Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2023: 2
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Ammavasai, S.K.
Article Type: Research Article
Abstract: The rapid growth of the cloud computing landscape has created significant challenges in managing the escalating volume of data and diverse resources within the cloud environment, catering to a broad spectrum of users ranging from individuals to large corporations. Ineffectual resource allocation in cloud systems poses a threat to overall performance, necessitating the equitable distribution of resources among stakeholders to ensure profitability and customer satisfaction. This paper addresses the critical issue of resource management in cloud computing through the introduction of a Dynamic Task Scheduling with Virtual Machine allocation (DTS-VM) strategy, incorporating Edge-Cloud computing for the Internet of Things (IoT). …The proposed approach begins by employing a Recurrent Neural Network (RNN) algorithm to classify user tasks into Low Priority, Mid Priority, and High Priority categories. Tasks are then assigned to Edge nodes based on their priority, optimizing efficiency through the application of the Spotted Hyena Optimization (SHO) algorithm for selecting the most suitable edge node. To address potential overloads on the edge, a Fuzzy approach evaluates offloading decisions using multiple metrics. Finally, optimal Virtual Machine allocation is achieved through the application of the Stable Matching algorithm. The seamless integration of these components ensures a dynamic and efficient allocation of resources, preventing the prolonged withholding of customer requests due to the absence of essential resources. The proposed system aims to enhance overall cloud system performance and user satisfaction while maintaining organizational profitability. The effectiveness of the DTS-VM strategy is validated through comprehensive testing and evaluation, showcasing its potential to address the challenges posed by the diverse and expanding cloud computing landscape. Show more
Keywords: Task scheduling, priority, classification, edge computing, cloud, VM allocation, IoT
DOI: 10.3233/JIFS-236838
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Du, Baigang | Zhang, Fujiang | Guo, Jun | Sun, Xiang
Article Type: Research Article
Abstract: The actual operating environment of rotating mechanical device contains a large number of noisy interference sources, leading to complex components, strong coupling, and low signal to noise ratio for vibration. It becomes a big challenge for intelligent fault diagnosis from high-noise vibration signals. Thus, this paper proposes a new deep learning approach, namely decomposition-enhance Fourier residual network (DEFR-net), to achieve high noise immunity for vibration signal and learn effective features to discriminate between different types of rotational machine faults. In the proposed DEFR-net, a novel algorithm is proposed to explicitly model high-noise signals for noisy data filtering and effective feature …enhancement based on a hard threshold decomposition function and muti-channel self-attention mechanism. Furthermore, it deeply integrates complementary analysis based on fast Fourier transform in the time-frequency domain and extends the breadth of network. The performance of the proposed model is verified by comparison with five state-of-the-art algorithms on two public datasets. Moreover, the noise experimental results show that the fault diagnosis accuracy is still 85.91% when the signal-to-noise-ratio reaches extreme noise of –8 dB. The results demonstrate that the proposed method is a valuable study for intelligent fault diagnosis of rotating machines in high-noise environments. Show more
Keywords: Intelligent fault diagnosis, high noise immunity, fourier residual network, decompose-enhance algorithm, attention mechanism
DOI: 10.3233/JIFS-233190
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-22, 2024
Authors: Shao, Changshun | Yu, Zhenglin | Tang, Jianyin | Li, Zheng | Zhou, Bin | Wu, Di | Duan, Jingsong
Article Type: Research Article
Abstract: The main focus of this paper is to solve the optimization problem of minimizing the maximum completion time in the flexible job-shop scheduling problem. In order to optimize this objective, random sampling is employed to extract a subset of states, and the mutation operator of the genetic algorithm is used to increase the diversity of sample chromosomes. Additionally, 5-tuple are defined as the state space, and a 4-tuple is designed as the action space. A suitable reward function is also developed. To solve the problem, four reinforcement learning algorithms (Double-Q-learning algorithm, Q-learning algorithm, SARS algorithm, and SARSA(λ ) algorithm) are …utilized. This approach effectively extracts states and avoids the curse of dimensionality problem that occurs when using reinforcement learning algorithms. Finally, experimental results using an international benchmark demonstrate the effectiveness of the proposed solution model. Show more
Keywords: Reinforcement learning, flexible job-shop scheduling, maximum completion time, Variation
DOI: 10.3233/JIFS-236981
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Lin, Zhiwei | Zhang, Songchuan | Zhou, Yiwei | Wang, Haoyu | Wang, Shilei
Article Type: Research Article
Abstract: Current mainstream deep learning optimization algorithms can be classified into two categories: non-adaptive optimization algorithms, such as Stochastic Gradient Descent with Momentum (SGDM), and adaptive optimization algorithms, like Adaptive Moment Estimation with Weight Decay (AdamW). Adaptive optimization algorithms for many deep neural network models typically enable faster initial training, whereas non-adaptive optimization algorithms often yield better final convergence. Our proposed Adaptive Learning Rate Burst (Adaburst) algorithm seeks to combine the strengths of both categories. The update mechanism of Adaburst incorporates elements from AdamW and SGDM, ensuring a seamless transition between the two. Adaburst modifies the learning rate of the SGDM …algorithm based on a cosine learning rate schedule, particularly when the algorithm encounters an update bottleneck, which is called learning rate burst. This approach helps the model to escape current local optima more effectively. The results of the Adaburst experiment underscore its enhanced performance in image classification and generation tasks when compared with alternative approaches, characterized by expedited convergence and elevated accuracy. Notably, on the MNIST, CIFAR-10, and CIFAR-100 datasets, Adaburst attained accuracies that matched or exceeded those achieved by SGDM. Furthermore, in training diffusion models on the DeepFashion dataset, Adaburst achieved convergence in fewer epochs than a meticulously calibrated AdamW optimizer while avoiding abrupt blurring or other training instabilities. Adaburst augmented the final training set accuracy on the MNIST, CIFAR-10, and CIFAR-100 datasets by 0.02%, 0.41%, and 4.18%, respectively. In addition, the generative model trained on the DeepFashion dataset demonstrated a 4.62-point improvement in the Frechet Inception Distance (FID) score, a metric for assessing generative model quality. Consequently, this evidence suggests that Adaburst introduces an innovative optimization algorithm that simultaneously updates AdamW and SGDM and incorporates a learning rate burst mechanism. This mechanism significantly enhances deep neural networks’ training speed and convergence accuracy. Show more
Keywords: Convolutional neural networks (CNNs), MNIST, CIFAR, deep learning, optimization algorithms, person image generation, diffusion models
DOI: 10.3233/JIFS-239157
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Gonzalez, Claudia I. | Torres, Cesar
Article Type: Research Article
Abstract: This paper presents an approach incorporating fuzzy logic techniques inside a convolutional neural network to manage uncertainty present in the multiple data sources that the model handles when training. The implementation considers the use of information and filters in the fuzzy spectrum, as well as the creation of a new layer to replace the traditional convolution layer with a fuzzy convolutional layer. The aim is to design artificial intelligence algorithms that combine the potential of deep convolutional neural networks and fuzzy logic to create robust systems that allow modeling the uncertainty present in the sources of data and that are …applied to classification problems. The fuzzification process is developed using three membership functions, including the Triangular, Gaussian, and S functions. The work was tested in databases oriented to traffic signs, due to the complexity of the different circumstances and factors in which a traffic sign can be found. Show more
Keywords: Fuzzy-neural network, fuzzy CNN, fuzzy deep learning model, fuzzy data, fuzzy convolutional
DOI: 10.3233/JIFS-219369
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Sun, Haibin | Zhang, Wenbo
Article Type: Research Article
Abstract: The ability of deep learning based bearing fault diagnosis methods is developing rapidly. However, it is difficult to obtain sufficient and comprehensive fault data in industrial applications, and changes in vibration signals caused by machine operating conditions can also hinder the accuracy of the model. The problem of limited data and frequent changes in operating conditions can seriously affect the effectiveness of deep learning methods. To tackle these challenges, a novel transformer model named the Differential Window Transformer (Dwin Transformer), which employs a new differential window self-attention mechanism, is presented in this paper. Meanwhile, the model introduces a hierarchical structure …and a new patch merging to further improve performance. Furthermore, a new fault diagnosis model dealing with limited training data is proposed, which combines the Auxiliary Classifier Generative Adversarial Network with the Dwin Transformer(DT-ACGAN). The DT-ACGAN model can generate high-quality fake samples to facilitate training with limited data, significantly improving diagnostic capabilities. The proposed model can achieve excellent results under the dual challenges of limited data and variable working conditions by combining Dwin Transformer with GAN. The DT-ACGAN owns superior diagnostic accuracy and generalization performance under limited sample data and varying working environments when compared with other existing models. A comparative test about cross-domain ability is conducted on the Case Western Reserve University dataset and Jiang Nan University dataset. The results show that the proposed method achieves an average accuracy of 11.3% and 3.76% higher than other existing methods with limited data respectively. Show more
Keywords: Transformer, generative adversarial network, cross-domains, limited data, fault diagnosis
DOI: 10.3233/JIFS-236787
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Dai, Jinpeng | Zhang, Zhijie | Yang, Xiaoyuan | Wang, Qicai | He, Jie
Article Type: Research Article
Abstract: This study explores nine machine learning (ML) methods, including linear, non-linear and ensemble learning models, using nine concrete parameters as characteristic variables. Including the dosage of cement (C), fly ash (FA), Ground granulated blast furnace slag (GGBS), coarse aggregate (G), fine aggregate (S), water reducing agent (WRA) and water (W), initial gas content (GC) and number of freeze-thaw cycles (NFTC), To predict relative dynamic elastic modulus (RDEM) and mass loss rate (MLR). Based on the linear correlation analysis and the evaluation of four performance indicators of R2 , MSE, MAE and RMSE, it is found that the nonlinear model has …better performance. In the prediction of RDEM, the integrated learning GBDT model has the best prediction ability. The evaluation indexes were R2 = 0.78, MSE = 0.0041, MAE = 0.0345, RMSE = 0.0157, SI = 0.0177, BIAS = 0.0294. In the prediction of MLR, ensemble learning Catboost algorithm model has the best prediction ability, and the evaluation indexes are R2 = 0.84, MSE = 0.0036, RMSE = 0.0597, MAE = 0.0312, SI = 5.5298, BIAS = 0.1772. Then, Monte Carlo fine-tuning method is used to optimize the concrete mix ratio, so as to obtain the best mix ratio. Show more
Keywords: Machine learning, relative dynamic elastic modulus, mass loss rate, sensitivity analysis, optimization design of mix proportions
DOI: 10.3233/JIFS-236703
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-26, 2024
Authors: Yuan, Weihao | Yang, Mengdao | Gu, Hexu | Xu, Gaojian
Article Type: Research Article
Abstract: There is scope to enhance agricultural measurement and control systems user interactivity, which typically necessitates training for users to perform specific operations successfully. With the continuous development of natural language semantic processing technology, it has become essential to augment the user-friendliness of multifaceted control and query operations in the agricultural measurement and control sector, ultimately leading to reduced operation costs for users. The study aims to focus on command parsing. The proposed AMR-OPO semantic parsing framework is based on the natural language understanding method of Abstract Meaning Representation of Rooted Markup Graphs (AMR). It transforms the user’s natural language inputs …into structured ternary (OPO) statements (operation-place-object) and converts the corresponding parameters of the user’s input commands. The framework subsequently sends the transformed commands to the relevant devices via the IoT gateway. To tackle the intricate task of parsing instructions, we developed a BERT-BiLSTM-ATT-CRF-OPO entity recognition model. This model can detect and extract entities from agricultural instructions, and precisely populate them into OPO statements. Our model shows exceptional accuracy in instruction parsing, with precision, recall, and F-value all measuring at 92.13%, 93.12%, and 92.76%, correspondingly. The findings from our experiment reveal outstanding and precise performance of our approach. It is anticipated that our algorithm will enhance the user experience offered by agricultural measurement and control systems, while also making them more user-friendly. Show more
Keywords: Natural language processing, abstract meaning representation, entity recognition, natural language understanding, human-computer interaction
DOI: 10.3233/JIFS-237280
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Li, Yingjie | Sun, Rongrong | Huang, Guangrong | Deng, Yuanbin | Zhang, Haixuan | Zhang, Delong
Article Type: Research Article
Abstract: In response to a series of issues in the distribution network, such as inadequate and inflexible utilization of flexible loads, delayed response to demand participation, and the uncertainty of new energy source output, a differentiated objective-based method for optimizing distribution network operations is proposed. Firstly, flexible loads are categorized, and corresponding mathematical models are established. Secondly, by employing chance-constrained programming to account for the uncertainty in new energy source output, a multi-objective optimization model is developed to reduce distribution network economic costs, decrease network losses, and enhance power supply reliability. Subsequently, an improved NSGA-III algorithm is introduced to address the …multi-objective model. Finally, an 11-node distribution network is used as a case study, and three different algorithms are comprehensively compared. This confirms the rationality of the optimized scheduling scheme proposed in this paper. Show more
Keywords: Distribution network, flexible load, multi-objective optimization, chance-constrained programming
DOI: 10.3233/JIFS-238367
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Yan, HongJu
Article Type: Research Article
Abstract: To solve the problem of lack of practice in Japanese teaching, a design of a Japanese remote interactive practical teaching platform based on the modern edge computing-based wireless sensor network is proposed. In terms of hardware, it mainly refits interactive mobile edge computing, wireless sensor networks, microprocessors, and other equipment, and adjusts the interface circuit. The Japanese teaching data and relevant Japanese teaching resources generated in the process of Japanese Teaching of practical courses are stored in the corresponding database table according to a certain format, and the logical relationship between database tables is used to update the database. The …software function of the platform is designed with the support of a database and hardware equipment. It consists of multiple modules, including platform user roles, interactive practical teaching and management, practical resource management and distribution, practice project information release, practice investigation statistics, and platform operation safety. Through the above design, the operation of a Japanese remote interactive practical teaching platform is realized. The test results show that there is no significant difference in the function realization of the design platform, but when multiple users are online at the same time, the interaction performance of the design platform is stronger, that is, the operation performance of the platform has obvious advantages. Show more
Keywords: Mobile edge computing, wireless sensor network, Japanese teaching platform, remote interactive learning, microprocessor, platform user roles, practical teaching, database management, interaction performance
DOI: 10.3233/JIFS-238196
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Ahani, Zahra | Shahiki Tash, Moein | Ledo Mezquita, Yoel | Angel, Jason
Article Type: Research Article
Abstract: Super-enhancers are a category of active super-enhancers densely occupied by transcription factors and chromatin regulators, controlling the expression of disease-related genes and cellular identity. Recent studies have demonstrated the formation of complex structures by various factors and super-enhancers, particularly in various cancers. However, our current knowledge of super-enhancers, such as their genomic locations, interaction with factors, functions, and distinction from other super-enhancers regions, remains limited. This research aims to employ deep learning techniques to detect and differentiate between super-enhancers and enhancers based on genomic and epigenomic features and compare the accuracy of the results with other machine learning methods In …this study, in addition to evaluating algorithms, we trained a set of genomic and epigenomic features using a deep learning algorithm and the Python-based cross-platform software to detect super-enhancers in DNA sequences. We successfully predicted the presence of super-enhancers in the sequences with higher accuracy and precision. Show more
Keywords: Super-enhancer, enhancer, genomic, epigenomic, deep learning
DOI: 10.3233/JIFS-219356
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Shahbazova, Shahnaz N. | Rzayev, Ab.G. | Asadova, R.Sh. | Jabiyev, K.M.
Article Type: Research Article
Abstract: The paper gives a systems analysis in the field of heat transfer and temperature distribution (TD) along the length of oil production wells (OPW). The analysis shows that the existing mathematical models are suitable only for determining TD along the length of casing string (CS) and are not suitable for determining TD along the length of the tubing run, since the existence of the interfacial (between the CS and the tubing) annulus of the fluid and gas layers with heat capacity and thermal conductivity that differ significantly from the heat capacity and thermal conductivity of rocks surrounding the CS. Given …the above, mathematical models taking into account the impact of the fluid and gas layers in the annulus on the heat transfer from the upward fluid flow to the tubing wall and from the wall to the interfacial annulus are developed. To ensure the technological effectiveness of the obtained model, formulas for quantitative estimation of the heat transfer of the fluid flow into the surrounding environment are given. Show more
Keywords: Heat exchange, heat transfer, heat dissipation, thermal conductivity, temperature distribution, oil production well.
