFCC (Mel Frequency Cepstral Coefficients) coefficients derived from sine and cosine-based filter banks enriches the GeMAPS feature set and are proven to be robust for mixed-lingual emotion recognition. Various Machine Learning (ML) and Deep Learning (DL) algorithms have been applied for emotion recognition. The experimental results demonstrate GeMAPS features classified from ML has been quite robust for recognizing all the emotions across the mixed-lingual database of the western languages. However, with diverse recording conditions and languages of the Indian self-recorded database the GeMAPS with enriched features and classified using DL are proven to be significant for mixed-lingual emotion recognition. Show more
Keywords: Emotion, GeMAPS, mixed-lingual, sine, cosine filter bank
DOI: 10.3233/JIFS-219390
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Bisht, Akhilesh | Gupta, Deepa
Article Type: Research Article
Abstract: Neural Machine Translation (NMT) for low resource languages is a challenging task due to unavailability of large parallel corpus. The efficacy of Transformer based NMT models largely depends on scale of the parallel corpus and the configuration of hyperparameters implemented during model training. This study aims to delve into and elucidate the impact of hyperparameters on the performance of NMT models for low resource languages. To accomplish this, a series of experiments are conducted using an open-source Hindi-Kangri corpus to train both supervised and semi-supervised NMT models. Throughout the experimentation process, a significant number of discrepancies were identified within the …data-set, necessitating manual correction. The best translation performance evaluated with respect to the metrics such as BLEU (0–1), SacreBLEU (0–100), Chrf (0–100), Chrf+ (0–100), Chrf++ (0–100) and TER (%) is (0.15, 14.98, 41.43, 41.49, 38.77, 68.20) for Hindi to Kangri direction, and (0.283, 28.17, 49.71, 50.64, 48.63, 51.25) for Kangri to Hindi direction. Show more
Keywords: Neural machine translation, low resource language, low resource MT, transformers, semi-supervised MT, Kangri, natural language processing
DOI: 10.3233/JIFS-219384
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Momena, Alaa Fouad | Gazi, Kamal Hossain | Mukherjee, Asesh Kumar | Salahshour, Soheil | Ghosh, Arijit | Mondal, Sankar Prasad
Article Type: Research Article
Abstract: Use of the Internet of Everything (IoE), the number of smart gadgets increasing rapidly giving the side effect of huge data, which has led to issues with traditional cloud computing models like inadequate security, slow response times, poor privacy, and bandwidth overload. Conventionally, cloud computing is no longer adequate for supporting the diversified needs of the user and the extraordinary society of data processing, so edge computing technologies have been revealed. This study considers edge computing in an educational institute in a scientific way. Multi criteria decision making (MCDM) is one of the most suitable decision making processes that propose …to choose optimal alternatives by considering multiple conflicting criteria. Entropy weighted method is considered to evaluate factor weight. Weighted Aggregated Sum Product Assessment (WASPAS) and Combined Compromise Solution (CoCoSo) based MCDM methodologies examine the ranking of alternatives for this study. Multiple decision makers (DMs) give opinions with Pentagonal Fuzzy Soft Set (PFSS) to express the uncertainty and fuzziness of the data set. The set operations and arithmetic operations of PFSS are discussed in detail. Also, a new de-fuzzification method of PFSS is proposed in this study. Calculated the criteria weight and prioritized the alternative based on source data. Lastly, sensitivity analysis and comparative analysis are conducted to check the stability of the result. Show more
Keywords: Edge computing, Academic institute, PFSS, Entropy, WASPAS, CoCoSo
DOI: 10.3233/JIFS-239887
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Jaiseeli, C. | Raajan, N.R.
Article Type: Research Article
Abstract: Medical and satellite image analysis require incredibly high resolution. Super-resolution combines several low-resolution images of the same scene to generate a high-resolution image. The Super resolution employing deep learning techniques still has an illumination issue. This paper proposes a novel CGIHE-VDSR algorithm that integrates the Very Deep Super Resolution (VDSR) Network with Color Global Image Histogram Equalization (CGIHE) to improve image resolution. In the proposed method, the low-resolution image is first histogram equalized using the CGIHE algorithm. Then, the VDSR network is applied to the histogram equalized image for super-resolution. The comparison of real-time data with the benchmark images is …done using the proposed algorithm in the MATLAB platform. The PSNR and SSIM metrics demonstrate that the super resolution image obtained using the proposed method is significantly better than the existing methods. Show more
Keywords: Histogram equalization, super-resolution, CNN, subsample image, VDSR, residual
DOI: 10.3233/JIFS-219392
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Javed, Hira | Sufyan Beg, M.M. | Akhtar, Nadeem | Alroobaea, Roobaea
Article Type: Research Article
Abstract: Vlogs, Recordings, news, sport coverages are huge sources of multimodal information that do not just limit to text but extend to audio, images and videos. Applications such as summary generation, image/video captioning, multimodal sentiment analysis, cross modal retrieval requires Computer Vision along with Natural Language Processing techniques to extract relevant information. Information from different modalities must be leveraged in order to extract quality content. Hence, reducing the gap between different modalities is of utmost importance. Image to text conversion is an emerging field and employs the use of encoder decoder architecture. Deep CNNs extract the feature of images and sequence …to sequence models are used to generate text description. This paper is a contribution towards the growing body of research in multimodal information retrieval. In order to generate the textual description of images, we have performed 5 experiments using the benchmark Flickr8k dataset. In these experiments we have utilized different architectures - simple sequence to sequence model, attention mechanism, transformer-based architecture to name a few. The results have been evaluated using BLEAU score. Results show that the best descriptions are attained by making use of transformer architecture. We have also compared our results with the pretrained visual model vit-gpt2 that incorporates visual transformer. Show more
Keywords: Multimodal, captioning, summarization, etc
DOI: 10.3233/JIFS-219394
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Kostiuk, Yevhen | Tonja, Atnafu Lambebo | Sidorov, Grigori | Kolesnikova, Olga
Article Type: Research Article
Abstract: In this paper, we investigate the issue of hate speech by presenting a novel task of translating hate speech into non-hate speech text while preserving its meaning. As a case study, we use Spanish texts. We provide a dataset and several baselines as a starting point for further research in the task. We evaluated our baseline results using multiple metrics, including BLEU scores. We used a cross-validation approach and an average of the metrics per fold for evaluation. We achieved a 0.236 sentenceBLEU score on four folds. This study aims to contribute to developing more effective methods for reducing the …spread of hate speech in online communities. Show more
Keywords: Hate speech, translation, Spanish
DOI: 10.3233/JIFS-219348
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: George, Neetha | Ramachandran, Sivakumar | Jiji, C.V.
