Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2023: 2
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Du, Rong | Cheng, Yan
Article Type: Research Article
Abstract: This research paper highlights the significance of vehicle detection in aerial images for surveillance systems, focusing on deep learning methods that outperform traditional approaches. However, the challenge of high computation complexity due to diverse vehicle appearances persists. The motivation behind this study is to highlight the crucial role of vehicle detection in aerial images for surveillance systems, emphasizing the superior performance of deep learning methods compared to traditional approaches. To address this, a lightweight deep neural network-based model is developed, striking a balance between accuracy and efficiency enabling real-time operation. The model is trained and evaluated on a standardized dataset, …with extensive experiments demonstrating its ability to achieve accurate vehicle detection with significantly reduced computation costs, offering a practical solution for real-world aerial surveillance scenarios. Show more
Keywords: Aerial images, vehicle detection, surveillance system, deep learning, real-time processing
DOI: 10.3233/JIFS-236059
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Pavithra, R. | Ramachandran, Prakash
Article Type: Research Article
Abstract: The Hilbert spectrum images of intrinsic mode functions (IMF) of empirical mode decomposition (EMD) analysis and variational mode decomposition (VMD) analysis of faulty machine vibration signals are used in deep convolutional neural network (DCNN) for machine fault classification in which the DCNN automatically learns the features from spectral images using convolution layer. Though both EMD and VMD analysis suit well for non-stationary signal analysis, VMD has the merit of aliasing free IMFs. In this paper, the performance improvement of DCNN classification for a non-stationary vibration signal dataset using VMD is brought out. The numerical experiment uses the Hilbert spectrum images …of 4 EMD-IMFs and 4 VMD-IMFs in DCNN to classify 10 different faults of the Case Western Reserve University (CWRU) bearing dataset. The confusion matrices are obtained and the plot of model accuracies in terms of epochs for the DCNN is analysed. It is shown that the spectrum images of one of the four EMD-IMFs, IMF0 , give a validation accuracy of 100% and in the case of VMD the spectrum images of two of the four VMD-IMFs, IMF0 , and IMF1 give a validation accuracy of 100%. This reveals that non-aliasing IMFs of VMD are better at classifying bearing faults. Further to bring out the merits of VMD analysis for non-stationary signals the numerical experiment is conducted using VMD analysis for binary fault classification of the milling dataset which is more non-stationary than the bearing dataset which is proved by plotting the statistical parameters of both datasets against time. It is found that the DCNN classification is 100% accurate for IMF3 of VMD analysis which is much better than the 81% accuracy provided by EMD analysis as per existing literature. The performance comparison highlights the merits of VMD analysis over EMD analysis and other state-of-the-art methods and ensemble learning methods. Show more
Keywords: Deep convolution neural network, empirical mode decomposition, hilbert transform, intrinsic mode function, variational mode decomposition, ensemble learning
DOI: 10.3233/JIFS-237546
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-19, 2024
Authors: Nawshin, Sabila | Islam, Salekul | Shatabda, Swakkhar
Article Type: Research Article
Abstract: Software Defined Networking (SDN) proposes a centralized network paradigm where a central controller manages the network. While this centralizes scheme opens up previously unachievable opportunities, it also makes the network more susceptible to a varying range of cyber threats. The development of effective Intrusion Detection Systems (IDS) designed for the SDN topology is a critical need to address the different vulnerabilities SDN faces. Towards that purpose, the inSDN dataset was specifically curated for intrusion detection in SDN with various attack scenarios unique to the SDN topology. This study leveraged the inSDN dataset to introduce an innovative Intrusion Detection …System (IDS) model that amalgamates Principal Component Analysis (PCA), a dimensionality reduction technique widely employed in traditional Machine Learning (ML) to extract the principal features of the dataset and couples it with Artificial Neural Networks (ANN) to classify network traffic based on the extracted features. The proposed model attains an exceptional accuracy rate of 99.95% for multi-class classification and demonstrate that it surpasses the current state-of-the-art techniques while operating within a much simpler framework. This significantly diminishes the necessity for complex models that demand extensive computational resources when dealing with the inSDN attack dataset. The analysis of the dataset carried out in this study also provides insights into the redundancy present in the dataset and identifies the core features that contains most of the information in the dataset. Show more
Keywords: Software Defined Networking (SDN), Intrusion Detection Systems (IDS), Principle Component Analysis (PCA), Artificial Neural Network (ANN)
DOI: 10.3233/JIFS-236340
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Kumar, Geethu S. | Ankayarkanni, B.
Article Type: Research Article
Abstract: Facial Emotion Recognition (FER) is a powerful tool for gaining insights into human behaviour and well-being by precisely quantifying a wide range of emotions especially stress, through the analysis of facial images. Detecting stress using FER entails meticulously examining subtle facial cues, such as changes in eye movements, brow furrowing, lip tightening, and muscle contractions. To assure effectiveness and real-time processing, FER approaches based on deep learning and artificial intelligence (AI) techniques was created using edge modules. This research introduces a novel approach for identifying stress, leveraging the Conv-XGBoost Algorithm to analyse facial emotions. The proposed model sustain rigorous evaluation …techniques, for employing key metrics examination such as the F1 score, validation accuracy, precision, and recall rate to assess its real-world reliability and robustness. This comprehensive analysis and validation proved the model’s practical utility in facial analysis. Integrating the Conv-XGBoost Algorithm with facial emotion analysis represents a promising and highly accurate solution for efficient stress detection. The method surpasses existing literature and demonstrate significant potential for practical applications based on well-validated data. Show more
Keywords: Stress, emotion recognition, Conv-XGBoost, deep learning, facial expression
DOI: 10.3233/JIFS-237820
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Martínez Felipe, Miguel de JesÚs | Martínez Castro, JesÚs Alberto | Montiel Pérez, JesÚs Yaljá | Chaparro Amaro, Oscar Roberto
Article Type: Research Article
Abstract: In this work, the image block matching based on dissimilarity measure is investigated. Moreover, an unsupervised approach is implemented to yield that the algorithms have low complexity (in numbers of operations) compared to the full search algorithm. The state-of-the-art experiments only use discrete cosine transform as a domain transform. In addition, some images were tested to evaluate the algorithms. However, these images were not evaluated according to specific characteristics. So, in this paper, an improved version is presented to tackle the problem of dissimilarity measure in block matching with a noisy environment, using another’s domain transforms or low-pass filters to …obtain a better result in block matching implementing a quantitive measure with an average accuracy margin of ± 0.05 is obtained. The theoretical analysis indicates that the complexity of these algorithms is still accurate, so implementing Hadamard spectral coefficients and Fourier filters can easily be adjusted to obtain a better accuracy of the matched block group. Show more
Keywords: Block matching, Walsh-Hadamard discrete transform, Fourier filter, dissimilarity measure, unsupervised machine learning
DOI: 10.3233/JIFS-219341
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Ensastegui-Ortega, Maria Elena | Batyrshin, Ildar | Cárdenas–Perez, Mario Fernando | Kubysheva, Nailya | Gelbukh, Alexander
Article Type: Research Article
Abstract: In today’s data-rich era, there is a growing need for developing effective similarity and dissimilarity measures to compare vast datasets. It is desirable that these measures reflect the intrinsic structure of the domain of these measures. Recently, it was shown that the space of finite probability distributions has a symmetric structure generated by involutive negation mapping probability distributions into their “opposite” probability distributions and back, such that the correlation between opposite distributions equals –1. An important property of similarity and dissimilarity functions reflecting such symmetry of probability distribution space is the co-symmetry of these functions when the similarity between probability …distributions is equal to the similarity between their opposite distributions. This article delves into the analysis of five well-known dissimilarity functions, used for creating new co-symmetric dissimilarity functions. To conduct this study, a random dataset of one thousand probability distributions is employed. From these distributions, dissimilarity matrices are generated that are used to determine correlations similarity between different dissimilarity functions. The hierarchical clustering is applied to better understand the relationships between the studied dissimilarity functions. This methodology aims to identify and assess the dissimilarity functions that best match the characteristics of the studied probability distribution space, enhancing our understanding of data relationships and patterns. The study of these new measures offers a valuable perspective for analyzing and interpreting complex data, with the potential to make a significant impact in various fields and applications. Show more
Keywords: Dissimilarity function, co-symmetry, correlation, probability distribution, negation
DOI: 10.3233/JIFS-219363
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Xu, Zhigang | Li, Yugen
Article Type: Research Article