DOI: 10.3233/JIFS-219366
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-7, 2024
Authors: Bai, Yu | Hu, Qijun | Zhou, Zhenxiang | Cai, Qijie | He, Leping
Article Type: Research Article
Abstract: The interaction of several workers with intelligent construction machinery can lead to serious collisions. Typically, the safety distance is used as an indicator of the safety of worker–machine interactions (WMI). However, the degree of risk does not increase linearly with decreasing worker–machine distances. To further reveal the essence of WMI safety, this study proposes a new method for assessing the safety state of WMIs, namely, the construction safety potential field. It is used to describe the factors and patterns associated with the spatial overlap and decay of hazardous energy in WMI operations. The proposed method was tested in an earthworks …construction WMI operation and the results were valid. A preliminary discussion of the relevant parameters constituting the construction safety potential field model is presented. The contributions of the research is proposing a generic energy-based model, which provides a novel idea for the interpretation of safety issues in construction WMI operations and opens up a new foundation for the development of active safety control. Show more
Keywords: Construction site, worker–machine safety, safety field, potential function
DOI: 10.3233/JIFS-236423
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Zhang, Qian | Bai, Enrui | Shao, Mingwen | Liang, Hong
Article Type: Research Article
Abstract: Convolutional neural networks (CNNs) and Transformer architectures have traditionally been recognized as the preferred models for addressing computer vision tasks. However, there has been a recent surge in the popularity of networks based on multi-layer perceptron (MLP) structures that do not rely on convolution or attention mechanisms. These MLP architectures have demonstrated exceptional performance in image classification tasks, exhibiting lower time complexity while maintaining high accuracy. In contrast, video classification tasks involve larger amounts of data and necessitate more intricate feature extraction, resulting in increased time and resource consumption. To enhance computational efficiency and minimize resource utilization, we propose a …convolution-free and Transformer-free architecture for video classification called Video-MLP for video classification. Video-MLP utilizes a simple MLP structure to learn video features. Specifically, it comprises two types of layers: Spatial-Mixer and Temporal-Mixer, which respectively capture spatial and temporal information. The Spatial-Mixer extracts spatial information from each frame along the height and width dimensions, while the Temporal-Mixer models temporal information for the same spatial positions across frames. To improve the efficiency of spatial-temporal modeling in our network, we used a spatial-temporal information fusion approach to integrate information at different scales. Additionally, we grouped the input data along the time dimension and designed three different grouping schemes when extracting temporal information. The experimental results indicate that Video-MLP achieved accuracy rates of 87.2% on the Kinetics-400 dataset and 75.3% on the SomethingV2 dataset, outperforming models with equivalent computational complexity. Notably, Video-MLP achieved these results without using convolution and attention mechanisms, and without pre-training on large-scale image and video datasets. Show more
Keywords: MLP-based-model, video classification, computer vision, deep learning
DOI: 10.3233/JIFS-240310
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Sivaranjani, N. | Senthil Ragavan, V.K. | Jawaherlalnehru, G.
Article Type: Research Article
Abstract: Industry experts are motivated to collect, collate, and analyse historical data in the legal sector in attempt to predict court case outcomes as the amount of historical data available in this field has increased over time. But using judicial data to predict and defend court judgements is no simple undertaking. Using Machine Learning (ML) models and traditional approaches for categorical feature encoding, previous research on predicting court outcomes using limited experimental datasets produced a number of unexpected predictions. The paper proposes an ensemble model combining Convolutional Neural Network (CNN), attention mechanism and eXtreme Gradient Boosting (XGB) algorithm. This model is …primarily based on a self-attention network, which could simultaneously capture linguistic relationships over lengthy sequences like RNN (Recurrent Neural Network) and is nevertheless speedy to train like CNN. C-XGB can obtain accuracy that surpasses the state-of-art model on numerous classification/prediction tasks simultaneously as being twice as speedy to train. The proposed C-XGB model is designed to process the documents hierarchically and calculates the attention weights. Two convolutional layers are used to calculate the attention weights, one at the word level and another at the sentence level. And finally, at the last layer, the XGB algorithm predicts the input case file’s outcome. The experimental results shows that the proposed model outperforms the existing model with 4.67% improvement in accuracy value. Show more
Keywords: Neural Networks, machine learning, legal judgment prediction, Indian Supreme Court
DOI: 10.3233/JIFS-235936
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Limei, Nong | Dongfan, Wu | Bo, Zhang
Article Type: Research Article
Abstract: Garden landscape is the combination of nature and humanity, with high aesthetic value, ecological value and cultural value, has become an important part of people’s life. Modern people have a higher pursuit for the spiritual food such as garden landscape after the material life is satisfied, which brings new challenges to the construction of urban garden landscape. As an advanced type of machine learning, deep learning applied to landscape image recognition can solve the problem of low quality and low efficiency of manual recognition. Based on this, this paper proposes a garden landscape image recognition algorithm based on SSD (Single …Shot Multibox Detector), which realizes accurate extraction and recognition of image features by positioning the target, and can effectively improve the quality and efficiency of landscape image recognition. In order to test the feasibility of the algorithm proposed in this paper, experimental analysis was carried out in the CVPR 2023 landscape data set. The experimental results show that the algorithm has a high recognition accuracy for landscape images, and has excellent performance compared with traditional image recognition algorithms. Show more
Keywords: Deep learning, garden landscape, image recognition, target detection; image analysis
DOI: 10.3233/JIFS-239654
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Ramkumar, N. | Karthika Renuka, D.
Article Type: Research Article
Abstract: In recent times, the rapid advancement of deep learning has led to increased interest in utilizing Electroencephalogram (EEG) signals for automatic speech recognition. However, due to the significant variation observed in EEG signals from different individuals, the field of EEG-based speech recognition faces challenges related to individual differences across subjects, which ultimately impact recognition performance. In this investigation, a novel approach is proposed for EEG-based speech recognition that combines the capabilities of Long Short Term Memory (LSTM) and Graph Attention Network (GAT). The LSTM component of the model is designed to process sequential patterns within the data, enabling it to …capture temporal dependencies and extract pertinent features. On the other hand, the GAT component exploits the interconnections among data points, which may represent channels, nodes, or features, in the form of a graph. This innovative model not only delves deeper into the connection between connectivity features and thinking as well as speaking states, but also addresses the challenge of individual disparities across subjects. The experimental results showcase the effectiveness of the proposed approach. When considering the thinking state, the average accuracy for single subjects and cross-subject are 65.7% and 67.3% respectively. Similarly, for the speaking state, the average accuracies were 65.4% for single subjects and 67.4% for cross-subject conditions, all based on the KaraOne dataset. These outcomes highlight the model’s positive impact on the task of cross-subject EEG speech recognition. The motivations for conducting cross subject are real world applicability, Generalization, Adaptation and personalization and performance evaluation. Show more
Keywords: Electroencephalography, recurrent neural network, long short term memory, gated recurrent unit, graph convolution network and graph attention network
DOI: 10.3233/JIFS-233143
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Peng, Weishi | Fang, Yangwang | Ma, Yongzhong
Article Type: Research Article
Abstract: Although many scholars say that their algorithms are better than others in the state estimation problem, only a fewer convincing algorithms were applied to engineering practices. The reason is that their algorithms outperform others only in some aspects such as the estimation accuracy or the computation load. To solve the problem of performance evaluation of state estimation algorithms, in this paper, the comprehensive evaluation measures (CEM) for evaluating the nonlinear estimation algorithm (NEA) is proposed, which can comprehensively reflect the performance of the NEAs. First, we introduce three types of the NEAs. Second, the CEM combining the flatness, estimation accuracy …and computation time of the NEAs, is designed to evaluate the above NEAs. Finally, the superiority of the CEM is verified by a numerical example, which helps decision makers of nonlinear estimation algorithms theoretically and technically. Show more
Keywords: Performance evaluation, nonlinear estimation algorithm, comprehensive metrics, error spectrum, EKF, UKF, PF
DOI: 10.3233/JIFS-231376
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Valdez-Rodríguez, José E. | Rangel, Nahum | Moreno-Armendáriz, Marco A.
Article Type: Research Article
Abstract: Visual detection of fingering on the trumpet is an increasingly interesting topic in music research. The ability to recognize and track the movements of the trumpet player’s fingers during the performance of a musical piece can provide valuable information for analyzing and improving instrument technique. However, this is a largely unexplored task, as most works focus on audio quality rather than instrument fingering techniques. Developing techniques for identifying essential finger positions on a musical instrument is crucial, as poor fingering techniques can harm instrument performance. In this work, we propose the visual detection of this fingering using convolutional neural networks …with a proprietary dataset created for this purpose. Additionally, to improve the results and focus on the essential parts of the instrument, we use self-attention mechanisms by extracting these features automatically. Show more
Keywords: Fingering detection, Convolutional Neural Networks, Self-attention mechanisms, Visual detection, Trumpet
DOI: 10.3233/JIFS-219342
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-9, 2024
Authors: Ganesh, M.A. | Saravana Perumaal, S. | Gomathi Sankar, S.M.
Article Type: Research Article
Abstract: The current framework for detecting Fake License Plates (FLP) in real-time is not robust enough for patrol teams. The objective of this paper is to develop a robust license plate authentication framework, based on the Vehicle Make and Model Recognition (VMMR) and the License Plate Recognition (LPR) algorithms that is implementable at the edge devices. The contributions of this paper are (i) Development of license plate database for 547 Indian cars, (ii) Development of an image dataset with 3173 images of 547 Indian cars in 8 classes, (iii) Development of an ensemble model to recognize vehicle make and model from …frontal, rear, and side images, and (iv) Development of a framework to authenticate the license plates with frontal, rear, and side images. The proposed ensemble model is compared with the state-of-the-art networks from the literature. Among the implemented networks for VMMR, the Ensembling model with a size of 303.2 MB achieves the best accuracy of 89% . Due to the limited memory size, Easy OCR is chosen to recognize license plate. The total size of the authentication framework is 308 MB. The performance of the proposed framework is compared with the literature. According to the results, the proposed framework enhances FLP recognition due to the recognition of vehicles from side images. The dataset is made public at https://www.kaggle.com/ganeshmailecture/datasets . Show more
Keywords: Vehicle make and model recognition, fake license plate detection, license plate authentication, intelligent transportation system
DOI: 10.3233/JIFS-230607
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-27, 2024
Authors: Yin, Songyi | Wang, Yu | Fu, Yelin
Article Type: Research Article
Abstract: The environmental, social, and governance (ESG) rating method is a powerful tool that can help investors to judge the investment value of companies based on the information disclosure. However, mainstream ESG rating methods ignore the distinction between companies with incomplete information disclosure and companies without information disclosure, which decreases the initiative and enthusiasm of companies to disclose information. In this study, a self-disclosure ESG (SDESG) rating method is proposed to evaluate companies’ ESG performance capabilities. First, based on the fuzzy set, fuzzy data is defined and applied to the SDESG rating method. Second, analogous to the academic reward system of …a university, a reward mechanism of disclosure is used in the SDESG rating method. Finally, the effectiveness and reliability of the SDESG rating method are demonstrated through Refinitiv’s case. The results show that the SDESG rating method can distinguish companies with incomplete information disclosure from companies without information disclosure and allow companies that proactively disclose information to obtain better ESG scores under each industry. The implications of the study would increase companies’ enthusiasm to disclose information and maintain transparency within a company. Show more
Keywords: ESG rating method, information disclosure, fuzzy set, reward mechanism
DOI: 10.3233/JIFS-230777
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Wang, Dan | Yao, Jingfa | Zhang, Yanmin
Article Type: Research Article
Abstract: Nowadays, automatic human activity recognition from video images is necessary for monitoring applications and caring for disabled people. The use of surveillance cameras and the processing of the obtained images leads to the achievement of a smart, accurate system for the recognition of human behavior. Since human detection in different scenes is associated with many challenges, several approaches have been implemented to detect human activity from video image processing. Due to the complexity of human activities, background noises and other factors affect the detection. For the solution of these problems, two deep learning-based algorithms have been described in the current …article. According to the convolutional neural networks, the LSTM + CNN method and the 3D CNN method have been used to recognize the human activities in the images of the video. Each algorithm is explained and analyzed in detail. The experiments designed in this paper are performed by two datasets: the HMDB-51 dataset and the UCF101 dataset. In the HMDB-51 dataset, the highest obtained accuracy for CNN + LSTM method was equal to 70.2 and for method 3D CNN equal to 54.4. In the UCF101 dataset, the highest obtained accuracy for CNN + LSTM method was equal to 95.1 and for method 3D CNN equal to 90.8. Show more
Keywords: Long short-term memory (LSTM), video processing, deep learning, human activity recognition, convolutional neural network (CNN)
DOI: 10.3233/JIFS-236068
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Viet, Hoang Huu | Uyen, Nguyen Thi | Cao, Son Thanh | Nguyen, Long Giang
Article Type: Research Article
Abstract: The Student-Project Allocation with preferences over Projects problem is a many-to-one stable matching problem that aims to assign students to projects in project-based courses so that students and lecturers meet their preference and capacity constraints. In this paper, we propose an efficient two-heuristic algorithm to solve this problem. Our algorithm starts from an empty matching and iteratively constructs a maximum stable matching of students to projects. At each iteration, our algorithm finds an unassigned student and assigns her/his most preferred project to her/him to form a student-project pair in the matching. If the project or the lecturer who offered the …project is over-subscribed, our algorithm uses two heuristic functions, one for the over-subscribed project and the other for the over-subscribed lecturer, to remove a student-project pair in the matching. To reach a stable matching of a maximum size, our two heuristics are designed such that the removed student has the most opportunities to be assigned to some project in the next iterations. Experimental results show that our algorithm is efficient in execution time and solution quality for solving the problem. Show more
Keywords: Approximation algorithm, heuristic search, matching problem, student-project allocation problem
DOI: 10.3233/JIFS-236300
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Huang, Jinsong | Hou, Hecheng | Li, Xiaoying | Zhang, Ziyi | Jia, Qi
Article Type: Research Article
Abstract: In the context of the digital era, the factors influencing the cognitive load of the full ecological smart home on the elderly are mostly interconnected. Most existing studies have conducted single correlation analyses, ignoring the fact that cognitive load is the result among multiple interactions of multiple factors. Furthermore, the color, material and Finishing of the product design can also impact on the user’s perceptual needs. Therefore, exploring the grouping dynamics of cognitive load and users’ perceptual needs for color (C), material (M), and Finishing (F) of smart products can provide insights for inclusive design of smart homes. The article …analyzes the asymmetric multiple concurrent causal effects of full ecological smart homes on the cognitive load of the elderly from a histological perspective using fuzzy set Qualitative Comparative Analysis (fsQCA) based on the four elements of Innovation Diffusion Theory. At the same time, principal component analysis and quantitative theory I class method are used to explore the quantitative relationship between color, material, Finishing and users’ perceptual imagery of the product. The results of the study showed that there were no necessary conditions leading to high or low cognitive load in the fsQCA analysis, indicating that the problem was the result of the interaction of multiple conditions, and the final analysis yielded three histological pathways leading to low cognitive load and one pathway leading to high load in older adults. Moreover, the study identifies the combination of colors, materials, and finishes that best represent user preferences. This study establishes a dialogue between theory, results, and cases in analyzing of the group dynamics of the impact of full ecological smart homes on the cognitive load of the elderly. It provides a theoretical basis for the development of digital inclusion enhancement strategies. Show more
Keywords: Smart home, cognitive load, diffusion of innovation, qualitative comparative analysis (QCA), human-computer interaction
DOI: 10.3233/JIFS-237212
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Jansi Sophia Mary, C. | Mahalakshmi, K.
