Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2023: 2
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Pillai, Leena G. | Muhammad Noorul Mubarak, D. | Sherly, Elizabeth
Article Type: Research Article
Abstract: Speech production is a complex sequential process which involve the coordination of various articulatory features. Among them tongue being a highly versatile active articulator responsible for shaping airflow to produce targeted speech sounds that are intellectual, clear, and distinct. This paper presents a novel approach for predicting tongue and lip articulatory features involved in a given speech acoustics using a stacked Bidirectional Long Short-Term Memory (BiLSTM) architecture, combined with a one-dimensional Convolutional Neural Network (CNN) for post-processing with fixed weights initialization. The proposed network is trained with two datasets consisting of simultaneously recorded speech and Electromagnetic Articulography (EMA) datasets, each …introducing variations in terms of geographical origin, linguistic characteristics, phonetic diversity, and recording equipment. The performance of the model is assessed in Speaker Dependent (SD), Speaker Independent (SI), corpus dependent (CD) and cross corpus (CC) modes. Experimental results indicate that the proposed model with fixed weights approach outperformed the adaptive weights initialization with in relatively minimal number of training epochs. These findings contribute to the development of robust and efficient models for articulatory feature prediction, paving the way for advancements in speech production research and applications. Show more
Keywords: Acoustic-to-articulatory inversion, smoothing techniques, articulatory features, weight initialization, bidirectional long short-term memory
DOI: 10.3233/JIFS-219386
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Sheshadri, Shailashree K. | Gupta, Deepa
Article Type: Research Article
Abstract: Non-Autoregressive Machine Translation (NAT) represents a groundbreaking advancement in Machine Translation, enabling the simultaneous prediction of output tokens and significantly boosting translation speeds compared to traditional auto-regressive (AR) models. Recent NAT models have adeptly balanced translation quality and speed, surpassing their AR counterparts. The widely employed Knowledge Distillation (KD) technique in NAT involves generating training data from pre-trained AR models, enhancing NAT model performance. While KD has consistently proven its empirical effectiveness and substantial accuracy gains in NAT models, its potential within Indic languages has yet to be explored. This study pioneers the evaluation of NAT model performance for Indic …languages, focusing mainly on Kashmiri to English translation. Our exploration encompasses varying encoder and decoder layers and fine-tuning hyper-parameters, shedding light on the vital role KD plays in facilitating NAT models to capture variations in output data effectively. Our NAT models, enhanced with KD, exhibit sacreBLEU scores ranging from 16.20 to 22.20. The Insertion Transformer reaches a SacreBLEU of 22.93, approaching AR model performance. Show more
Keywords: Neural machine translation, auto-regressive translation, non-autoregressive translation, Levenshtein Transformer, insertion transformer, knowledge distillation
DOI: 10.3233/JIFS-219383
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Bai, Xiaojun | Jia, Haiyang | Fu, Yanfang | Ji, Yu | Li, Suyang
Article Type: Research Article
Abstract: Predicting the remaining life of aircraft engines is paramount in aviation maintenance management. It helps formulate maintenance schedules, reduce maintenance expenses, and enhance flight safety. Traditional methods for predicting the remaining life of an engine suffer from significant errors and limited generalization capabilities. This paper introduces a predictive model based on Long Short-Term Memory (LSTM) networks and Feedforward Neural Networks (FNN) to improve prediction accuracy. Furthermore, the model’s hyperparameters undergo optimization using the Gannet Optimization Algorithm (GOA). Leveraging the N-CMAPSS dataset for prediction and transfer learning experiments, the results highlight the significant advantages of the proposed model in forecasting the …remaining life of aircraft engines. When subjected to training and testing on the DS02 equipment dataset, the root mean square error (RMSE) registers at 5.04. At that time, the score function reached a value of 1.39, surpassing the performance of current state-of-the-art prediction methods. Additionally, in terms of its transfer learning capabilities, the model demonstrates minimal fluctuations in RMSE when applied directly to datasets of various other engine models. It consistently maintains a high level of predictive accuracy. Show more
Keywords: Remaining life prediction, N-CMAPSS dataset, long short-term memory network, Gannet Optimization Algorithm (GOA)
DOI: 10.3233/JIFS-236225
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Anbumani, A. | Jayanthi, P.
Article Type: Research Article
Abstract: GLOBOCAN 2020 states that, after lung cancer, breast cancer is the most common cancer worldwide, affecting many women [1 ]. AI-based computer-assisted detection/diagnosis techniques can assist radiologists in diagnosing breast cancer earlier. Mammography is one of the most widely used and effective methods for detecting and treating breast cancer. This research proposes a customised deep-learning model for breast cancer categorization. To effectively categorise the breast cancer mammography image, two customised CNN models are proposed. Three real-time datasets such as MIAS, CBIS-DDSM, and INbreast were used to evaluate the efficacy of the proposed categorization strategy. The results show that the proposed …method effectively classifies the image and obtains 98.78%, 97.84% and 96.92% accuracy for the datasets MIAS, INbreast and CBIS-DDSM. Show more
Keywords: Breast cancer, CNN, deep learning, mammography, classification
DOI: 10.3233/JIFS-232896
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Cruz, Elsy | Santos, Lourdes | Calvo, Hiram | Anzueto-Rios, Álvaro | Villuendas-Rey, Yenny
Article Type: Research Article
Abstract: In recent years, multiple studies have highlighted the growing correlation between breast density and the risk of developing breast cancer. In this research, the performance of two convolutional neural network architectures, VGG16 and VGG19, was evaluated for breast density classification across three distinct scenarios aimed to compare the masking effect on the models performance. These scenarios encompass both binary classification (fatty and dense) and multi-class classification based on the BI-RADS categorization, utilizing a subset of the ABC-Digital Mammography Dataset. In the first experiment, focusing on cases with no masses, VGG16 achieved an accuracy of 93.33% and 90.00% for two and …four-class classification. The second experiment, which involved cases with benign masses, yielded a remarkable accuracy of 95.83% and 93.33% with VGG16, respectively. In the third and last experiment, an accuracy of 88.00% was obtained using VGG16 for the two-class classification, while VGG19 delivered an accuracy of 93.33% for the four-class classification. These findings underscore the potential of deep learning models in enhancing breast density classification, with implications for breast cancer risk assessment and early detection. Show more
Keywords: Mammography, breast tissue density, convolutional neural networks
DOI: 10.3233/JIFS-219378
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-9, 2024
Authors: Zheng, Z. | Gao, J.B. | Weng, Z.
