Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2023: 2
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Ning, Yi | Liu, Meiyu | Guo, Xifeng | Liu, Zhiyong | Wang, Xinlu
Article Type: Research Article
Abstract: Accurate load forecasting is an important issue for safe and economic operation of power system. However, load data often has strong non-stationarity, nonlinearity and randomness, which increases the difficulty of load forecasting. To improve the prediction accuracy, a hybrid short-term load forecasting method using load feature extraction based on complete ensemble empirical mode decomposition with adaptive noise (CEEMDAN) and refined composite multi-scale entropy (RCMSE) and improved bidirectional long short time memory (BiLSTM) error correction is proposed. Firstly, CEEMDAN is used to separate the detailed information and trend information of the original load series, RCMSE is used to reconstruct the feature …information, and Spearman is used to screen the features. Secondly, an improved butterfly optimization algorithm (IBOA) is proposed to optimize BiLSTM, and the reconstructed components are predicted respectively. Finally, an error correction model is constructed to mine the hidden information contained in error sequence. The experimental results show that the MAE, MAPE and RMSE of the proposed method are 645 kW, 0.96% and 827.3 kW respectively, and MAPE is improved by about 10% compared with other hybrid models. Therefore, the proposed method can overcome the problem of inaccurate prediction caused by data and inherent defects of models and improve the prediction accuracy. Show more
Keywords: Short-term load forecasting, complete ensemble empirical mode decomposition with adaptivenoise, refined composite multi-scale entropy, improved butterfly optimization algorithm, bidirectional long short time memory neural network
DOI: 10.3233/JIFS-237993
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Arulmurugan, A. | Jose Moses, G. | Gandhi, Ongole | Sheshikala, M. | Arthie, A.
Article Type: Research Article
Abstract: In the current scenario, feature selection (FS) remains one of the very important functions in machine learning. Decreasing the feature set (FSt) assists in enhancing the classifier’s accuracy. Because of the existence of a huge quantity of data within the dataset (DS), it remains a colossal procedure for choosing the requisite features out of the DS. Hence, for resolving this issue, a new Chaos Quasi-Oppositional-based Flamingo Search Algorithm with Simulated Annealing Algorithm (CQOFSASAA) has been proffered for FS and for choosing the optimum FSt out of the DSs, and, hence, this lessens the DS’ dimension. The FSA technique can be …employed for selecting the optimal feature subset out of the DS. Generalized Ring Crossover has been as well embraced for selecting the very pertinent features out of the DS. Lastly, the Kernel Extreme Learning Machine (KELM) classifier authenticates the chosen features. This proffered paradigm’s execution has been tested by standard DSs and the results have been correlated with the rest of the paradigms. From the experimental results, it has been confirmed that this proffered CQOFSASAA attains 93.74% of accuracy, 92% of sensitivity, and 92.1% of specificity. Show more
Keywords: Quasi-oppositional, feature selection, Flamingo Search Algorithm, Simulated Annealing, convergence rate
DOI: 10.3233/JIFS-233557
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2023
Authors: Harikumar, Yedhu | Muthumeenakshi, M.