Article Type: Research Article
Abstract: Intrusion Detection (ID) in cloud environments is vital to maintain the safety and integrity of data and resources. However, the presence of class imbalance, where normal samples significantly outweigh intrusive instances, poses a challenge in constructing a potential ID system. Deep Learning (DL) methods, with their capability to automatically study complex patterns and features, present a promising solution in various ID tasks. Such methods can automatically learn intricate features and patterns from the input dataset, making them suitable for detecting anomalies and finding intrusions in cloud environments. Therefore, this study proposes a Class Imbalance Data Handling with an Optimal Deep …Learning-Based Intrusion Detection System (CIDH-ODLIDS) in a cloud computing atmosphere. The CIDH-ODLIDS technique leverages optimal DL-based classification and addresses class imbalance. Primarily, the CIDH-ODLIDS technique preprocesses the input data using a Z-score normalization approach to ensure data quality and consistency. To handle class imbalance, the CIDH-ODLIDS technique employs oversampling techniques, particularly focused on synthetic minority oversampling techniques such as Adaptive Synthetic (ADASYN) sampling. ADASYN generates synthetic instances for the minority class depending on the available data instances, effectively balancing the class distribution and mitigating the impact of class imbalance. For the ID process, the CIDH-ODLIDS technique utilizes a Fuzzy Deep Neural Network (FDNN) model, and its tuning procedure is performed using the Chaotic Tunicate Swarm Algorithm (CTSA). CTSA is employed to choose the learning rate of the FDNN methods optimally. The experimental assessment of the CIDH-ODLIDS method is extensively conducted on three IDS datasets. The comprehensive comparison results confirm the superiority of the CIDH-ODLIDS algorithm over existing techniques. Show more
Keywords: Cloud computing, security, deep learning, intrusion detection system, tunicate swarm algorithm, class imbalance data
DOI: 10.3233/JIFS-237900
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Lomas-Barrie, Victor | Reyes-Camacho, Michelle | Neme, Antonio
Article Type: Research Article
Abstract: Horizontal gene transference is a biological process that involves the donation of DNA or RNA from an organism to a second, unrelated organism. This process is different from the more common one, vertical transference, which is present whenever an organism or pair of organisms reproduce and transmit their genetic material to the descendants. The identification of segments of genetic material that are the result of horizontal transference is relevant to construct accurate phylogenetic trees, on one hand, and to detect possible drug-resistance mechanisms, on the other, since this movement of genetic material is the main cause behind antibiotic resistance in …bacteria. Here, we describe a novel algorithm able to detect sequences of foreign origin, and thus, possible acquired via horizontal transference. The general idea of our method is that within the genome of an organism, there might be sequences that are different from the vast majority of the remaining sequences from the same organism. The former are candidate anomalies, and thus, their origin may be explained by horizontal transference. This approach is equivalent to a particular instance of the authorship attribution problem, that in which from a set of texts or paragraphs, almost all of them were written by the same author, whereas a minority has a different authorship. The constraint is that the author of each text is not known, so the algorithm has to attribute the authorship of each one of the texts. The texts detected to be written by a different author are the equivalent of the sequences of foreign origin for the case of genetic material. We describe here a novel method to detect anomalous sequences, based on interpretable embeddings derived from a common attention mechanism in humans, that of identifying novel tokens within a given sequence. Our proposal achieves novel and consistent results over the genome of a well known organism. Show more
Keywords: Horizontal gene transference, anomaly detection, embeddings, natural language processing, genomics
DOI: 10.3233/JIFS-219337
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Weng, Zhi | Bai, Rongfei | Zheng, Zhiqiang
Article Type: Research Article
Abstract: Cattle detection and counting is one of the most important topics in the development of modern agriculture and animal husbandry. The traditional manual monitoring methods are inefficient and constrained by factors such as site. To solve the above problems, a SCS-YOLOv5 cattle detection and counting model for complex breeding scenarios is proposed. The original SPPF module is replaced in the YOLOv5 backbone network with a CSP structured SPPFCSPC. A CA (Coordinate Attention) mechanism is added to the neck network, as well as the SC (Standard Convolution) of the Neck network is replaced with a light convolution GSConv and Slim Neck …is introduced, and training strategies such as multi-scale training are also employed. The experimental results show that the proposed method enhances the feature extraction ability and feature fusion ability, balances the localization accuracy and detection speed, and improves the use effect in real farming scenarios. The Precision of the improved network model is improved from 93.2% to 95.5%, [email protected] is improved from 94.5% to 95.2%, the RMSE is reduced by about 0.03, and the FPS reaches 88. Compared with other mainstream algorithms, the comprehensive performance of SCS-YOLOv5 s is in a leading position, with fewer missed and false detections, and the strong robustness and generalization ability of this model are proved on multi-category public datasets. Applying the improvement ideas in this paper to YOLOv8 s also yields an increase in accuracy. The improved method in this study can greatly improve the accuracy of cattle detection and counting in complex environments, and has good real-time performance, so as to provide technical support for large-scale cattle breeding. Show more
Keywords: Cattle detection, counting, attention mechanism, occlusion, complex environments
DOI: 10.3233/JIFS-237231
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Lugo-Torres, Gerardo | Valdez-Rodríguez, José E. | Peralta-Rodríguez, Diego A.
Article Type: Research Article
Abstract: The use of generative models in image synthesis has become increasingly prevalent. Synthetic medical imaging data is of paramount importance, primarily because medical imaging data is scarce, costly, and encumbered by legal considerations pertaining to patient confidentiality. Synthetic medical images offer a potential answer to these issues. The predominant approaches primarily assess the quality of images and the degree of resemblance between these images and the original ones employed for their generation.The central idea of the work can be summarized in the question: Do the performance metrics of Frechet Inception Distance(FID) and Inception Score(IS) in the Cycle-consistent Generative Adversarial Networks …(CycleGAN) model are adequate to determine how real a generated chest x-ray pneumonia image is? In this study, a CycleGAN model was employed to produce artificial images depicting 3 classes of chest x-ray pneumonia images: general(any type), bacterial, and viral pneumonia. The quality of the images were evaluated assessing and contrasting 3 criteria: performance metric of CycleGAN model, clinical assessment of respiratory experts and the results of classification of a visual transformer(ViT). The overall results showed that the evaluation metrics of the CycleGAN are insufficient to establish realism in generated medical images. Show more
Keywords: Synthetic chest x-ray, cycle generative adversarial network, pneumonia, image-to-image translation, visual transformer
DOI: 10.3233/JIFS-219373
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Ramírez-Martínez, Angel | Chong-Quero, J. Enrique | Cervantes-Culebro, Héctor | Cruz-Villar, Carlos A.
Article Type: Research Article
Abstract: This paper presents a data-driven control approach for a five-bar robot with compliant joints. The robot consists of a parallel mechanism with compliant elements that introduce uncertainties in modeling and control. To address this fact, it is implemented a model-less data-driven controller based on a Feedforward Neural Network Module (FNNM) that identifies the inverse dynamics of the robot. The FNNM is incorporated into a coordination of Feedforward Control Method (CFCM) to achieve precise trajectory tracking. Experiments compare the compliant joints robot to a bearing-joint robot performing pick-and-place tasks from 0.15 to 3.15 Hz. Results show the compliant robot maintaining trajectory tracking …up to 1.25 Hz with a Root Mean Square Error (RMSE) of 9.02 mm. Show more
Keywords: Data-driven, five-bar robot, compliant joints, vision-based
DOI: 10.3233/JIFS-219364
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-7, 2024
Authors: Chen, Kang | Song, Changming | Cheng, Dongxu | Li, Hao
Article Type: Research Article
Abstract: Video anomaly detection (VAD) has garnered substantial attention from researchers due to its broad applications, including fire detection, drop detection, and vibration detection. In the current context of VAD, existing methods prioritize detection efficiency but overlook the impact of motion and appearance information. Additionally, achieving accurate predictions while retaining motion and appearance information poses a significant challenge. This paper proposes a novel semi-supervised method for VAD based on Generative Adversarial Network (GAN) structures with dual generators and dual discriminators, namely Dual-GAN. The future frame generator utilizes an improved encoder-decoder network to preserve more spatial information. Motion information for the future …flow generator is obtained by estimating optical flow between reconstruction frames, complementing the optical flow between prediction frames. The introduction of a frame discriminator and a motion discriminator against the frame generator enhances the realism of prediction frames, which facilitates the identification of unexpected abnormal events. This method significantly outperforms comparative approaches in synthesizing video frames and predicting future flows, showcasing its effectiveness in handling diverse video data. Extensive experiments are performed on four publicly available datasets to ensure a comprehensive evaluation of the model performance. Further exploration could include refining the model architecture, exploring additional datasets, and adapting the methodology to specific application domains. Show more
Keywords: Anomaly detection, generative adversarial network, dual discriminators, future flow
DOI: 10.3233/JIFS-237831
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Karthikeyan, M. | Colak, Ilhami | Sagar Imambi, S. | Joselin Jeya Sheela, J. | Nair, Sruthi | Umarani, B. | Alagusabai, Andril | Suriyakrishnaan, K. | Rajaram, A.
Article Type: Research Article
Abstract: This research paper introduces a cutting-edge approach to electric demand forecasting by incorporating the Temporal Fusion Transformer (TFT). As the landscape of demand forecasting becomes increasingly intricate, precise predictions are vital for effective energy management. To tackle this challenge, we leverage the sequential and temporal patterns in an extensive electric demand dataset spanning from 2003 to 2014. Our proposed Temporal Fusion Transformer model combines attention mechanisms with the transformer architecture, enabling it to adeptly capture intricate temporal dependencies. Thorough data preprocessing, including temporal embedding and external features, enhances prediction accuracy. Through rigorous evaluation, the TFT model surpasses existing forecasting techniques, …showcasing its capacity for accurate, resilient, and adaptive predictions. This research contributes to the advancement of electric demand forecasting, harnessing the TFT’s capabilities to excel in capturing diverse temporal patterns. The findings hold the potential to enhance energy management and support decision-making in the energy sector, bridging the gap between innovation and practical utility. Show more
Keywords: Electric demand forecasting, temporal fusion transformer, energy management, time-series analysis, transformer architecture
DOI: 10.3233/JIFS-236036
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Arenas Muñiz, Andrés Antonio | Mújica-Vargas, Dante | Rendón Castro, Arturo | Luna-Álvarez, Antonio | Vela-Rincón, Virna V.
Article Type: Research Article
Abstract: The selection of an appropriate trajectory for self-driving vehicles involves the analysis of several criteria that describe the generated trajectories. This problem evolves into an optimization problem when it is desired to increase or decrease the values for a specific criterion. The contribution of this thesis is to explore the use and optimization of another technique for decision-making, such as TOPSIS, with a sufficiently robust method that allows the inclusion of multiple parameters and their proper optimization, incorporating human experience. The proposed approach showed significantly higher safety and comfort performance, with about 20% better efficiency and 80% fewer safety violations …compared to other state-of-the-art methods, and in some cases outperforming in comfort by about 30.43%. Show more
Keywords: Decision-making, human experience, trajectory selection, self-driving
DOI: 10.3233/JIFS-219365
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Téllez-Velázquez, Arturo | Delice, Pierre A. | Salgado-Leyva, Rafael | Cruz-Barbosa, Raúl
Article Type: Research Article
Abstract: This paper performs an analysis comparing two evolutionary explainable fuzzy models that make inferences in a pipeline with a blood test data set for COVID-19 classification. Firstly, data is preprocessed by the following stages: cleaning, imputation and ranking feature selection. Later, we perform a comparative analysis between several clustering methods used in an Evolutionary Clustering-Structured Fuzzy Classifier (ECSFC) to solve this classification problem using the Differential Evolution (DE) algorithm. Complementarily, we find that the Fuzzy Decision Tree model produces similar performance when is tuned with the DE algorithm (EFDT). The obtained results show that, simpler models are easier to explain …qualitatively, i.e., increasing the number of clusters in ECSFC model or the maximum depth of the tree in EFDT model, does not necessarily help to obtain simplified and accurate models. In addition, although the EFDT model is by itself an intuitively explainable model, the ECSFC, with the help of the proposed Weighted Stacked Features Plot, generates more intuitive models that allow not only highlighting the features and the linguistic terms that defines a patient with COVID-19, but also allows users to visualize in a single graph and in specific colors the analyzed classes. Show more
Keywords: COVID-19, blood tests, fuzzy classifier, fuzzy decision tree, clustering, differential evolution
DOI: 10.3233/JIFS-219372
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Yao, Ziyang
Article Type: Research Article
Abstract: The traditional multi-task Takagi-Sugeno-Kang (TSK) fuzzy system modeling methods pay more attention to utilizing the inter-task correlation to learn the consequent parameters but ignore the importance of the antecedent parameters of the model. To this end, we propose a novel multi-task TSK fuzzy system modeling method based on multi-task fuzzy clustering. This method first proposes a novel multi-task fuzzy c-means clustering method that learns multiple specific clustering centers for each task and some common clustering centers for all tasks. Secondly, for the consequent parameters of the fuzzy system, the novel low-rank and row-sparse constraints are proposed to better implement multi-task …learning. The experimental results demonstrate that the proposed model shows better performance compared with other existing methods. Show more
Keywords: Multi-task fuzzy clustering, TSK fuzzy system, low-rank, row-sparsity, joint learning
DOI: 10.3233/JIFS-232312
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Gao, Lijun | Liu, Kai | Liu, Wenjun | Wu, Jiehong | Jin, Xiao
Article Type: Research Article
Abstract: As machine learning models become increasingly integrated into practical applications and are made accessible via public APIs, the risk of model extraction attacks has gained prominence. This study presents an innovative and efficient approach to model extraction attacks, aimed at reducing query costs and enhancing attack effectiveness. The method begins by leveraging a pre-trained model to identify high-confidence samples from unlabeled datasets. It then employs unsupervised contrastive learning to thoroughly dissect the structural nuances of these samples, constructing a dataset of high quality that precisely mirrors a variety of features. A mixed information confidence strategy is employed to refine the …query set, effectively probing the decision boundaries of the target model. By integrating consistency regularization and pseudo-labeling techniques, reliance on authentic labels is minimized, thus improving the feature extraction capabilities and predictive precision of the surrogate models. Evaluation on four major datasets reveals that the models crafted through this method bear a close functional resemblance to the original models, with a real-world API test success rate of 62.35%, which vouches for the method’s validity. Show more
Keywords: Model extraction, unsupervised learning, selection of strategies, active learning
DOI: 10.3233/JIFS-239504
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Yu, Xiaobing | Zhang, Yuexin | Wang, Xuming
Article Type: Research Article
Abstract: Sensors are often deployed in harsh environments, in which some threats may endanger the safety of sensors. In this paper, a sensor deployment model is developed in Wireless Sensor Networks (WSNs), in which the coverage rate and the threat risk are considered simultaneously. The model is established as an optimization problem. An adaptive ranking teaching learning-based optimization algorithm (ARTLBO) is proposed to solve the problem. Learners are divided into inferior and superior groups. The teacher phase is boosted by replacing the teacher with the top three learners, and the learner phase is improved by providing some guidance for inferior learners. …The experimental results show that the proposed ARTLBO algorithm can effectively optimize the model. The fitness values of the proposed model found by the proposed ARTLBO are 0.4894, 0.4886, which are better than its competitors. The algorithm can provide a higher coverage rate and lower threat risk. Show more
Keywords: WSNs, teaching-learning-based optimization, sensor deployment, coverage rate
DOI: 10.3233/JIFS-240215
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Zhang, Lixin | Yin, Hongtao | Li, Ang | Hu, Longbiao
Article Type: Research Article
Abstract: In large-scale scenes, how to quickly obtain paths while ensuring the shortest possible path length is a key issue. Rapidly-exploring Random Tree (RRT) have the characteristic of quickly exploring the state space, but it is often difficult to obtain a short path. To overcome this problem, this paper proposes an improved RRT algorithm based on equidistance retention strategy and A* local search(ERRRT-A*). First, RRT is used for large-step global fast exploration to obtain approximate paths. Then, an equidistance retention strategy is used to discard most of the points and retain a small number of key points. Finally, A* is used …to search between each segment to obtain a new path. The ERRRT-A* algorithm is compared with other commonly used algorithms on maps of different size in terms of path length and planning time. Simulation results indicate that compared with other algorithms, this algorithm achieves fast planning in large-scale scenes while obtaining short path length, which can effectively balance the path length and planning time. Show more
Keywords: Path planning, large-scale scenes, unmanned vehicles, RRT
DOI: 10.3233/JIFS-238695
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: López-Jasso, Edgar | Felipe-Riverón, Edgardo M. | Valdez-Rodríguez, José E.