Article Type: Research Article
Abstract: The body size parameter of cattle is an important index reflecting the growth and development and health condition of cattle. The traditional manual contact measurement is not only a large workload and difficult to measure, but also prone to problems such as affecting the normal life habits of cattle. In this paper, we address this problem by proposing a contactless body size measurement method for cattle based on machine vision. Firstly, the cattle is confined to a fixed space using a position-limiting device, and images of the body of the cattle are taken from three directions: top, left, and right, …using multiple cameras. Secondly, the image is segmented using a fuzzy clustering algorithm based on neighborhood adaptive local spatial information improvement, and the image is processed to extract the contour images of the top view and side view. The key points of body measurements were extracted using interval division and curvature calculation for the side view images, and the key point information was extracted using skeleton extraction and pruning for the top view images, which realized the measurements of body height(BH), rump height(RH), body slanting length(BSL), and abdominal circumference(AC) parameters of the cattle. The correlation between body size and weight data obtained by contactless methods was investigated and the modeled using one-factor linear regression, one-factor nonlinear regression, multivariate stepwise regression, RBF network fitting, BP neural network fitting, support vector machine, and particle swarm optimization-based support vector machine methods, respectively. Information on body size parameters was collected from 137 cattles, and the results showed that the maximum errors between the measured and actual values of BH, RH, BSL and AC were 5.0%, 4.4%, 3.6%, and 5.5%, respectively. Correlation of BH, RH, BSL and AC with weight obtained by non-contact methods was > 0.75. The BH parameter can be selected in the single-factor growth monitoring. The multi-body scale can reflect the growth status of cattle more comprehensively, in which RH, BSL and AC are important detection parameter; the multi-factor nonlinear model can reflect the growth characteristics of cattle more comprehensively. The contactless measurement method proposed in the paper can effectively improve the work efficiency and reduce the stress reaction of cattle, which is a long-term and effective monitoring method, and is of great significance in promoting accurate and welfare cattle rearing. Show more
Keywords: Image processing, body size measurement, fuzzy clustering, non-contact measurement, cattle weight estimation
DOI: 10.3233/JIFS-238016
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Vidhya, S.S. | Mathi, Senthilkumar | Anantha Narayanan, V. | Neelakanta Iyer, Ganesh
Article Type: Research Article
Abstract: The Internet of Things lies in establishing low-power and lossy networks created by interconnecting many wireless devices with limited resources. Fascinatingly, an IPv6 routing protocol for low-power and lossy networks has become a common practice for these applications. Even though this protocol addresses the challenges of low-power networks, many issues concerning the quality of service and energy consumption are open to the research community. The protocol relies on a destination-oriented directed acyclic graph, and the root selection depends on some constraints and metrics associated with an objective function (OF). The conventional OFs select parents based on a single metric, such …as the expected transmission count or the number of nodes to travel. The current paper proposes an enhancement to the OF metric, aiming to decrease node energy and enhance the quality of service. This improvement is achieved by the factors, including the received signal strength indicator, node distance, power, link quality indicator, and expected transmission count, to select reliable communication links. The minimum power needed for reliable communication is predicted from the received signal strength indicator, node distance, receiver power, and link quality indicator using a nonlinear support vector machine. The OF value of the candidate node is computed from the power level and expected transmission count combined using the Takagi-Sugeno fuzzy model. The proposed OF is implemented in the Cooja simulator and compared against minimum rank with hysteresis OF and OF zero. A considerable improvement in the packet delivery ratio and a 37.5% reduction in energy consumption is obtained. Show more
Keywords: Classification, fuzzification, power prediction, received signal strength indicator, transmission power, link quality indicator, low power networks, TSK fuzzy model
DOI: 10.3233/JIFS-219420
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Mathi, Senthilkumar | Ramalingam, Venkadeshan | Sree Keerthi, Angara Venkata | Abhirup, Kothamasu Ganga | Sreejith, K. | Dharuman, Lavanya
Article Type: Research Article
Abstract: Long-term evolution in wireless broadband communication aims to provide secure communication for users and a high data rate for a fourth-generation network. Even though the fourth-generation network provides security, some loopholes lead to several attacks on the fourth-generation network attacks. The denial-of-service attack occurs when the user communicates with a rogue base station, and the radio base station in fourth-generation long-term evolution networks ensures that the user is attached to the rogue node assigned network. The location leak attack occurs when the packets are sniffed to find any user’s location using its temporary mobile subscriber identity. Prevention of rogue base …station and location leak attacks helps the system achieve secure communication between the participating entities. Earlier works in long-term evolution mobility management do not address preventing attacks such as denial-of-service, rogue base stations and location leaks and suffer from computational costs while providing security features. Hence, the present paper addresses the vulnerability of these attacks. It also investigates how these attacks occur and exposes communication in the fourth-generation network. To mitigate these vulnerabilities, the paper proposes a novel authentication scheme. The proposed scheme is simulated using Network Simulator 3, and the security analysis of the proposed scheme is shown using AVISPA –a security tool. Numerical analysis demonstrates that the proposed scheme significantly reduces communication overhead and computational costs associated with the fourth-generation long-term evolution authentication mechanism. Show more
Keywords: Authentication, long-term evolution, denial-of-service, attack, location leak, confidentiality
DOI: 10.3233/JIFS-219406
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Zheng, Lina | Wang, Yini | Wang, Sichun
Article Type: Research Article
Abstract: Due to the relatively high cost of labeling data, only a fraction of the available data is typically labeled in machine learning. Some existing research handled attribute selection for partially labeled data by using the importance of an attribute subset or uncertainty measure (UM). Nevertheless, it overlooked the missing rate of labels or the choice of the UM with optimal performance. This study uses discernibility relation and the missing rate of labels to UM for partially labeled data and applies it to attribute selection. To begin with, a decision information system for partially labeled data (pl-DIS) can be used to …induce two equivalent decision information systems (DISs): a DIS is constructed for labeled data (l-DIS), and separately, another DIS is constructed for unlabeled data (ul-DIS). Subsequently, a discernibility relation and the percentage of missing labels are introduced. Afterwards, four importance of attribute subset are identified by taking into account the discernibility relation and the missing rate of labels. The sum of their importance, which is determined by the label missing rates of two DISs, is calculated by weighting each of them and adding them together. These four importance may be seen as four UMs. In addition, numerical simulations and statistical analyses are carried out to showcase the effectiveness of four UMs. In the end, as its application for UM, the UM with optimal performance is used to attribute selection for partially labeled data and the corresponding algorithm is proposed. The experimental outcomes demonstrate the excellence of the proposed algorithm. Show more
Keywords: Partially labeled data, pl-DIS, uncertainty measure, attribute selection, the missing rate of labels, discernibility relation
DOI: 10.3233/JIFS-240581
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Rao, Vishisht Srihari | Vinay, P. | Uma, D.
Article Type: Research Article
Abstract: A hazy image is characterized by atmospheric conditions that reduce the image’s clarity and contrast, thereby making it less visible. This degradation in image quality can hinder the performance of advanced computer vision tasks such as object detection and identifying open spaces which need to perform with high accuracy in important real world applications such as security surveillance and autonomous driving. In the recent past, the use of deep learning in image processing tasks have shown a remarkable improvement in performance, in particular, Convolutional Neural Networks (CNNs) perform superior to any other type of neural network in image related tasks. …In this paper, we propose the addition of Channel Attention and Pixel Attention layers to four state-of-the-art CNNs, namely, GMAN, U-Net, 123-CEDH and DMPHN, used for the task of image dehazing. We show that the addition of these layers yields a non-trivial improvement on the quality of the dehazed images which we show qualitatively with examples and quantitatively by obtaining PSNR and SSIM scores of 28.63 and 0.959 respectively. Through the experiments, we show that the addition of the mentioned attention layers to the GMAN architecture yields the best results. Show more
Keywords: Dehazing, deep neural network, convolutional neural network, attention
DOI: 10.3233/JIFS-219391
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Agrawalla, Bikash | Shukla, Alok Kumar | Tripathi, Diwakar | Singh, Koushlendra Kumar | Ramachandra Reddy, B.
Article Type: Research Article
Abstract: Software fault prediction, which aims to find and fix probable flaws before they appear in real-world settings, is an essential component of software quality assurance. This article provides a thorough analysis of the use of feature ranking algorithms for successful software failure prediction. In order to choose and prioritise the software metrics or qualities most important to fault prediction models, feature ranking approaches are essential. The proposed focus on applying an ensemble feature ranking algorithm to a specific software fault dataset, addressing the challenge posed by the dataset’s high dimensionality. In this extensive study, we examined the effectiveness of multiple …machine learning classifiers on six different software projects: jedit, ivy, prop, xerces, tomcat, and poi, utilising feature selection strategies. In order to evaluate classifier performance under two scenarios—one with the top 10 features and another with the top 15 features—our study sought to determine the most relevant features for each project. SVM consistently performed well across the six datasets, achieving noteworthy results like 98.74% accuracy on “jedit” (top 10 features) and 91.88% on “tomcat” (top 10 features). Random Forest achieving 89.20% accuracy on the top 15 features, on “ivy.” In contrast, NB repeatedly recording the lowest accuracy rates, such as 51.58% on “poi” and 50.45% on “xerces” (the top 15 features). These findings highlight SVM and RF as the top performers, whereas NB was consistently the least successful classifier. The findings suggest that the choice of feature ranking algorithm has a substantial impact on the fault prediction models’ predictive accuracy and effectiveness. When using various ranking systems, the research also analyses the trade-offs between computing complexity and forecast accuracy. Show more
