Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2024: 1.7
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Li, Yuerong | Zhang, Yuhua | Che, Jinxing
Article Type: Research Article
Abstract: Accurate prediction of short-term electricity price is the key to obtain economic benefit and also an important index of power system planning and management. Support vector regression (SVR) based ensemble works have gained remarkable achievements in terms of high accuracy and steady performance, but they are highly dependent on data representativeness and have a high computational complexity O (k * N 3 ) of data samples and parameter selection. To further improve the data representativeness and reduce its computational complexity, this paper develops a new approach to forecast electricity price via optimal weighted ensemble. In the model, the cluster-based subsampling …algorithm is proposed to categorize the inputs being seasonally decomposed into several groups, and representative data are drawn from each group in a certain proportion to ensure that each subset trained with SVR has the same representativeness and features. Moreover, the optimal weighted combination method is presented to assign weights to the sub-SVRs to obtain the optimal support vector regression ensemble model (OWSSVRE). The experimental results show that the improved support vector regression ensemble model with the same features and representativeness of the subset has better performance in electricity price forecasting. As a result, it is suitable to support decision making in the energy and other sectors. Show more
Keywords: Electricity price forecasting, support vector regression, K-means clustering, optimal weight, subsampling
DOI: 10.3233/JIFS-236239
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Thenmozhi, R. | Sakthivel, P. | Kulothungan, K.
Article Type: Research Article
Abstract: The Internet of Things and Quantum Computing raise concerns, as Quantum IoT defines security that exploits quantum security management in IoT. The security of IoT is a significant concern for ensuring secure communications that must be appropriately protected to address key distribution challenges and ensure high security during data transmission. Therefore, in the critical context of IoT environments, secure data aggregation can provide access privileges for accessing network services. "Most data aggregation schemes achieve high computational efficiency; however, the cryptography mechanism faces challenges in finding a solution for the expected security desecration, especially with the advent of quantum computers utilizing …public-key cryptosystems despite these limitations. In this paper, the Secure Data Aggregation using Quantum Key Management scheme, named SDA-QKM, employs public-key encryption to enhance the security level of data aggregation. The proposed system introduces traceability and stability checks for the keys to detect adversaries during the data aggregation process, providing efficient security and reducing authentication costs. Here the performance has been evaluated by comparing it with existing competing schemes in terms of data aggregation. The results demonstrate that SDA-QKM offers a robust security analysis against various threats, protecting privacy, authentication, and computation efficiency at a lower computational cost and communication overhead than existing systems. Show more
Keywords: Internet of things, security, data aggregation, access control, quantum cryptography
DOI: 10.3233/JIFS-223619
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Li, Chen | Liu, Na | Xu, Zhenshun | Zheng, Guofeng | Yang, Jie | Dao, Lu
Article Type: Research Article
Abstract: Medical short text classification is of great significance to medical information extraction and medical auxiliary diagnosis. However, medical short texts face challenges such as sparse features, semantic ambiguity, and the specialized nature of the medical field, resulting in relatively low accuracy in short text classification. Taking into consideration the characteristics of medical short texts, this paper proposes a Chinese medical short text classification model based on DPECNN. First, ERNIE is utilized to learn text knowledge and information in order to enhance the model’s semantic representation capabilities. Then, the DPECNN model is employed to extract rich feature information, and the classification …results are generated through a fully connected layer. In the case of DPCNN, it only considers deep-level contextual semantic information, overlooking the correlation of adjacent semantic information between channels. To address this, ECA channel attention is introduced to account for adjacent semantic information. The use of a self-normalizing activation function helps avoid the problem of vanishing gradients. To enhance the model’s robustness and generalization ability, the FGM adversarial training algorithm is employed to perturb the data. The F1 values achieved on the THUCNews, KUAKE-QIC, and CHIP-CTC datasets are 95.00%, 79.45%, and 82.81%, respectively. Show more
Keywords: Medical text mining, Chinese short text classification, ERNIE, DPECNN, confrontation training
DOI: 10.3233/JIFS-239006
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Du, Rong | Cheng, Yan
Article Type: Research Article