Article Type: Research Article
Abstract: This study underscores the crucial role of image preprocessing in enhancing the outcomes of multimodal image registration tasks using scale-invariant feature selection. The primary focus is on registering two types of retinal images, assessing a methodology’s performance on a set of retinal image pairs, including those with and without microaneurysms. Each pair comprises a color optical image and a gray-level fluorescein image, presenting distinct characteristics and captured under varying conditions. The SIFT methodology, encompassing five stages, with preprocessing as the initial and pivotal stage, is employed for image registration. Out of 35 test retina image pairs, 33 (94.28%) were successfully …registered, with the inability to extract features hindering automatic registration in the remaining pairs. Among the registered pairs, 42.42% were retinal images without microaneurysms, and 57.57% had microaneurysms. Instead of simultaneous registration of all channels, independent registration of preprocessed images in each channel proved more effective. The study concludes with an analysis of the fifth registration’s resulting image to detect abnormalities or pathologies, highlighting the challenges encountered in registering blue channel images due to high intrinsic noise. Show more
Keywords: Image SIFT registration, microaneurysms counting, retina image analysis, multimodal registration, image processing
DOI: 10.3233/JIFS-219374
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Pradeepkumar, G. | Kavitha, S.
Article Type: Research Article
Abstract: To provide the best possible performance in precisely segmenting clinical images, several approaches are used. Convolutional neural networks are one method used in it to extract its features, which combine several models with several additional methods. It also improves the efficiency of generalisation between categorised and uncategorized image categories. The method proposed combines multi-style image fusion with two-dimensional fracture image representation. The photographs on this page have been updated with a variety of images to improve concentration sharing and achieve the desired visual look. The border detection algorithm is then used to extract the exact border of the image from …the contrast extended images. It will then be divided into basic and comprehensive layers. The fused image was then created using augmented end layers. Show more
Keywords: Segmenting, clinical images, extract features, categorized image, uncategorized image, multi style, border detection, image extraction
DOI: 10.3233/JIFS-239695
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Wei, Xiao | Lin, Yidian
Article Type: Research Article
Abstract: Legal judgment prediction(LJP) has achieved remarkable results. However, existing methods still face problems such as difficulties in obtaining key feature words for charges, which impose limitations on the improvement of prediction results. To this end, we propose a legal judgment prediction model with legal feature Word subgraph Label-Embedding and Dual-knowledge Distillation(WLEDD). Compared with traditional methods, our method has two contributions: (1) To mitigate the impact of overly sparse tail class data and high similarity text representations, we capture the critical features related to the charges by fusing LDA and legal feature word subgraphs. Then we encode them as label information …to obtain highly distinguished representations of legal documents. (2) To solve the problem of high difficulty in some subtasks in LJP, we perform subtask-oriented compression of models to construct a student model with lower complexity and higher accuracy through dual knowledge distillation. Moreover, we exploit the logical association between the subtasks to constrain the labels of articles by charge prediction results. It greatly reduces the difficulty of article prediction. Experimental results on four datasets show that our approach significantly outperforms the baseline models. Compared with the state-of-art method, the F1 value of WLEDD for charge prediction has increased by an average of 2.57% . For article prediction, the F1 value has increased by an average of 1.09% . In addition, we demonstrate its effectiveness through ablation experiments and analytical experiments. Show more
Keywords: Legal judgment prediction, knowledge distillation, label embedding, legal text mining
DOI: 10.3233/JIFS-237323
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Yang, Hong | Wang, Lina
Article Type: Research Article
Abstract: The paper focuses on how to improve the prediction accuracy of time series and the interpretability of prediction results. First, a novel Prophet model based on Gaussian linear fuzzy approximate representation (GF-Prophet) is proposed for long-term prediction, which uniformly predicts the data with consistent trend characteristics. By taking Gaussian linear fuzzy information granules as inputs and outputs, GF-Prophet predicts with significantly smaller cumulative error. Second, noticing that trend extraction affects prediction accuracy seriously, a novel granulation modification algorithm is proposed to merge adjacent information granules that do not have significant differences. This is the first attempt to establish Prophet based …on fuzzy information granules to predict trend characteristics. Experiments on public datasets show that the introduction of Gaussian linear fuzzy information granules significantly improves prediction performance of traditional Prophet model. Compared with other classical models, GF-Prophet has not only higher prediction accuracy, but also better interpretability, which can clearly give the change information, fluctuation amplitude and duration of a certain trend in the future that investors actually pay attention to. Show more
Keywords: Fuzzy number, gaussian linear fuzzy information granule, the prophet model, long-term prediction
DOI: 10.3233/JIFS-230313
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Canul-Chin, Miguel Angel | Moguel-Ordóñez, Yolanda Beatriz | Martin-Gonzalez, Anabel | Brito-Loeza, Carlos | Legarda-Saenz, Ricardo
Article Type: Research Article
Abstract: Yucatan has a variety of plant species of melliferous importance. The honey produced in Yucatan has several special properties that make it one of the most demanded internationally. Analyzing the pollen grains present in honey is essential to determine its quality and identify its plants of origin. This study is a time-consuming process that must be carried out by highly trained palynologists. In this work, we propose an improved model based on a fully convolutional neural network for the automatic detection of pollen grains in microscopic images of four plant species of Yucatan to contribute to the analysis of the …honey designation of origin. Show more
Keywords: Pollen analysis, object detection, palynology, deep learning
DOI: 10.3233/JIFS-219379
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-8, 2024
Authors: Hashmi, Hina | Dwivedi, Rakesh | Kumar, Anil | Kumar, Aman
Article Type: Research Article
Abstract: The rapid advancements in satellite imaging technology have brought about an unprecedented influx of high-resolution satellite imagery. One of the critical tasks in this domain is the automated detection of buildings within satellite imagery. Building detection holds substantial significance for urban planning, disaster management, environmental monitoring, and various other applications. The challenges in this field are manifold, including variations in building sizes, shapes, orientations, and surrounding environments. Furthermore, satellite imagery often contains occlusions, shadows, and other artifacts that can hinder accurate building detection. The proposed method introduces a novel approach to improve the boundary detection of detected buildings in high-resolution …remote sensed images having shadows and irregular shapes. It aims to enhance the accuracy of building detection and classification. The proposed algorithm is compared with Customized Faster R-CNNs and Single-Shot Multibox Detectors to show the significance of the results. We have used different datasets for training and evaluating the algorithm. Experimental results show that SESLM for Building Detection in Satellite Imagery can detect 98.5% of false positives at a rate of 8.4%. In summary, SESLM showcases high accuracy and improved robustness in detecting buildings, particularly in the presence of shadows. Show more
Keywords: Object detection, image analysis, faster R-CNN, CNN, satellite imagery, object localization
DOI: 10.3233/JIFS-235150
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-21, 2024
Authors: Huang, De Ling | Huang, Yi Fan | Yang, Yu Qiao
Article Type: Research Article
Abstract: Practical Byzantine Fault Tolerance (PBFT), the widest-used consensus algorithm in the alliance blockchain, suffers from high communications complexity and relatively low scalability, making it difficult to support large-scale networks. To overcome these limitations, we propose a secure and scalable consensus algorithm, Vague Sets-based Double Layer PBFT (VSDL-PBFT). Roles and tasks of consensus nodes are redesigned. Three-phase consensus process of the original PBFT is optimized. Through these approaches, the communication complexity of the algorithm is significantly reduced. In order to better fit the complexity of voting in the real world, we use a vague set to select primary nodes of consensus …groups. This can greatly reduce the likelihood of malicious nodes being selected as the primary nodes. The experimental results show that the VSDL-PBFT consensus algorithm improves the system’s fault tolerance, it also achieves better performance in algorithm security, communications complexity, and transaction throughput compared to the baseline consensus algorithms. Show more
Keywords: Blockchain, consensus algorithm, Byzantine fault tolerance, PBFT
DOI: 10.3233/JIFS-239745
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Rodriguez-Bazan, Horacio | Sidorov, Grigory | Escamilla-Ambrosio, Ponciano Jorge
Article Type: Research Article
Abstract: Recently, Android device usage has increased significantly, and malicious applications for the Android ecosystem have also increased. Security researchers have studied Android malware analysis as an emerging issue. The proposed methods employ a combination of static, dynamic, or hybrid analysis along with Machine Learning (ML) algorithms to detect and classify malware into families. These families often exhibit shared similarities among their members or with other families. This paper presents a new method that combines Fuzzy Hashing and Natural Language Processing (NLP) techniques to find Android malware families based on their similarities by applying reverse engineering to extract the features and …compute fuzzy hashing of the preprocessed code. This relationship allows us to identify the families according to their features. A study was conducted using a database test of 2,288 samples from diverse ransomware families. An accuracy in classifying Android ransomware malware up to 98.46% was achieved. Show more
Keywords: Android malware analysis, android ransomware, cybersecurity, fuzzy hashing, natural language processing
DOI: 10.3233/JIFS-219367
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Arulmurugan, A. | Kaviarasan, R. | Garnepudi, Parimala | Kanchana, M. | Kothandaraman, D. | Sandeep, C.H.
Article Type: Research Article
Abstract: This research focuses on scene segmentation in remotely sensed images within the field of Remote Sensing Image Scene Understanding (RSISU). Leveraging recent advancements in Deep Learning (DL), particularly Residual Neural Networks (RESNET-50 and RESNET-101), and the research proposes a methodology involving feature fusing, extraction, and classification for categorizing remote sensing images. The approach employs a dataset from the University of California Irvine (UCI) comprising twenty-one groups of pictures. The images undergo pre-processing, feature extraction using the mentioned DL frameworks, and subsequent categorization through an ensemble classification structure combining Kernel Extreme Learning Machine (KELM) and Support Vector Machine (SVM). The paper …concludes with optimal results achieved through performance and comparison analyses. Show more
Keywords: Remote sensing, image scene classification, deep learning, feature extraction, RESNET- 101, ensemble
DOI: 10.3233/JIFS-235109
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2023
Authors: Cai, Xiumei | Yang, Xi | Wu, Chengmao | Zhang, Rui
Article Type: Research Article
Abstract: Focusing on the currently available multi-view fuzzy clustering algorithms, many of which frequently lack robustness and are hence less frequently used in image segmentation. We present a multi-view fuzzy clustering image segmentation algorithm in this research, along with an autonomous view-weight learning mechanism. Firstly, to ensure that each view has the best view weight, the algorithm adds a view weight factor. Secondly, it introduces the weighted fuzzy factor and the kernel distance metric, the role of the weighted fuzzy factor is to collect the local spatial information and local grey scale information to preserve as much of the image’s detailed …information as feasible during segmentation. The role of the kernel distance metric is to lessen the influence of outliers and noisy points on image segmentation. Finally, the technique for resolving the issue of image uncertainty and fuzzy factor selection introduces the concept of interval type-2 fuzzy c-means clustering. Numerous experiments on different images demonstrate that the proposed algorithm in this paper is more robust than previous multi-view fuzzy clustering algorithms for solving noise image segmentation problems. It is also more effective at segmenting images contaminated by noise and can better retain the detailed information in the image. Show more
Keywords: Multi-view, fuzzy clustering, autonomous view-weight learning, type-2 fuzzy, image segmentation
DOI: 10.3233/JIFS-235967
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Yang, Yi | Huang, Huiling | Wu, FeiBin | Han, Jun | Ma, Mengyuan | Zhang, Yantong | Feng, Yanbing
Article Type: Research Article
Abstract: This paper introduces a novel neural network architecture and an enhanced data synthesis method that significantly boost the performance in removing complex smoke from images. The architecture features a multi-branch and multi-scale feature fusion design, which effectively integrates multiple feature streams and adaptively restores the background by identifying specific smoke characteristics within the image. A newly designed Fourier residual block is incorporated to capture frequency domain information, enabling the network to process and transform information across both spatial and frequency domains. To improve the network’s generalization ability and robustness, an in-depth analysis of the imaging process in smoky environments was …conducted, leading to an improved method for synthesizing smoke images. This methodology facilitates the creation of a more varied and realistic training dataset, substantially enhancing the neural network’s capabilities in image restoration. Experimental results show that this approach is highly effective on both synthetic and real-world smoke datasets, outperforming existing image de-smoking methods in terms of quantitative metrics and visual perception. The code for this method is available at https://github.com/Exiagit/MFSR. Show more
Keywords: Single image smoke removal, frequency domain learning, data synthesis method
DOI: 10.3233/JIFS-239146
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Nieves, Juan Carlos | Osorio, Mauricio | Rojas-Velazquez, David | Magallanes, Yazmín | Brännström, Andreas
Article Type: Research Article
Abstract: Humans have evolved to seek social connections, extending beyond interactions with living beings. The digitization of society has led to interactions with non-living entities, such as digital companions, aimed at supporting mental well-being. This literature review surveys the latest developments in digital companions for mental health, employing a hybrid search strategy that identified 67 relevant articles from 2014 to 2022. We identified that by the nature of the digital companions’ purposes, it is important to consider person profiles for: a) to generate both person-oriented and empathetic responses from these virtual companions, b) to keep track of the person’s conversations, activities, …therapy, and progress, and c) to allow portability and compatibility between digital companions. We established a taxonomy for digital companions in the scope of mental well-being. We also identified open challenges in the scope of digital companions related to ethical, technical, and socio-technical points of view. We provided documentation about what these issues mean, and discuss possible alternatives to approach them. Show more
Keywords: Conversational agents, well-being, mental health, trustworthy artificial intelligence
DOI: 10.3233/JIFS-219336
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Gomathi, S.V. | Jayalakshmi, M.
Article Type: Research Article
Abstract: This article focuses on an area of nonlinear programming problems known as linear fractional programming problems with multiple objectives. When tackling real-world linear fractional optimization problems, ambiguity and uncertainty in decision-making are inherent. This research aims to present a simple and computationally quick approach to solving multiple objective linear fractional programming problems with all decision variables and parameters described in terms of crisp. The proposed solution algorithm is based primarily on the fuzzy-based technique, and a membership function strategy. To resolve the multi-objective linear fractional programming problem, first consider the problem as a single objective function and along with the …fuzzy programming model obtain the optimal solution using LINGO software. LINGO is a software application primarily used for solving linear, nonlinear, and integer optimization problems Moreover, an e-education setup problem demonstrates the steps of the proposed method. Show more
Keywords: Linear fractional programming problem, multi-objective linear fractional programming, fuzzy mathematical programming, hyperbolic membership function
DOI: 10.3233/JIFS-234286
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-8, 2024
Authors: Sánchez-Jiménez, Eduardo | Cuevas-Chávez, Alejandra | Hernández, Yasmín | Ortiz-Hernandez, Javier | Hernández-Aguilar, José Alberto | Martínez-Rebollar, Alicia | Estrada-Esquivel, Hugo
Article Type: Research Article
Abstract: Machine learning algorithms have been used in diverse areas among applications, including healthcare. However, to fit an effective and optimal machine learning model, the hyperparameters need to be tuned. This process is commonly referred to as Hyperparameter Optimization and comprises several approaches. We combined three Hyperparameter Optimization techniques (Bayesian Optimization, Particle Swarm Optimization, and Genetic Algorithm) with three classifiers (Random Forest, Support Vector Machine, and XGBoost) to identify the best combination of hyperparameters that maximize model performance. We use the Framingham dataset to test the proposal. For classifier performance, the Support Vector Machine obtained the best result in recall (96.40%) …and F-score (93.86%), while XGBoost obtained the best result in precision (96.30%) and specificity (96.36%). In the accuracy metric, both classifiers achieved 95%. Bayesian optimization had the best results in terms of accuracy, precision, specificity, and F-score metrics. Both Particle Swarm Optimization and Genetic Algorithm obtained the best result in the recall metric. Show more
Keywords: Bayesian optimization, framingham dataset, genetic algorithm, heart disease, hyperparameter default value, hyperparameter optimization, machine learning, particle swarm optimization, support vector machine, XGBoost
DOI: 10.3233/JIFS-219376
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Cosío-León, M.A. | Martínez-Vargas, Anabel | Rodríguez-Cortés, Gabriela
Article Type: Research Article
Abstract: It is well-known that tuning a metaheuristic is a critical task because the performance of a metaheuristic and the quality of its solutions depend on its parameter values. However, finding a good parameter setting is a time-consuming task. In this work, we apply the upper confidence bound (UCB) algorithm to automate offline tuning in a (1 + 1)-evolution strategy. Preliminary results show that our proposed approach is a less costly method.