Keywords: Software fault prediction, ensemble techniques, feature ranking, random forests, support vector machine
DOI: 10.3233/JIFS-219431
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Su, Xue | Chen, Lijun
Article Type: Research Article
Abstract: Incomplete real-valued data often misses some labels due to the high cost of labeling data. This paper investigates for partially labeled incomplete real-valued data and considers its application in semi-supervised attribute reduction. There are two decision information systems (DISs) in a partially labeled incomplete real-valued data DIS (p-IRVDIS): a labeled incomplete real-valued data DIS (l-IRVDIS) and a unlabeled incomplete real-valued data DIS (u-IRVDIS). The degree of importance on an attribute subset in a p-IRVDIS are defined using an indistinguishable relation and conditional information entropy. It is the weighted sum of l-IRVDIS and u-IRVDIS using the missing rate of label to …measure p-IRVDIS uncertainty. Based on the degree of importance, an adaptive semi-supervised attribute reduction algorithm in a p-IRVDIS is proposed. This algorithm can automatically adapt to various missing rates of label. The experimental results on 8 datasets reveal that the proposed algorithm performs statistically better than some state-of-the-art algorithms. Show more
Keywords: p-IRVDIS, the degree of importance, semi-supervised attribute reduction, indiscernibility relation, conditional information entropy
DOI: 10.3233/JIFS-239559
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Tahir Kidwai, Umar | Akhtar, Nadeem | Nadeem, Mohammad | Alroobaea, Roobaea Salim
Article Type: Research Article
Abstract: In recent years, the surge in online content has necessitated the development of intelligent recommender systems capable of offering personalized suggestions to users. However, these systems often encapsulate users within a “filter bubble”, limiting their exposure to a narrow range of content. This study introduces a novel approach to address this issue by integrating a novel diversity module into a knowledge graph-based explainable recommender system. Utilizing the Movie Lens 1M dataset, this research pioneers in fostering a more nuanced and transparent user experience, thereby enhancing user trust and broadening the spectrum of recommendations. Looking ahead, we aim to further refine …this system by incorporating an explicit feedback loop and leveraging Natural Language Processing (NLP) techniques to provide users with insightful explanations of recommendations, including a comprehensive analysis of filter bubbles. This initiative marks a significant stride towards creating a more inclusive and informed recommendation landscape, promising users not only a wider array of content but also a deeper understanding of the recommendation mechanisms at play. Show more
Keywords: Recommender system, explainable recommendations, filter bubble, knowledge graph, diversity
DOI: 10.3233/JIFS-219416
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Li, Xin | Hao, Miao | Ru, Changhai | Wang, Yong | Zhu, Junhui
Article Type: Research Article
Abstract: With the development of science and technology, people have higher and higher requirements for robots. The application of robots in industrial production is also increasing, and there are more applications in people’s lives. Therefore, robots must have a better ability to receive and process the external environment. Therefore, visual servo system appears. Pose estimation is a major problem in the current vision system. It has great application value in positioning and navigation, target tracking and recognition, virtual reality and motion estimation. Therefore, this paper put forward the research of robot arm pose estimation and control based on machine vision. This …paper first analyzed the technology of machine vision, and then carried out experiments. The accuracy and stability of the two methods for robot arm pose estimation were compared. The experimental results showed that when the noise of Kalman’s centralized data fusion method was 1 pixel, the maximum error of the X-axis angle was only 0.55, and the average error was 0.02. In Kalman’s distributed data fusion method, the average error of X-axis displacement was 0.06, and the maximum value was 17.66. In terms of accuracy, Kalman’s centralized data fusion method was better. In terms of stability, Kalman’s centralized data fusion method was also better. However, in general, these two methods had very good results, and could accurately control the position and posture of the manipulator. Show more
Keywords: Position and attitude estimation of manipulator, machine vision, kalman filter, world coordinate system
DOI: 10.3233/JIFS-237904
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Wang, Wei | Xu, Dehao | Lv, Jing | Rong, Jian | He, Donggang | Li, Shuangshuang
Article Type: Research Article
Abstract: The factors of water quality in the intensive marine stichopus japonicus aquaculture process are changing with seasons, so water temperature, salinity, pH value and nitrite were selected as auxiliary variables to measure the concentration of ammonia nitrogen. FCM (Fuzzy C-means) algorithm was adopted to classify them. Based on the EM (Expectation Maximization) algorithm, fuzzy sub-models of ammonia nitrogen concentration were constructed around each operating point, and finally the fuzzy sub-models were combined according to the posterior distribution of the characteristics of the sampling data. Based on the data collected at Xinyulong Marine Biological Seed Technology Co., Ltd, in Dalian China, …the ammonia nitrogen concentration prediction model was tested and verified. Show more
Keywords: Water quality, stichopus japonicus, expectation maximization, multi-model
DOI: 10.3233/JIFS-239032
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Shuangyuan, Li | Qichang, Li | Mengfan, Li | Yanchang, Lv
Article Type: Research Article
Abstract: With the development of information technology, the number and methods of cyber attacks continue to increase, making network security issues increasingly important. Intrusion detection has become a vital means of dealing with cyber threats. Current intrusion detection methods predominantly rely on machine learning. However, machine learning suffers from limitations in detection capability and the requirement for extensive feature engineering. Additionally, current intrusion detection datasets face the challenge of data imbalance. To address these challenges, this paper proposes a novel solution leveraging Generative Adversarial Networks (GANs) to balance the dataset and introduces an attention mechanism into the generator to efficiently extract …key feature information, the mechanism can effectively sort the key information of the data and quickly capture important features. Subsequently, a combination of 1D Convolutional Neural Networks (1DCNN) and Bidirectional Gated Recurrent Units (BiGRU) is employed to construct a classification model capable of extracting both spatial and temporal features. Furthermore, Particle Swarm Optimization (PSO) is utilized to optimize the input weights and hidden biases of the model, so as to further improve the accuracy and robustness of the model. Finally, the model is trained and implemented for network intrusion detection. To demonstrate the applicability of the model, experiments were conducted using the NSL-KDD dataset and the UNSW-NB15 dataset. The final results showed that the proposed model outperformed other models, achieving accuracies of 99.15% and 97.33% on the respective datasets. This indicates that the model improves the efficiency of network intrusion detection and better ensures the effectiveness of network security. Show more
Keywords: Intrusion detection, GAN, 1DCNN, BiGRU, PSO
DOI: 10.3233/JIFS-236285
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Liu, Xia | Zhang, Xianyong | Chen, Jiaxin | Chen, Benwei
Article Type: Research Article
Abstract: Attribute reduction is an important method in data analysis and machine learning, and it usually relies on algebraic and informational measures. However, few existing informational measures have considered the relative information of decision class cardinality, and the fusion application of algebraic and informational measures is also limited, especially in attribute reductions for interval-valued data. In interval-valued decision systems, this paper presents a coverage-credibility-based condition entropy and an improved rough decision entropy, further establishes corresponding attribute reduction algorithms for optimization and applicability. Firstly, the concepts of interval credibility, coverage and coverage-credibility are proposed, and thus, an improved condition entropy is defined …by virtue of the integrated coverage-credibility. Secondly, the fused rough decision entropy is constructed by the fusion of improved condition entropy and roughness degree. By introducing the coverage-credibility, the proposed uncertainty measurements enhance the relative information of decision classes. In addition, the nonmonotonicity of the improved condition entropy and rough decision entropy is validated by theoretical proofs and experimental counterexamples, with respect to attribute subsets and thresholds. Then, the two rough decision entropies drive monotonic and nonmonotonic attribute reductions, and the corresponding reduction algorithms are designed for heuristic searches. Finally, data experiments not only verify the effectiveness and improvements of the proposed uncertainty measurements, but also illustrate the reduction algorithms optimization through better classification accuracy than four comparative algorithms. Show more
Keywords: Rough sets, Attribute reduction, Interval-valued decision systems, Algebraic measures and informational measures, Coverage-credibility-based rough decision entropy
DOI: 10.3233/JIFS-239544
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Li, Zexin | Li, Qiulin | Li, Zepeng | Huang, Lixia | Pu, Song | Luo, Zunhao
Article Type: Research Article
Abstract: Tourist attraction recommendation (TAR) problem has gained attention due to its potential to enhance tourist services. Existing studies focus on meeting tourists’ individual needs, but overlook the tour operator’s interests as the TAR service provider. The TAR problem is more challenging due to the high variability of customer demand, which is difficult to predict accurately beforehand. This paper examines TAR in response to random changes in tourist demand, aiming to minimize transportation costs, cooperation expenses between tour operators and attractions, ticket booking fees, and promotion costs, where ambiguity set is defined by means, mean absolute deviations, and the support set. …Firstly a distributionally robust model is proposed to identify suitable attractions for cooperation, along with determining the associated costs of ticket booking, promotion, and tourist transportation, while considering chance constraint on the service level. Subsequently, the model is reformulated into a tractable mixed integer linear programming model using duality theory. Numerical experiments illustrate that the proposed model outperforms both the stochastic programming model and the deterministic model in terms of risk level by out-of-sample test. In particularly, considering uncertainty and distributional ambiguity can make the model more accurate and credible. Show more