Article Type: Research Article
Abstract: The Indian stock market is a dynamic, complicated system that is impacted by many different variables, making it difficult to anticipate its future. The utilization of deep learning and optimization techniques to forecast stock market movements has gained popularity in recent years. To foresee the Indian stock market, an innovative approach is presented in this study that combines the Grey Wolf Optimization algorithm with a hybrid Convolutional Neural Network (CNN) and Bi-Directional Long-Short Term Memory (Bi-LSTM) framework. The stock market information is first pre-processed utilizing a CNN to extract pertinent features. The Bi-LSTM system, that is intended to capture the …long-term dependencies and temporal correlations of the stock market statistics, is then fed the CNN’s outcome. The model parameters are then optimized utilizing the Grey Wolf Optimization (GWO) technique, which also increases forecasting accuracy. The findings demonstrate that, in terms of forecasting accuracy, the suggested method outperforms a number of contemporary methods, including conventional time series models, neural networks, and evolutionary algorithms. Thus, the suggested methodology provides an effective way to forecast the Indian stock market by combining deep learning and optimization approaches. Show more
Keywords: Indian stock market, grey wolf optimization, deep learning approach, bi-directional long-short term memory, convolutional neural network
DOI: 10.3233/JIFS-233716
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2023
Authors: Li, Xiaoli | Du, Linhui | Yu, Xiaowei | Wang, Kang | Hu, Yongkang
Article Type: Research Article
Abstract: During the operation of HVAC (Heating, Ventilation, and Air-Conditioning) systems, precise energy consumption prediction plays an important role in achieving energy savings and optimizing system performance. However, the HVAC system is a complex and dynamic system characterized by a large number of variables that exhibit significant changes over time. Therefore, it is inadequate to rely on a fixed offline model to adapt to the dynamic changes in the system that consume tremendous computation time. To solve this problem, a deep neural network (DNN) model based on Just-in-Time learning with hyperparameter R (RJITL) is proposed in this paper to predict …HVAC energy consumption. Firstly, relevant samples are selected using Euclidean distance weighted by Spearman coefficients. Subsequently, local models are constructed using deep neural networks supplemented with optimization techniques to enable real-time rolling energy consumption prediction. Then, the ensemble JITL model mitigates the influence of local features, and improves prediction accuracy. Finally, the local models can be adaptively updated to reduce the training time of the overall model by defining the update rule (hyperparameter R ) for the JITL model. Experimental results on energy consumption prediction for the HVAC system show that the proposed DNN-RJITL method achieves an average improvement of 5.17% in accuracy and 41.72% in speed compared to traditional methods. Show more
Keywords: HVAC, energy consumption, weighted similarity measure, deep neural network, Just-in-Time learning
DOI: 10.3233/JIFS-233544
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Maleki, Monavareh | Ebrahimi, Mohamad | Davvaz, B.
Article Type: Research Article
Abstract: The concept of entropy and information gain of BE-algebras in scientific disciplines such as information theory, data science, supply chain and machine learning assists us to calculate the uncertanity of the scientific processes of phenomena. In this respect the notion of filter entropy for a transitive BE-algebra is introduced and its properties are investigated. The notion of a dynamical system on a transitive BE-algebra is introduced. The concept of the entropy for a transitive BE-algebra dynamical system is developed and, its characteristics are considered. The notion of equivalent transitive BE-algebra dynamical systems is defined, and it is proved the fact …that two equivalent BE-algebra dynamical systems have the same entropy. Theorems to help calculate the entropy are given. Specifically, a new version of Kolmogorov– Sinai Theorem has been proved. The study introduces the concept of information gain of a transitive BE-algebra with respect to its filters and investigates its properties. This study proposes the use of filter entropy to approximate the level of risk introduced by a BE-algebra dynamical system. This aim is reached by defining the information gain with respect to the filters of a BE-algebra. This methodology is well developed for use in engineering, especially in industrial networks. This paper proposes a novel approach to assess the quantity of uncertainty, and the impact of information gain of a BE-algebra dynamical system. Show more
Keywords: Generator, transitive BE-algebra, dynamical system, entropy, information gain
DOI: 10.3233/JIFS-232363
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Yang, Jiyun | Gui, Can
Article Type: Research Article
Abstract: Malware attack is a growing problem on the Android mobile platform due to its popularity and openness. Although numerous malware detection approaches have been proposed, it still remains challenging for malware detection due to a large amount of constantly mutating apps. The opcode, as the most fundamental part of Android app, possesses good resistance against obfuscation and Android version updates. Due to the large number of opcodes, most opcode-based methods employ statistical-based feature selection, which disrupts the correlation and semantic information among opcodes. In this paper, we propose an Android malware detection framework based on sensitive opcodes and deep reinforcement …learning. Firstly, we extract sensitive opcode fragments based on sensitive elements and then encode the features using n -gram. Next, we use deep reinforcement learning to select the optimal subset of features. During the process of handling opcodes, we focus on preserving semantic information and the correlation among opcodes. Finally, our experimental results show an accuracy of 0.9670 by using the 25 opcode features we obtained. Show more