Keywords: Upper confidence bound algorithm, meta-optimizer, bandit problems, reinforcement learning
DOI: 10.3233/JIFS-219362
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Akhmetova, Dilyara | Akhmetov, Iskander | Pak, Alexander | Gelbukh, Alexander
Article Type: Research Article
Abstract: The paper focuses on the importance of coherence and preserving the breadth of content in summaries generated by the extractive text summarization method. The study utilized the dataset containing 16,772 pairs of extractive and corresponding abstractive summaries of scientific papers specifically tailored to increase text coherence. We smoothed the extractive summaries with a Large Language Model (LLM) fine-tuning approach and evaluated our results by applying the coefficient of variation approach. The statistical significance of the results was assessed using the Kolmogorov-Smirnov test and Z-test. We observed an increase in coherence in the predicted texts, highlighting the effectiveness of our proposed …methods. Show more
Keywords: Coherence, cohesion, extractive summary, abstractive summary, GPT2, summarization, seq2seq, random forest
DOI: 10.3233/JIFS-219353
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Ibarra Carrillo, Mario Alfredo | Montiel Pérez, Jesús Yaljá | Molina Lozano, Herón
Article Type: Research Article
Abstract: Today, it is the amount of data that defines the existence of mankind. Scientists respond to the large amount of required calculations by developing hardware in several directions. One of them is to increase the number of arithmetic elements. Another direction is to create new architectures that represent new algorithms for processing numerical data. We have chosen the second direction by developing a new systolic core architecture, which implies an improvement in efficiency, i.e. performing the same task with the same number of arithmetic elements but reducing the latency. Measurements are made in terms of computational capacity and the number …of arithmetic elements involved in the operations. The results of the tests are compared with data from a number of selected articles. Today, we have achieved 3.2GFlops with only two modules. In the future, we plan to integrate up to four of our cores in a system with its own memory and management processor and at a higher operating frequency. Show more
Keywords: Systolic array, systolic tensor core, accelerated matrix multiplication, accelerated convolution
DOI: 10.3233/JIFS-219361
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: El Alaoui Elfels, Mohamed | Douiri, Moulay Rachid | Raoufi, Mustapha
Article Type: Research Article
Abstract: The generation of power in Photovoltaic systems is reduced when they operate far from their maximum power point. For optimal operation, it is essential to continuously track the maximum power point of the PV solar array. However, identifying the maximum power point is a challenge due to the nonlinear relationship of electrical characteristics of PV panels with external factors. To address this issue, we present a novel design approach for a self-organizing, self-tuning fuzzy logic controller, applied to the problem of maximum power point tracking in photovoltaic systems. We outline the basic structure of the fuzzy logic controller and address …the design problems typically associated with conventional trial-and-error schemes. We also discuss the suitability of the genetic algorithm optimization technique for determining and optimizing the fuzzy logic controller design. In our proposed approach, we translate the normalization factors, membership function parameters, and controller policy into bit-strings, which are then processed by the genetic algorithm to find a near-optimal solution. To achieve high dynamic performance, we choose a particular objective function as a performance index. We compare our approach with two variants of the maximum power point algorithm, one based on genetic algorithms and the other based on fuzzy logic, as well as with the methods described in references [34 ] and [35 ], in order to evaluate its effectiveness. Show more
Keywords: Fuzzy logic controller, genetic algorithm optimisation, optimal power, photovoltaic system
DOI: 10.3233/JIFS-231710
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Tang, Ao | Wang, Xiaofeng | Peng, Qingyuan | Wang, Junxia | Yang, Yi | He, Fei | Hua, Yingying
Article Type: Research Article
Abstract: A CNF formula with each clause of length k and each variable occurring 4s times, where positive occurrences are 3s and negative occurrences are s , is a regular (3s + s , k )-CNF formula (F 3s +s ,k formula). The random regular exact (3s + s , k )-SAT problem is whether there exists a set of Boolean variable assignments such that exactly one literal is true for each clause in the F 3s +s ,k formula. By introducing a random instance generation model, the satisfiability phase transition of the solution is analyzed by …using the first moment method, the second moment method, and the small subgraph conditioning method, which gives the phase transition point s* of the random regular exact (3s + s , k )-SAT problem for k ≥3. When s < s* , F 3s +s ,k formula is satisfiable with high probability; when s > s* , F 3s +s ,k formula is unsatisfiable with high probability. Finally, through the experimental verification, the results show that the theoretical proofs are consistent with the experimental results. Show more
Keywords: Random regular exact (3s + s, k)-SAT problem, first moment method, second moment method, small subgraph conditioning method, phase transition
DOI: 10.3233/JIFS-238254
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Kolesnikova, Olga | Yigezu, Mesay Gemeda | Gelbukh, Alexander | Abitte, Selam | Sidorov, Grigori
Article Type: Research Article
Abstract: Twitter has experienced a tremendous surge in popularity over recent years, establishing itself as a prominent social media platform with a large user base. However, with this increased usage, there has been a concerning rise in the number of individuals resorting to derogatory language and expressing their opinions in a demeaning manner toward others. This surge in hate speech has drawn significant attention to the field of sentiment analysis, which aims to develop algorithms capable of detecting and analyzing emotions expressed in social networks using intuitive approaches. This paper focuses on addressing the complex task of detecting hate speech and …aggressive behavior while performing target classification. We explored various deep-learning approaches, including LSTM, BiLSTM, CNN, and GRU. Each offers unique capabilities for capturing different aspects of the input data. We proposed an ensemble approach that combines the top three performing models. This ensemble approach benefits from the diverse strengths of each individual model showing F1 score of 0.85 for English-HS, 0.94 for English-TR, 0.92 for English-AB, 0.84 for Spanish-HS, 0.86 for Spanish-TR, 0.97 for Spanish-AB, 0.74 for multilingual-HS, 0.94 for multilingual-TR, and 0.88 for multilingual-AB. Show more
Keywords: Hate speech, aggressive behavior, target classification, ensemble learning, deep learning, target classification
DOI: 10.3233/JIFS-219350
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Valencia-Valencia, Alex I. | Gomez-Adorno, Helena | Stephens Rhodes, Christopher | Bel-Enguix, Gemma | Trueba, Ojeda | Fuentes Pineda, Gibran
Article Type: Research Article
Abstract: Social media platforms, such as Twitter (now X), are a major source of communication. Identifying communicative intentions is useful, as it encapsulates the latent motivations that drive text creation. This intention is also helpful in understanding the message, context, and audience. This study proposes a method for detecting communicative intentions in tweets using Jakobson’s language functions. We constructed a meticulously annotated dataset, drawing from the extensive RepLab2013 corpus. Our dataset underwent rigorous scrutiny by linguistic annotators who analyzed over 12,000 tweets individually. These experts identified the dominant language function within each tweet by employing diverse strategies to ensure precise labeling …quality. The outcome demonstrated a noteworthy Kappa agreement score of 0.6, reflecting a strong inter-annotator reliability. Subsequently, these functions were mapped to the corresponding intention categories. We employed logistic regression and support vector machines (SVM) algorithms to classify intention in tweets and explored various pre-processing techniques, incorporating n-grams and bag-of-words representations. Furthermore, we expanded our research using pre-trained large language models, incorporating the latest state-of-the-art techniques in natural language processing. Show more
Keywords: Intention, communicative intention, tweets, language functions, intention identification, n-grams, logistic regression, SVM, deep learning
DOI: 10.3233/JIFS-219357
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Rasham, Tahair | Kutbi, Marwan Amin | Hussain, Aftab | Chandok, Sumit
Article Type: Research Article
Abstract: The objective of this research is to propose some new fixed point theorems for fuzzy-dominated operators that satisfy a nonlinear contraction on a closed ball in a complete b -multiplicative metric space. Our strategy involves the use of a combination of two distinct kinds of mappings: one belongs to a weaker class of strictly increasing mappings, and the other is a class of dominated mappings. In order to demonstrate the validity of our new findings, we provide instances that are both illustrative and substantial. Finally, in order to illustrate the novelty of our findings, we provide applications that allow us …to derive the common solution to integral and fractional differential equations. Our findings have a significant impact on the interpretation of a large number of previously published studies, both present and historical. Show more
Keywords: Fixed point, b-multiplicative metric space, generalized nonlinear contraction, fuzzy dominated operators, graph contraction, ordered fuzzy mappings, integral equation, fractional differential equation
DOI: 10.3233/JIFS-238250
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Zhang, Xin-jie | Li, Jun-qing | Liu, Xiao-feng | Tian, Jie | Duan, Pei-yong | Tan, Yan-yan
Article Type: Research Article
Abstract: Enterprises have increasingly focused on integrated production and transportation problems, recognizing their potential to enhance cohesion across different decision-making levels. The whale optimization algorithm, with its advantages such as minimal parameter control, has garnered attention. In this study, a hybrid whale optimization algorithm (HWOA) is designed to settle the distributed no-wait flow-shop scheduling problem with batch delivery (DNWFSP-BD). Two objectives are considered concurrently, namely, the minimization of the makespan and total energy consumption. In the proposed algorithm, four vectors are proposed to represent a solution, encompassing job scheduling, factory assignment, batch delivery and speed levels. Subsequently, to generate high-quality candidate …solutions, a heuristic leveraging the Largest Processing Time (LPT) rule and the NEH heuristic is introduced. Moreover, a novel path-relinking strategy is proposed for a more meticulous search of the optimal solution neighborhood. Furthermore, an insert-reversed block operator and variable neighborhood descent (VND) are introduced to prevent candidate solutions from converging to local optima. Finally, through comprehensive comparisons with efficient algorithms, the superior performance of the HWOA algorithm in solving the DNWFSP-BD is conclusively demonstrated. Show more
Keywords: Distributed no-wait flow shop, batch delivery, hybrid whale optimization algorithm, path-relinking
DOI: 10.3233/JIFS-238627
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Fan, Zhou | Yanjun, Shen | Zebin, Wu
Article Type: Research Article
Abstract: In this article, a non-fragile adaptive fuzzy observer is proposed for nonlinear systems with uncertain external disturbance and measurement noise. Firstly, the nonlinear system is augmented by an output filtered transformation. The output with measurement disturbance is put into the state equation of the augment system. Then, we introduce fuzzy logic system (FLS) to approximate the measurement disturbance, and construct an augmented non-fragile adaptive fuzzy observer for the augment system. A Lyapunov function is constructed to reveal that the characteristic of estimation errors is uniformly ultimately boundedness (UUB). Finally, two experimental simulations are offered to confirm the validity of the …proposed design method. Show more
Keywords: Non-fragile, high-gain observer, adaptive observer, fuzzy logic system
DOI: 10.3233/JIFS-237271
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Rajesh Kannan, A. | Thirupathi, G. | Murali Krishnan, S.
Article Type: Research Article
Abstract: Consider the graph G , with the injection Ω from node set to the first p + q natural numbers. Let us assume that the ceiling function of the classical average of the node labels of the end nodes of each link is the induced link assignment Ω * . If the union of range of Ω of node set and the range of Ω * of link set is all the first p + q natural numbers, then Ω is called a classical mean labeling. A super classical mean graph is a graph …with super classical mean labeling. In this research effort, we attempted to address the super classical meanness of graphs generated by paths and those formed by the union of two graphs. Show more
Keywords: Labeling, super classical mean labeling, super classical mean graph
DOI: 10.3233/JIFS-232328
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-7, 2024
Authors: Ihtisham, Shumaila | Mustafa, Ghulam | Qureshi, Muhammad Nauman | Manzoor, Sadaf | Alamgir, | Khan, Adnan
Article Type: Research Article
Abstract: This study explores the distribution of order statistics of the Alpha Power Pareto (APP) distribution. Alpha Power Pareto is a more flexible distribution proposed by adding an extra parameter in the well-known Pareto distribution. This paper focuses on the derivation of single and product moment of the APP order statistics. Additionally, a recurrence link for single moments of order statistics is established. Moreover, analytical formulas of Rényi and q-entropy for APP order statistics are obtained.
Keywords: Order statistics, q-entropy, rényi entropy, recurrence relation, single and product moments
DOI: 10.3233/JIFS-231873
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Shafi, Smd | Sathiya Kumar, C.
Article Type: Research Article
Abstract: Identifying diseases using chest X-rays is challenging because more medical professionals are needed. A chest X-ray contains many features, making it difficult to pinpoint the factors causing a disease. Moreover, healthy individuals are more common than those with illnesses, and various diseases occur at different rates. To diagnose the disease accurately using X-ray images, extracting significant features and addressing unbalanced data is essential. To resolve these challenges, a proposed ensemble self-attention-based deep neural network aims to tackle the problem of unbalanced information distribution by creating a new goal factor. Additionally, the InceptionV3 architecture is trained to identify significant features. The …proposed objective function is a performance metric that adjusts the ratio of positive to negative instances, and the suggested loss function can dynamically mitigate the impact of many negative observations by reducing each cross-entropy term by a variable amount. Tests have shown that ensemble self-attention performs well on the ChestXray14 dataset, especially regarding the dimension around the recipient’s characteristics curves. Show more
Keywords: Deep neural networks, cross-weighted entropy loss, data with discrepancies, feature extraction, X-ray
DOI: 10.3233/JIFS-236444
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Venkatesan, S. | Kempanna, M. | Arogia Victor Paul, M. | Bhuvanesh, A.