Keywords: Attraction recommendation, distributionally robust optimization, demand uncertainty
DOI: 10.3233/JIFS-238169
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Tian, Wen | Zhang, Yining | Fang, Qin | Liu, Weidong
Article Type: Research Article
Abstract: In order to solve the problem of imbalance between traffic demand and airspace capacity of high-altitude air route network, reduce unnecessary delay costs, and improve air route operation efficiency, the resource allocation problem of multi-objective air route network for CTOP program is studied. Taking the affected flights in the congested area of air routes as the research object, taking into account the constraints of actual flight operation, FCA time slot resource availability limit, FCA capacity limit, etc., aiming at minimizing the total delay time of each flight and maximizing the fairness of airlines, a multi-objective optimization model for air route …network resource allocation is established, and an improved NSGA-II algorithm is designed to solve the model. Based on the actual operation data of air routes in East China, the Pareto optimal solution set is obtained and compared with the traditional RBS algorithm, the average delay time is reduced by 5.49% and the average fair loss degree is reduced by 66.76%. The results show that the proposed multi-objective optimization model and the improved NSGA-II algorithm have better performance, which can take into account the fairness of each airline on the basis of reducing the total delay cost, realize the allocation of optimal flight trajectories and time slot resources, and provide a reference scheme for air traffic control resource scheduling. Show more
Keywords: Air traffic flow management, resource allocation, collaborative trajectory options program (CTOP), multi-objective optimization, genetic algorithm
DOI: 10.3233/JIFS-233588
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Velusamy, Saravanan | Murugan, Pallikonda Rajasekaran | Vishnuvarthanan, G. | Thiyagarajan, Arunprasath | Ramaraj, Kottaimalai | Kamalakkannan, Vidyavathi
Article Type: Research Article
Abstract: Due to the advantages of Electrocardiogram (ECG) signals, which are challenging to replicate yet easy to get, ECG-based identification has become a new path in biometric recognition research. These classic feature extraction techniques require Hand-crafted or feature-specific implications. The methods used for selection and integration of features, are time-consuming. The main objective of this study is develop deep learning approach to study the features of ECG data digital characteristics, thus saving a lot of signal pre-processing steps. This research proposed novel technique in X-wave recognition of ECG signal using max-min threshold technique and classification of ECG signal. This signal has …been processed for noise removal and normalization. Then this processed signal has been used to recognize X-wave from ECG signal. From recognized X-wave, the ECG signal has been classified using Improved Support Vector Machine (ISVM). The QRS complex has been detected using Stacked Auto-Encoder with Neural Networks (SAENN). The study took raw ECG signals and entropy-based features evaluated from extracted QRS complexes. Exams are based on classifying heart disorders into two, five, and twenty classes. The experimental findings showed that our suggested model attained a high classification accuracy of 97%, precision of 89%, recall of 90%, F-1 score of 88%. Show more
Keywords: Electrocardiogram, X-wave recognition, QRS complex, cross-validation, entropy-based features, classification
DOI: 10.3233/JIFS-241456
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Gong, Zengtai | Zhang, Yuanyuan
Article Type: Research Article
Abstract: In this paper, we focus on generalized fuzzy complex numbers and propose a straightforward matrix method to solve the dual rectangular fuzzy complex matrix equations C · Z ˜ + L ˜ = R · Z ˜ + W ˜ , in which C and R are crisp complex matrices and Z ˜ , L ˜ and M ˜ …are fuzzy complex number matrices. The existing methods for solving fuzzy complex matrix equations involve separately calculating the extended solution and the corresponding parameters of the real and imaginary parts, whereby we obtain the algebraic solution of the equations. By means of the interval arithmetic and embedding approach, the n × n dual rectangular fuzzy complex linear systems could be converted into 2n × 2n fuzzy linear systems, which are also equivalent to the 4n × 4n real linear systems. By directly solving the 4n × 4n real linear systems, the algebraic solutions can be obtained. The general dual rectangular fuzzy complex matrix equations and dual rectangular fuzzy complex linear systems are investigated by the generalized inverses of matrices. Finally, some examples are given to illustrate the effectiveness of method. Show more
Keywords: Fuzzy number, fuzzy complex number, rectangular fuzzy complex number, dual rectangular fuzzy complex matrix equations
DOI: 10.3233/JIFS-239305
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-21, 2024
Authors: Aguilar-Canto, Fernando | Luján-García, Juan Eduardo | Espinosa-Juárez, Alberto | Calvo, Hiram
Article Type: Research Article
Abstract: Inferring phylogenetic trees in human populations is a challenging task that has traditionally relied on genetic, linguistic, and geographic data. In this study, we explore the application of Deep Learning and facial embeddings for phylogenetic tree inference based solely on facial features. We use pre-trained ConvNets as image encoders to extract facial embeddings and apply hierarchical clustering algorithms to construct phylogenetic trees. Our methodology differs from previous approaches in that it does not rely on preconstructed phylogenetic trees, allowing for an independent assessment of the potential of facial embeddings to capture relationships between populations. We have evaluated our method with …a dataset of 30 ethnic classes, obtained by web scraping and manual curation. Our results indicate that facial embeddings can capture phenotypic similarities between closely related populations; however, problems arise in cases of convergent evolution, leading to misclassifications of certain ethnic groups. We compare the performance of different models and algorithms, finding that using the model with ResNet50 backbone and the face recognition module yields the best overall results. Our results show the limitations of using only facial features to accurately infer a phylogenetic tree and highlight the need to integrate additional sources of information to improve the robustness of population classification. Show more
Keywords: Convolutional neural networks, deep learning, hierarchical clustering, phylogenetic tree
DOI: 10.3233/JIFS-219343
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-09, 2024
Authors: Li, Yuangang | Gao, Xinrui | Ni, Hongcheng | Song, Yingjie | Deng, Wu
Article Type: Research Article
Abstract: In this paper, an adaptive differential evolution algorithm with multi-strategy, namely ESADE is proposed to solve the premature convergence and high time complexity for complex optimization problem. In the ESADE, the population is divided into several sub-populations after the fitness value of each individual is sorted. Then different mutation strategies are proposed for different populations to balance the global exploration and local optimization. Next, a new self-adaptive strategy is designed adjust parameters to avoid falling into local optimum while the convergence accuracy has reached its maximum value. And a complex airport gate allocation multi-objective optimization model with the maximum flight …allocation rate, the maximum near gate allocation rate, and the maximum passenger rate at near gate is constructed, which is divided into several single-objective optimization model. Finally, the ESADE is applied solve airport gate allocation optimization model. The experiment results show that the proposed ESADE algorithm can effectively solve the complex airport gate allocation problem and achieve ideal airport gate allocation results by comparing with the current common heuristic optimization algorithms. Show more
Keywords: Differential evolution, multi-strategy, self-adaptive strategy, gate allocation, optimization
DOI: 10.3233/JIFS-238217
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Sowndeswari, S. | Kavitha, E. | Krishnamoorthy, Raja
Article Type: Research Article
Abstract: The development of tiny sensing nodes efficient for wireless communication in Wireless Sensor Networks (WSNs) can be attributed to the rapid advancements in processors and radio technology. Data transmission occurs through multi-hop routing in WSN, which relies on nodes’ cooperation. The collaboration between nodes has rendered these networks susceptible to various attacks. It is imperative to employ a security scheme to evaluate the dependability of nodes in distinctive malicious nodes from non-malicious nodes. In recent years, there has been a growing significance placed on security-based routing protocols with energy constraints as valuable mechanisms for enhancing the security and performance of …WSNs. A novel solution called the Deep Learning-based Hybrid Energy Efficient and Security System (DL-HE2S2) is introduced to address these challenges. The research workflow encompasses various essential stages, namely the deployment of nodes, the creation of clusters, the selection of cluster heads, the detection of malevolent nodes within each group, and the determination of optimal paths intra- and inter-clusters employing the routing algorithm for efficient packet transmission. The design of the algorithm is focused on achieving energy efficiency and enhancing network security while also taking into account various performance metrics, including a mean network lifetime of 187.244 hours, a throughput of 59.88 kilobits per second, an end-to-end latency of 11.939 milliseconds, a packet loss of 14.9%, a packet delivery ratio of 99.194%, network security at 92.026%, and energy usage of 19.424 J. This research examines the algorithm’s scalability and efficiency across various network sizes using a Network Simulator (NS-2). DL-HE2S2 offers valuable insights that can be applied to practical implementations in multiple applications. Show more
Keywords: Wireless sensor networks, energy efficiency, secured routing, cluster
DOI: 10.3233/JIFS-235322
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Xu, Liwen | Chen, Jiali
Article Type: Research Article