Article Type: Research Article
Abstract: Macula is the part of retina responsible for sharp and clear vision. Macular edema is caused by the accumulation of intraretinal fluid (IRF) in the macula, which is further distinguished by the compromised integrity of the blood-retinal barrier, particularly evident in the retinal vasculature. This results in swelling, that may lead to vision impairment and is the dominant sign of several ocular diseases, including age-related macular degeneration, diabetic retinopathy, etc. Quantitative analysis of the fluid regions in macular edema helps in ascertaining the severity as well as the response to treatment of the diseases. Optical coherence tomography (OCT) is a …major tool used by ophthalmologists for visualizing edema. The prevalent practice for diagnosing and treating macular edema involves measuring Central Retinal Thickness (CRT). Segmenting the IRF in OCT images offers the potential for a more accurate and better quantification of macular edema. This paper proposes a novel method combining convolutional neural network (CNN) and active contour model for segmenting the IRF to ascertain the severity of macular edema. The IRF region is initially segmented using an encoder-decoder architecture. Contour evolution is then performed on this segmented image to demarcate the IRF boundaries. The advantage of the method is that it does not require precisely labeled images for training the CNN. A comparison of the experimental results with models employing CNN alone and with other state-of-the art methods demonstrates the superior performance and consistency of the proposed method. Show more
Keywords: edema segmentation, convolutional neural network, active contour model
DOI: 10.3233/JIFS-219401
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-9, 2024
Authors: Wu, Donghui | Wang, Jinfeng | Zhao, Wanwan | Geng, Xin | Liu, Guozhi | Qiu, Sen
Article Type: Research Article
Abstract: Gesture recognition based on wearable sensors has received extensive attention in recent years. This paper proposes a gesture recognition model (CGR_ATT) based on Convolutional Neural Network (CNN) and Gated Recurrent Unit (GRU) fused attention mechanism to improve accuracy rate of wearable sensors. First, CNN serves as a feature extractor, learning features automatically from sensor data by performing multiple layers of convolution and pooling operations, capturing spatial features of gestures. Furthermore, a temporal modeling unit GRU is introduced to capture the temporal dynamics in gesture sequences. By controlling the information flow through gate mechanisms, it effectively handles the temporal relationships in …sensor data. Finally, an attention mechanism is introduced to assign different weights to the hidden state of the GRU. By calculating the attention weights for each time period, the model automatically selects key time periods related to gesture movements. The GR-dataset proposed in this paper involves 910 sets of training parameters. The model achieves an ultimate accuracy of 97.57% . In compare with CLA-net, CLT-net, CGR, GRU, LSTM and CNN, the experimental results demonstrate that the proposed method has superior accuracy. Show more
Keywords: Wearable gesture recognition system, CGR_ATT model, deep learning, wearable devices
DOI: 10.3233/JIFS-240427
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Visvanathan, P. | Durai Raj Vincent, P.M.
Article Type: Research Article
Abstract: A Stroke is a sudden loss of blood circulation in certain parts of the brain that results in a loss of neurological function. To save a patient from stroke, an immediate diagnosis and treatment plan must be implemented. Artificial intelligence-based machine learning algorithms play a major role in the prediction. To predict a person likely to have a stroke, stroke healthcare data records must be accessed, which is very sensitive. Data shared for machine learning training pose security risks and have concerns about privacy. To overcome this issue, Genetic Algorithm and Federated Learning (GA-FL) –based hybridization approach is proposed to …predict the risk of stroke in a person. Federated Learning was developed by Google, which can provide security to the data during the training process because every client participating in this training process needs to exchange only the training parameters without sharing the data. In addition to the security features, a genetic algorithm was used to optimize the parameters required to train a model using the perceptron neural network model. The experimental results show that our proposed research model (GA-FL) provides security and predicts the risk of stroke more accurately than any other existing algorithm. Show more
Keywords: Federated learning, genetic algorithm, stroke risk, perceptron neural network
DOI: 10.3233/JIFS-236354
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Hu, Junhua | Zhou, Yingling | Li, Huiyu | Liang, Pei
Article Type: Research Article
Abstract: To enhance infection diseases interval prediction, an improved model is proposed by integrating neighborhood fuzzy information granulation (NNIG) and spatial-temporal graph neural network (STGNN). Additionally, the NNIG model can efficiently extract the most representative features from the time series data and identifies the support upper and lower bounds. NNIG model transfers time series data from numerical level to granular level, and processes data feed it into STGNN for interval prediction. Finally, experiments are conducted for evaluation based on the COVID-19 data. The results demonstrate that the NNIG outperforms baseline models. Further, it proves beneficial in offering a valuable approach for …policy-making. Show more
Keywords: Time series, fuzzy information granulation, interval prediction, spatial-temporal graph neural network
DOI: 10.3233/JIFS-236766
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Wu, Jie | Hou, Mengshu
Article Type: Research Article
Abstract: Table-based fact verification (TFV) is a binary classification task that requires understanding and reasoning about both table and text. This task poses many challenges, such as table parsing, text comprehension, and numerical reasoning. However, existing methods tend to depend solely on pre-trained models for tables, treating all types of reasoning equally and disregarding the importance of identifying logic types in inference process. In this regard, we propose MoETFV, an efficient and explanatory approach to solving TFV, which is based on a Mixture-of-Experts (MoE) framework. This approach can detect the underlying logic types of statements and leverage multiple independent experts to …emulate diverse logical reasoning. It consists of one shared expert for general semantic understanding and several specific experts with distinct responsibilities for different logical inferences. Moreover, the practical applications of the MoE method in TFV are thoroughly investigated. This model doesn’t necessitate any table pre-trained models, and aligns closely with human cognitive processes in addressing such issues. Experimental results demonstrate the innovation and feasibility of the proposed approach. Show more
Keywords: Tabular data, fact verification, mixture-of-experts, logical reasoning, natural language processing
DOI: 10.3233/JIFS-238142
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Chen, Longkai | Huang, Jingjing
Article Type: Research Article
Abstract: Urban traffic accidents impose a significant threat to public safety because of its frequent occurrence and potential for severe injuries and fatalities. Hence, an effective analysis of accident patterns is crucial for designing accident prevention strategies. Recent advancement in data analytics have provided opportunities to improve the pattern of urban traffic accidents. However, the existing works face several challenges in adapting the complex dynamics, and heterogeneity of the accident data. To overcome these challenges, we proposed an innovative solution by combining the K-means clustering and Support Vector Machine to precisely predict the traffic accident patterns. By leveraging the efficiencies of …clustering technique and machine learning, this work intends to identify the intricate patterns within the traffic database. Initially, a traffic accident database was collected and fed into the system. The collected database was pre-processed to improve and standardize the raw dataset. Further, cluster analysis is employed to identify distinct patterns within the dataset and group similar accidents into clusters. This clustering enables the system to recognize common accident scenarios and identify recent accident trends. Subsequently, a Support Vector Machine is deployed to classify accidents into distinct categories through intensive training with identified clusters. The combination enables the system to understand the complex relationships among diverse accident variables, making it an effective framework for real-time pattern recognition. The proposed strategy is implemented in Python and validated using the publicly available traffic accident database. The experimental results manifest that the proposed method achieved 99.65% accuracy, 99.53% precision, 99.62% recall, and 99.57% f-measure. Finally, the comparison with the existing techniques shows that the developed strategy offers improved accuracy, precision, recall, and f-measure compared to existing ones. shows that the developed strategy offers improved accuracy, precision, recall, and f-measure compared to existing ones. Show more