Abstract: Construction site environment helmet detection is of great significance for protecting workers’ lives and realizing the automation of safety management. Aiming at the current object detection methods for the complex construction site environment in the small-scale helmet object detection ability is insufficient. This paper proposes a construction site environment helmet detection method based on multi-scale context and attention fusion. The method is able to aggregate the multi-scale contextual semantics of deep image features through the proposed multi-scale context module and expand the receptive field in order to improve the network’s discriminative learning ability for small-scale helmet objects. Meanwhile, the proposed …attention feature fusion module dynamically fuses features from shallow features and network decoding features to enhance the network’s ability to learn the expression of global feature dependencies and local spatial detail features of helmet objects, and further improve the network’s detection precision of helmet objects. The experimental results show that on the constructed safety helmet wearing dataset, the proposed method in this paper has good detection effect and balanced detection speed compared with the existing mainstream object detection methods. Show more
Keywords: Construction site, helmet detection, CenterNet, multi-scale context, attention feature fusion
DOI: 10.3233/JIFS-236385
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Wei, Tao | Yang, Changchun | Zheng, Yanqi | Zhang, Jingxue
Article Type: Research Article
Abstract: Recently, Graph Neural Networks (GNNs) using aggregating neighborhood collaborative information have shown effectiveness in recommendation. However, GNNs-based models suffer from over-smoothing and data sparsity problems. Due to its self-supervised nature, contrastive learning has gained considerable attention in the field of recommendation, aiming at alleviating highly sparse data. Graph contrastive learning models are widely used to learn the consistency of representations by constructing different graph augmentation views. Most current graph augmentation with random perturbation destroy the original graph structure information, which mislead embeddings learning. In this paper, an effective graph contrastive learning paradigm CollaGCL is proposed, which constructs graph augmentation by …using singular value decomposition to preserve crucial structure information. CollaGCL enables perturbed views to effectively capture global collaborative information, mitigating the negative impact of graph structural perturbations. To optimize the contrastive learning task, the extracted meta-knowledge was propagate throughout the original graph to learn reliable embedding representations. The self-information learning between views enhances the semantic information of nodes, thus alleviating the problem of over-smoothing. Experimental results on three real-world datasets demonstrate the significant improvement of CollaGCL over state-of-the-art methods. Show more
Keywords: Self-supervised learning, recommendation, contrastive learning, data augmentation
DOI: 10.3233/JIFS-236497
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Yang, Dianqing | Wang, Wenliang
Article Type: Research Article
Abstract: Unmanned aerial vehicle (UAV) remote-sensing images have a wide range of applications in wildfire monitoring, providing invaluable data for early detection and effective management. This paper proposes an improved few-shot target detection algorithm tailored specifically for wildfire detection. The quality of UAV remote-sensing images is significantly improved by utilizing image enhancement techniques such as Gamma change and Wiener filter, thereby enhancing the accuracy of the detection model. Additionally, ConvNeXt-ECA is used to focus on valid information within the images, which is an improvement of ConvNeXt with the addition of the ECANet attention mechanism. Furthermore, multi-scale feature fusion is performed by …adding a feature pyramid network (FPN) to optimize the extracted small target features. The experimental results demonstrate that the improved algorithm achieves a detection accuracy of 93.2%, surpassing Faster R-CNN by 6.6%. Moreover, the improved algorithm outperforms other target detection algorithms YOLOv8, RT-DETR, YoloX, and SSD by 3.4%, 6.4%, 7.6% and 21.1% respectively. This highlights its superior recognition accuracy and robustness in wildfire detection tasks. Show more
Keywords: Fire target detection, ConvNeXt-ECA, UAV remote-sensing image, feature pyramid network
DOI: 10.3233/JIFS-240531
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Singh, Pratibha | Kushwaha, Alok Kumar Singh | Varshney, Neeraj
Article Type: Research Article
Abstract: Precise video moment retrieval is crucial for enabling users to locate specific moments within a large video corpus. This paper presents Interactive Moment Localization with Multimodal Fusion (IMF-MF), a novel interactive moment localization with multimodal fusion model that leverages the power of self-attention to achieve state-of-the-art performance. IMF-MF effectively integrates query context and multimodal features, including visual and audio information, to accurately localize moments of interest. The model operates in two distinct phases: feature fusion and joint representation learning. The first phase dynamically calculates fusion weights for adapting the combination of multimodal video content, ensuring that the most relevant features …are prioritized. The second phase employs bi-directional attention to tightly couple video and query features into a unified joint representation for moment localization. This joint representation captures long-range dependencies and complex patterns, enabling the model to effectively distinguish between relevant and irrelevant video segments. The effectiveness of IMF-MF is demonstrated through comprehensive evaluations on three benchmark datasets: TVR for closed-world TV episodes and Charades for open-world user-generated videos, DiDeMo dataset, Open-world, diverse video moment retrieval dataset. The empirical results indicate that the proposed approach surpasses existing state-of-the-art methods in terms of retrieval accuracy, as evaluated by metrics like Recall (R1, R5, R10, and R100) and Intersection-of-Union (IoU). The results consistently demonstrate IMF-MF’s superior performance compared to existing state-of-the-art methods, highlighting the benefits of its innovative interactive moment localization approach and the use of self-attention for feature representation and attention modeling. Show more
Keywords: Multimedia data retrieval, query-dependent fusion, ranking system, multimodal retrieval, video segment localization
DOI: 10.3233/JIFS-233071
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Maheswari, M. | Anitha, D. | Sharma, Aditi | Kaur, Kiranpreet | Balamurugan, V. | Garikapati, Bindu | Dineshkumar, R. | Karunakaran, P.
Article Type: Research Article
Abstract: Anomaly detection, a critical aspect of data analysis and cybersecurity, aims to identify unusual patterns that deviate from the expected norm. In this study, we propose a hybrid approach that combines the strengths of Autoencoder neural networks and Multiclass Support Vector Machines (SVM) for robust anomaly detection. The Autoencoder is utilized for feature learning and extraction, capturing intricate patterns in the data, while the Multiclass SVM provides a discriminative classification mechanism to distinguish anomalies from normal patterns. Specifically, the Autoencoder is trained on normal data to acquire a compact and efficient representation of the underlying patterns, with the reconstruction errors …serving as indicative measures of anomalies. Concurrently, a Multiclass SVM is trained to classify instances into multiple classes, including an anomaly class. The anomaly scores from the Autoencoder and the decision function of the Multiclass SVM, along with that of the Random Forest Neural Network (AE-RFNN), are combined, leveraging their complementary strengths. A thresholding mechanism is then employed to classify instances as normal or anomalous based on the combined scores. The performance of the hybrid model is evaluated using standard metrics such as precision, recall, F1-score, and the area under the Receiver Operating Characteristic (ROC) curve. The proposed hybrid anomaly detection approach demonstrates effectiveness in capturing complex patterns and discerning anomalies across diverse datasets. Additionally, the model offers flexibility for adaptation to evolving data distributions. This study contributes to the advancement of anomaly detection methodologies by presenting a hybrid solution that combines feature learning and discriminative classification for improved accuracy and generalization. Show more
Keywords: Anomaly detection, Autoencoder, Multiclass SVM, feature learning, hybrid model, cybersecurity
DOI: 10.3233/JIFS-240028
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Ren, Xinyu | Yang, Wanhe | Yang, Hui
Article Type: Research Article
Abstract: With the increasing demand for tourism, people’s travel modes are more and more diversified, and the tourism recommendation system also arises at the historical juncture. However, the current recommendation system is only recommended for a single user and does not realize the group travel recommendation. To achieve the goal of recommending its preferred attractions for multiple users, the time decay characteristics and Pearson correlation coefficient in Newton’s cooling law are used to obtain the user similarity with spatial distance factor and temporal decay factor and to obtain the score prediction results based on spatiotemporal fusion. In addition, the trust of …user communication is used to recommend, and the weights of the two scoring results are added to obtain the personalized recommendation results of member users. Finally, the study used the fusion strategy to integrate the personalized recommendation results for group preference and obtained the final group travel recommendation list. Therefore, a group travel recommendation model based on spatio-temporal integration factors was constructed. According to the experimental analysis, we can see that the average HR value of the constructed model is 0.8124, and the average NDCG value is 0.7284, which can accurately judge users’ preferences and get the most suitable group travel recommendation results, thus facilitating users to make the next plan for the tourism project. Show more
Keywords: Group recommendation, spatio-temporal fusion, score prediction, fusion strategy
DOI: 10.3233/JIFS-239548
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Shehzadi, Maham | Fahmi, Aliya | Abdeljawad, Thabet | Khan, Aziz
Article Type: Research Article