Abstract: This research paper highlights the significance of vehicle detection in aerial images for surveillance systems, focusing on deep learning methods that outperform traditional approaches. However, the challenge of high computation complexity due to diverse vehicle appearances persists. The motivation behind this study is to highlight the crucial role of vehicle detection in aerial images for surveillance systems, emphasizing the superior performance of deep learning methods compared to traditional approaches. To address this, a lightweight deep neural network-based model is developed, striking a balance between accuracy and efficiency enabling real-time operation. The model is trained and evaluated on a standardized dataset, …with extensive experiments demonstrating its ability to achieve accurate vehicle detection with significantly reduced computation costs, offering a practical solution for real-world aerial surveillance scenarios. Show more
Keywords: Aerial images, vehicle detection, surveillance system, deep learning, real-time processing
DOI: 10.3233/JIFS-236059
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Pavithra, R. | Ramachandran, Prakash
Article Type: Research Article
Abstract: The Hilbert spectrum images of intrinsic mode functions (IMF) of empirical mode decomposition (EMD) analysis and variational mode decomposition (VMD) analysis of faulty machine vibration signals are used in deep convolutional neural network (DCNN) for machine fault classification in which the DCNN automatically learns the features from spectral images using convolution layer. Though both EMD and VMD analysis suit well for non-stationary signal analysis, VMD has the merit of aliasing free IMFs. In this paper, the performance improvement of DCNN classification for a non-stationary vibration signal dataset using VMD is brought out. The numerical experiment uses the Hilbert spectrum images …of 4 EMD-IMFs and 4 VMD-IMFs in DCNN to classify 10 different faults of the Case Western Reserve University (CWRU) bearing dataset. The confusion matrices are obtained and the plot of model accuracies in terms of epochs for the DCNN is analysed. It is shown that the spectrum images of one of the four EMD-IMFs, IMF0 , give a validation accuracy of 100% and in the case of VMD the spectrum images of two of the four VMD-IMFs, IMF0 , and IMF1 give a validation accuracy of 100%. This reveals that non-aliasing IMFs of VMD are better at classifying bearing faults. Further to bring out the merits of VMD analysis for non-stationary signals the numerical experiment is conducted using VMD analysis for binary fault classification of the milling dataset which is more non-stationary than the bearing dataset which is proved by plotting the statistical parameters of both datasets against time. It is found that the DCNN classification is 100% accurate for IMF3 of VMD analysis which is much better than the 81% accuracy provided by EMD analysis as per existing literature. The performance comparison highlights the merits of VMD analysis over EMD analysis and other state-of-the-art methods and ensemble learning methods. Show more
Keywords: Deep convolution neural network, empirical mode decomposition, hilbert transform, intrinsic mode function, variational mode decomposition, ensemble learning
DOI: 10.3233/JIFS-237546
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-19, 2024
Authors: Nawshin, Sabila | Islam, Salekul | Shatabda, Swakkhar
Article Type: Research Article
Abstract: Software Defined Networking (SDN) proposes a centralized network paradigm where a central controller manages the network. While this centralizes scheme opens up previously unachievable opportunities, it also makes the network more susceptible to a varying range of cyber threats. The development of effective Intrusion Detection Systems (IDS) designed for the SDN topology is a critical need to address the different vulnerabilities SDN faces. Towards that purpose, the inSDN dataset was specifically curated for intrusion detection in SDN with various attack scenarios unique to the SDN topology. This study leveraged the inSDN dataset to introduce an innovative Intrusion Detection …System (IDS) model that amalgamates Principal Component Analysis (PCA), a dimensionality reduction technique widely employed in traditional Machine Learning (ML) to extract the principal features of the dataset and couples it with Artificial Neural Networks (ANN) to classify network traffic based on the extracted features. The proposed model attains an exceptional accuracy rate of 99.95% for multi-class classification and demonstrate that it surpasses the current state-of-the-art techniques while operating within a much simpler framework. This significantly diminishes the necessity for complex models that demand extensive computational resources when dealing with the inSDN attack dataset. The analysis of the dataset carried out in this study also provides insights into the redundancy present in the dataset and identifies the core features that contains most of the information in the dataset. Show more
Keywords: Software Defined Networking (SDN), Intrusion Detection Systems (IDS), Principle Component Analysis (PCA), Artificial Neural Network (ANN)
DOI: 10.3233/JIFS-236340
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Kumar, Geethu S. | Ankayarkanni, B.