Keywords: Support vector machine, traffic accident pattern recognition, cluster analysis, machine learning
DOI: 10.3233/JIFS-241018
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Liu, Fei
Article Type: Research Article
Abstract: In China, aesthetic education at the college level is essential for students’ quality because it improves their understanding of art, helps them progress in their professional career development, and helps them comprehend more fully the attractiveness of creative creations. As a result, it needs to prioritize aesthetic education at the institution and endeavor to nurture students’ feelings progressively and improve their aesthetic abilities at different levels. Artificial intelligence (AI) is used in this project to create a novel, interdisciplinary teaching technique that will maximize students’ artistic and intellectual potential and help them make more, better art. In this research, the …Osprey Optimization method improves the interdisciplinary teaching technique for aesthetic education based on a light Exclusive gradient-boosting mechanism (OOM-LEGBM). The exploration-exploitation dynamics of the OOM are incorporated into LEGBM, providing the students with a tangible and relatable technique to understand complex-solving processes. This research develops an enhanced quality framework for college aesthetic education based on the multi-model data fusion system about the implication and necessity of aesthetic education. The influence of college aesthetic education on students’ creative capacity and artistic literacy was investigated to inform instructional activities better to develop students’ aesthetic skills. The experimental findings suggest that the proposed approach achieved an improved accuracy of 99.90%, higher precision of 99.88%, and greater recall of 99.91%. Moreover, it obtained a minimum Root Mean Square Error (RMSE) of 0.26% and a lower Mean Absolute Error (MAE) of 0.34%, showing that the suggested model greatly improved preference learning accuracy while keeping overall accuracy at an identical level. Innovation capacity building in college aesthetic education can help students become more self-aware, improve their study habits, visually literate, and more comprehensive. Show more
Keywords: Interdisciplinary teaching, aesthetic education, curriculum, multimodal data fusion, artificial intelligence, and big data
DOI: 10.3233/JIFS-240723
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Zhou, Yancong | Xu, Chenheng | Chen, Yongqiang | Li, Shanshan | Guo, Zhen
Article Type: Research Article
Abstract: Due to the complexity of the products from the ethanol coupling reaction, the C4 olefin yield tends to be low. Finding the optimal ethanol reaction conditions requires repeated manual experiments. In this paper, a novel learning framework based on least squares support vector machine and tree-structured parzen estimator is proposed to solve the optimization problem of C4 olefin production conditions. And shapley value is introduced to improve the interpretation ability of modeling method. The experimental results show that the proposed learning framework can obtain the combination of ethanol reaction conditions that maximized the C4 olefin yield It is nearly 17.30% …higher compared to the current highest yield of 4472.81% obtained from manual experiments. Show more
Keywords: C4 olefin production, complex problem optimization, model interpretability, LSSVM, SHAP, TPE
DOI: 10.3233/JIFS-235144
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Muthu Thiruvengadam, P. | Gnanavadivel, J.
Article Type: Research Article
Abstract: The Power solutions have become indispensable for all the devices in recent years with an appropriate power conversion circuitries and control methods to ensure good dynamic response, improved stability, reliability and efficiency. The main intent of this article is to impart the designing of interval type-2 fuzzy logic controller (IT2FLC) based interleaved Sepic power factor correction (PFC) converter. This work also involves the careful design of the robust controller with enhanced precision and good power quality (PQ) performance at the AC mains. In addition, the development of IT2FLC based power solution improves the overall power conversion with stabilized output in …the perspective of its quick rise time, less overshoot and fast settling time in comparison to other traditional controllers. Further, the uncertainties and issues associated with the conventional proportional integral (PI) and fuzzy logic controllers (FLCs) are handled effectively by the proposed IT2FLC controller. Moreover, this preferred converter is modeled with an internal parasitics and its performances are evaluated and compared with other conventional Zeigler Nicholas (ZN) tuned PI controller and FLC by dint of MATLAB/Simulink platform. Finally, the experimental test bench set up of 250 W, 48 V power circuitry is devised and the test outcomes confirm the excellent transient behavior and PQ performances of the modeled power solution. Show more
Keywords: Power quality, interval type-2 fuzzy logic controller, total harmonic distortion, power factor correction, discontinuous conduction mode and continuous conduction mode
DOI: 10.3233/JIFS-230325
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Belal, Mohamad Mulham | Sundaram, Divya Meena
Article Type: Research Article
Abstract: Visualization-based malware detection gets more and more attention for detecting sophisticated malware that traditional antivirus software may miss. The approach involves creating a visual representation of the memory or portable executable files (PEs). However, most current visualization-based malware classification models focus on convolution neural networks instead of Vision transformers (ViT) even though ViT has a higher performance and captures the spatial representation of malware. Therefore, more research should be performed on malware classification using vision transformers. This paper proposes a multi-variants vision transformer-based malware image classification model using multi-criteria decision-making. The proposed method employs Multi-variants transformer encoders to show different …visual representation embeddings sets of one malware image. The proposed architecture contains five steps: (1) patch extraction and embeddings, (2) positional encoding, (3) multi-variants transformer encoders, (4) classification, and (5) decision-making. The variants of transformer encoders are transfer learning-based models i.e., it was originally trained on ImageNet dataset. Moreover, the proposed malware classifier employs MEREC-VIKOR, a hybrid standard evaluation approach, which combines multi-inconsistent performance metrics. The performance of the transformer encoder variants is assessed both on individual malware families and across the entire set of malware families within two datasets i.e., MalImg and Microsoft BIG datasets achieving overall accuracy 97.64 and 98.92 respectively. Although the proposed method achieves high performance, the metrics exhibit inconsistency across some malware families. The results of standard evaluation metrics i.e., Q, R, and U show that TE3 outperform the TE1, TE2, and TE4 variants achieving minimal values equal to 0. Finally, the proposed architecture demonstrates a comparable performance to the state-of-the-art that use CNNs. Show more
Keywords: Vision transformer, MCDM, VIKOR, MEREC, image malware classifier
DOI: 10.3233/JIFS-235154
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-21, 2024
Authors: Wang, R | Yu, F.S | Zhao, L.Y
Article Type: Research Article