Abstract: This paper investigates the detailed analysis of linear diophantine fuzzy Aczel-Alsina aggregation operators, enhancing their efficacy and computational efficiency while aggregating fuzzy data by using the fuzzy C-means (FCM) method. The primary goal is to look at the practical uses and theoretical foundations of these operators in the context of fuzzy systems. The aggregation process is optimised using the FCM algorithm, which divides data into clusters iteratively. This reduces computer complexity and enables more dependable aggregation. The mathematical underpinnings of Linear Diophantine Fuzzy Aczel-Alsina aggregation operators are thoroughly examined in this study, along with an explanation of their purpose in …handling imprecise and uncertain data. It also investigates the integration of the FCM method, assessing its impact on simplifying the aggregation procedure, reducing algorithmic complexity, and improving the accuracy of aggregating fuzzy data sets. This work illuminates these operators performance and future directions through extensive computational experiments and empirical analysis. It provides an extensive framework that shows the recommended strategy’s effectiveness and use in a variety of real-world scenarios. We obtain our ultimate outcomes through experimental investigation, which we use to inform future work and research. The purpose of the study is to offer academics and practitioners insights on how to improve information fusion techniques and decision-making processes. Show more
Keywords: Linear diophantine fuzzy set, Aczel-Alsina operational laws, linear diophantine fuzzy Aczel-Alsina aggregation operators, fuzzy C-means algorithm
DOI: 10.3233/JIFS-238716
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-22, 2024
Authors: Chongjuan, Wang
Article Type: Research Article
Abstract: The convergence of visual communication design with unique effects, graphic design, as well as virtual reality, which is becoming progressively more popular, has created a new paradigm for education in recent years. However, emerging evidence indicates that their integration into the world of learning is a somewhat gradual and intricate process. The present research proposes a novel algorithm and a functional model of artificial intelligence technology design to automatically arrange graphic language in visual communication design. In visual communication design, the goal orchestration function used to determine the display size of buffer images is the difference between the minimum and …maximum values of the number of orchestration screens. An ant colony method is used in visual communication design to identify the optimal locations for visuals to be presented, and ASM semantics is used to characterize the visual languages. In order to accomplish the invention and development of a visual communication design style, the suggested algorithm has to be programmed and executed. It employs sequential decision marking to characterize the visual vocabulary and accomplishes automated organization. According to the trial results, visual saturation based on AI technology can reach up to 97%, and the average user satisfaction score is 7.65. It is evident that a creative visual thinking approach can maximize the visual communication design effect and communicate fresh design concepts. Show more
Keywords: Innovation and entrepreneurship, visual communication design (VCD), hybrid optimization, adaptive network-based fuzzy inference system (ANFIS), Statistical analysis, t-test and correlation
DOI: 10.3233/JIFS-235930
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Bakhshi, Mahmood | Ahn, Sun Shin | Jun, Young Bae | Borzooei, Rajab Ali
Article Type: Research Article
Abstract: Some kinds of pseudo valuations such as positive implicative pseudo valuation, (weak) implicative pseudo valuation, and commutative pseudo valuation of various types are introduced. Several examples, properties and characterizations of them are given as well. The relationships between them and the substructures of hyper BCK -algebras are investigated, too. Finally, by giving various examples and theorems, the relationships among the proposed pseudo valuations are investigated and characterized, especially in hyper BCK -algebras with three elements.
Keywords: Hyper BCK -algebra, pseudo valuation, positive implicative pseudo valuation, implicative pseudo valuation, commutative pseudo valuation
DOI: 10.3233/JIFS-233898
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Selvaraj, Sunil Kumar | Bhat Pundikai, Venkatramana
Article Type: Research Article
Abstract: BACKGROUND: The increased depletion of ground water resources poses the risk of higher moisture stress environment for agriculture crops. The rapid increase in the moisture stress situation imposes the need of efficient agricultural research on determining the impact of moisture stress on variety of crops. OBJECTIVE: The prime objective of the proposed work is building an IoT based Plant Phenotyping Device for moisture stress experimental study on variety of crops with deep learning model for stress response detection. METHODS: In this work, IoT technology is used for building a proposed system for conducting …the moisture stress experiments on plants and adopting the image processing and convolution neural network based model for stress prediction. RESULTS: The accuracy of the proposed system was experimentally evaluated and empirical results were satisfactory in maintaining the desired level of moisture stress. Performance analysis of LeNet, AlexNet, customized AlexNet and GoogLeNet CNN models were carried out with hyper-parameters variations on the leaf images. GoogLeNet achieved a better validation accuracy of 96% among other models. The trained GoogLeNet model is used for predicting the moisture stress response and predicted results were matched with manual observation of stress response. SIGNIFICANCE: The affirmative results of proposed system would increases its adoption for in-house precision agriculture and also for conducting various moisture stress experiments on variety of crops. The confirmative detection of moisture stress tolerance level of plant provides knowledge on minimum level of water requirement for plant growth, which in-turn save the water by avoiding excess watering to plants. Show more
Keywords: IoT, sensors, Raspberry Pi, moisture stress, deep learning
DOI: 10.3233/JIFS-236885
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Ashwin, P.V. | Ansal, K.A.
Article Type: Research Article
Abstract: Image classification using polarimetric synthetic aperture radar (Pol-SAR) is becoming more important in image processing for remote sensing applications. However, in the existing techniques, during the feature extraction process, there exist some limitations including laborious endeavour for Pol-SAR image classification, identifying intrinsic features for target recognition is difficult in feature selection, and pixel-level Pol-SAR image classification is difficult for obtaining more precise and coherent interpretation consequences. Hence to overcome these issues, a novel Multifarious Stratification Stratagem in machine learning is proposed to achieve pixel-level Pol-SAR classification. In this proposed model, a novel Scrumptious Integrant Wrenching method is used for efficient …feature extraction. It is compatible with the orientation-sensitive of the Pol-SAR image which increases the variety of intra-layer features. To remove the difficulty in feature selection, a novel Episodicical Proximity Selection method is proposed in which a Split-level parallel feature selection strategy is used to select the best qualities from the extracted features. To tackle the difficulty in classification, an Elastic Net Classifier (ENC) is used that find the coefficient vector for the linear combination of the training sets. This efficiently classified the best features in the Pol-SAR images and improved the proposed system’s accuracy. As a result, the performance measures of the proposed system demonstrate that the accuracy is increased by 99.69%, precision is increased by 98.99%, recall is increased by 98.99%, sensitivity is increased by 98.99%, and F1-score is increased by 98.99% as a response. Show more
Keywords: Feature extraction, feature selection, elastic net classifier, principle component analysis, convolution layer, max-pooling layer
DOI: 10.3233/JIFS-222403
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2024
Authors: Ning, Tao | Zhang, Tingting | Huang, Guowei
Article Type: Research Article
Abstract: Folk dance is an important intangible cultural heritage in China. In the environment where movement recognition technology is widely used, there is still no research field on the protection and inheritance of folk dance culture. In order to better protect and inherit the minority dance, screening the typical movements of 5 types of minority dance, through the dance video frame processing, obtain the key movements of 19 class dance sequence, build the national dance typical action data set, put forward a 3D CNN fusion Transformer national dance recognition network model (FCTNet), the recognition rate of 96.7% in the experiment. The …results show that the construction method of the folk dance data set is reasonable, the identification model has good performance for the classification of folk dance, and can effectively identify and record the folk dance movements, which also makes new contributions to the digital protection of folk dance. Show more
Keywords: Transformer, folk dance, cultural protection
DOI: 10.3233/JIFS-235302
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-09, 2024
Authors: Shao, Shuai | Li, Dongwei
Article Type: Research Article
Abstract: As technology evolves, the allocation and use of educational resources becomes increasingly complex. Due to the many factors involved in recommending and matching English education resources, traditional predictive control models are no longer adequate. Therefore, fuzzy predictive control models based on neural networks have emerged. To increase the effectiveness and efficiency of using English educational resources (EER), this research aims to create a neural network-based fuzzy predictive control model (T-S-BPNN) for resource suggestion and matching. The results of the study show that the T-S-BPNN model α proposed in the study starts from 0 and increases sequentially by 0.1 up to …1, observing the change in MAE values. The experiment’s findings demonstrate that the value of MAE is lowest at values around 0.5. The T-S-BPNN model, on the other hand, gradually plateaued in its adaptation rate up to 7 runs, reaching about 9.8%. The accuracy rate peaked at 0.843 when the number of recommendations reached 7. The recall rate also peaked at 0.647 when the number of recommended English courses reached 7. The R-value for each set hovered around 0.97, which is a good fit. And the R-value of the training set is 0.97024, which can indicate that the T-S-BPNN model model proposed in the study fits well. It indicates that the algorithm proposed in the study is highly practical. Show more
Keywords: Resource recommendation, english teaching, fuzzy predictive control, recommended evaluation, neural network
DOI: 10.3233/JIFS-233265
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Ammavasai, S.K.