Abstract: Node classification in graph learning faces significant challenges due to imbalanced data, particularly for under-represented samples from minority classes. To address this issue, existing methods often rely on synthetic minority over-sampling techniques, introducing additional complexity during model training. In light of the challenges faced, we introduce GraphECC, an innovative approach that addresses numerical anomalies in large-scale datasets by supplanting the traditional CE loss function with an Enhanced Complementary Classifier (ECC) loss function’a novel modification to the CCE loss. This alteration ensures computational stability and mitigates potential numerical anomalies by incorporating a slight offset in the denominator during the computation of …the complementary probability distribution. In this paper, we present a novel training paradigm, the Enhanced Complementary Classifier (ECC), which offers “imbalance defense for free” without the need for extra procedures to improve node classification accuracy.The ECC approach optimizes model probabilities for the ground-truth class, akin to the cross-entropy method. Additionally, it effectively neutralizes probabilities associated with incorrect classes through a “guided” term, achieving a balanced trade-off between the two aspects. Experimental results demonstrate that our proposed method not only enhances model robustness but also surpasses the widely used cross-entropy training objective.Moreover, we demonstrate the versatility of our method by seamlessly integrating it with various well-known adversarial training techniques, resulting in significant gains in robustness. Notably, our approach represents a breakthrough, as it enhances model robustness without compromising performance, distinguishing it from previous attempts.The code for GraphECC can be accessed from the following link:https://github.com/12chen20/GraphECC . Show more
Keywords: Imbalanced node classification, trade-off optimization, enhanced complementary classifier (ECC), graph learning, minority classes
DOI: 10.3233/JIFS-239663
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Ali, Zeeshan | Yin, Shi | Yang, Miin-Shen
Article Type: Research Article
Abstract: In the context of fuzzy relations, symmetry refers to a property where the relationship between two elements remains the same regardless of the order in which they are considered. Natural language processing (NLP) in engineering documentation discusses the application of computational methods or techniques to robotically investigate, analyze, and produce natural language information for manufacturing contents. The NLP plays an essential role in dealing with large amounts of textual data normally recovered in engineering documents. In this paper, we expose the idea of a bipolar complex hesitant fuzzy (BCHF) set by combining the bipolar fuzzy set (BFS) and the complex …hesitant fuzzy set (CHFS). Further, we evaluate some algebraic and Schweizer-Sklar operational laws under the presence of BCHF numbers (BCHFNs). Additionally, using the above information as well as the idea of prioritized (PR) operators, we derive the idea of BCHF Schweizer-Sklar PR weighted averaging (BCHFSSPRWA) operator, BCHF Schweizer-Sklar PR ordered weighted averaging (BCHFSSPROWA) operator, BCHF Schweizer-Sklar PR weighted geometric (BCHFSSPRWG) operator, and BCHF Schweizer-Sklar PR ordered weighted geometric (BCHFSSPROWG) operator. Basic properties for the above operators are also discussed in detail, such as idempotency, monotonicity, and boundedness. Moreover, we evaluate the best way in which NLP can be applied to engineering documentations with the help of the proposed operators. Therefore, we illustrate the major technique of multi-attribute decision-making (MADM) problems based on these derived operators. Finally, we use some existing operators and try to compare their ranking results with our proposed ranking results to show the supremacy and validity of the investigated theory. Show more
Keywords: Fuzzy set (FS), hesitant FS, bipolar complex hesitant FS, Schweizer-Sklar prioritized aggregation operators, natural language processing, multi-attribute decision-making
DOI: 10.3233/JIFS-240116
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-27, 2024
Authors: Shi, Jing | Zhang, Xiao-Lin | Wang, Yong-Ping | Gu, Rui-Chun | Xu, En-Hui
Article Type: Research Article
Abstract: Deep neural networks (DNNs) are susceptible to adversarial attacks, and one important factor is that adversarial samples are transferable, i.e., adversarial samples generated by a particular network may deceive other black-box models. However, existing transferable adversarial attacks tend to modify the input features of images directly without selection to reduce the prediction accuracy in the alternative model, which would enable the adversarial samples to fall into the model’s local optimum. Alternative models differ significantly from the victim model in most cases, and while simultaneously attacking multiple models may improve transferability, gathering numerous different models is more challenging and expensive. We …simulate various models using frequency domain transformation to close the gap between the source and victim models and improve transferability. At the same time, we destroy important intermediate layer features that influence the decision of the model in the feature space. Additionally, smoothing loss is introduced to remove high-frequency perturbations. Extensive experiments demonstrate that our FM-FSTA attack generates more well-hidden and transferable adversarial samples, and achieves a high deception rate even when attacking adversarially trained models. Compared to other methods, our FM-FSTA improved attack success rate under different defense mechanisms, which reveals the potential threats of current robust models. Show more
Keywords: Deep neural networks, adversarial samples, transferable attacks
DOI: 10.3233/JIFS-234156
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Zhao, Xianhao | Wang, Mingyang | Xin, Chaoqun | Wang, Xianjie
Article Type: Research Article
Abstract: In the field of autonomous driving, driving systems need to understand and quickly respond to changes in road scenes, which makes it equally important to enhance the accuracy and real-time performance of semantic segmentation tasks in road scenes. This article proposes a lightweight road scene semantic segmentation model LR3S that integrates global contextual information based on the DeepLabV3+ framework. LR3S utilizes a lightweight GhostNetV2 network as the backbone to capture rich semantic information in images, and uses ASPP_eSE module to enhance the capture of multi-scale and detail level semantic information. In addition, a lightweight CARAFE upsampling operator is utilized to …upsample feature maps, taking advantage of CARAFE’s large receptive field and low computational cost to prevent the loss of fine-grained features and ensure the integrity of semantic information. Experimental results demonstrate that LR3S achieves an MIoU of 74.47% on the Cityscapes dataset and obtains an MIoU of 76.01% on the PASCAL VOC 2012 dataset. Compared to baseline semantic segmentation models, LR3S significantly reduces the parameter amount while maintaining segmentation accuracy, achieving a good balance between model accuracy and real-time performance. Show more
Keywords: Semantic segmentation, road scenes, attention mechanism, GhostNetV2, CARAFE
DOI: 10.3233/JIFS-239692
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Haennah, J.H. Jensha | Christopher, C. Seldev | King, G.R. Gnana
Article Type: Research Article
Abstract: Accurate SARS-CoV-2 screening is made possible by automated Computer-Aided Diagnosis (CAD) which reduces the stress on healthcare systems. Since Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2) is highly contagious, the transition chain can be broken through an early diagnosis by clinical knowledge and Artificial Intelligence (AI). Manual findings are time and labor-intensive. Even if Reverse Transcription-Polymerase Chain Reaction (RT-PCR) delivers quick findings, Chest X-ray (CXR) imaging is still a more trustworthy tool for disease classification and assessment. Several studies have been conducted using Deep Learning (DL) algorithms for COVID-19 detection. One of the biggest challenges in modernizing healthcare is extracting …useful data from high-dimensional, heterogeneous, and complex biological data. Intending to introduce an automated COVID-19 diagnosis model, this paper develops a proficient optimization model that enhances the classification performance with better accuracy. The input images are initially pre-processed with an image filtering approach for noise removal and data augmentation to extend the dataset. Secondly, the images are segmented via U-Net and are given to classification using the Fused U-Net Convolutional Neural Network (FUCNN) model. Here, the performance of U-Net is enhanced through the modified Moth Flame Optimization (MFO) algorithm named Chaotic System-based MFO (CSMFO) by optimizing the weights of U-Net. The significance of the implemented model is confirmed over a comparative evaluation with the state-of-the-art models. Specifically, the proposed CSMFO-FUCNN attained 98.45% of accuracy, 98.63% of sensitivity, 98.98% of specificity, and 98.98% of precision. Show more
Keywords: COVID-19 classification, deep Learning, U-Net, Convolutional Neural Network (CNN), Moth Flame Optimization (MFO)
DOI: 10.3233/JIFS-230523
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Liu, Zhaohui | Wang, Xiao
Article Type: Research Article
Abstract: Pedestrians have random distribution and dynamic characteristics. Aiming to this problem, this paper proposes a pedestrian object detection method based on improved YOLOv5 in urban road scenes. Firstly, the last C3 module was replaced in the Backbone with the SE attention mechanism to enhance the network’s extraction of pedestrian object features and improve the detection accuracy of small-scale pedestrians. Secondly, the EIOU loss function was introduced to optimize the object detection performance of the detection network. To validate the effectiveness of the algorithm, experiments were conducted on a dataset composed of filtered Caltech pedestrian detection data and images taken by …ourselves. The experiments showed that the improved algorithm has P -value, R -value, and mAP of 98.4%, 95.5%, and 98%, respectively. Compared to the YOLOv5 model, it has increased P -value by 1.4%, R -value by 2.7%, and mAP by 1.3%. The improved algorithm also boosts the detection speed. The detection speed is 0.8 ms faster than the YOLOv5 model. It is also faster than other mainstream algorithms including Faster R-CNN and SSD. The improved algorithm enhances the effectiveness of pedestrian detection significantly and has important application value. Show more
Keywords: Road traffic safety, YOLOv5, pedestrian object detection
DOI: 10.3233/JIFS-240537
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Zhan, Huawei | Han, Chengju | Li, Junjie | Wei, Gaoyong
Article Type: Research Article
Abstract: Aiming at the problems of slow speed and low accuracy of traditional neural network systems for real-time gesture recognition in complex backgrounds., this paper proposes DMS-yolov8-a gesture recognition method to improve yolov8. This algorithm replaces the Bottleneck convolution module in the backbone network of yolov8 with variable row convolution DCNV2, and increases the feature convolution range without increasing the computation amount through a more flexible feeling field. in addition, the self-developed MPCA attention module is added after the feature output layer of the backbone layer, which improves the problem of recognizing the accuracy of difference gestures in complex backgrounds by …effectively combining the feature information of the contextual framework, taking into account the multi-scale problem of the gestures in the image, this paper introduces the SPPFCSPS module, which realizes multi-feature fusion and improves real-time accuracy of detection. Finally, the model proposed in this paper is compared with other models, and the proposed DMS-yolov8 model achieves good results on both publicly available datasets and homemade datasets, with the average accuracy up to 97.4% and the average mAP value up to 96.3%, The improvements proposed in this paper are effectively validated. Show more
Keywords: Gesture recognition, yolov8, DCNV2, MPCA, feature fusion
DOI: 10.3233/JIFS-238629
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Meenakshi, A. | Bramila, M.