Abstract: This paper demonstrates a fuzzy decentralized dynamic surface control (DSC) scheme for switched large-scale interconnected nonlinear systems under arbitrary switching, which contains non-strict feedback form and unknown input saturation uncertainties. An auxiliary design system is established to handled input saturation. Uncertainties of non-strict feedback form are learned by fuzzy logic systems (FLSs) approximators, DSC method is designed to conquer “explosion of complexity” inherented by repeated differential of virtute controller in backstepping approach. Ii is shown that based on common Lyapunov function (CLF) design and analysis scheme, all the closed-loop systems signals are uniformly ultimately bounded (UUB), simulation results are provided …to demonstrate the effectiveness of this proposed strategy. Show more
Keywords: DSC scheme, large-scale switched nonlinear systems(LSSNs), input saturation, non-strict feedback (NSF) form
DOI: 10.3233/JIFS-238024
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Hassan, Shabbir
Article Type: Research Article
Abstract: The CPU scheduling technique influences the performance and efficiency of operating systems. Round-robin scheduling algorithm is ideal for time-shared systems, but it is not optimal for real-time operating systems since it yields more context switching, longer waiting time, and high turnaround time. The performance of the algorithm is predominantly influenced by the designated time quantum; however, determining a suitable time quantum is extremely challenging. This paper presents a CPU scheduling algorithm that provides a better tradeoff between waiting time, turnaround time, response time, and number of context switch by using hypothesis-based quanta generation approach. It combines the CPU burst …requirements of actual processes with some noisy data and plots them against the presumed CPU quanta to get quanta densities so that a polynomial regression model can fit the data points with the highest adjusted R-squared. Then applying some complex inferential statistic, the required quanta is obtained. The scheduling is dynamic in nature because it generates the next CPU quanta in reference to the quanta that have been used in the previous cycle with remaining CPU burst requirements of the process, and it is also adaptive in nature because, at each cycle, it uses ‘d’ (5, 5, 4, 3, 2) degree of freedom to calculate the Jarque-Bera Statistics to accept/reject the hypothesis. The algorithm is implemented in ‘R’ and the performance has been evaluated on a sample size of five processes with some noisy data which outperforms the conventional RR and significantly reduces the performance parameters mentioned above. Implementing this algorithm to a time-sharing or distributed environment will undoubtedly improve system performance and will help to avoid issues like thrashing, incorporate aging, CPU affinity, and starvation. Since the proposed algorithm is work-conservative, therefore can be implemented in network packet switching, statistical multiplexing, and real-time systems. Show more
Keywords: Adaptive scheduling, context switching, CPU burst, jarque-bera, kernel density estimation, kurtosis, quanta, thrashing
DOI: 10.3233/JIFS-238624
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Alqaissi, Eman | Alotaibi, Fahd | Ramzan, Muhammad Sher | Algarni, Abdulmohsen
Article Type: Research Article
Abstract: The influenza virus can spread easily, causing significant public health concern. Despite the existence of different techniques for rapid detection and prevention of influenza, their efficiency varies significantly. Additionally, there is currently a lack of a comprehensive, interoperable, and reusable real-time model for detecting influenza infection and predicting relationships within the field of influenza analysis. This study proposed a comprehensive, real-time model for rapid and early influenza detection using symptoms. Further, new relationships in the influenza field were discovered. Multiple data sources were used for the influenza knowledge graph (KG). Throughout this study, various graph algorithms were utilized to extract …significant nodes and relationship features and multiple influenza detection machine learning (ML) models were compared. Node classification and link prediction methods were employed on a multi-layer perceptron (MLP) model. Furthermore, the hyperparameters of the model were automatically tuned. The proposed MLP model demonstrated the lowest rate of loss and the highest specificity, accuracy, recall, precision, and F1-score compared to state-of-the-art ML models. Moreover, the Matthews correlation coefficient was promising. This study shows that graph data science can improve MLP model detection and assist in discovering hidden connections in influenza KG. Show more
Keywords: Influenza detection, knowledge graph, graph multi-layer perceptron model, graph algorithms, automatic tuning, real-time analysis
DOI: 10.3233/JIFS-233381
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-22, 2024
Authors: Chen, Sian | Zuo, Yajuan | Wang, Rui
Article Type: Research Article
Abstract: Traditional rule-based and statistical methods have limitations when dealing with complex language structures and semantics. In neural network machine translation algorithms, the objective function is usually to improve the accuracy of n-ary words. However, this does not guarantee a more natural and accurate translation. To overcome these challenges, this paper proposes an optimization algorithm for English natural translation processing based on neural networks, which combines Generative Adversarial Network (GAN) and Transformer models. In GAN, the generative model uses the Transformer model to generate false samples, while the discriminative model uses a binary classifier based on convolutional neural networks and attention …mechanisms to distinguish between true and false samples. During the training process, reinforcement learning algorithms are added to evaluate and adjust the generated sentences, and the parameters of the generated model are updated. The classification results of the discriminative model are used together with the Bilingual Evaluation Basis Value (BLEU) objective function to evaluate false samples, and the results are fed back to the generating model to guide parameter updates and optimization. Extensive experiments were conducted on a standard English-Chinese machine translation dataset to evaluate our method. Compared with the benchmark model that only uses supervised learning methods, our neural network-based optimization algorithm for English natural translation processing has achieved significant improvements in translation quality. According to statistical comparison, compared with the Transformer model (BLUE = 33.63 and AP = 90%) and the deep learning model based on long-term and short-term memory (BLUE = 30.26 and AP = 83%), the GAN and Transformer models proposed as the best framework exhibit better performance in bilingual evaluation deficiency (BLEU) (34.35) and accuracy (AP = 95%). Show more
Keywords: Artificial neural network, English translation, GAN, generator, discriminator, transformer model; Adam optimization algorithm, reinforcement learning method
DOI: 10.3233/JIFS-237181
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Kannan, Jeevitha | Jayakumar, Vimala | Pethaperumal, Mahalakshmi | Shanmugam, Nithya Sri
Article Type: Research Article
Abstract: Every day, the globe becomes more contemporary and industrialized. As a result, the number of vehicles and engines is growing. However, the energy sources utilized in these engines are scarce and dwindling over time. This circumstance prompts the search for alternate fuel. As civilization develops, transportation becomes a need for daily living. The largest issue is the diminishing supply of fossil fuels and the expanding population. As a result, everyone needs alternate energy sources for their automobiles. Therefore, in this investigation, we identify the best substitute for petrol. We offer the similarity measure(SM) for a hybrid structure of a Linear …Diophantine Multi-Fuzzy Soft Set(LDMFSS) with the goal of determining this issue. Because the range of grade values has been expanded, decision-makers now have greater freedom in selecting their grade. An exemplary case study is illustrated that shows the appropriateness of our recommended approach. A comparative analysis is provided to show the outcomes of the proposed method are more achievable and beneficial than those of the existing methodologies. Additionally, its applicability and attainability are evaluated by comparing its structure to those of the already used procedures. Show more
Keywords: Linear diophantine multi-fuzzy soft set, similarity measures, fossil fuels, alternative fuel, fuel specifications
DOI: 10.3233/JIFS-219415