Article Type: Research Article
Abstract: The rapid growth of the cloud computing landscape has created significant challenges in managing the escalating volume of data and diverse resources within the cloud environment, catering to a broad spectrum of users ranging from individuals to large corporations. Ineffectual resource allocation in cloud systems poses a threat to overall performance, necessitating the equitable distribution of resources among stakeholders to ensure profitability and customer satisfaction. This paper addresses the critical issue of resource management in cloud computing through the introduction of a Dynamic Task Scheduling with Virtual Machine allocation (DTS-VM) strategy, incorporating Edge-Cloud computing for the Internet of Things (IoT). …The proposed approach begins by employing a Recurrent Neural Network (RNN) algorithm to classify user tasks into Low Priority, Mid Priority, and High Priority categories. Tasks are then assigned to Edge nodes based on their priority, optimizing efficiency through the application of the Spotted Hyena Optimization (SHO) algorithm for selecting the most suitable edge node. To address potential overloads on the edge, a Fuzzy approach evaluates offloading decisions using multiple metrics. Finally, optimal Virtual Machine allocation is achieved through the application of the Stable Matching algorithm. The seamless integration of these components ensures a dynamic and efficient allocation of resources, preventing the prolonged withholding of customer requests due to the absence of essential resources. The proposed system aims to enhance overall cloud system performance and user satisfaction while maintaining organizational profitability. The effectiveness of the DTS-VM strategy is validated through comprehensive testing and evaluation, showcasing its potential to address the challenges posed by the diverse and expanding cloud computing landscape. Show more
Keywords: Task scheduling, priority, classification, edge computing, cloud, VM allocation, IoT
DOI: 10.3233/JIFS-236838
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Du, Baigang | Zhang, Fujiang | Guo, Jun | Sun, Xiang
Article Type: Research Article
Abstract: The actual operating environment of rotating mechanical device contains a large number of noisy interference sources, leading to complex components, strong coupling, and low signal to noise ratio for vibration. It becomes a big challenge for intelligent fault diagnosis from high-noise vibration signals. Thus, this paper proposes a new deep learning approach, namely decomposition-enhance Fourier residual network (DEFR-net), to achieve high noise immunity for vibration signal and learn effective features to discriminate between different types of rotational machine faults. In the proposed DEFR-net, a novel algorithm is proposed to explicitly model high-noise signals for noisy data filtering and effective feature …enhancement based on a hard threshold decomposition function and muti-channel self-attention mechanism. Furthermore, it deeply integrates complementary analysis based on fast Fourier transform in the time-frequency domain and extends the breadth of network. The performance of the proposed model is verified by comparison with five state-of-the-art algorithms on two public datasets. Moreover, the noise experimental results show that the fault diagnosis accuracy is still 85.91% when the signal-to-noise-ratio reaches extreme noise of –8 dB. The results demonstrate that the proposed method is a valuable study for intelligent fault diagnosis of rotating machines in high-noise environments. Show more
Keywords: Intelligent fault diagnosis, high noise immunity, fourier residual network, decompose-enhance algorithm, attention mechanism
DOI: 10.3233/JIFS-233190
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-22, 2024
Authors: Shao, Changshun | Yu, Zhenglin | Tang, Jianyin | Li, Zheng | Zhou, Bin | Wu, Di | Duan, Jingsong
Article Type: Research Article
Abstract: The main focus of this paper is to solve the optimization problem of minimizing the maximum completion time in the flexible job-shop scheduling problem. In order to optimize this objective, random sampling is employed to extract a subset of states, and the mutation operator of the genetic algorithm is used to increase the diversity of sample chromosomes. Additionally, 5-tuple are defined as the state space, and a 4-tuple is designed as the action space. A suitable reward function is also developed. To solve the problem, four reinforcement learning algorithms (Double-Q-learning algorithm, Q-learning algorithm, SARS algorithm, and SARSA(λ ) algorithm) are …utilized. This approach effectively extracts states and avoids the curse of dimensionality problem that occurs when using reinforcement learning algorithms. Finally, experimental results using an international benchmark demonstrate the effectiveness of the proposed solution model. Show more
Keywords: Reinforcement learning, flexible job-shop scheduling, maximum completion time, Variation
DOI: 10.3233/JIFS-236981
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Lin, Zhiwei | Zhang, Songchuan | Zhou, Yiwei | Wang, Haoyu | Wang, Shilei
Article Type: Research Article
Abstract: Current mainstream deep learning optimization algorithms can be classified into two categories: non-adaptive optimization algorithms, such as Stochastic Gradient Descent with Momentum (SGDM), and adaptive optimization algorithms, like Adaptive Moment Estimation with Weight Decay (AdamW). Adaptive optimization algorithms for many deep neural network models typically enable faster initial training, whereas non-adaptive optimization algorithms often yield better final convergence. Our proposed Adaptive Learning Rate Burst (Adaburst) algorithm seeks to combine the strengths of both categories. The update mechanism of Adaburst incorporates elements from AdamW and SGDM, ensuring a seamless transition between the two. Adaburst modifies the learning rate of the SGDM …algorithm based on a cosine learning rate schedule, particularly when the algorithm encounters an update bottleneck, which is called learning rate burst. This approach helps the model to escape current local optima more effectively. The results of the Adaburst experiment underscore its enhanced performance in image classification and generation tasks when compared with alternative approaches, characterized by expedited convergence and elevated accuracy. Notably, on the MNIST, CIFAR-10, and CIFAR-100 datasets, Adaburst attained accuracies that matched or exceeded those achieved by SGDM. Furthermore, in training diffusion models on the DeepFashion dataset, Adaburst achieved convergence in fewer epochs than a meticulously calibrated AdamW optimizer while avoiding abrupt blurring or other training instabilities. Adaburst augmented the final training set accuracy on the MNIST, CIFAR-10, and CIFAR-100 datasets by 0.02%, 0.41%, and 4.18%, respectively. In addition, the generative model trained on the DeepFashion dataset demonstrated a 4.62-point improvement in the Frechet Inception Distance (FID) score, a metric for assessing generative model quality. Consequently, this evidence suggests that Adaburst introduces an innovative optimization algorithm that simultaneously updates AdamW and SGDM and incorporates a learning rate burst mechanism. This mechanism significantly enhances deep neural networks’ training speed and convergence accuracy. Show more
Keywords: Convolutional neural networks (CNNs), MNIST, CIFAR, deep learning, optimization algorithms, person image generation, diffusion models
DOI: 10.3233/JIFS-239157
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Gonzalez, Claudia I. | Torres, Cesar
Article Type: Research Article
Abstract: This paper presents an approach incorporating fuzzy logic techniques inside a convolutional neural network to manage uncertainty present in the multiple data sources that the model handles when training. The implementation considers the use of information and filters in the fuzzy spectrum, as well as the creation of a new layer to replace the traditional convolution layer with a fuzzy convolutional layer. The aim is to design artificial intelligence algorithms that combine the potential of deep convolutional neural networks and fuzzy logic to create robust systems that allow modeling the uncertainty present in the sources of data and that are …applied to classification problems. The fuzzification process is developed using three membership functions, including the Triangular, Gaussian, and S functions. The work was tested in databases oriented to traffic signs, due to the complexity of the different circumstances and factors in which a traffic sign can be found. Show more
Keywords: Fuzzy-neural network, fuzzy CNN, fuzzy deep learning model, fuzzy data, fuzzy convolutional
DOI: 10.3233/JIFS-219369
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Sun, Haibin | Zhang, Wenbo
Article Type: Research Article
Abstract: The ability of deep learning based bearing fault diagnosis methods is developing rapidly. However, it is difficult to obtain sufficient and comprehensive fault data in industrial applications, and changes in vibration signals caused by machine operating conditions can also hinder the accuracy of the model. The problem of limited data and frequent changes in operating conditions can seriously affect the effectiveness of deep learning methods. To tackle these challenges, a novel transformer model named the Differential Window Transformer (Dwin Transformer), which employs a new differential window self-attention mechanism, is presented in this paper. Meanwhile, the model introduces a hierarchical structure …and a new patch merging to further improve performance. Furthermore, a new fault diagnosis model dealing with limited training data is proposed, which combines the Auxiliary Classifier Generative Adversarial Network with the Dwin Transformer(DT-ACGAN). The DT-ACGAN model can generate high-quality fake samples to facilitate training with limited data, significantly improving diagnostic capabilities. The proposed model can achieve excellent results under the dual challenges of limited data and variable working conditions by combining Dwin Transformer with GAN. The DT-ACGAN owns superior diagnostic accuracy and generalization performance under limited sample data and varying working environments when compared with other existing models. A comparative test about cross-domain ability is conducted on the Case Western Reserve University dataset and Jiang Nan University dataset. The results show that the proposed method achieves an average accuracy of 11.3% and 3.76% higher than other existing methods with limited data respectively. Show more