Article Type: Research Article
Abstract: Molecular structures are characterised by the Hosoya polynomial and Wiener index, ideas from mathematical chemistry and graph theory. The graph representation of a chemical compound that has atoms as vertices and chemical bonds as edges is called a molecular graph, and the Hosoya polynomial is a polynomial related to this graph. As a graph attribute that remains unchanged under graph isomorphism, the Hosoya polynomial is known as a graph invariant. It offers details regarding the quantity of distinct non-empty subgraphs within a specified graph. A topological metric called the Wiener index is employed to measure the branching complexity and size …of a molecular graph. For every pair of vertices in a molecular network, the Wiener index is the total of those distances. In this paper, discussed the Hosoya polynomial, Wiener index and Hyper-Wiener index of the Abid-Waheed graphs (AW)a 8 and (AW)a 10 . This graph is similar to Jahangir’s graph. Further, we have extended the research work on the applications of the described graphs. Show more
Keywords: Wiener index, Abid-Waheed, Hosoya polynomial, diameter, distance, connected graph
DOI: 10.3233/JIFS-236051
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-8, 2024
Authors: Lin, Jiayi
Article Type: Research Article
Abstract: At this stage, network communication technology is increasingly mature, and intelligent wearable products are also widely used in human daily life. Wearable products are popular with users because of their numerous types, complete functions and convenient services. Wearable products integrate interaction technology, and users can interact with products. However, how to improve the user’s interaction experience and reduce the user’s cognitive burden on the interaction interface is an urgent problem in the current product interaction design. Therefore, based on the analysis of the types and related technologies of wearable products, this paper made a specific analysis of the interaction design …of wearable products, and established an interaction design model. At the same time, the wearable fall detection system was also tested by machine learning algorithm. The experimental results showed that the average test result of the algorithm in this paper was 87.39%, while the average test result of the traditional algorithm was 83.79%. In terms of the missed alarm rate of fall detection, the average test result of this algorithm was 6.4%, while the average test result of the traditional algorithm was 12.33%. In terms of fall detection sensitivity, the average test result of this algorithm was 92.50%, while the average test result of the traditional algorithm was 88.24%. Compared with traditional algorithms, this method performs better, with lower missed detection rate and higher sensitivity. Innovative combination of machine learning algorithm, through three-dimensional coordinate system, differentiation and vector sum formula, improves the accuracy and reliability of fall detection. In conclusion, the algorithm in this paper can effectively optimize the relevant performance of the system, thus improving the accuracy of the system’s fall detection. Show more
Keywords: 5 G network communication technology, wearable products, interaction design, wearable fall detection system
DOI: 10.3233/JIFS-237837
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Li, Hongjun | Zhang, Jinlong
Article Type: Research Article
Abstract: This paper presents a sophisticated four-stage optimization and intelligent control algorithm tailored for two-way electric vehicle charging (EVC) stations integrated with advanced photovoltaic systems and fixed battery energy storage in commercial buildings. The primary objective is to minimize operating costs while prioritizing customer satisfaction within a dynamic and uncertain energy landscape. Our algorithm optimizes the scheduled charging and discharging of electric vehicles (EVs), local battery storage (BS) units, grid power supply, and deferred loads to balance instantaneous supply and demand. The first stage focuses on developing optimal energy management plans for the day ahead, considering factors such as projected energy …production, anticipated EVC demand, and building energy consumption patterns. Building on this foundation, the second stage introduces multilayer EV charging price structures and optimizes participation rewards for discharging, dynamically addressing EV charging patterns and price sensitivities. Approaching the commissioning timeline, the third stage refines energy management plans for the upcoming hours using real-time data and forecasts, adapting to evolving conditions for optimal resource allocation. The final stage involves real-time control and the implementation of optimized programs, dynamically adjusting charge/discharge processes, grid interactions, and load deferral to maintain supply-demand balance and minimize operating costs. Our algorithm enhances system resilience in unpredictable conditions, providing compelling incentives for active EV user participation. Coordinating the integrated system efficiently, including the commercial building’s energy load, ensures reliable service to customers while reducing costs. Extensive case studies and a comparative analysis validate the algorithm’s efficiency in significantly reducing operating costs and enhancing resilience to uncertainty. The paper concludes by highlighting the algorithm’s pioneering role in intelligent EV charging station (CHS) management, offering a cost-effective, customer-oriented, and dynamic energy control strategy for advancing global energy practices. Show more
Keywords: Electric vehicle charging, photovoltaic integration, battery energy storage, energy management optimization, commercial building integration
DOI: 10.3233/JIFS-241032
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Valadez-Godínez, Sergio | Sossa, Humberto | Santiago-Montero, Raúl
Article Type: Research Article
Abstract: The Associative Pattern Classifier (APC) was designed as an associative memory, focusing particularly on pattern classification. This implies that the training memory is constructed in a single operation and pattern classification also occurs in a single process. It is important to note that the APC translates the input patterns through a translation vector, which represents the average of all input patterns. Until now, there is no theoretical framework to explain the inner workings of the APC. Its relevance is inferred from the fact that several studies have been conducted using it as a foundation. This paper seeks to provide a …theoretical comprehension of the APC’s operation to facilitate future enhancements. We found the APC creates a system in static equilibrium through concurrent vectors at the origin (translation vector), resulting in a balanced separation of patterns. However, the APC cannot achieve complete pattern separation because of the presence of a neutral region. The neutral region is defined by all the points that define the separation hyperplanes. The points over the hyperplanes cannot be classified by the APC. Additionally, we discovered that the APC is unable to accurately classify the translation vector, which could be included as part of the input patterns. Our previous research showed that the APC is unsuccessful in achieving the linear separation of the AND function. In this research, we also broaden the examination of the AND function to illustrate that achieving linear separation is not feasible because the separation line represents a neutral region. The APC demonstrated exceptional performance when tested with artificial datasets where patterns were distributed over balanced regions, thus operating as an efficient multiclass and non-linear classifier. Nevertheless, the performance of the APC is lower when tested with real-world databases, making the APC inaccurate due to its restricted inner workings. Show more
Keywords: Classifier, pattern, associative memory, class, classification
DOI: 10.3233/JIFS-219347
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-23, 2024
Authors: Zhang, Wei | Zheng, Hongxuan | Zhang, Runyu
Article Type: Research Article
Abstract: In this paper, a self-organizing RBF (SORBF) neural network with an adaptive threshold is proposed based on improved particle swarm optimization (IPSO) and neural strength (NS). The parameters and structure of SORBF can be optimized simultaneously and dynamically. Moreover, the tiresome problem of threshold setting is solved. Firstly, the network size and parameters of SORBF are mapped into the particle information of PSO. Secondly, an IPSO algorithm, based on diversity inertia weight and elite knowledge guiding, is proposed to reduce the probability of the population falling into the local optimum. Then, IPSO is used for optimizing the parameters of SORBF. …Based on neuron growth intensity and competition intensity, SORBF can realize the hidden neuron addition and deletion adaptively. Moreover, the thresholds during the structure adjustment can be provided adaptively based on the network scale and neuron strength, which avoids the subjectivity setting and can improve the adaptive ability. Finally, the convergence analysis of IPSO is provided to ensure the performance of SORBF. Experiment results show that the proposed SORBF has good self-organizing ability and compact network structure compared with other methods. Show more
Keywords: RBF neural network, PSO, self-organization, neural strength, adaptive threshold
DOI: 10.3233/JIFS-239569
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Wei, Guangcun | Fu, Jihua | Pan, Zhifei | Fang, Qingge | Zhang, Zhi
Article Type: Research Article