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Duan, Wenbiao | Yang, Mingjin | Sun, Weiliang | Xia, Mingmin | Zhu, Hui | Gu, Chijiang | Zhang, Haiqiang
Article Type: Research Article
Abstract: OBJECTIVE: A comprehensive evaluation of studies using DNA microarray datasets for screening and identifying key genes in gastric cancer is the goal of this systematic review and meta-analysis. To better understand the molecular environment associated with stomach cancer, this study aims to provide a quantitative synthesis of findings. PURPOSE: Using DNA microarray databases in a systematic manner, this study aims to analyze gastric cancer (GC) screening and gene identification efforts. Through a literature review spanning 2002–2022, this research aims to identify key genes associated with GC and develop strategies for screening and prognosis based on these …findings. METHODS: The following databases were searched extensively: Science Direct, NCKI, Web of Science, Springer, and PubMed. Fifteen studies met the inclusion and exclusion criteria; 10,134 tissues served as controls and 11,724 as GCs. The levels of critical genes, including COL1A1, COL1A2, THBS2, SPP1, SPARC, COL6A3, and COL3A1, were compared in normal and GC tissues. Rev Man 5.3 was used to do the meta-analysis. While applying models with fixed or random effects, 95% confidence intervals and weighted mean differences were computed. RESULTS According to the meta-analysis, GC tissues exhibited substantially elevated levels of important genes when contrasted with the control group. In particular, there were statistically significant increases in COL1A1 (MD = 2.43, 95% CI: 1.84–3.02), COL1A2 (MD = 2.75, 95% CI: 1.09–4.41), THBS2 (MD = 2.54, 95% CI: 1.66–3.41), SPP1 (MD = 3.64, 95% CI: 3.40–3.88), SPARC (MD = 1.57, 95% CI: 0.37–2.77), COL6A3 (MD = 2.31, 95% CI: 2.02–2.60), and COL3A1 (MD = 2.21, 95% CI: 1.59–2.82). CONCLUSIONS: The COL1A1, THBS2, SPP1, COL6A3, and COL3A1 genes were shown to have potential use in germ cell cancer screening and prognosis, according to this research. Clinical assessment and prognosis of heart failure patients may be theoretically supported by the results of this study. Show more
Keywords: DNA microarray database, gastric cancer, key genes, meta-analysis
DOI: 10.3233/JIFS-236416
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Li, Tao | Zhang, Zhongyu | Tao, Zhigang | Jia, Xinyu | Wang, Xiaolong | Wang, Jian
Article Type: Research Article
Abstract: Rock crack is one of the main factors responsible for rock failure. Uniaxial compression creep tests are performed using acoustic emission techniques, a high-sensitivity, non-radiative, non-destructive testing method to understand the influence of crack number on the precursor characteristics of short-term creep damage in the fractured rock mass. Based on the Grassberger-Procaccia (G-P) algorithm, the calculation step size for the correlation dimension value (D 2 ) of the acoustic emission ringing count rate is consistent with that for the acoustic emission b -value. The influence of the number of pre-cracks on the Acoustic emission precursor characteristics of red sandstone …creep is analyzed. The results show that near the destabilization of the specimen, the Acoustic emission accumulative ringing count surges in a stepwise manner, the Acoustic emission b -value decreases, the D 2 -value increases, the Acoustic emission amplitude shows high intensity and high frequency, and the ringing count increases sharply, all with the characteristics of failure precursors. During the accelerated creep stage of the specimens, with the increase of pre-cracks number, the precursory time points of acoustic emission b -value and D 2 -value advance, and their acoustic emission ringing counts increase sharply. Show more
Keywords: Acoustic emission, b-value, correlation dimension value (D2), precursor information, pre-cracks
DOI: 10.3233/JIFS-238964
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Hou, Xiaoyu | Luo, Chao | Gao, Baozhong
Article Type: Research Article
Abstract: Candlesticks are widely used as an effective technical analysis tool in financial markets. Traditionally, different combinations of candlesticks have formed specific bullish/bearish patterns providing investors with increased opportunities for profitable trades. However, most patterns derived from subjective expertise without quantitative analysis. In this article, combining bullish/bearish patterns with ensemble learning, we present an intelligent system for making stock trading decisions. The Ensemble Classifier through Multimodal Perturbation (ECMP) is designed to generate a diverse set of precise base classifiers to further determine the candlestick patterns. It achieves this by: first, introducing perturbations to the sample space through bootstrap sampling; second, employing …an attribute reduction algorithm based on neighborhood rough set theory to select relevant features; third, perturbing the feature space through random subspace selection. Ultimately, the trading decisions are guided by the classification outcomes of this procedure. To evaluate the proposed model, we apply it to empirical investigations within the context of the Chinese stock market. The results obtained from our experiments clearly demonstrate the effectiveness of the approach. Show more
Keywords: Trading system, ensemble learning, multimodal perturbation method, neighborhood rough set theory
DOI: 10.3233/JIFS-237087
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-19, 2024
Authors: Zhao, Bin | Cao, Wei | Zhang, Jiqun | Gao, Yilong | Li, Bin | Chen, Fengmei
Article Type: Research Article
Abstract: Aiming at the issue that the current click-through rate prediction methods ignore the varying impacts of different input features on prediction accuracy and exhibit low accuracy when dealing with large-scale data, a click-through rate prediction method (GBIFM) which combines Gradient Boosting Decision Tree (GBDT) and Input-aware Factorization Machine (IFM) is proposed in this paper. The proposed GBIFM method employs GBDT for data processing, which can flexibly handle various types of data without the need for one-hot encoding of discrete features. An Input-aware strategy is introduced to refine the weight vector and embedding vector of each feature for different instances, adaptively …learning the impact of each input vector on feature representation. Furthermore, a fully connected network is incorporated to capture high-order features in a non-linear manner, enhancing the method’s ability to express and generalize complex structured data. A comprehensive experiment is conducted on the Criteo and Avazu datasets, the results show that compared to typical methods such as DeepFM, AFM, and IFM, the proposed method GBIFM can increase the AUC value by 10% –12% and decrease the Logloss value by 6% –20%, effectively improving the accuracy of click-through rate prediction. Show more
Keywords: Click-through rate estimation, GBIFM, GBDT, IFM
DOI: 10.3233/JIFS-234713
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Wang, Shuo | Yang, Jing | Yang, Yue
Article Type: Research Article
Abstract: Personalized recommendation systems fundamentally assess user preferences as a reflection of their emotional responses to items. Traditional recommendation algorithms, focusing primarily on numerical processing, often overlook emotional factors, leading to reduced accuracy and limited application scenarios. This paper introduces a collaborative filtering recommendation method that integrates features of facial information, derived from emotions extracted from such data. Upon user authorization for camera usage, the system captures facial information features. Owing to the diversity in facial information, deep learning methods classify these features, employing the classification results as emotional labels. This approach calculates the similarity between emotional and item labels, reducing …the ambiguity inherent in facial information features. The fusion process of facial information takes into account the user’s emotional state prior to item interaction, which might influence the emotions generated during the interaction. Variance is utilized to measure emotional fluctuations, thereby circumventing misjudgments caused by sustained non-interactive emotions. In selecting the nearest neighboring users, the method considers not only the similarity in user ratings but also in their emotional responses. Tests conducted using the Movielens dataset reveal that the proposed method, modeling facial features, more effectively aligns recommendations with user preferences and significantly enhances the algorithm’s performance. Show more