Keywords: Transformer, generative adversarial network, cross-domains, limited data, fault diagnosis
DOI: 10.3233/JIFS-236787
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Dai, Jinpeng | Zhang, Zhijie | Yang, Xiaoyuan | Wang, Qicai | He, Jie
Article Type: Research Article
Abstract: This study explores nine machine learning (ML) methods, including linear, non-linear and ensemble learning models, using nine concrete parameters as characteristic variables. Including the dosage of cement (C), fly ash (FA), Ground granulated blast furnace slag (GGBS), coarse aggregate (G), fine aggregate (S), water reducing agent (WRA) and water (W), initial gas content (GC) and number of freeze-thaw cycles (NFTC), To predict relative dynamic elastic modulus (RDEM) and mass loss rate (MLR). Based on the linear correlation analysis and the evaluation of four performance indicators of R2 , MSE, MAE and RMSE, it is found that the nonlinear model has …better performance. In the prediction of RDEM, the integrated learning GBDT model has the best prediction ability. The evaluation indexes were R2 = 0.78, MSE = 0.0041, MAE = 0.0345, RMSE = 0.0157, SI = 0.0177, BIAS = 0.0294. In the prediction of MLR, ensemble learning Catboost algorithm model has the best prediction ability, and the evaluation indexes are R2 = 0.84, MSE = 0.0036, RMSE = 0.0597, MAE = 0.0312, SI = 5.5298, BIAS = 0.1772. Then, Monte Carlo fine-tuning method is used to optimize the concrete mix ratio, so as to obtain the best mix ratio. Show more
Keywords: Machine learning, relative dynamic elastic modulus, mass loss rate, sensitivity analysis, optimization design of mix proportions
DOI: 10.3233/JIFS-236703
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-26, 2024
Authors: Yuan, Weihao | Yang, Mengdao | Gu, Hexu | Xu, Gaojian
Article Type: Research Article
Abstract: There is scope to enhance agricultural measurement and control systems user interactivity, which typically necessitates training for users to perform specific operations successfully. With the continuous development of natural language semantic processing technology, it has become essential to augment the user-friendliness of multifaceted control and query operations in the agricultural measurement and control sector, ultimately leading to reduced operation costs for users. The study aims to focus on command parsing. The proposed AMR-OPO semantic parsing framework is based on the natural language understanding method of Abstract Meaning Representation of Rooted Markup Graphs (AMR). It transforms the user’s natural language inputs …into structured ternary (OPO) statements (operation-place-object) and converts the corresponding parameters of the user’s input commands. The framework subsequently sends the transformed commands to the relevant devices via the IoT gateway. To tackle the intricate task of parsing instructions, we developed a BERT-BiLSTM-ATT-CRF-OPO entity recognition model. This model can detect and extract entities from agricultural instructions, and precisely populate them into OPO statements. Our model shows exceptional accuracy in instruction parsing, with precision, recall, and F-value all measuring at 92.13%, 93.12%, and 92.76%, correspondingly. The findings from our experiment reveal outstanding and precise performance of our approach. It is anticipated that our algorithm will enhance the user experience offered by agricultural measurement and control systems, while also making them more user-friendly. Show more
Keywords: Natural language processing, abstract meaning representation, entity recognition, natural language understanding, human-computer interaction
DOI: 10.3233/JIFS-237280
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Li, Yingjie | Sun, Rongrong | Huang, Guangrong | Deng, Yuanbin | Zhang, Haixuan | Zhang, Delong
Article Type: Research Article
Abstract: In response to a series of issues in the distribution network, such as inadequate and inflexible utilization of flexible loads, delayed response to demand participation, and the uncertainty of new energy source output, a differentiated objective-based method for optimizing distribution network operations is proposed. Firstly, flexible loads are categorized, and corresponding mathematical models are established. Secondly, by employing chance-constrained programming to account for the uncertainty in new energy source output, a multi-objective optimization model is developed to reduce distribution network economic costs, decrease network losses, and enhance power supply reliability. Subsequently, an improved NSGA-III algorithm is introduced to address the …multi-objective model. Finally, an 11-node distribution network is used as a case study, and three different algorithms are comprehensively compared. This confirms the rationality of the optimized scheduling scheme proposed in this paper. Show more
Keywords: Distribution network, flexible load, multi-objective optimization, chance-constrained programming
DOI: 10.3233/JIFS-238367
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Yan, HongJu
Article Type: Research Article
Abstract: To solve the problem of lack of practice in Japanese teaching, a design of a Japanese remote interactive practical teaching platform based on the modern edge computing-based wireless sensor network is proposed. In terms of hardware, it mainly refits interactive mobile edge computing, wireless sensor networks, microprocessors, and other equipment, and adjusts the interface circuit. The Japanese teaching data and relevant Japanese teaching resources generated in the process of Japanese Teaching of practical courses are stored in the corresponding database table according to a certain format, and the logical relationship between database tables is used to update the database. The …software function of the platform is designed with the support of a database and hardware equipment. It consists of multiple modules, including platform user roles, interactive practical teaching and management, practical resource management and distribution, practice project information release, practice investigation statistics, and platform operation safety. Through the above design, the operation of a Japanese remote interactive practical teaching platform is realized. The test results show that there is no significant difference in the function realization of the design platform, but when multiple users are online at the same time, the interaction performance of the design platform is stronger, that is, the operation performance of the platform has obvious advantages. Show more
Keywords: Mobile edge computing, wireless sensor network, Japanese teaching platform, remote interactive learning, microprocessor, platform user roles, practical teaching, database management, interaction performance
DOI: 10.3233/JIFS-238196
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Ahani, Zahra | Shahiki Tash, Moein | Ledo Mezquita, Yoel | Angel, Jason
Article Type: Research Article
Abstract: Super-enhancers are a category of active super-enhancers densely occupied by transcription factors and chromatin regulators, controlling the expression of disease-related genes and cellular identity. Recent studies have demonstrated the formation of complex structures by various factors and super-enhancers, particularly in various cancers. However, our current knowledge of super-enhancers, such as their genomic locations, interaction with factors, functions, and distinction from other super-enhancers regions, remains limited. This research aims to employ deep learning techniques to detect and differentiate between super-enhancers and enhancers based on genomic and epigenomic features and compare the accuracy of the results with other machine learning methods In …this study, in addition to evaluating algorithms, we trained a set of genomic and epigenomic features using a deep learning algorithm and the Python-based cross-platform software to detect super-enhancers in DNA sequences. We successfully predicted the presence of super-enhancers in the sequences with higher accuracy and precision. Show more
Keywords: Super-enhancer, enhancer, genomic, epigenomic, deep learning
DOI: 10.3233/JIFS-219356
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Shahbazova, Shahnaz N. | Rzayev, Ab.G. | Asadova, R.Sh. | Jabiyev, K.M.
Article Type: Research Article
Abstract: The paper gives a systems analysis in the field of heat transfer and temperature distribution (TD) along the length of oil production wells (OPW). The analysis shows that the existing mathematical models are suitable only for determining TD along the length of casing string (CS) and are not suitable for determining TD along the length of the tubing run, since the existence of the interfacial (between the CS and the tubing) annulus of the fluid and gas layers with heat capacity and thermal conductivity that differ significantly from the heat capacity and thermal conductivity of rocks surrounding the CS. Given …the above, mathematical models taking into account the impact of the fluid and gas layers in the annulus on the heat transfer from the upward fluid flow to the tubing wall and from the wall to the interfacial annulus are developed. To ensure the technological effectiveness of the obtained model, formulas for quantitative estimation of the heat transfer of the fluid flow into the surrounding environment are given. Show more
Keywords: Heat exchange, heat transfer, heat dissipation, thermal conductivity, temperature distribution, oil production well.