Article Type: Research Article
Abstract: At present, Non-Orthogonal Multiple Access (NOMA) has become the most efficient technique to solve Data Rate (DR) requirements in Visible Light Communication (VLC) systems. However, present NOMA systems show high interference and increase the Peak-to-Average Power Ratio (PAPR), especially in wider applications. To overcome this issue, several techniques have been undertaken in the past and proven to better communication performance. However, the existing studies fail to provide a better Quality of Services (QoS) for the recent multi-carrier Optical Communication System (OCS). Hence, this study put forth a novel Generalized Frequency Division Multiplexing (GFDM) scheme to minimize the PAPR in an …indoor-based NOMA-VLC system. To enhance the performance of the GFDM system, a novel Offset-based Quadrature Amplitude Modulation (OQAM) technique is introduced that enhances the signal quality and prevents the Co-Channel Interference (CCI) problems effectively. Moreover, the proposed study introduces a novel Quantum-enabled Rabbit Optimization (QRO) technique for solving Resource Allocation (RA) problems in the NOMA-VLC system. The proposed method is processed via the MATLAB platform and various performance measures like Sum Rate (SR), Signal-to-Interference Noise Ratio (SINR), and Symbol Error Rate (SER) are analyzed and distinguished with various existing studies. In the simulation scenario, the proposed method achieves the SR of 178Mbps, SINR of 16 dB, and SER of compared to conventional techniques. Show more
Keywords: Indoor optical communication, non-orthogonal multiple access, light fidelity, generalized frequency division multiplexing, resource allocation, quantum rabbit optimization, offset quadrature modulation
DOI: 10.3233/JIFS-237800
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Yang, Wenyang | Li, Mengdi
Article Type: Research Article
Abstract: The development of computer vision and artificial intelligence provides technical support for objective evaluation of classroom teaching, and promotes the implementation of personalized teaching by teachers. In traditional classroom teaching, due to limitations, teachers are unable to timely understand and evaluate the effectiveness of classroom teaching through students’ classroom behavior, making it difficult to meet students’ personalized learning needs. Using artificial intelligence, big data and other digital technologies to analyze student classroom learning behavior is helpful to understand and evaluate students’ learning situation, thus improving the quality of classroom teaching. By using the method of literature analysis, the paper sorts …out relevant domestic and foreign literature in the past five years, and systematically analyzes the methods of student classroom behavior recognition supported by deep learning. Firstly, the concepts and processes of student classroom behavior recognition are introduced and analyzed. Secondly, it elaborates on the representation methods of features, including image features, bone features, and multimodal fusion. Finally, the development trend of student classroom behavior recognition methods and the problems that need to be further solved are summarized and analyzed, which provides reference for future research on student classroom behavior recognition. Show more
Keywords: Behavior recognition, object detection, skeleton pose, deep learning
DOI: 10.3233/JIFS-238228
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Ali, Zeeshan | Yin, Shi | Yang, Miin-Shen
Article Type: Research Article
Abstract: In the context of fuzzy relations, symmetry refers to a property where the relationship between two elements remains the same regardless of the order in which they are considered. Natural language processing (NLP) in engineering documentation discusses the application of computational methods or techniques to robotically investigate, analyze, and produce natural language information for manufacturing contents. The NLP plays an essential role in dealing with large amounts of textual data normally recovered in engineering documents. In this paper, we expose the idea of a bipolar complex hesitant fuzzy (BCHF) set by combining the bipolar fuzzy set (BFS) and the complex …hesitant fuzzy set (CHFS). Further, we evaluate some algebraic and Schweizer-Sklar operational laws under the presence of BCHF numbers (BCHFNs). Additionally, using the above information as well as the idea of prioritized (PR) operators, we derive the idea of BCHF Schweizer-Sklar PR weighted averaging (BCHFSSPRWA) operator, BCHF Schweizer-Sklar PR ordered weighted averaging (BCHFSSPROWA) operator, BCHF Schweizer-Sklar PR weighted geometric (BCHFSSPRWG) operator, and BCHF Schweizer-Sklar PR ordered weighted geometric (BCHFSSPROWG) operator. Basic properties for the above operators are also discussed in detail, such as idempotency, monotonicity, and boundedness. Moreover, we evaluate the best way in which NLP can be applied to engineering documentations with the help of the proposed operators. Therefore, we illustrate the major technique of multi-attribute decision-making (MADM) problems based on these derived operators. Finally, we use some existing operators and try to compare their ranking results with our proposed ranking results to show the supremacy and validity of the investigated theory. Show more
Keywords: Fuzzy set (FS), hesitant FS, bipolar complex hesitant FS, Schweizer-Sklar prioritized aggregation operators, natural language processing, multi-attribute decision-making
DOI: 10.3233/JIFS-240116
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-27, 2024
Authors: Shi, Jing | Zhang, Xiao-Lin | Wang, Yong-Ping | Gu, Rui-Chun | Xu, En-Hui
Article Type: Research Article
Abstract: Deep neural networks (DNNs) are susceptible to adversarial attacks, and one important factor is that adversarial samples are transferable, i.e., adversarial samples generated by a particular network may deceive other black-box models. However, existing transferable adversarial attacks tend to modify the input features of images directly without selection to reduce the prediction accuracy in the alternative model, which would enable the adversarial samples to fall into the model’s local optimum. Alternative models differ significantly from the victim model in most cases, and while simultaneously attacking multiple models may improve transferability, gathering numerous different models is more challenging and expensive. We …simulate various models using frequency domain transformation to close the gap between the source and victim models and improve transferability. At the same time, we destroy important intermediate layer features that influence the decision of the model in the feature space. Additionally, smoothing loss is introduced to remove high-frequency perturbations. Extensive experiments demonstrate that our FM-FSTA attack generates more well-hidden and transferable adversarial samples, and achieves a high deception rate even when attacking adversarially trained models. Compared to other methods, our FM-FSTA improved attack success rate under different defense mechanisms, which reveals the potential threats of current robust models. Show more
Keywords: Deep neural networks, adversarial samples, transferable attacks
DOI: 10.3233/JIFS-234156
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Zhao, Xianhao | Wang, Mingyang | Xin, Chaoqun | Wang, Xianjie
Article Type: Research Article
Abstract: In the field of autonomous driving, driving systems need to understand and quickly respond to changes in road scenes, which makes it equally important to enhance the accuracy and real-time performance of semantic segmentation tasks in road scenes. This article proposes a lightweight road scene semantic segmentation model LR3S that integrates global contextual information based on the DeepLabV3+ framework. LR3S utilizes a lightweight GhostNetV2 network as the backbone to capture rich semantic information in images, and uses ASPP_eSE module to enhance the capture of multi-scale and detail level semantic information. In addition, a lightweight CARAFE upsampling operator is utilized to …upsample feature maps, taking advantage of CARAFE’s large receptive field and low computational cost to prevent the loss of fine-grained features and ensure the integrity of semantic information. Experimental results demonstrate that LR3S achieves an MIoU of 74.47% on the Cityscapes dataset and obtains an MIoU of 76.01% on the PASCAL VOC 2012 dataset. Compared to baseline semantic segmentation models, LR3S significantly reduces the parameter amount while maintaining segmentation accuracy, achieving a good balance between model accuracy and real-time performance. Show more
Keywords: Semantic segmentation, road scenes, attention mechanism, GhostNetV2, CARAFE
DOI: 10.3233/JIFS-239692
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Haennah, J.H. Jensha | Christopher, C. Seldev | King, G.R. Gnana
Article Type: Research Article
Abstract: Accurate SARS-CoV-2 screening is made possible by automated Computer-Aided Diagnosis (CAD) which reduces the stress on healthcare systems. Since Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2) is highly contagious, the transition chain can be broken through an early diagnosis by clinical knowledge and Artificial Intelligence (AI). Manual findings are time and labor-intensive. Even if Reverse Transcription-Polymerase Chain Reaction (RT-PCR) delivers quick findings, Chest X-ray (CXR) imaging is still a more trustworthy tool for disease classification and assessment. Several studies have been conducted using Deep Learning (DL) algorithms for COVID-19 detection. One of the biggest challenges in modernizing healthcare is extracting …useful data from high-dimensional, heterogeneous, and complex biological data. Intending to introduce an automated COVID-19 diagnosis model, this paper develops a proficient optimization model that enhances the classification performance with better accuracy. The input images are initially pre-processed with an image filtering approach for noise removal and data augmentation to extend the dataset. Secondly, the images are segmented via U-Net and are given to classification using the Fused U-Net Convolutional Neural Network (FUCNN) model. Here, the performance of U-Net is enhanced through the modified Moth Flame Optimization (MFO) algorithm named Chaotic System-based MFO (CSMFO) by optimizing the weights of U-Net. The significance of the implemented model is confirmed over a comparative evaluation with the state-of-the-art models. Specifically, the proposed CSMFO-FUCNN attained 98.45% of accuracy, 98.63% of sensitivity, 98.98% of specificity, and 98.98% of precision. Show more
Keywords: COVID-19 classification, deep Learning, U-Net, Convolutional Neural Network (CNN), Moth Flame Optimization (MFO)
DOI: 10.3233/JIFS-230523
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Liu, Zhaohui | Wang, Xiao
Article Type: Research Article
Abstract: Pedestrians have random distribution and dynamic characteristics. Aiming to this problem, this paper proposes a pedestrian object detection method based on improved YOLOv5 in urban road scenes. Firstly, the last C3 module was replaced in the Backbone with the SE attention mechanism to enhance the network’s extraction of pedestrian object features and improve the detection accuracy of small-scale pedestrians. Secondly, the EIOU loss function was introduced to optimize the object detection performance of the detection network. To validate the effectiveness of the algorithm, experiments were conducted on a dataset composed of filtered Caltech pedestrian detection data and images taken by …ourselves. The experiments showed that the improved algorithm has P -value, R -value, and mAP of 98.4%, 95.5%, and 98%, respectively. Compared to the YOLOv5 model, it has increased P -value by 1.4%, R -value by 2.7%, and mAP by 1.3%. The improved algorithm also boosts the detection speed. The detection speed is 0.8 ms faster than the YOLOv5 model. It is also faster than other mainstream algorithms including Faster R-CNN and SSD. The improved algorithm enhances the effectiveness of pedestrian detection significantly and has important application value. Show more
Keywords: Road traffic safety, YOLOv5, pedestrian object detection
DOI: 10.3233/JIFS-240537
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Zhan, Huawei | Han, Chengju | Li, Junjie | Wei, Gaoyong
Article Type: Research Article
Abstract: Aiming at the problems of slow speed and low accuracy of traditional neural network systems for real-time gesture recognition in complex backgrounds., this paper proposes DMS-yolov8-a gesture recognition method to improve yolov8. This algorithm replaces the Bottleneck convolution module in the backbone network of yolov8 with variable row convolution DCNV2, and increases the feature convolution range without increasing the computation amount through a more flexible feeling field. in addition, the self-developed MPCA attention module is added after the feature output layer of the backbone layer, which improves the problem of recognizing the accuracy of difference gestures in complex backgrounds by …effectively combining the feature information of the contextual framework, taking into account the multi-scale problem of the gestures in the image, this paper introduces the SPPFCSPS module, which realizes multi-feature fusion and improves real-time accuracy of detection. Finally, the model proposed in this paper is compared with other models, and the proposed DMS-yolov8 model achieves good results on both publicly available datasets and homemade datasets, with the average accuracy up to 97.4% and the average mAP value up to 96.3%, The improvements proposed in this paper are effectively validated. Show more
Keywords: Gesture recognition, yolov8, DCNV2, MPCA, feature fusion
DOI: 10.3233/JIFS-238629
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Meenakshi, A. | Bramila, M.
Article Type: Research Article
Abstract: Molecular structures are characterised by the Hosoya polynomial and Wiener index, ideas from mathematical chemistry and graph theory. The graph representation of a chemical compound that has atoms as vertices and chemical bonds as edges is called a molecular graph, and the Hosoya polynomial is a polynomial related to this graph. As a graph attribute that remains unchanged under graph isomorphism, the Hosoya polynomial is known as a graph invariant. It offers details regarding the quantity of distinct non-empty subgraphs within a specified graph. A topological metric called the Wiener index is employed to measure the branching complexity and size …of a molecular graph. For every pair of vertices in a molecular network, the Wiener index is the total of those distances. In this paper, discussed the Hosoya polynomial, Wiener index and Hyper-Wiener index of the Abid-Waheed graphs (AW)a 8 and (AW)a 10 . This graph is similar to Jahangir’s graph. Further, we have extended the research work on the applications of the described graphs. Show more
Keywords: Wiener index, Abid-Waheed, Hosoya polynomial, diameter, distance, connected graph
DOI: 10.3233/JIFS-236051
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-8, 2024
Authors: Lin, Jiayi
Article Type: Research Article
Abstract: At this stage, network communication technology is increasingly mature, and intelligent wearable products are also widely used in human daily life. Wearable products are popular with users because of their numerous types, complete functions and convenient services. Wearable products integrate interaction technology, and users can interact with products. However, how to improve the user’s interaction experience and reduce the user’s cognitive burden on the interaction interface is an urgent problem in the current product interaction design. Therefore, based on the analysis of the types and related technologies of wearable products, this paper made a specific analysis of the interaction design …of wearable products, and established an interaction design model. At the same time, the wearable fall detection system was also tested by machine learning algorithm. The experimental results showed that the average test result of the algorithm in this paper was 87.39%, while the average test result of the traditional algorithm was 83.79%. In terms of the missed alarm rate of fall detection, the average test result of this algorithm was 6.4%, while the average test result of the traditional algorithm was 12.33%. In terms of fall detection sensitivity, the average test result of this algorithm was 92.50%, while the average test result of the traditional algorithm was 88.24%. Compared with traditional algorithms, this method performs better, with lower missed detection rate and higher sensitivity. Innovative combination of machine learning algorithm, through three-dimensional coordinate system, differentiation and vector sum formula, improves the accuracy and reliability of fall detection. In conclusion, the algorithm in this paper can effectively optimize the relevant performance of the system, thus improving the accuracy of the system’s fall detection. Show more
Keywords: 5 G network communication technology, wearable products, interaction design, wearable fall detection system
DOI: 10.3233/JIFS-237837
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Li, Hongjun | Zhang, Jinlong
Article Type: Research Article
Abstract: This paper presents a sophisticated four-stage optimization and intelligent control algorithm tailored for two-way electric vehicle charging (EVC) stations integrated with advanced photovoltaic systems and fixed battery energy storage in commercial buildings. The primary objective is to minimize operating costs while prioritizing customer satisfaction within a dynamic and uncertain energy landscape. Our algorithm optimizes the scheduled charging and discharging of electric vehicles (EVs), local battery storage (BS) units, grid power supply, and deferred loads to balance instantaneous supply and demand. The first stage focuses on developing optimal energy management plans for the day ahead, considering factors such as projected energy …production, anticipated EVC demand, and building energy consumption patterns. Building on this foundation, the second stage introduces multilayer EV charging price structures and optimizes participation rewards for discharging, dynamically addressing EV charging patterns and price sensitivities. Approaching the commissioning timeline, the third stage refines energy management plans for the upcoming hours using real-time data and forecasts, adapting to evolving conditions for optimal resource allocation. The final stage involves real-time control and the implementation of optimized programs, dynamically adjusting charge/discharge processes, grid interactions, and load deferral to maintain supply-demand balance and minimize operating costs. Our algorithm enhances system resilience in unpredictable conditions, providing compelling incentives for active EV user participation. Coordinating the integrated system efficiently, including the commercial building’s energy load, ensures reliable service to customers while reducing costs. Extensive case studies and a comparative analysis validate the algorithm’s efficiency in significantly reducing operating costs and enhancing resilience to uncertainty. The paper concludes by highlighting the algorithm’s pioneering role in intelligent EV charging station (CHS) management, offering a cost-effective, customer-oriented, and dynamic energy control strategy for advancing global energy practices. Show more
Keywords: Electric vehicle charging, photovoltaic integration, battery energy storage, energy management optimization, commercial building integration
DOI: 10.3233/JIFS-241032
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Valadez-Godínez, Sergio | Sossa, Humberto | Santiago-Montero, Raúl
Article Type: Research Article