Keywords: Collaborative filtering algorithm, facial information features, emotional factors, non-interactive emotion
DOI: 10.3233/JIFS-232718
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2024
Authors: Zhai, Shanshan | Fan, Jianping | Liu, Lin
Article Type: Research Article
Abstract: Neutrosophic cubic set (NCS) can process complex information by choosing both interval value and single value membership and indeterminacy and falsehood components. The aggregation operators based on Aczel-Alsina t-norm and t-corm are quite effective for evaluating the interrelationship among attributes. The purpose of this paper is to diagnose the interrelationship among attributes with neutrosophic cubic information, and propose a multi-attribute decision-making(MADM) method for supplier selection problem with unknown weight under neutrosophic cubic environment. We defined neutrosophic cubic Aczel-Alsina (NC-AA) operator and neutrosophic cubic Aczel–Alsina weighted arithmetic average (NCAAWAA) operator, then we discussed various important results and some properties of the …proposed operators. Additionally, we proposed a MADM method under the presence of the NC-AAWAA operator. When the weights of attributes are unknown, we use the MEREC method to determine the weights. Later, the NC-AAWAA operator and MEREC method are applied to address the supplier selection problem. Finally, a sensitivity analysis and a comparative analysis are conducted to illustrate the stability and superiority of the proposed method. The results show the NC-AAWAA operator can handle the interrelationship among complex information more effectively, and MEREC method can weight the attributes based on the removal effect of a neutrosophic cubic attribute. Show more
Keywords: Multi-attribute decision-making (MADM), neutrosophic cubic set (NCS), Aczel-Alsina aggregation operators, MEREC method
DOI: 10.3233/JIFS-235274
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-22, 2024
Authors: Hong, Yuntao
Article Type: Research Article
Abstract: Obsessive-compulsive disorder (OCD) is a chronic disease and psychosocial disorder that significantly reduces the quality of life of patients and affects their personal and social relationships. Therefore, early diagnosis of this disorder is of particular importance and has attracted the attention of researchers. In this research, new statistical differential features are used, which are suitable for EEG signals and have little computational load. Hilbert-Huang transform was applied to EEGs recorded from 26 OCD patients and 30 healthy subjects to extract instant amplitude and phase. Then, modified mean, variance, median, kurtosis and skewness were calculated from amplitude and phase data. Next, …the difference of these statistical features between various pairs of EEG channels was calculated. Finally, different scenarios of feature classification were examined using the sparse nonnegative least squares classifier. The results showed that the modified mean feature calculated from the amplitude and phase of the interhemispheric channel pairs produces a high accuracy of 95.37%. The frontal lobe of the brain also created the most distinction between the two groups among other brain lobes by producing 90.52% accuracy. In addition, the features extracted from the frontal-parietal network produced the best classification accuracy (93.42%) compared to the other brain networks examined. The method proposed in this paper dramatically improves the accuracy of EEG classification of OCD patients from healthy individuals and produces much better results compared to previous machine learning techniques. Show more
Keywords: Obsessive-compulsive disorder (OCD), Electroencephalogram (EEG), Hilbert-Huang transform, statistical features, classification
DOI: 10.3233/JIFS-237946
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Zhao, Xixi | Gu, Liang | Duan, Xiaorong | Wang, Liguo | Li, Zhenxi
Article Type: Research Article
Abstract: Cloud storage attribute libraries usually store a large amount of sensitive data such as personal information and trade secrets. Attackers adopt diverse and complex attack methods to target the cloud storage attribute database, which makes the defense work more challenging. In order to realize the secure storage of information, an attribute based cloud storage anti-attack algorithm based on dynamic authorization access is proposed. According to the characteristic variables of the sample, the data correlation matrix is calculated, and the principal component analysis method is adopted to reduce the dimension of the data, build the anti-attack code model, simulate the dynamic …authorization access rights, and calculate the packet loss rate according to the anti-attack flow. Design the initialization stage, cluster stage and cluster center update stage to realize the attack prevention of cloud storage attribute database. The experimental results show that the proposed algorithm can accurately classify the anti-attack code, has good packet processing ability, relatively short page request time, and anti-attack success rate is higher than 90%, which can effectively ensure the stability of the algorithm. Show more
Keywords: Dynamic authorization access, cloud storage attributes, basic anti-attack algorithm, anti-attack code model, access permissions
DOI: 10.3233/JIFS-237409
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Ning, Yi | Liu, Meiyu | Guo, Xifeng | Liu, Zhiyong | Wang, Xinlu
Article Type: Research Article
Abstract: Accurate load forecasting is an important issue for safe and economic operation of power system. However, load data often has strong non-stationarity, nonlinearity and randomness, which increases the difficulty of load forecasting. To improve the prediction accuracy, a hybrid short-term load forecasting method using load feature extraction based on complete ensemble empirical mode decomposition with adaptive noise (CEEMDAN) and refined composite multi-scale entropy (RCMSE) and improved bidirectional long short time memory (BiLSTM) error correction is proposed. Firstly, CEEMDAN is used to separate the detailed information and trend information of the original load series, RCMSE is used to reconstruct the feature …information, and Spearman is used to screen the features. Secondly, an improved butterfly optimization algorithm (IBOA) is proposed to optimize BiLSTM, and the reconstructed components are predicted respectively. Finally, an error correction model is constructed to mine the hidden information contained in error sequence. The experimental results show that the MAE, MAPE and RMSE of the proposed method are 645 kW, 0.96% and 827.3 kW respectively, and MAPE is improved by about 10% compared with other hybrid models. Therefore, the proposed method can overcome the problem of inaccurate prediction caused by data and inherent defects of models and improve the prediction accuracy. Show more
Keywords: Short-term load forecasting, complete ensemble empirical mode decomposition with adaptivenoise, refined composite multi-scale entropy, improved butterfly optimization algorithm, bidirectional long short time memory neural network
DOI: 10.3233/JIFS-237993
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Limei, Nong | Dongfan, Wu | Bo, Zhang
Article Type: Research Article
Abstract: Garden landscape is the combination of nature and humanity, with high aesthetic value, ecological value and cultural value, has become an important part of people’s life. Modern people have a higher pursuit for the spiritual food such as garden landscape after the material life is satisfied, which brings new challenges to the construction of urban garden landscape. As an advanced type of machine learning, deep learning applied to landscape image recognition can solve the problem of low quality and low efficiency of manual recognition. Based on this, this paper proposes a garden landscape image recognition algorithm based on SSD (Single …Shot Multibox Detector), which realizes accurate extraction and recognition of image features by positioning the target, and can effectively improve the quality and efficiency of landscape image recognition. In order to test the feasibility of the algorithm proposed in this paper, experimental analysis was carried out in the CVPR 2023 landscape data set. The experimental results show that the algorithm has a high recognition accuracy for landscape images, and has excellent performance compared with traditional image recognition algorithms. Show more
Keywords: Deep learning, garden landscape, image recognition, target detection; image analysis
DOI: 10.3233/JIFS-239654
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Ramkumar, N. | Karthika Renuka, D.