DOI: 10.3233/JIFS-219366
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-7, 2024
Authors: Bai, Yu | Hu, Qijun | Zhou, Zhenxiang | Cai, Qijie | He, Leping
Article Type: Research Article
Abstract: The interaction of several workers with intelligent construction machinery can lead to serious collisions. Typically, the safety distance is used as an indicator of the safety of worker–machine interactions (WMI). However, the degree of risk does not increase linearly with decreasing worker–machine distances. To further reveal the essence of WMI safety, this study proposes a new method for assessing the safety state of WMIs, namely, the construction safety potential field. It is used to describe the factors and patterns associated with the spatial overlap and decay of hazardous energy in WMI operations. The proposed method was tested in an earthworks …construction WMI operation and the results were valid. A preliminary discussion of the relevant parameters constituting the construction safety potential field model is presented. The contributions of the research is proposing a generic energy-based model, which provides a novel idea for the interpretation of safety issues in construction WMI operations and opens up a new foundation for the development of active safety control. Show more
Keywords: Construction site, worker–machine safety, safety field, potential function
DOI: 10.3233/JIFS-236423
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Zhang, Qian | Bai, Enrui | Shao, Mingwen | Liang, Hong
Article Type: Research Article
Abstract: Convolutional neural networks (CNNs) and Transformer architectures have traditionally been recognized as the preferred models for addressing computer vision tasks. However, there has been a recent surge in the popularity of networks based on multi-layer perceptron (MLP) structures that do not rely on convolution or attention mechanisms. These MLP architectures have demonstrated exceptional performance in image classification tasks, exhibiting lower time complexity while maintaining high accuracy. In contrast, video classification tasks involve larger amounts of data and necessitate more intricate feature extraction, resulting in increased time and resource consumption. To enhance computational efficiency and minimize resource utilization, we propose a …convolution-free and Transformer-free architecture for video classification called Video-MLP for video classification. Video-MLP utilizes a simple MLP structure to learn video features. Specifically, it comprises two types of layers: Spatial-Mixer and Temporal-Mixer, which respectively capture spatial and temporal information. The Spatial-Mixer extracts spatial information from each frame along the height and width dimensions, while the Temporal-Mixer models temporal information for the same spatial positions across frames. To improve the efficiency of spatial-temporal modeling in our network, we used a spatial-temporal information fusion approach to integrate information at different scales. Additionally, we grouped the input data along the time dimension and designed three different grouping schemes when extracting temporal information. The experimental results indicate that Video-MLP achieved accuracy rates of 87.2% on the Kinetics-400 dataset and 75.3% on the SomethingV2 dataset, outperforming models with equivalent computational complexity. Notably, Video-MLP achieved these results without using convolution and attention mechanisms, and without pre-training on large-scale image and video datasets. Show more
Keywords: MLP-based-model, video classification, computer vision, deep learning
DOI: 10.3233/JIFS-240310
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Sivaranjani, N. | Senthil Ragavan, V.K. | Jawaherlalnehru, G.
Article Type: Research Article
Abstract: Industry experts are motivated to collect, collate, and analyse historical data in the legal sector in attempt to predict court case outcomes as the amount of historical data available in this field has increased over time. But using judicial data to predict and defend court judgements is no simple undertaking. Using Machine Learning (ML) models and traditional approaches for categorical feature encoding, previous research on predicting court outcomes using limited experimental datasets produced a number of unexpected predictions. The paper proposes an ensemble model combining Convolutional Neural Network (CNN), attention mechanism and eXtreme Gradient Boosting (XGB) algorithm. This model is …primarily based on a self-attention network, which could simultaneously capture linguistic relationships over lengthy sequences like RNN (Recurrent Neural Network) and is nevertheless speedy to train like CNN. C-XGB can obtain accuracy that surpasses the state-of-art model on numerous classification/prediction tasks simultaneously as being twice as speedy to train. The proposed C-XGB model is designed to process the documents hierarchically and calculates the attention weights. Two convolutional layers are used to calculate the attention weights, one at the word level and another at the sentence level. And finally, at the last layer, the XGB algorithm predicts the input case file’s outcome. The experimental results shows that the proposed model outperforms the existing model with 4.67% improvement in accuracy value. Show more
Keywords: Neural Networks, machine learning, legal judgment prediction, Indian Supreme Court
DOI: 10.3233/JIFS-235936
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Limei, Nong | Dongfan, Wu | Bo, Zhang
Article Type: Research Article
Abstract: Garden landscape is the combination of nature and humanity, with high aesthetic value, ecological value and cultural value, has become an important part of people’s life. Modern people have a higher pursuit for the spiritual food such as garden landscape after the material life is satisfied, which brings new challenges to the construction of urban garden landscape. As an advanced type of machine learning, deep learning applied to landscape image recognition can solve the problem of low quality and low efficiency of manual recognition. Based on this, this paper proposes a garden landscape image recognition algorithm based on SSD (Single …Shot Multibox Detector), which realizes accurate extraction and recognition of image features by positioning the target, and can effectively improve the quality and efficiency of landscape image recognition. In order to test the feasibility of the algorithm proposed in this paper, experimental analysis was carried out in the CVPR 2023 landscape data set. The experimental results show that the algorithm has a high recognition accuracy for landscape images, and has excellent performance compared with traditional image recognition algorithms. Show more
Keywords: Deep learning, garden landscape, image recognition, target detection; image analysis
DOI: 10.3233/JIFS-239654
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Ramkumar, N. | Karthika Renuka, D.
Article Type: Research Article
Abstract: In recent times, the rapid advancement of deep learning has led to increased interest in utilizing Electroencephalogram (EEG) signals for automatic speech recognition. However, due to the significant variation observed in EEG signals from different individuals, the field of EEG-based speech recognition faces challenges related to individual differences across subjects, which ultimately impact recognition performance. In this investigation, a novel approach is proposed for EEG-based speech recognition that combines the capabilities of Long Short Term Memory (LSTM) and Graph Attention Network (GAT). The LSTM component of the model is designed to process sequential patterns within the data, enabling it to …capture temporal dependencies and extract pertinent features. On the other hand, the GAT component exploits the interconnections among data points, which may represent channels, nodes, or features, in the form of a graph. This innovative model not only delves deeper into the connection between connectivity features and thinking as well as speaking states, but also addresses the challenge of individual disparities across subjects. The experimental results showcase the effectiveness of the proposed approach. When considering the thinking state, the average accuracy for single subjects and cross-subject are 65.7% and 67.3% respectively. Similarly, for the speaking state, the average accuracies were 65.4% for single subjects and 67.4% for cross-subject conditions, all based on the KaraOne dataset. These outcomes highlight the model’s positive impact on the task of cross-subject EEG speech recognition. The motivations for conducting cross subject are real world applicability, Generalization, Adaptation and personalization and performance evaluation. Show more
Keywords: Electroencephalography, recurrent neural network, long short term memory, gated recurrent unit, graph convolution network and graph attention network
DOI: 10.3233/JIFS-233143
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Peng, Weishi | Fang, Yangwang | Ma, Yongzhong
Article Type: Research Article
Abstract: Although many scholars say that their algorithms are better than others in the state estimation problem, only a fewer convincing algorithms were applied to engineering practices. The reason is that their algorithms outperform others only in some aspects such as the estimation accuracy or the computation load. To solve the problem of performance evaluation of state estimation algorithms, in this paper, the comprehensive evaluation measures (CEM) for evaluating the nonlinear estimation algorithm (NEA) is proposed, which can comprehensively reflect the performance of the NEAs. First, we introduce three types of the NEAs. Second, the CEM combining the flatness, estimation accuracy …and computation time of the NEAs, is designed to evaluate the above NEAs. Finally, the superiority of the CEM is verified by a numerical example, which helps decision makers of nonlinear estimation algorithms theoretically and technically. Show more
Keywords: Performance evaluation, nonlinear estimation algorithm, comprehensive metrics, error spectrum, EKF, UKF, PF
DOI: 10.3233/JIFS-231376
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Valdez-Rodríguez, José E. | Rangel, Nahum | Moreno-Armendáriz, Marco A.
Article Type: Research Article
Abstract: Visual detection of fingering on the trumpet is an increasingly interesting topic in music research. The ability to recognize and track the movements of the trumpet player’s fingers during the performance of a musical piece can provide valuable information for analyzing and improving instrument technique. However, this is a largely unexplored task, as most works focus on audio quality rather than instrument fingering techniques. Developing techniques for identifying essential finger positions on a musical instrument is crucial, as poor fingering techniques can harm instrument performance. In this work, we propose the visual detection of this fingering using convolutional neural networks …with a proprietary dataset created for this purpose. Additionally, to improve the results and focus on the essential parts of the instrument, we use self-attention mechanisms by extracting these features automatically. Show more
Keywords: Fingering detection, Convolutional Neural Networks, Self-attention mechanisms, Visual detection, Trumpet
DOI: 10.3233/JIFS-219342
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-9, 2024
Authors: Ganesh, M.A. | Saravana Perumaal, S. | Gomathi Sankar, S.M.