Abstract: The Associative Pattern Classifier (APC) was designed as an associative memory, focusing particularly on pattern classification. This implies that the training memory is constructed in a single operation and pattern classification also occurs in a single process. It is important to note that the APC translates the input patterns through a translation vector, which represents the average of all input patterns. Until now, there is no theoretical framework to explain the inner workings of the APC. Its relevance is inferred from the fact that several studies have been conducted using it as a foundation. This paper seeks to provide a …theoretical comprehension of the APC’s operation to facilitate future enhancements. We found the APC creates a system in static equilibrium through concurrent vectors at the origin (translation vector), resulting in a balanced separation of patterns. However, the APC cannot achieve complete pattern separation because of the presence of a neutral region. The neutral region is defined by all the points that define the separation hyperplanes. The points over the hyperplanes cannot be classified by the APC. Additionally, we discovered that the APC is unable to accurately classify the translation vector, which could be included as part of the input patterns. Our previous research showed that the APC is unsuccessful in achieving the linear separation of the AND function. In this research, we also broaden the examination of the AND function to illustrate that achieving linear separation is not feasible because the separation line represents a neutral region. The APC demonstrated exceptional performance when tested with artificial datasets where patterns were distributed over balanced regions, thus operating as an efficient multiclass and non-linear classifier. Nevertheless, the performance of the APC is lower when tested with real-world databases, making the APC inaccurate due to its restricted inner workings. Show more
Keywords: Classifier, pattern, associative memory, class, classification
DOI: 10.3233/JIFS-219347
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-23, 2024
Authors: Zhang, Wei | Zheng, Hongxuan | Zhang, Runyu
Article Type: Research Article
Abstract: In this paper, a self-organizing RBF (SORBF) neural network with an adaptive threshold is proposed based on improved particle swarm optimization (IPSO) and neural strength (NS). The parameters and structure of SORBF can be optimized simultaneously and dynamically. Moreover, the tiresome problem of threshold setting is solved. Firstly, the network size and parameters of SORBF are mapped into the particle information of PSO. Secondly, an IPSO algorithm, based on diversity inertia weight and elite knowledge guiding, is proposed to reduce the probability of the population falling into the local optimum. Then, IPSO is used for optimizing the parameters of SORBF. …Based on neuron growth intensity and competition intensity, SORBF can realize the hidden neuron addition and deletion adaptively. Moreover, the thresholds during the structure adjustment can be provided adaptively based on the network scale and neuron strength, which avoids the subjectivity setting and can improve the adaptive ability. Finally, the convergence analysis of IPSO is provided to ensure the performance of SORBF. Experiment results show that the proposed SORBF has good self-organizing ability and compact network structure compared with other methods. Show more
Keywords: RBF neural network, PSO, self-organization, neural strength, adaptive threshold
DOI: 10.3233/JIFS-239569
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Wei, Guangcun | Fu, Jihua | Pan, Zhifei | Fang, Qingge | Zhang, Zhi
Article Type: Research Article
Abstract: The text in natural scenes is often smaller compared to artificially designed text. Due to the small proportion of pixels, low resolution, less semantic information, and susceptibility to complex scenes, tiny text detection often results in many missed detections. To address this issue, this paper draws inspiration from small object detection methods and proposes TiTDet, a detection algorithm more suitable for tiny text. Due to the small proportion of pixels, low resolution, less semantic information, and susceptibility to complex scenes, tiny text detection often results in many missed detections. To address this issue, this paper draws inspiration from small object …detection methods and proposes TiTDet, a detection algorithm more suitable for tiny text. Firstly, this paper incorporates a context extraction module and an attention-guided module. These modules guide contextual information learning through a self attention mechanism, while eliminating the possible negative impact caused by redundant information. Regarding multi-scale feature fusion, this paper proposes a fine-grained effective fusion factor, making the fusion process emphasize small object learning more and highlight the feature expression of tiny texts. In terms of post-processing, this paper proposes a differentiable binarization module, incorporating the binarization process into model training. Leveraging the implicit information in the data to drive model improvement can enhance the post-processing effect. Lastly, this paper proposes a scale-sensitive loss, which can handle tiny texts more fairly, fully considering the positional relationship between the predicted and real regions, and better guiding the model training. This paper proves that TiTDet exhibits high sensitivity and accuracy in detecting tiny texts, achieving an 86.0% F1-score on ICDAR2015. The paper also compares the superiority of the method on CTW1500 and Total-Text. Show more
Keywords: Tiny text detection, context extraction module, attention-guided module, effective fusion factor, scale-sensitive loss
DOI: 10.3233/JIFS-236317
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Pandiyarajan, Abinaya | Jagatheesaperumal, Senthil Kumar | Thayanithi, Manonmani
Article Type: Research Article
Abstract: This study explores how Electronic Health Records (EHR) might be transformed in the context of the rapid improvements in cloud computing and IoT technology. But worries about sensitive data security and access management when it moves to large cloud provider networks surface. Even if they are secure, traditional encryption techniques sometimes lack the granularity needed for effective data protection. We suggest the Secure Access Policy – Ciphertext Policy – Attribute-based Encryption (SAPCP-ABE) algorithm as a solution to this problem. This method ensures that only authorized users may access the necessary data while facilitating fine-grained encrypted data exchange. The three main …phases of SAPCP-ABE are retrieval and decoding, where the system verifies users’ access restrictions, secure outsourcing that prioritizes critical attributes, and an authenticity phase for early authentication. Performance tests show that SAPCP-ABE is a better scheme than earlier ones, with faster encryption and decryption speeds of 5 and 5.1 seconds for 512-bit keys, respectively. Security studies, numerical comparisons, and implementation outcomes demonstrate our suggested approach’s efficacy, efficiency, and scalability. Show more
Keywords: Attribute-based encryption, electronic health record, access policy, cloud providers, cloud computing
DOI: 10.3233/JIFS-240341
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Huang, Ying | Li, Lang | Li, Di | Li, Yongchao
Article Type: Research Article
Abstract: AND-Rotation-XOR (AND-RX) ciphers are known for its unique round function and excellent implementation performance. As a result, AND-RX ciphers are well suited for protecting sensitive information on resource-constrained devices. AND-RX ciphers need to be passed by rigorous cryptanalysis methods before practice. Integral cryptanalysis is one of the important cryptanalysis methods. MILP-based automated model is constructed to solve the integral cryptanalysis of AND-RX ciphers. The automated model usually consumes a long time when the block length and the number of round function components are large. In this paper, we design a neural distinguisher named IABC model for fast and efficient integral …cryptanalysis. The IABC model learns to distinguish between ciphertext multisets to construct an integral distinguisher for AND-RX cipher, which ciphertext multisets from plaintext or random plaintexts. The IABC model is used for SIMON, SIMECK and SAND ciphers, which validates the neural distinguisher for AND-RX ciphers. The experimental results show that the IABC model is capable of expanding the number of rounds of integral distinguishers for AND-RX ciphers with certain accuracy. Therefore, IABC model can be effectively used for integral cryptanalysis of AND-RX ciphers. In addition, we discover that a larger number of active bits in the plaintext multiset results in a more accurate IABC model. Show more
Keywords: AND-RX cipher, integral cryptanalysis, division property, neural distinguisher
DOI: 10.3233/JIFS-238122
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Ranjith, K. | Karthikeyan, K.
Article Type: Research Article
Abstract: The flow-shop scheduling problem (FSSP) has received a considerable amount of attention due to its wide-ranging applications. However, the omission of uncertainty significantly diminishes the practicality of scheduling results, underscoring its the necessity to address uncertainty in the flow shop problem. In this paper, a fuzzy two-machine flow-shop problem is considered and an effective algorithm with a fuzzy ranking method is proposed to minimize the total waiting time. The processing times are represented using trapezoidal membership functions. Furthermore, a two-stage flow shop scheduling problem is used in the proposed algorithm and various categories of fuzzy mean techniques. The experimental results …and statistical comparisons demonstrate that the proposed algorithm exhibits significant advantages in effectively solving the FFSSP (Fuzzy Flow-Shop Scheduling Problem). Show more
Keywords: Two-stage flow shop, trapezoidal fuzzy number, mean ranking techniques, waiting time
DOI: 10.3233/JIFS-235526
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Sageengrana, S. | Selvakumar, S.
Article Type: Research Article
Abstract: Distraction and fatigue are serious issues in online learning, and they directly impact educational outcomes. To achieve excellent academic achievement, students need to focus on their studies without being distracted or fatigued. Learners frequently overlook crucial information, directions, and concepts while they are passive and sleepy. They tend to miss important content, instructions, and concepts. Iris Angle Position (IAP) and electroencephalography (EEG) were used in this model to identify the behaviour of learners. Specifically, a Deep Convolutional Neural Network (DCNN) is constructed to extract IAP in order to accurately capture the learner’s facial area. EEG signals are effectively handled and …sorted using deep reinforcement learning (DRL). The learners’ facial landmarks are retrieved from a frame using the dlib toolbox. Only eye landmark points from face landmarks alone are focused on in order to determine the learner’s behaviour. When the learners EEG signals and Iris positions are monitored simultaneously, it’s helpful to identify the learner’s fatigue state (LFS) and the learner’s distraction state (LDS). The Brain Vision Algorithm (BVA) uses iris position and minimal facial landmarks, along with brain activity, to properly identify the learner’s level of distraction and exhaustion. When a student is detected as being preoccupied or sleepy, an alert goes off automatically, and the educator gets performance feedback. Iris position data and brain-computer interface-based EEG signal values are utilised to identify distraction and sleepiness. Comparative tests have demonstrated that this innovative method offers fast and high-accuracy student activity detection in virtual learning settings. Applying the suggested approach to different existing classifiers yields an F-Score of 91.92%, a recall of 93.87%, and a precision of 92.37% . The results showed that the detection rates for both distracted and sleepy phases were higher than those attained with other currently used techniques. Show more
Keywords: Drowsiness, online learning, iris position, EEG signals, distraction, brain vision algorithm
DOI: 10.3233/JIFS-237016
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Geetha, R. | Priya, E. | Sivakumar, Kavitha
Article Type: Research Article
Abstract: Purpose: Automated diagnosis of acute cerebral ischemic stroke lesions (ACISL) is an evolving science. Early detection and exact delineation of ACISL automatically from diffusion-weighted magnetic resonance (DWMR) images are crucial for initiating prompt treatment. Thus, this work aims to determine the appropriate slice out of 60 pieces using multi-fractal analysis (MFA) and to segment the lesions in DWMR images using a hybrid optimization method. Features extracted from the segmented images were clinically correlated with the modified Rankin Scale (mRS). Methods: Thirty-one real-time stroke patients’ images were collected from Rajiv Gandhi Government General Hospital, Chennai, India. Multiple …MRI slices were taken from each patient and filtered using an anisotropic diffusion filter (ADF). These filtered images were skull-stripped automatically by the maximum entropy thresholding technique incorporating mathematical morphological operations (MEM). The multi-fractal analysis (MFA) identifies the prominent slice with the significant infarct lesion. An isodata algorithm that integrated differential evolution with the particle swarm optimization method based on Kapur’s (IDPK) and Otsu’s (IDPO) approaches was attempted to segment the ACISL. Finally, the geometric and moment features extracted from the segmented lesions categorized the stroke severity and were correlated with the mRS. Results: The findings of the experimental work confirm that the suggested IDPK approach achieved usual normalized values for image similarity indices such as Sokal-Michener Coefficient (98.51%), Roger-Tanimoto Coefficient (90.16%), Sokel-Sneath-2 (91.04%), and Sorenson Index (90.04%) are superior to IDPO. Statistical significance proved that the segmented lesions’ area (r = 0.820, p < 0.0001) and perimeter (r = 0.928, p < 0.0001) were strongly correlated with the mild and moderate criteria of mRS. Conclusion: The proposed work effectively detected ischemic stroke lesions and their severity within the studied image groups. It could be a promising and potential tool to aid radiologists in validating their diagnosis. Show more
Keywords: Ischemic stroke lesion, magnetic resonance imaging, multi-fractal analysis, isodata algorithm, differential evolution with particle swarm optimization, modified Rankin Scale
DOI: 10.3233/JIFS-233883
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-19, 2024
Authors: Luo, Long
Article Type: Research Article
Abstract: This paper proposes a lightweight human action recognition algorithm for pedestrian behavior recognition. First, the skeleton feature information is input into the HRNet network model. In order to selectively enhance more details containing the target features and suppress irrelevant or weak features, an external attention mechanism is added to the HRN child model. Secondly, in order to extract the temporal characteristics of the target feature vector and ensure the continuity of actions in human behavior recognition, a dual-stream network based on HRNet and Long Short-Term Memory (LSTM) is constructed; finally, due to the huge model, it cannot be well transplanted …to embedded. Therefore, this paper uses depthwise separable convolution to lightweight the network model. The experimental results show that in terms of human behavior recognition, the method in this paper has better recognition accuracy than Two-stream, Multi-streamCNN, Cov3DJ, ConvNets, JTM, ASM-3, RF+SW, hd-CNN and TPSMMs. Show more
Keywords: External attention mechanism, lightweight, the network model, depthwise separable convolution, dual-stream network introduction
DOI: 10.3233/JIFS-239704
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Lavanya, J. | Kavi Priya, S.
Article Type: Research Article
Abstract: The paper addresses the optimization challenges in cloud resource task execution within the container paradigm, introducing the Multi-Objective Comprehensive Container Scheduling and Resource Allocation (MOCCSRA) scheme. It aims to enhance cost-effectiveness and efficiency by utilizing the Tuna Swarm Optimization (TSO) technique to optimize task planning and resource allocation. This novel approach considers various objectives for task scheduling optimization, including energy efficiency, compliance with service level agreements (SLAs), and quality of service (QoS) metrics like CPU utilization, memory usage, data transmission time, container-VM correlation, and container grouping. Resource allocation decisions are guided by the VM cost and task completion period factors. …MOCCSRA distinguishes itself by tackling the multi-objective optimization challenge for task scheduling and resource allocation, producing non-dominated Pareto-optimal solutions. It effectively identifies optimal tasks and matches them with the most suitable VMs for deploying containers, thereby streamlining the overall task execution process. Through comprehensive simulations, the results demonstrate MOCCSRA’s superiority over traditional container scheduling methods, showcasing reductions in resource imbalance and notable enhancements in response times. This research introduces an innovative and practical solution that notably advances the optimization field for cloud-based container systems, meeting the increasing demand for efficient resource utilization and enhanced performance in cloud computing environments. Show more
Keywords: Cloud container, task scheduling, resource allocation, DSTS, multi-objective optimization, tuna swarm optimizer, pareto optimality
DOI: 10.3233/JIFS-234262
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Su, Jiafu | Xu, Baojian | Liu, Hongyu | Chen, Yijun | Zhang, Xiaoli
Article Type: Research Article
Abstract: As an emerging concept in knowledge management (KM), green knowledge management plays a crucial role in the sustainable development of enterprises. A reasonable assessment of an enterprise’s green knowledge management capabilities can help the company effectively manage the embedded green knowledge within its operational processes, thereby achieving self-reinforcement of competitive advantages for the enterprise. Therefore, this paper proposes a multi-criteria classification method based on interval-valued intuitionistic fuzzy entropy weight method-TOPSIS-Sort-B (EWM-TOPSIS-Sort-B) to assess the green knowledge management capabilities of enterprises. In this method, expert assessments are expressed using interval-valued intuitionistic fuzzy sets. A new entropy weight method is introduced into …TOPSIS-Sort-B to determine the weights of various evaluation indicators, and TOPSIS-Sort-B is employed to classify and rate each evaluation scheme. It is worth noting that this paper has improved the TOPSIS-Sort-B method by not converting interval-valued intuitionistic fuzzy sets into precise values throughout the entire evaluation process, thus avoiding information loss. Finally, we applied a case of knowledge management capability assessment to validate the proposed method, and conducted sensitivity analysis and comparative analysis on this approach. The analysis results indicate that variations in the parameter ϑ of the interval-valued intuitionistic fuzzy aggregation operator lead to changes in criterion weights and the comprehensive evaluation matrix, resulting in unordered changes in the final classification results. Due to the absence of transformation of interval values in this study, compared to the four classification methods of TOPSISort-L, the classification results are more detailed, and the evaluation levels are more pronounced. Show more
Keywords: Interval-valued intuitionistic fuzzy set, TOPSIS-Sort-B, entropy weight method, green knowledge management capability
DOI: 10.3233/JIFS-239001
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-19, 2024
Authors: Xiao, Le | Chen, Xiaolin | Shan, Xin
Article Type: Research Article
Abstract: News summary generation is an important task in the field of intelligence analysis, which can provide accurate and comprehensive information to help people better understand and respond to complex real-world events. However, traditional news summary generation methods face some challenges, which are limited by the model itself and the amount of training data, as well as the influence of text noise, making it difficult to generate reliable information accurately. In this paper, we propose a new paradigm for news summary generation using Large Language Model(LLM) with powerful natural language understanding and generative capabilities. We also designed News Summary Generator (NSG), …which aims to select and evolve the event pattern population and generate news summaries, so that using LLM extracts structured event patterns from events contained in news paragraphs, evolves the event pattern population using a genetic algorithm, and selects the most adaptive event patterns to input into LLM in order to generate news summaries. The experimental results show that the news summary generator is able to generate accurate and reliable news summaries with some generalization ability. Show more
Keywords: News summary generation, large language model, genetic algorithm, evolution