Abstract: The text in natural scenes is often smaller compared to artificially designed text. Due to the small proportion of pixels, low resolution, less semantic information, and susceptibility to complex scenes, tiny text detection often results in many missed detections. To address this issue, this paper draws inspiration from small object detection methods and proposes TiTDet, a detection algorithm more suitable for tiny text. Due to the small proportion of pixels, low resolution, less semantic information, and susceptibility to complex scenes, tiny text detection often results in many missed detections. To address this issue, this paper draws inspiration from small object …detection methods and proposes TiTDet, a detection algorithm more suitable for tiny text. Firstly, this paper incorporates a context extraction module and an attention-guided module. These modules guide contextual information learning through a self attention mechanism, while eliminating the possible negative impact caused by redundant information. Regarding multi-scale feature fusion, this paper proposes a fine-grained effective fusion factor, making the fusion process emphasize small object learning more and highlight the feature expression of tiny texts. In terms of post-processing, this paper proposes a differentiable binarization module, incorporating the binarization process into model training. Leveraging the implicit information in the data to drive model improvement can enhance the post-processing effect. Lastly, this paper proposes a scale-sensitive loss, which can handle tiny texts more fairly, fully considering the positional relationship between the predicted and real regions, and better guiding the model training. This paper proves that TiTDet exhibits high sensitivity and accuracy in detecting tiny texts, achieving an 86.0% F1-score on ICDAR2015. The paper also compares the superiority of the method on CTW1500 and Total-Text. Show more
Keywords: Tiny text detection, context extraction module, attention-guided module, effective fusion factor, scale-sensitive loss
DOI: 10.3233/JIFS-236317
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Pandiyarajan, Abinaya | Jagatheesaperumal, Senthil Kumar | Thayanithi, Manonmani
Article Type: Research Article
Abstract: This study explores how Electronic Health Records (EHR) might be transformed in the context of the rapid improvements in cloud computing and IoT technology. But worries about sensitive data security and access management when it moves to large cloud provider networks surface. Even if they are secure, traditional encryption techniques sometimes lack the granularity needed for effective data protection. We suggest the Secure Access Policy – Ciphertext Policy – Attribute-based Encryption (SAPCP-ABE) algorithm as a solution to this problem. This method ensures that only authorized users may access the necessary data while facilitating fine-grained encrypted data exchange. The three main …phases of SAPCP-ABE are retrieval and decoding, where the system verifies users’ access restrictions, secure outsourcing that prioritizes critical attributes, and an authenticity phase for early authentication. Performance tests show that SAPCP-ABE is a better scheme than earlier ones, with faster encryption and decryption speeds of 5 and 5.1 seconds for 512-bit keys, respectively. Security studies, numerical comparisons, and implementation outcomes demonstrate our suggested approach’s efficacy, efficiency, and scalability. Show more
Keywords: Attribute-based encryption, electronic health record, access policy, cloud providers, cloud computing
DOI: 10.3233/JIFS-240341
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Huang, Ying | Li, Lang | Li, Di | Li, Yongchao
Article Type: Research Article
Abstract: AND-Rotation-XOR (AND-RX) ciphers are known for its unique round function and excellent implementation performance. As a result, AND-RX ciphers are well suited for protecting sensitive information on resource-constrained devices. AND-RX ciphers need to be passed by rigorous cryptanalysis methods before practice. Integral cryptanalysis is one of the important cryptanalysis methods. MILP-based automated model is constructed to solve the integral cryptanalysis of AND-RX ciphers. The automated model usually consumes a long time when the block length and the number of round function components are large. In this paper, we design a neural distinguisher named IABC model for fast and efficient integral …cryptanalysis. The IABC model learns to distinguish between ciphertext multisets to construct an integral distinguisher for AND-RX cipher, which ciphertext multisets from plaintext or random plaintexts. The IABC model is used for SIMON, SIMECK and SAND ciphers, which validates the neural distinguisher for AND-RX ciphers. The experimental results show that the IABC model is capable of expanding the number of rounds of integral distinguishers for AND-RX ciphers with certain accuracy. Therefore, IABC model can be effectively used for integral cryptanalysis of AND-RX ciphers. In addition, we discover that a larger number of active bits in the plaintext multiset results in a more accurate IABC model. Show more
Keywords: AND-RX cipher, integral cryptanalysis, division property, neural distinguisher
DOI: 10.3233/JIFS-238122
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Ranjith, K. | Karthikeyan, K.
Article Type: Research Article
Abstract: The flow-shop scheduling problem (FSSP) has received a considerable amount of attention due to its wide-ranging applications. However, the omission of uncertainty significantly diminishes the practicality of scheduling results, underscoring its the necessity to address uncertainty in the flow shop problem. In this paper, a fuzzy two-machine flow-shop problem is considered and an effective algorithm with a fuzzy ranking method is proposed to minimize the total waiting time. The processing times are represented using trapezoidal membership functions. Furthermore, a two-stage flow shop scheduling problem is used in the proposed algorithm and various categories of fuzzy mean techniques. The experimental results …and statistical comparisons demonstrate that the proposed algorithm exhibits significant advantages in effectively solving the FFSSP (Fuzzy Flow-Shop Scheduling Problem). Show more
Keywords: Two-stage flow shop, trapezoidal fuzzy number, mean ranking techniques, waiting time
DOI: 10.3233/JIFS-235526
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Sageengrana, S. | Selvakumar, S.
Article Type: Research Article
Abstract: Distraction and fatigue are serious issues in online learning, and they directly impact educational outcomes. To achieve excellent academic achievement, students need to focus on their studies without being distracted or fatigued. Learners frequently overlook crucial information, directions, and concepts while they are passive and sleepy. They tend to miss important content, instructions, and concepts. Iris Angle Position (IAP) and electroencephalography (EEG) were used in this model to identify the behaviour of learners. Specifically, a Deep Convolutional Neural Network (DCNN) is constructed to extract IAP in order to accurately capture the learner’s facial area. EEG signals are effectively handled and …sorted using deep reinforcement learning (DRL). The learners’ facial landmarks are retrieved from a frame using the dlib toolbox. Only eye landmark points from face landmarks alone are focused on in order to determine the learner’s behaviour. When the learners EEG signals and Iris positions are monitored simultaneously, it’s helpful to identify the learner’s fatigue state (LFS) and the learner’s distraction state (LDS). The Brain Vision Algorithm (BVA) uses iris position and minimal facial landmarks, along with brain activity, to properly identify the learner’s level of distraction and exhaustion. When a student is detected as being preoccupied or sleepy, an alert goes off automatically, and the educator gets performance feedback. Iris position data and brain-computer interface-based EEG signal values are utilised to identify distraction and sleepiness. Comparative tests have demonstrated that this innovative method offers fast and high-accuracy student activity detection in virtual learning settings. Applying the suggested approach to different existing classifiers yields an F-Score of 91.92%, a recall of 93.87%, and a precision of 92.37% . The results showed that the detection rates for both distracted and sleepy phases were higher than those attained with other currently used techniques. Show more
Keywords: Drowsiness, online learning, iris position, EEG signals, distraction, brain vision algorithm
DOI: 10.3233/JIFS-237016
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Canul-Chin, Miguel Angel | Moguel-Ordóñez, Yolanda Beatriz | Martin-Gonzalez, Anabel | Brito-Loeza, Carlos | Legarda-Saenz, Ricardo
Article Type: Research Article
Abstract: Yucatan has a variety of plant species of melliferous importance. The honey produced in Yucatan has several special properties that make it one of the most demanded internationally. Analyzing the pollen grains present in honey is essential to determine its quality and identify its plants of origin. This study is a time-consuming process that must be carried out by highly trained palynologists. In this work, we propose an improved model based on a fully convolutional neural network for the automatic detection of pollen grains in microscopic images of four plant species of Yucatan to contribute to the analysis of the …honey designation of origin. Show more
Keywords: Pollen analysis, object detection, palynology, deep learning
DOI: 10.3233/JIFS-219379
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-8, 2024
Authors: Hashmi, Hina | Dwivedi, Rakesh | Kumar, Anil | Kumar, Aman
Article Type: Research Article
Abstract: The rapid advancements in satellite imaging technology have brought about an unprecedented influx of high-resolution satellite imagery. One of the critical tasks in this domain is the automated detection of buildings within satellite imagery. Building detection holds substantial significance for urban planning, disaster management, environmental monitoring, and various other applications. The challenges in this field are manifold, including variations in building sizes, shapes, orientations, and surrounding environments. Furthermore, satellite imagery often contains occlusions, shadows, and other artifacts that can hinder accurate building detection. The proposed method introduces a novel approach to improve the boundary detection of detected buildings in high-resolution …remote sensed images having shadows and irregular shapes. It aims to enhance the accuracy of building detection and classification. The proposed algorithm is compared with Customized Faster R-CNNs and Single-Shot Multibox Detectors to show the significance of the results. We have used different datasets for training and evaluating the algorithm. Experimental results show that SESLM for Building Detection in Satellite Imagery can detect 98.5% of false positives at a rate of 8.4%. In summary, SESLM showcases high accuracy and improved robustness in detecting buildings, particularly in the presence of shadows. Show more