Article Type: Research Article
Abstract: In recent times, the rapid advancement of deep learning has led to increased interest in utilizing Electroencephalogram (EEG) signals for automatic speech recognition. However, due to the significant variation observed in EEG signals from different individuals, the field of EEG-based speech recognition faces challenges related to individual differences across subjects, which ultimately impact recognition performance. In this investigation, a novel approach is proposed for EEG-based speech recognition that combines the capabilities of Long Short Term Memory (LSTM) and Graph Attention Network (GAT). The LSTM component of the model is designed to process sequential patterns within the data, enabling it to …capture temporal dependencies and extract pertinent features. On the other hand, the GAT component exploits the interconnections among data points, which may represent channels, nodes, or features, in the form of a graph. This innovative model not only delves deeper into the connection between connectivity features and thinking as well as speaking states, but also addresses the challenge of individual disparities across subjects. The experimental results showcase the effectiveness of the proposed approach. When considering the thinking state, the average accuracy for single subjects and cross-subject are 65.7% and 67.3% respectively. Similarly, for the speaking state, the average accuracies were 65.4% for single subjects and 67.4% for cross-subject conditions, all based on the KaraOne dataset. These outcomes highlight the model’s positive impact on the task of cross-subject EEG speech recognition. The motivations for conducting cross subject are real world applicability, Generalization, Adaptation and personalization and performance evaluation. Show more
Keywords: Electroencephalography, recurrent neural network, long short term memory, gated recurrent unit, graph convolution network and graph attention network
DOI: 10.3233/JIFS-233143
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Peng, Weishi | Fang, Yangwang | Ma, Yongzhong
Article Type: Research Article
Abstract: Although many scholars say that their algorithms are better than others in the state estimation problem, only a fewer convincing algorithms were applied to engineering practices. The reason is that their algorithms outperform others only in some aspects such as the estimation accuracy or the computation load. To solve the problem of performance evaluation of state estimation algorithms, in this paper, the comprehensive evaluation measures (CEM) for evaluating the nonlinear estimation algorithm (NEA) is proposed, which can comprehensively reflect the performance of the NEAs. First, we introduce three types of the NEAs. Second, the CEM combining the flatness, estimation accuracy …and computation time of the NEAs, is designed to evaluate the above NEAs. Finally, the superiority of the CEM is verified by a numerical example, which helps decision makers of nonlinear estimation algorithms theoretically and technically. Show more
Keywords: Performance evaluation, nonlinear estimation algorithm, comprehensive metrics, error spectrum, EKF, UKF, PF
DOI: 10.3233/JIFS-231376
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Valdez-Rodríguez, José E. | Rangel, Nahum | Moreno-Armendáriz, Marco A.
Article Type: Research Article
Abstract: Visual detection of fingering on the trumpet is an increasingly interesting topic in music research. The ability to recognize and track the movements of the trumpet player’s fingers during the performance of a musical piece can provide valuable information for analyzing and improving instrument technique. However, this is a largely unexplored task, as most works focus on audio quality rather than instrument fingering techniques. Developing techniques for identifying essential finger positions on a musical instrument is crucial, as poor fingering techniques can harm instrument performance. In this work, we propose the visual detection of this fingering using convolutional neural networks …with a proprietary dataset created for this purpose. Additionally, to improve the results and focus on the essential parts of the instrument, we use self-attention mechanisms by extracting these features automatically. Show more
Keywords: Fingering detection, Convolutional Neural Networks, Self-attention mechanisms, Visual detection, Trumpet
DOI: 10.3233/JIFS-219342
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-9, 2024
Authors: Ganesh, M.A. | Saravana Perumaal, S. | Gomathi Sankar, S.M.
Article Type: Research Article
Abstract: The current framework for detecting Fake License Plates (FLP) in real-time is not robust enough for patrol teams. The objective of this paper is to develop a robust license plate authentication framework, based on the Vehicle Make and Model Recognition (VMMR) and the License Plate Recognition (LPR) algorithms that is implementable at the edge devices. The contributions of this paper are (i) Development of license plate database for 547 Indian cars, (ii) Development of an image dataset with 3173 images of 547 Indian cars in 8 classes, (iii) Development of an ensemble model to recognize vehicle make and model from …frontal, rear, and side images, and (iv) Development of a framework to authenticate the license plates with frontal, rear, and side images. The proposed ensemble model is compared with the state-of-the-art networks from the literature. Among the implemented networks for VMMR, the Ensembling model with a size of 303.2 MB achieves the best accuracy of 89% . Due to the limited memory size, Easy OCR is chosen to recognize license plate. The total size of the authentication framework is 308 MB. The performance of the proposed framework is compared with the literature. According to the results, the proposed framework enhances FLP recognition due to the recognition of vehicles from side images. The dataset is made public at https://www.kaggle.com/ganeshmailecture/datasets . Show more
Keywords: Vehicle make and model recognition, fake license plate detection, license plate authentication, intelligent transportation system
DOI: 10.3233/JIFS-230607
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-27, 2024
Authors: Yin, Songyi | Wang, Yu | Fu, Yelin
Article Type: Research Article
Abstract: The environmental, social, and governance (ESG) rating method is a powerful tool that can help investors to judge the investment value of companies based on the information disclosure. However, mainstream ESG rating methods ignore the distinction between companies with incomplete information disclosure and companies without information disclosure, which decreases the initiative and enthusiasm of companies to disclose information. In this study, a self-disclosure ESG (SDESG) rating method is proposed to evaluate companies’ ESG performance capabilities. First, based on the fuzzy set, fuzzy data is defined and applied to the SDESG rating method. Second, analogous to the academic reward system of …a university, a reward mechanism of disclosure is used in the SDESG rating method. Finally, the effectiveness and reliability of the SDESG rating method are demonstrated through Refinitiv’s case. The results show that the SDESG rating method can distinguish companies with incomplete information disclosure from companies without information disclosure and allow companies that proactively disclose information to obtain better ESG scores under each industry. The implications of the study would increase companies’ enthusiasm to disclose information and maintain transparency within a company. Show more
Keywords: ESG rating method, information disclosure, fuzzy set, reward mechanism
DOI: 10.3233/JIFS-230777
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Wang, Dan | Yao, Jingfa | Zhang, Yanmin
Article Type: Research Article
Abstract: Nowadays, automatic human activity recognition from video images is necessary for monitoring applications and caring for disabled people. The use of surveillance cameras and the processing of the obtained images leads to the achievement of a smart, accurate system for the recognition of human behavior. Since human detection in different scenes is associated with many challenges, several approaches have been implemented to detect human activity from video image processing. Due to the complexity of human activities, background noises and other factors affect the detection. For the solution of these problems, two deep learning-based algorithms have been described in the current …article. According to the convolutional neural networks, the LSTM + CNN method and the 3D CNN method have been used to recognize the human activities in the images of the video. Each algorithm is explained and analyzed in detail. The experiments designed in this paper are performed by two datasets: the HMDB-51 dataset and the UCF101 dataset. In the HMDB-51 dataset, the highest obtained accuracy for CNN + LSTM method was equal to 70.2 and for method 3D CNN equal to 54.4. In the UCF101 dataset, the highest obtained accuracy for CNN + LSTM method was equal to 95.1 and for method 3D CNN equal to 90.8. Show more