DOI: 10.3233/JIFS-237685
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Zheng, Quanchang
Article Type: Research Article
Abstract: We investigate the semi-online problem of MapReduce scheduling on two parallel machines. We aim to minimize the makespan. Jobs are released over-list, and each job includes a map task and a reduce task. The job’s map task can be preemptive and scheduled simultaneously onto different machines, however, the reduce task is non-preemptive. The job’s reduce task needs to wait for its map task to complete before starting. We consider the following two versions: Firstly, we know the processing time of the largest reduce task beforehand, and then design a 4/3-competitive optimal semi-online algorithm. Secondly, we know in advance the value …of the reduce task with the largest processing time and the the total sum of the processing times. Then we present a 4/3-competitive semi-online algorithm. We conclude that the algorithm is the best possible when the largest reduce task meets certain conditions. Show more
Keywords: MapReduce system, semi-online, scheduling, competitive ratio, makespan
DOI: 10.3233/JIFS-239276
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Cui, Jinrong | Sun, Haosen | Kuang, Ciwei | Xu, Yong
Article Type: Research Article
Abstract: Effective fire detection can identify the source of the fire faster, and reduce the risk of loss of life and property. Existing methods still fail to efficiently improve models’ multi-scale feature learning capabilities, which are significant to the detection of fire targets of various sizes. Besides, these methods often overlook the accumulation of interference information in the network. Therefore, this paper presents an efficient fire detection network with boosted multi-scale feature learning and interference immunity capabilities (MFII-FD). Specifically, a novel EPC-CSP module is designed to enhance backbone’s multi-scale feature learning capability with low computational consumption. Beyond that, a pre-fusion module …is leveraged to avoid the accumulation of interference information. Further, we also construct a new fire dataset to make the trained model adaptive to more fire situations. Experimental results demonstrate that, our method obtains a better detection accuracy than all comparative models while achieving a high detection speed for video in fire detection task. Show more
Keywords: Object detection, fire detection, efficient, multi-scale feature learning, interference immunity
DOI: 10.3233/JIFS-238164
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Lu, Mingzhen
Article Type: Research Article
Abstract: The idea of sustainable development has become more important in resolving environmental issues and fostering a healthy coexistence of human endeavors with the natural world. Internet of Things (IoT) technology is expanding across many industries, and it is also advancing in agriculture and the agricultural environment. The planning and design for intelligent gardens using a unique Sunflower Optimized-Enhanced Support Vector Machine (SFO-ESVM) is thoroughly analyzed and researched in this study. The development and plan of intelligent gardens are investigated using agricultural IoT technologies and agricultural landscapes. First, we used the SFO method to select the best garden plan inspired by …the mathematical patterns observed in sunflower seed groupings. Next, we use an ESVM model to assess how well each plant species fits into the planned garden. The SFO-ESVM considers several variables, such as soil qualities, climatic information, plant traits, and ecological requirements, to choose the best plants. Additionally, we create an intelligent control system that combines sensors, actuators, and IoT technologies to track and regulate the environmental parameters of the garden. The SFO-ESVM-based conceptual planning and design framework for smart gardens is proposed and systematically extended to give scientific direction for the agricultural IoT of smart gardens. The proposed method was then tested in a real-world garden environment. The outcomes show that the SFO-ESVM framework-based intelligent design and execution of the sustainable development-oriented garden combines ecological principles with innovative optimization methods. Show more
Keywords: Intelligent design and realization, garden, internet of things (IoT), sustainable development, sunflower optimized-enhanced support vector machine (SFO-ESVM)
DOI: 10.3233/JIFS-234540
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: He, Shun | Li, Chaorong | Wang, Xingjie | Zeng, Anping
Article Type: Research Article
Abstract: This paper proposes a watermarking method that can be used for the copyright protection of DNN models, utilizing learnable block-wise image transformation techniques and a secret key to embed a watermark. A black-box watermarking approach is used, which does not require a specific predefined training or trigger set, allowing for the remote verification of model ownership. As a result, this method can achieve copyright protection using authentication methods for DNN models. Results of experiments on established datasets [1, 2 ] indicate that the original watermark is not easily overwritten by pirated watermarks. Moreover, its performance in pruning attack experiments is …similar to that observed in the studies cited above. However, our approach demonstrates stronger robustness against fine-tuning attacks, while also achieving higher image classification accuracy. Show more
Keywords: DNN watermark, block-wise image transformation, black-box watermark, robustness
DOI: 10.3233/JIFS-240274
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Han, Xinyue | Yao, Wei
Article Type: Research Article
Abstract: The aim of this paper is to present basic concepts of lattice-valued fuzzy mathematical morphology. We use a complete residuated lattice as the codomain of fuzzy sets, a pair of fuzzy powerset operators, called the fuzzy erosion operator and the fuzzy dilation operator, is defined and their properties and relationships are studied. The pair of two operators forms a Galois adjunction and so that the induced fuzzy opening operator and fuzzy closing are an interior operator and a closure operator respectively. It is shown that the dilation stable sets and the erosion stable sets are equivalent, which form a fuzzy …Alexandrov topology. Show more
Keywords: Fuzzy mathematical morphology, complete residuated lattice, fuzzy dilation, fuzzy erosion, dilation stable set, erosion stable set, fuzzy Alexandrov topology
DOI: 10.3233/JIFS-238540
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Long, Huimin | Zheng, Hang | Chen, Ming | Liu, Chengjian
Article Type: Research Article
Abstract: The detection of communication signals in heterogeneous electromagnetic environments currently relies primarily on a one-dimensional statistical feature threshold method. However, this approach is highly sensitive to dynamic changes in the environment, fluctuations in signal-to-noise ratios, and complex noise. To address these limitations, this paper proposes a novel time-frequency diagram based on high-order accumulation for signal detection. Traditional time-frequency diagrams suffer from poor noise suppression ability and unclear features. However, higher-order cumulants can effectively overcome these shortcomings. Currently, methods based on higher-order cumulants are typically limited to one-dimensional signals. Yet, two-dimensional time-frequency signal diagrams can represent a broader array of features. …This paper employs higher-order accumulation to extract time-frequency features from the received signal, thereby transforming the conventional radio detection problem into an image recognition challenge. By merging the advantages of higher-order accumulations and time-frequency diagrams, we propose the use of higher-order accumulation time-frequency diagrams for signal detection. Extensive experimental simulations demonstrate that the proposed time-frequency diagram exhibits strong anti-noise performance and effectively suppresses frequency bias from multiple perspectives. The performance of the Higher-Order Cumulant-Time Frequency (HOC-TF) indicated lower Root Mean Square Error (RMSE) compared with the Short-Time Fourier Transform-Time Frequency (STFT-TF) and Wavelet Transform-Time Frequency (WT-TF). Additionally, compared to the STFT-TF and WT-TF methodologies, the novel time-frequency diagram introduced demonstrates superior stability using the Singular Value Decomposition (SVD) method. Moreover, by combining the new time-frequency diagram with the deep learning YOLOV5 network, signal detection and modulation identification of communication signals can be achieved. Show more
Keywords: Signal detection, higher-order cumulant, novel time-frequency diagram
DOI: 10.3233/JIFS-237988
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Ruth Isabels, K. | Arul Freeda Vinodhini, G. | Anandan, Viswanathan
Article Type: Research Article
Abstract: This work tackles the problem of maximizing machining parameters to improve the strength and resilience of 17-4 precipitation hardening (17-4 PH SS) stainless steel, which is renowned for its strong ductility but challenging machinability. We investigate different turning input parameter combinations and machining environments (dry, oil, ionic liquid), focusing on cutting temperature and flank wear as critical parameters. We analyze eighteen experimental outcomes using a VIKOR multi-criteria decision-making (MCDM) technique using CRITIC and intuitionistic fuzzy VIKOR. Expert analyses emphasize how important the machining environment is, especially when using ionic liquids (IL). Expert preferences are taken into consideration as the hybrid …CRITIC intuitionistic fuzzy R-VIKOR technique balances flank wear and cutting temperature. Criteria similarity is evaluated by the Jaccard distance coefficient, but opponent’s subjective regret and group utility are given priority in the R-VIKOR method. Compromise values are determined by an enhanced normalization technique, and parameter analysis shows that the approach is more accurate and effective than previous ones. The machining parameters for (17-4 PH SS) are being optimized by this research, which is important for businesses that need high-performance materials with intricate machining requirements. Show more
Keywords: Cutting temperature, flank wear, CRITIC, IF R-VIKOR MCDM, Jaccard coefficient
DOI: 10.3233/JIFS-241509
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Sheng, Wenshun | Shen, Jiahui | Huang, Qiming | Liu, Zhixuan | Ding, Zihao
Article Type: Research Article
Abstract: A real-time stable multi-target tracking method based on the enhanced You Only Look Once-v8 (YOLOv8) and the optimized Simple Online and Realtime Tracking with a Deep association metric (DeepSORT) for multi-target tracking (S-YOFEO) is proposed with the aim of addressing the issue of target ID transformation and loss caused by the increase of practical background complexity. For the purpose of further enhancing the representation of small-scale features, a small target detection head is first introduced to the detection layer of YOLOv8 in this paper with the aim of collecting more detailed information by increasing the detection resolution of YOLOv8. Secondly, …the Omni-Scale Network (OSNet) feature extraction network is implemented to enable accurate and efficient fusion of the extracted complex and comparable feature information, taking into account the restricted computational power of DeepSORT’s original feature extraction network. Again, a novel adaptive forgetting Kalman filter algorithm (FSA) is devised to enhance the precision of model prediction and the effectiveness of parameter updates to adjust to the uncertain movement speed and trajectory of pedestrians in real scenarios. Following that, an accurate and stable association matching process is obtained by substituting Efficient-Intersection over Union (EIOU) for Complete-Intersection over Union (CIOU) in DeepSORT to boost the convergence speed and matching effect during association matching. Last but not least, One-Shot Aggregation (OSA) is presented as the trajectory feature extractor to deal with the various noise interferences in the complex scene. OSA is highly sensitive to information of different scales, and its one-time aggregation property substantially decreases the computational overhead of the model. According to the trial results, S-YOFEO has made some developments as its precision can reach 78.2% and its speed can reach 56.0 frames per second (FPS). Show more
Keywords: Pedestrian tracking, YOLOv8, DeepSORT, association matching
DOI: 10.3233/JIFS-237208
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Tino Merlin, R. | Ravi, R.
Article Type: Research Article
Abstract: This study introduces a tailored data acquisition and communication framework for IoT smart applications, focusing on enhancing efficiency and system performance. The proposed Quality-Driven IoT Routing (EQR-SC) for smart cities utilizes IoT-enabled wireless sensor networks. Additionally, a noteworthy contribution is the introduction of the Chaotic Firefly Optimization (CFOA) algorithm for IoT sensor cluster formation, potentially optimizing the organization and efficiency of IoT sensor networks in smart cities. Trust-based cluster Head Selection is enhanced by employing the Weighted Clustering Algorithm (WCA), which assigns weights to nodes based on trustworthiness and relevant metrics to select reliable cluster heads. The proposal of a …lightweight data encryption technique enhances data security among IoT sensors, ensuring the privacy and integrity of transmitted information. To optimize pathfinding within the IoT platform, the research employs the Bellman-Ford algorithm, ensuring efficient data routing while accommodating negative edge weights when necessary. Finally, a thorough performance analysis, conducted through network simulation (NS2), provides insights into the effectiveness of the proposed OQR-SC technique, allowing for valuable comparisons with existing state-of-the-art methods. Show more
Keywords: QoS, IoT smart applications, wireless sensor networks
DOI: 10.3233/JIFS-240308
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Deng, Lulu | Zhang, Changlun | He, Qiang | Wang, Hengyou | Huo, Lianzhi | Mu, Haibing
Article Type: Research Article
Abstract: The semantic segmentation of high-resolution remote sensing images has broad application prospects in land cover classification, road extraction, urban planning and other fields. To alleviate the influence of the large data volume and complex background of high-resolution remote sensing images, the usual approach is to downsample them or cut them into small pieces for separate processing. Even if combining the two methods can improve the segmentation efficiency, it ignores the differences between the middle and the edge regions. Therefore, we consider the characteristics of large and irregular region in high-resolution remote sensing images, and then propose an irregular adaptive refinement …network to locate the irregular edge region, which will be refined adaptively. Specifically, on the basis of effectively preserving the global and local information, the prediction confidence is calculated to locate pixel points that are poorly segmented, so as to form irregular regions requiring further refinement, avoiding to ‘over-refine’ intermediate region with good segmentation. At the same time, considering the difference in the refinement degree of different pixels, we propose to adaptively integrate the local segmentation results to refine the coarse segmentation results. In addition, in order to bridge the gap between the two extreme ends of the scale space, we introduce a multi-scale framework. Finally, we conducted experiments on the Deepglobe dataset showing that the proposed method performed 0.37% to 0.87% better than the previous state-of-the-art methods in terms of mean Intersection over Union (mIoU). Show more
Keywords: High spatial resolution, remote sensing image, semantic segmentation, adaptive
DOI: 10.3233/JIFS-232958
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Manju, S.C. | Swarnajyothi, K. | Geetha, J. | Somasundaram, K.
Article Type: Research Article
Abstract: The Padmakar-Ivan (PI) index of a connected graph G is given by PI (G ) = ∑e =(u ,v )∈E (G ) (|V (G ) | - N G (e )) and weighted Padmakar-Ivan index is PI w (G ) = ∑e =(u ,v )∈E (G ) (d G (u ) + d G (v )) (|V (G ) | - N G (e )) . In this paper, we present the PI index for various classes of perfect graphs, including block graphs, the line graph of unicyclic graphs, and split graphs. The theorems established in this study are applied to ascertain the PI index of chain and …cyclic silicates. Furthermore, we derive both the PI and weighted PI indices for the lexicographic product of two regular graphs and determine the exact values for the lexicographic product involving a regular graph and a complete multipartite graph. Show more
Keywords: PI index, weighted pi index, perfect graphs, block graphs, lexicographic product, regular graphs, chain and cyclic tetrahedral frameworks
DOI: 10.3233/JIFS-238204
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Chen, Jiankai | Li, Zhongyan | Wang, Xin | Zhai, Junhai
Article Type: Research Article
Abstract: Monotonic classification is a widely applied classification task where improvements in specific input values do not lead to worse outputs. Monotonic classifiers based on K-nearest neighbors (KNN) have become crucial tools for addressing such tasks. However, these models share drawbacks with traditional KNN classifiers, including high computational complexity and sensitivity to noise. Fuzzy Monotonic K-Nearest Neighbors (FMKNN) is currently the state-of-the-art KNN-based monotonic classifier, mitigating the impact of noise to some extent. Nevertheless, there is still room for improvement in reducing computational complexity and softening monotonicity in FMKNN. In this paper, we propose a prototype selection algorithm based on FMKNN, …named Condensed Fuzzy Monotonic K-Nearest Neighbors (C -FMKNN). This algorithm achieves a dynamic balance between monotonicity and test accuracy by constructing a joint evaluation function that combines fuzzy ranking conditional entropy and correct prediction. Data reduction and simplifying computations can be achieved by using C -FMKNN to filter out instance subsets under the adaptive dynamic balance between monotonicity and test accuracy. Extensive experiments show that the proposed C -FMKNN improves significantly in terms of ACCU, MAE and NMI compared with the involved KNN-based non-monotonic algorithms and non-KNN monotonic algorithms. Compared with the instance selection algorithms MCNN, MENN, and MONIPS, C -FMKNN improves the average values of ACCU, MAE, and NMI by 3.7%, 3.6% and 18.3%, respectively, on the relevant datasets. In particular, compared with the benchmark algorithm FMKNN, C -FMKNN achieves an average data reduction rate of 58.74% while maintaining or improving classification accuracy. Show more
Keywords: Monotonic classification, fuzzy monotonic K-nearest neighbor, fuzzy ranking conditional entropy, joint evaluation function, data reduction
DOI: 10.3233/JIFS-236643
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-22, 2024
Authors: Vimala, S. | Valarmathi, K.
Article Type: Research Article
Abstract: This study proposes a novel method using hybrid CNN-LSTM networks to measure and predict the effectiveness of speech and vision therapy. Traditional methods for evaluating therapy often rely on subjective assessments, lacking precision and efficiency. By combining CNN for visual data and MFCC for speech, alongside LSTM for temporal dependencies, the system captures dynamic changes in patients’ conditions. Pre-processing of audio and visual data enhances accuracy, and the model’s performance outperforms existing methods. This approach exhibits the potential of deep learning in monitoring patient progress effectively in speech and vision therapy, offering valuable insights for improving treatment outcomes. The proposed …system’s effectiveness is assessed by various performance metrics. The suggested system’s results are compared with those of other methods already in use. The study’s findings indicate that the suggested approach is more accurate than other existing models. In conclusion, this study offers important new information on how deep learning methods are being used to track patients’ progress in speech and vision therapy. Show more
Keywords: Monitor, speech and vision, deep learning, therapy patient, recording device, CNN-LSTM, categorization
DOI: 10.3233/JIFS-237363
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]