Article Type: Research Article
Abstract: The current framework for detecting Fake License Plates (FLP) in real-time is not robust enough for patrol teams. The objective of this paper is to develop a robust license plate authentication framework, based on the Vehicle Make and Model Recognition (VMMR) and the License Plate Recognition (LPR) algorithms that is implementable at the edge devices. The contributions of this paper are (i) Development of license plate database for 547 Indian cars, (ii) Development of an image dataset with 3173 images of 547 Indian cars in 8 classes, (iii) Development of an ensemble model to recognize vehicle make and model from …frontal, rear, and side images, and (iv) Development of a framework to authenticate the license plates with frontal, rear, and side images. The proposed ensemble model is compared with the state-of-the-art networks from the literature. Among the implemented networks for VMMR, the Ensembling model with a size of 303.2 MB achieves the best accuracy of 89% . Due to the limited memory size, Easy OCR is chosen to recognize license plate. The total size of the authentication framework is 308 MB. The performance of the proposed framework is compared with the literature. According to the results, the proposed framework enhances FLP recognition due to the recognition of vehicles from side images. The dataset is made public at https://www.kaggle.com/ganeshmailecture/datasets . Show more
Keywords: Vehicle make and model recognition, fake license plate detection, license plate authentication, intelligent transportation system
DOI: 10.3233/JIFS-230607
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-27, 2024
Authors: Yin, Songyi | Wang, Yu | Fu, Yelin
Article Type: Research Article
Abstract: The environmental, social, and governance (ESG) rating method is a powerful tool that can help investors to judge the investment value of companies based on the information disclosure. However, mainstream ESG rating methods ignore the distinction between companies with incomplete information disclosure and companies without information disclosure, which decreases the initiative and enthusiasm of companies to disclose information. In this study, a self-disclosure ESG (SDESG) rating method is proposed to evaluate companies’ ESG performance capabilities. First, based on the fuzzy set, fuzzy data is defined and applied to the SDESG rating method. Second, analogous to the academic reward system of …a university, a reward mechanism of disclosure is used in the SDESG rating method. Finally, the effectiveness and reliability of the SDESG rating method are demonstrated through Refinitiv’s case. The results show that the SDESG rating method can distinguish companies with incomplete information disclosure from companies without information disclosure and allow companies that proactively disclose information to obtain better ESG scores under each industry. The implications of the study would increase companies’ enthusiasm to disclose information and maintain transparency within a company. Show more
Keywords: ESG rating method, information disclosure, fuzzy set, reward mechanism
DOI: 10.3233/JIFS-230777
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Wang, Dan | Yao, Jingfa | Zhang, Yanmin
Article Type: Research Article
Abstract: Nowadays, automatic human activity recognition from video images is necessary for monitoring applications and caring for disabled people. The use of surveillance cameras and the processing of the obtained images leads to the achievement of a smart, accurate system for the recognition of human behavior. Since human detection in different scenes is associated with many challenges, several approaches have been implemented to detect human activity from video image processing. Due to the complexity of human activities, background noises and other factors affect the detection. For the solution of these problems, two deep learning-based algorithms have been described in the current …article. According to the convolutional neural networks, the LSTM + CNN method and the 3D CNN method have been used to recognize the human activities in the images of the video. Each algorithm is explained and analyzed in detail. The experiments designed in this paper are performed by two datasets: the HMDB-51 dataset and the UCF101 dataset. In the HMDB-51 dataset, the highest obtained accuracy for CNN + LSTM method was equal to 70.2 and for method 3D CNN equal to 54.4. In the UCF101 dataset, the highest obtained accuracy for CNN + LSTM method was equal to 95.1 and for method 3D CNN equal to 90.8. Show more
Keywords: Long short-term memory (LSTM), video processing, deep learning, human activity recognition, convolutional neural network (CNN)
DOI: 10.3233/JIFS-236068
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Viet, Hoang Huu | Uyen, Nguyen Thi | Cao, Son Thanh | Nguyen, Long Giang
Article Type: Research Article
Abstract: The Student-Project Allocation with preferences over Projects problem is a many-to-one stable matching problem that aims to assign students to projects in project-based courses so that students and lecturers meet their preference and capacity constraints. In this paper, we propose an efficient two-heuristic algorithm to solve this problem. Our algorithm starts from an empty matching and iteratively constructs a maximum stable matching of students to projects. At each iteration, our algorithm finds an unassigned student and assigns her/his most preferred project to her/him to form a student-project pair in the matching. If the project or the lecturer who offered the …project is over-subscribed, our algorithm uses two heuristic functions, one for the over-subscribed project and the other for the over-subscribed lecturer, to remove a student-project pair in the matching. To reach a stable matching of a maximum size, our two heuristics are designed such that the removed student has the most opportunities to be assigned to some project in the next iterations. Experimental results show that our algorithm is efficient in execution time and solution quality for solving the problem. Show more
Keywords: Approximation algorithm, heuristic search, matching problem, student-project allocation problem
DOI: 10.3233/JIFS-236300
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Huang, Jinsong | Hou, Hecheng | Li, Xiaoying | Zhang, Ziyi | Jia, Qi
Article Type: Research Article
Abstract: In the context of the digital era, the factors influencing the cognitive load of the full ecological smart home on the elderly are mostly interconnected. Most existing studies have conducted single correlation analyses, ignoring the fact that cognitive load is the result among multiple interactions of multiple factors. Furthermore, the color, material and Finishing of the product design can also impact on the user’s perceptual needs. Therefore, exploring the grouping dynamics of cognitive load and users’ perceptual needs for color (C), material (M), and Finishing (F) of smart products can provide insights for inclusive design of smart homes. The article …analyzes the asymmetric multiple concurrent causal effects of full ecological smart homes on the cognitive load of the elderly from a histological perspective using fuzzy set Qualitative Comparative Analysis (fsQCA) based on the four elements of Innovation Diffusion Theory. At the same time, principal component analysis and quantitative theory I class method are used to explore the quantitative relationship between color, material, Finishing and users’ perceptual imagery of the product. The results of the study showed that there were no necessary conditions leading to high or low cognitive load in the fsQCA analysis, indicating that the problem was the result of the interaction of multiple conditions, and the final analysis yielded three histological pathways leading to low cognitive load and one pathway leading to high load in older adults. Moreover, the study identifies the combination of colors, materials, and finishes that best represent user preferences. This study establishes a dialogue between theory, results, and cases in analyzing of the group dynamics of the impact of full ecological smart homes on the cognitive load of the elderly. It provides a theoretical basis for the development of digital inclusion enhancement strategies. Show more
Keywords: Smart home, cognitive load, diffusion of innovation, qualitative comparative analysis (QCA), human-computer interaction
DOI: 10.3233/JIFS-237212
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Jansi Sophia Mary, C. | Mahalakshmi, K.