Keywords: Long short-term memory (LSTM), video processing, deep learning, human activity recognition, convolutional neural network (CNN)
DOI: 10.3233/JIFS-236068
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Viet, Hoang Huu | Uyen, Nguyen Thi | Cao, Son Thanh | Nguyen, Long Giang
Article Type: Research Article
Abstract: The Student-Project Allocation with preferences over Projects problem is a many-to-one stable matching problem that aims to assign students to projects in project-based courses so that students and lecturers meet their preference and capacity constraints. In this paper, we propose an efficient two-heuristic algorithm to solve this problem. Our algorithm starts from an empty matching and iteratively constructs a maximum stable matching of students to projects. At each iteration, our algorithm finds an unassigned student and assigns her/his most preferred project to her/him to form a student-project pair in the matching. If the project or the lecturer who offered the …project is over-subscribed, our algorithm uses two heuristic functions, one for the over-subscribed project and the other for the over-subscribed lecturer, to remove a student-project pair in the matching. To reach a stable matching of a maximum size, our two heuristics are designed such that the removed student has the most opportunities to be assigned to some project in the next iterations. Experimental results show that our algorithm is efficient in execution time and solution quality for solving the problem. Show more
Keywords: Approximation algorithm, heuristic search, matching problem, student-project allocation problem
DOI: 10.3233/JIFS-236300
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Huang, Jinsong | Hou, Hecheng | Li, Xiaoying | Zhang, Ziyi | Jia, Qi
Article Type: Research Article
Abstract: In the context of the digital era, the factors influencing the cognitive load of the full ecological smart home on the elderly are mostly interconnected. Most existing studies have conducted single correlation analyses, ignoring the fact that cognitive load is the result among multiple interactions of multiple factors. Furthermore, the color, material and Finishing of the product design can also impact on the user’s perceptual needs. Therefore, exploring the grouping dynamics of cognitive load and users’ perceptual needs for color (C), material (M), and Finishing (F) of smart products can provide insights for inclusive design of smart homes. The article …analyzes the asymmetric multiple concurrent causal effects of full ecological smart homes on the cognitive load of the elderly from a histological perspective using fuzzy set Qualitative Comparative Analysis (fsQCA) based on the four elements of Innovation Diffusion Theory. At the same time, principal component analysis and quantitative theory I class method are used to explore the quantitative relationship between color, material, Finishing and users’ perceptual imagery of the product. The results of the study showed that there were no necessary conditions leading to high or low cognitive load in the fsQCA analysis, indicating that the problem was the result of the interaction of multiple conditions, and the final analysis yielded three histological pathways leading to low cognitive load and one pathway leading to high load in older adults. Moreover, the study identifies the combination of colors, materials, and finishes that best represent user preferences. This study establishes a dialogue between theory, results, and cases in analyzing of the group dynamics of the impact of full ecological smart homes on the cognitive load of the elderly. It provides a theoretical basis for the development of digital inclusion enhancement strategies. Show more
Keywords: Smart home, cognitive load, diffusion of innovation, qualitative comparative analysis (QCA), human-computer interaction
DOI: 10.3233/JIFS-237212
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Jansi Sophia Mary, C. | Mahalakshmi, K.
Article Type: Research Article
Abstract: Intrusion Detection (ID) in cloud environments is vital to maintain the safety and integrity of data and resources. However, the presence of class imbalance, where normal samples significantly outweigh intrusive instances, poses a challenge in constructing a potential ID system. Deep Learning (DL) methods, with their capability to automatically study complex patterns and features, present a promising solution in various ID tasks. Such methods can automatically learn intricate features and patterns from the input dataset, making them suitable for detecting anomalies and finding intrusions in cloud environments. Therefore, this study proposes a Class Imbalance Data Handling with an Optimal Deep …Learning-Based Intrusion Detection System (CIDH-ODLIDS) in a cloud computing atmosphere. The CIDH-ODLIDS technique leverages optimal DL-based classification and addresses class imbalance. Primarily, the CIDH-ODLIDS technique preprocesses the input data using a Z-score normalization approach to ensure data quality and consistency. To handle class imbalance, the CIDH-ODLIDS technique employs oversampling techniques, particularly focused on synthetic minority oversampling techniques such as Adaptive Synthetic (ADASYN) sampling. ADASYN generates synthetic instances for the minority class depending on the available data instances, effectively balancing the class distribution and mitigating the impact of class imbalance. For the ID process, the CIDH-ODLIDS technique utilizes a Fuzzy Deep Neural Network (FDNN) model, and its tuning procedure is performed using the Chaotic Tunicate Swarm Algorithm (CTSA). CTSA is employed to choose the learning rate of the FDNN methods optimally. The experimental assessment of the CIDH-ODLIDS method is extensively conducted on three IDS datasets. The comprehensive comparison results confirm the superiority of the CIDH-ODLIDS algorithm over existing techniques. Show more
Keywords: Cloud computing, security, deep learning, intrusion detection system, tunicate swarm algorithm, class imbalance data
DOI: 10.3233/JIFS-237900
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Lomas-Barrie, Victor | Reyes-Camacho, Michelle | Neme, Antonio
Article Type: Research Article
Abstract: Horizontal gene transference is a biological process that involves the donation of DNA or RNA from an organism to a second, unrelated organism. This process is different from the more common one, vertical transference, which is present whenever an organism or pair of organisms reproduce and transmit their genetic material to the descendants. The identification of segments of genetic material that are the result of horizontal transference is relevant to construct accurate phylogenetic trees, on one hand, and to detect possible drug-resistance mechanisms, on the other, since this movement of genetic material is the main cause behind antibiotic resistance in …bacteria. Here, we describe a novel algorithm able to detect sequences of foreign origin, and thus, possible acquired via horizontal transference. The general idea of our method is that within the genome of an organism, there might be sequences that are different from the vast majority of the remaining sequences from the same organism. The former are candidate anomalies, and thus, their origin may be explained by horizontal transference. This approach is equivalent to a particular instance of the authorship attribution problem, that in which from a set of texts or paragraphs, almost all of them were written by the same author, whereas a minority has a different authorship. The constraint is that the author of each text is not known, so the algorithm has to attribute the authorship of each one of the texts. The texts detected to be written by a different author are the equivalent of the sequences of foreign origin for the case of genetic material. We describe here a novel method to detect anomalous sequences, based on interpretable embeddings derived from a common attention mechanism in humans, that of identifying novel tokens within a given sequence. Our proposal achieves novel and consistent results over the genome of a well known organism. Show more
Keywords: Horizontal gene transference, anomaly detection, embeddings, natural language processing, genomics
DOI: 10.3233/JIFS-219337
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]