Article Type: Research Article
Abstract: Facial Emotion Recognition (FER) is a powerful tool for gaining insights into human behaviour and well-being by precisely quantifying a wide range of emotions especially stress, through the analysis of facial images. Detecting stress using FER entails meticulously examining subtle facial cues, such as changes in eye movements, brow furrowing, lip tightening, and muscle contractions. To assure effectiveness and real-time processing, FER approaches based on deep learning and artificial intelligence (AI) techniques was created using edge modules. This research introduces a novel approach for identifying stress, leveraging the Conv-XGBoost Algorithm to analyse facial emotions. The proposed model sustain rigorous evaluation …techniques, for employing key metrics examination such as the F1 score, validation accuracy, precision, and recall rate to assess its real-world reliability and robustness. This comprehensive analysis and validation proved the model’s practical utility in facial analysis. Integrating the Conv-XGBoost Algorithm with facial emotion analysis represents a promising and highly accurate solution for efficient stress detection. The method surpasses existing literature and demonstrate significant potential for practical applications based on well-validated data. Show more
Keywords: Stress, emotion recognition, Conv-XGBoost, deep learning, facial expression
DOI: 10.3233/JIFS-237820
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Martínez Felipe, Miguel de JesÚs | Martínez Castro, JesÚs Alberto | Montiel Pérez, JesÚs Yaljá | Chaparro Amaro, Oscar Roberto
Article Type: Research Article
Abstract: In this work, the image block matching based on dissimilarity measure is investigated. Moreover, an unsupervised approach is implemented to yield that the algorithms have low complexity (in numbers of operations) compared to the full search algorithm. The state-of-the-art experiments only use discrete cosine transform as a domain transform. In addition, some images were tested to evaluate the algorithms. However, these images were not evaluated according to specific characteristics. So, in this paper, an improved version is presented to tackle the problem of dissimilarity measure in block matching with a noisy environment, using another’s domain transforms or low-pass filters to …obtain a better result in block matching implementing a quantitive measure with an average accuracy margin of ± 0.05 is obtained. The theoretical analysis indicates that the complexity of these algorithms is still accurate, so implementing Hadamard spectral coefficients and Fourier filters can easily be adjusted to obtain a better accuracy of the matched block group. Show more
Keywords: Block matching, Walsh-Hadamard discrete transform, Fourier filter, dissimilarity measure, unsupervised machine learning
DOI: 10.3233/JIFS-219341
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Ensastegui-Ortega, Maria Elena | Batyrshin, Ildar | Cárdenas–Perez, Mario Fernando | Kubysheva, Nailya | Gelbukh, Alexander
Article Type: Research Article
Abstract: In today’s data-rich era, there is a growing need for developing effective similarity and dissimilarity measures to compare vast datasets. It is desirable that these measures reflect the intrinsic structure of the domain of these measures. Recently, it was shown that the space of finite probability distributions has a symmetric structure generated by involutive negation mapping probability distributions into their “opposite” probability distributions and back, such that the correlation between opposite distributions equals –1. An important property of similarity and dissimilarity functions reflecting such symmetry of probability distribution space is the co-symmetry of these functions when the similarity between probability …distributions is equal to the similarity between their opposite distributions. This article delves into the analysis of five well-known dissimilarity functions, used for creating new co-symmetric dissimilarity functions. To conduct this study, a random dataset of one thousand probability distributions is employed. From these distributions, dissimilarity matrices are generated that are used to determine correlations similarity between different dissimilarity functions. The hierarchical clustering is applied to better understand the relationships between the studied dissimilarity functions. This methodology aims to identify and assess the dissimilarity functions that best match the characteristics of the studied probability distribution space, enhancing our understanding of data relationships and patterns. The study of these new measures offers a valuable perspective for analyzing and interpreting complex data, with the potential to make a significant impact in various fields and applications. Show more
Keywords: Dissimilarity function, co-symmetry, correlation, probability distribution, negation
DOI: 10.3233/JIFS-219363
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Xu, Zhigang | Li, Yugen
Article Type: Research Article
Abstract: Construction site environment helmet detection is of great significance for protecting workers’ lives and realizing the automation of safety management. Aiming at the current object detection methods for the complex construction site environment in the small-scale helmet object detection ability is insufficient. This paper proposes a construction site environment helmet detection method based on multi-scale context and attention fusion. The method is able to aggregate the multi-scale contextual semantics of deep image features through the proposed multi-scale context module and expand the receptive field in order to improve the network’s discriminative learning ability for small-scale helmet objects. Meanwhile, the proposed …attention feature fusion module dynamically fuses features from shallow features and network decoding features to enhance the network’s ability to learn the expression of global feature dependencies and local spatial detail features of helmet objects, and further improve the network’s detection precision of helmet objects. The experimental results show that on the constructed safety helmet wearing dataset, the proposed method in this paper has good detection effect and balanced detection speed compared with the existing mainstream object detection methods. Show more
Keywords: Construction site, helmet detection, CenterNet, multi-scale context, attention feature fusion
DOI: 10.3233/JIFS-236385
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]