Article Type: Research Article
Abstract: Intrusion Detection (ID) in cloud environments is vital to maintain the safety and integrity of data and resources. However, the presence of class imbalance, where normal samples significantly outweigh intrusive instances, poses a challenge in constructing a potential ID system. Deep Learning (DL) methods, with their capability to automatically study complex patterns and features, present a promising solution in various ID tasks. Such methods can automatically learn intricate features and patterns from the input dataset, making them suitable for detecting anomalies and finding intrusions in cloud environments. Therefore, this study proposes a Class Imbalance Data Handling with an Optimal Deep …Learning-Based Intrusion Detection System (CIDH-ODLIDS) in a cloud computing atmosphere. The CIDH-ODLIDS technique leverages optimal DL-based classification and addresses class imbalance. Primarily, the CIDH-ODLIDS technique preprocesses the input data using a Z-score normalization approach to ensure data quality and consistency. To handle class imbalance, the CIDH-ODLIDS technique employs oversampling techniques, particularly focused on synthetic minority oversampling techniques such as Adaptive Synthetic (ADASYN) sampling. ADASYN generates synthetic instances for the minority class depending on the available data instances, effectively balancing the class distribution and mitigating the impact of class imbalance. For the ID process, the CIDH-ODLIDS technique utilizes a Fuzzy Deep Neural Network (FDNN) model, and its tuning procedure is performed using the Chaotic Tunicate Swarm Algorithm (CTSA). CTSA is employed to choose the learning rate of the FDNN methods optimally. The experimental assessment of the CIDH-ODLIDS method is extensively conducted on three IDS datasets. The comprehensive comparison results confirm the superiority of the CIDH-ODLIDS algorithm over existing techniques. Show more
Keywords: Cloud computing, security, deep learning, intrusion detection system, tunicate swarm algorithm, class imbalance data
DOI: 10.3233/JIFS-237900
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Lomas-Barrie, Victor | Reyes-Camacho, Michelle | Neme, Antonio
Article Type: Research Article
Abstract: Horizontal gene transference is a biological process that involves the donation of DNA or RNA from an organism to a second, unrelated organism. This process is different from the more common one, vertical transference, which is present whenever an organism or pair of organisms reproduce and transmit their genetic material to the descendants. The identification of segments of genetic material that are the result of horizontal transference is relevant to construct accurate phylogenetic trees, on one hand, and to detect possible drug-resistance mechanisms, on the other, since this movement of genetic material is the main cause behind antibiotic resistance in …bacteria. Here, we describe a novel algorithm able to detect sequences of foreign origin, and thus, possible acquired via horizontal transference. The general idea of our method is that within the genome of an organism, there might be sequences that are different from the vast majority of the remaining sequences from the same organism. The former are candidate anomalies, and thus, their origin may be explained by horizontal transference. This approach is equivalent to a particular instance of the authorship attribution problem, that in which from a set of texts or paragraphs, almost all of them were written by the same author, whereas a minority has a different authorship. The constraint is that the author of each text is not known, so the algorithm has to attribute the authorship of each one of the texts. The texts detected to be written by a different author are the equivalent of the sequences of foreign origin for the case of genetic material. We describe here a novel method to detect anomalous sequences, based on interpretable embeddings derived from a common attention mechanism in humans, that of identifying novel tokens within a given sequence. Our proposal achieves novel and consistent results over the genome of a well known organism. Show more
Keywords: Horizontal gene transference, anomaly detection, embeddings, natural language processing, genomics
DOI: 10.3233/JIFS-219337
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Weng, Zhi | Bai, Rongfei | Zheng, Zhiqiang
Article Type: Research Article
Abstract: Cattle detection and counting is one of the most important topics in the development of modern agriculture and animal husbandry. The traditional manual monitoring methods are inefficient and constrained by factors such as site. To solve the above problems, a SCS-YOLOv5 cattle detection and counting model for complex breeding scenarios is proposed. The original SPPF module is replaced in the YOLOv5 backbone network with a CSP structured SPPFCSPC. A CA (Coordinate Attention) mechanism is added to the neck network, as well as the SC (Standard Convolution) of the Neck network is replaced with a light convolution GSConv and Slim Neck …is introduced, and training strategies such as multi-scale training are also employed. The experimental results show that the proposed method enhances the feature extraction ability and feature fusion ability, balances the localization accuracy and detection speed, and improves the use effect in real farming scenarios. The Precision of the improved network model is improved from 93.2% to 95.5%, [email protected] is improved from 94.5% to 95.2%, the RMSE is reduced by about 0.03, and the FPS reaches 88. Compared with other mainstream algorithms, the comprehensive performance of SCS-YOLOv5 s is in a leading position, with fewer missed and false detections, and the strong robustness and generalization ability of this model are proved on multi-category public datasets. Applying the improvement ideas in this paper to YOLOv8 s also yields an increase in accuracy. The improved method in this study can greatly improve the accuracy of cattle detection and counting in complex environments, and has good real-time performance, so as to provide technical support for large-scale cattle breeding. Show more
Keywords: Cattle detection, counting, attention mechanism, occlusion, complex environments
DOI: 10.3233/JIFS-237231
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Lugo-Torres, Gerardo | Valdez-Rodríguez, José E. | Peralta-Rodríguez, Diego A.
Article Type: Research Article
Abstract: The use of generative models in image synthesis has become increasingly prevalent. Synthetic medical imaging data is of paramount importance, primarily because medical imaging data is scarce, costly, and encumbered by legal considerations pertaining to patient confidentiality. Synthetic medical images offer a potential answer to these issues. The predominant approaches primarily assess the quality of images and the degree of resemblance between these images and the original ones employed for their generation.The central idea of the work can be summarized in the question: Do the performance metrics of Frechet Inception Distance(FID) and Inception Score(IS) in the Cycle-consistent Generative Adversarial Networks …(CycleGAN) model are adequate to determine how real a generated chest x-ray pneumonia image is? In this study, a CycleGAN model was employed to produce artificial images depicting 3 classes of chest x-ray pneumonia images: general(any type), bacterial, and viral pneumonia. The quality of the images were evaluated assessing and contrasting 3 criteria: performance metric of CycleGAN model, clinical assessment of respiratory experts and the results of classification of a visual transformer(ViT). The overall results showed that the evaluation metrics of the CycleGAN are insufficient to establish realism in generated medical images. Show more
Keywords: Synthetic chest x-ray, cycle generative adversarial network, pneumonia, image-to-image translation, visual transformer
DOI: 10.3233/JIFS-219373
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Ramírez-Martínez, Angel | Chong-Quero, J. Enrique | Cervantes-Culebro, Héctor | Cruz-Villar, Carlos A.
Article Type: Research Article
Abstract: This paper presents a data-driven control approach for a five-bar robot with compliant joints. The robot consists of a parallel mechanism with compliant elements that introduce uncertainties in modeling and control. To address this fact, it is implemented a model-less data-driven controller based on a Feedforward Neural Network Module (FNNM) that identifies the inverse dynamics of the robot. The FNNM is incorporated into a coordination of Feedforward Control Method (CFCM) to achieve precise trajectory tracking. Experiments compare the compliant joints robot to a bearing-joint robot performing pick-and-place tasks from 0.15 to 3.15 Hz. Results show the compliant robot maintaining trajectory tracking …up to 1.25 Hz with a Root Mean Square Error (RMSE) of 9.02 mm. Show more
Keywords: Data-driven, five-bar robot, compliant joints, vision-based
DOI: 10.3233/JIFS-219364
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-7, 2024
Authors: Chen, Kang | Song, Changming | Cheng, Dongxu | Li, Hao
Article Type: Research Article
Abstract: Video anomaly detection (VAD) has garnered substantial attention from researchers due to its broad applications, including fire detection, drop detection, and vibration detection. In the current context of VAD, existing methods prioritize detection efficiency but overlook the impact of motion and appearance information. Additionally, achieving accurate predictions while retaining motion and appearance information poses a significant challenge. This paper proposes a novel semi-supervised method for VAD based on Generative Adversarial Network (GAN) structures with dual generators and dual discriminators, namely Dual-GAN. The future frame generator utilizes an improved encoder-decoder network to preserve more spatial information. Motion information for the future …flow generator is obtained by estimating optical flow between reconstruction frames, complementing the optical flow between prediction frames. The introduction of a frame discriminator and a motion discriminator against the frame generator enhances the realism of prediction frames, which facilitates the identification of unexpected abnormal events. This method significantly outperforms comparative approaches in synthesizing video frames and predicting future flows, showcasing its effectiveness in handling diverse video data. Extensive experiments are performed on four publicly available datasets to ensure a comprehensive evaluation of the model performance. Further exploration could include refining the model architecture, exploring additional datasets, and adapting the methodology to specific application domains. Show more
Keywords: Anomaly detection, generative adversarial network, dual discriminators, future flow
DOI: 10.3233/JIFS-237831
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Karthikeyan, M. | Colak, Ilhami | Sagar Imambi, S. | Joselin Jeya Sheela, J. | Nair, Sruthi | Umarani, B. | Alagusabai, Andril | Suriyakrishnaan, K. | Rajaram, A.
Article Type: Research Article
Abstract: This research paper introduces a cutting-edge approach to electric demand forecasting by incorporating the Temporal Fusion Transformer (TFT). As the landscape of demand forecasting becomes increasingly intricate, precise predictions are vital for effective energy management. To tackle this challenge, we leverage the sequential and temporal patterns in an extensive electric demand dataset spanning from 2003 to 2014. Our proposed Temporal Fusion Transformer model combines attention mechanisms with the transformer architecture, enabling it to adeptly capture intricate temporal dependencies. Thorough data preprocessing, including temporal embedding and external features, enhances prediction accuracy. Through rigorous evaluation, the TFT model surpasses existing forecasting techniques, …showcasing its capacity for accurate, resilient, and adaptive predictions. This research contributes to the advancement of electric demand forecasting, harnessing the TFT’s capabilities to excel in capturing diverse temporal patterns. The findings hold the potential to enhance energy management and support decision-making in the energy sector, bridging the gap between innovation and practical utility. Show more
Keywords: Electric demand forecasting, temporal fusion transformer, energy management, time-series analysis, transformer architecture
DOI: 10.3233/JIFS-236036
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]