Keywords: Object detection, image analysis, faster R-CNN, CNN, satellite imagery, object localization
DOI: 10.3233/JIFS-235150
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-21, 2024
Authors: Huang, De Ling | Huang, Yi Fan | Yang, Yu Qiao
Article Type: Research Article
Abstract: Practical Byzantine Fault Tolerance (PBFT), the widest-used consensus algorithm in the alliance blockchain, suffers from high communications complexity and relatively low scalability, making it difficult to support large-scale networks. To overcome these limitations, we propose a secure and scalable consensus algorithm, Vague Sets-based Double Layer PBFT (VSDL-PBFT). Roles and tasks of consensus nodes are redesigned. Three-phase consensus process of the original PBFT is optimized. Through these approaches, the communication complexity of the algorithm is significantly reduced. In order to better fit the complexity of voting in the real world, we use a vague set to select primary nodes of consensus …groups. This can greatly reduce the likelihood of malicious nodes being selected as the primary nodes. The experimental results show that the VSDL-PBFT consensus algorithm improves the system’s fault tolerance, it also achieves better performance in algorithm security, communications complexity, and transaction throughput compared to the baseline consensus algorithms. Show more
Keywords: Blockchain, consensus algorithm, Byzantine fault tolerance, PBFT
DOI: 10.3233/JIFS-239745
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Rodriguez-Bazan, Horacio | Sidorov, Grigory | Escamilla-Ambrosio, Ponciano Jorge
Article Type: Research Article
Abstract: Recently, Android device usage has increased significantly, and malicious applications for the Android ecosystem have also increased. Security researchers have studied Android malware analysis as an emerging issue. The proposed methods employ a combination of static, dynamic, or hybrid analysis along with Machine Learning (ML) algorithms to detect and classify malware into families. These families often exhibit shared similarities among their members or with other families. This paper presents a new method that combines Fuzzy Hashing and Natural Language Processing (NLP) techniques to find Android malware families based on their similarities by applying reverse engineering to extract the features and …compute fuzzy hashing of the preprocessed code. This relationship allows us to identify the families according to their features. A study was conducted using a database test of 2,288 samples from diverse ransomware families. An accuracy in classifying Android ransomware malware up to 98.46% was achieved. Show more
Keywords: Android malware analysis, android ransomware, cybersecurity, fuzzy hashing, natural language processing
DOI: 10.3233/JIFS-219367
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Arulmurugan, A. | Kaviarasan, R. | Garnepudi, Parimala | Kanchana, M. | Kothandaraman, D. | Sandeep, C.H.
Article Type: Research Article
Abstract: This research focuses on scene segmentation in remotely sensed images within the field of Remote Sensing Image Scene Understanding (RSISU). Leveraging recent advancements in Deep Learning (DL), particularly Residual Neural Networks (RESNET-50 and RESNET-101), and the research proposes a methodology involving feature fusing, extraction, and classification for categorizing remote sensing images. The approach employs a dataset from the University of California Irvine (UCI) comprising twenty-one groups of pictures. The images undergo pre-processing, feature extraction using the mentioned DL frameworks, and subsequent categorization through an ensemble classification structure combining Kernel Extreme Learning Machine (KELM) and Support Vector Machine (SVM). The paper …concludes with optimal results achieved through performance and comparison analyses. Show more
Keywords: Remote sensing, image scene classification, deep learning, feature extraction, RESNET- 101, ensemble
DOI: 10.3233/JIFS-235109
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2023
Authors: Cai, Xiumei | Yang, Xi | Wu, Chengmao | Zhang, Rui
Article Type: Research Article
Abstract: Focusing on the currently available multi-view fuzzy clustering algorithms, many of which frequently lack robustness and are hence less frequently used in image segmentation. We present a multi-view fuzzy clustering image segmentation algorithm in this research, along with an autonomous view-weight learning mechanism. Firstly, to ensure that each view has the best view weight, the algorithm adds a view weight factor. Secondly, it introduces the weighted fuzzy factor and the kernel distance metric, the role of the weighted fuzzy factor is to collect the local spatial information and local grey scale information to preserve as much of the image’s detailed …information as feasible during segmentation. The role of the kernel distance metric is to lessen the influence of outliers and noisy points on image segmentation. Finally, the technique for resolving the issue of image uncertainty and fuzzy factor selection introduces the concept of interval type-2 fuzzy c-means clustering. Numerous experiments on different images demonstrate that the proposed algorithm in this paper is more robust than previous multi-view fuzzy clustering algorithms for solving noise image segmentation problems. It is also more effective at segmenting images contaminated by noise and can better retain the detailed information in the image. Show more
Keywords: Multi-view, fuzzy clustering, autonomous view-weight learning, type-2 fuzzy, image segmentation
DOI: 10.3233/JIFS-235967
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Yang, Yi | Huang, Huiling | Wu, FeiBin | Han, Jun | Ma, Mengyuan | Zhang, Yantong | Feng, Yanbing
Article Type: Research Article
Abstract: This paper introduces a novel neural network architecture and an enhanced data synthesis method that significantly boost the performance in removing complex smoke from images. The architecture features a multi-branch and multi-scale feature fusion design, which effectively integrates multiple feature streams and adaptively restores the background by identifying specific smoke characteristics within the image. A newly designed Fourier residual block is incorporated to capture frequency domain information, enabling the network to process and transform information across both spatial and frequency domains. To improve the network’s generalization ability and robustness, an in-depth analysis of the imaging process in smoky environments was …conducted, leading to an improved method for synthesizing smoke images. This methodology facilitates the creation of a more varied and realistic training dataset, substantially enhancing the neural network’s capabilities in image restoration. Experimental results show that this approach is highly effective on both synthetic and real-world smoke datasets, outperforming existing image de-smoking methods in terms of quantitative metrics and visual perception. The code for this method is available at https://github.com/Exiagit/MFSR. Show more
Keywords: Single image smoke removal, frequency domain learning, data synthesis method
DOI: 10.3233/JIFS-239146
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Nieves, Juan Carlos | Osorio, Mauricio | Rojas-Velazquez, David | Magallanes, Yazmín | Brännström, Andreas
Article Type: Research Article
Abstract: Humans have evolved to seek social connections, extending beyond interactions with living beings. The digitization of society has led to interactions with non-living entities, such as digital companions, aimed at supporting mental well-being. This literature review surveys the latest developments in digital companions for mental health, employing a hybrid search strategy that identified 67 relevant articles from 2014 to 2022. We identified that by the nature of the digital companions’ purposes, it is important to consider person profiles for: a) to generate both person-oriented and empathetic responses from these virtual companions, b) to keep track of the person’s conversations, activities, …therapy, and progress, and c) to allow portability and compatibility between digital companions. We established a taxonomy for digital companions in the scope of mental well-being. We also identified open challenges in the scope of digital companions related to ethical, technical, and socio-technical points of view. We provided documentation about what these issues mean, and discuss possible alternatives to approach them. Show more
Keywords: Conversational agents, well-being, mental health, trustworthy artificial intelligence
DOI: 10.3233/JIFS-219336
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Gomathi, S.V. | Jayalakshmi, M.
Article Type: Research Article
Abstract: This article focuses on an area of nonlinear programming problems known as linear fractional programming problems with multiple objectives. When tackling real-world linear fractional optimization problems, ambiguity and uncertainty in decision-making are inherent. This research aims to present a simple and computationally quick approach to solving multiple objective linear fractional programming problems with all decision variables and parameters described in terms of crisp. The proposed solution algorithm is based primarily on the fuzzy-based technique, and a membership function strategy. To resolve the multi-objective linear fractional programming problem, first consider the problem as a single objective function and along with the …fuzzy programming model obtain the optimal solution using LINGO software. LINGO is a software application primarily used for solving linear, nonlinear, and integer optimization problems Moreover, an e-education setup problem demonstrates the steps of the proposed method. Show more
Keywords: Linear fractional programming problem, multi-objective linear fractional programming, fuzzy mathematical programming, hyperbolic membership function
DOI: 10.3233/JIFS-234286
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-8, 2024
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]