Keywords: Android malware, deep reinforcement learning, feature selection, machine learning
DOI: 10.3233/JIFS-235767
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-10, 2024
Authors: Badshah, Noor | Begum, Nasra | Rada, Lavdie | Ashfaq, Muniba | Atta, Hadia
Article Type: Research Article
Abstract: Joint segmentation and registration of images is a focused area of research nowadays. Jointly segmenting and registering noisy images and images having weak boundaries/intensity inhomogeneity is a challenging task. In medical image processing, joint segmentation and registration are essential methods that aid in distinguishing structures and aligning images for precise diagnosis and therapy. However, these methods encounter challenges, such as computational complexity and sensitivity to variations in image quality, which may reduce their effectiveness in real-world applications. Another major issue is still attaining effective joint segmentation and registration in the presence of artifacts or anatomical deformations. In this paper, a …new nonparametric joint model is proposed for the segmentation and registration of multi-modality images having weak boundaries/noise. For segmentation purposes, the model will be utilizing local binary fitting data term and for registration, it is utilizing conditional mutual information. For regularization of the model, we are using linear curvature. The new proposed model is more efficient to segmenting and registering multi-modality images having intensity inhomogeneity, noise and/or weak boundaries. The proposed model is also tested on the images obtained from the freely available CHOAS dataset and compare the results of the proposed model with the other existing models using statistical measures such as the Jaccard similarity index, relative reduction, Dice similarity coefficient and Hausdorff distance. It can be seen that the proposed model outperforms the other existing models in terms of quantitatively and qualitatively. Show more
Keywords: Image segmentation, image registration, linear curvature (LC), conditional mutual information (CMI), Jaccard similarity index (JSI)
DOI: 10.3233/JIFS-233306
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Wang, Tianxiong | Xu, Mengmeng | Yang, Liu | Zhou, Meiyu | Sun, Xin
Article Type: Research Article
Abstract: Kansei Engineering (KE) is a product design method that aims to develop products to meet users’ emotional preferences. However, traditional KE faces the problem that the acquisition of Kansei factors does not represent the real consumers demands based on manual and reports, and using tradition methods to calculate relationship between Kansei factors and specific design elements, which can lead to the omission of key information. To address these problems, this study adopts text mining and backward propagation neural networks (BPNN) to propose a product form design method from a multi-objective optimization perspective. Firstly, Term Frequency-Inverse Document Frequency (TF-IDF) and WordNet …are used to extract key user Kansei requirements from online review texts to obtain more accurate Kansei knowledge. Secondly, the BPNN is used to establish the non-linear relationship between product Kansei factors and specific design elements, and a preference mapping prediction model is constructed. Finally, BPNN is transformed into an iterative prediction value of non-dominated sorting genetic algorithm-II (NSGA-II), and the model is solved through multi-objective evolutionary algorithm (MOEA) to obtain the Pareto optimal solution set that satisfies the user’s multiple emotional needs, and the fuzzy Delphi method is used to obtain the best product form design scheme that meets the user’s multiple emotional images. Using the example of electric bicycle form design show that this proposed method can effectively complete multi-objective product solutions innovation design. Show more
Keywords: Text mining, Back propagation neural network (BPNN), Multi-objective evolutionary algorithm (MOEA), Non-dominated sorting genetic algorithm-II (NSGA-II), Kansei engineering
DOI: 10.3233/JIFS-230668
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-21, 2024
Authors: Jianping, Liu | Yingfei, Wang | Jian, Wang | Meng, Wang | Xintao, Chu
Article Type: Research Article
Abstract: To better understand users’ behavior patterns in web search, numerous click models are proposed to extract the implicit interaction feedback. Most existing click models are heavily based on the implicit information to model user behaviors, ignoring the impact of explicit information between queries and documents in search sessions. In this paper, we fully consider the topic relevance between queries and documents in search sessions and propose a novel topic relevance-aware click model (TRA-CM) for web search. TRA-CM consists of a relevance estimator and an examination predictor. The relevance estimator consists of a topic relevance predictor and a click context encoder. …In the topic relevance predictor, we utilize the pre-trained BERT model to model the content information of queries and documents in search sessions. Meanwhile, we use transformer to encode users’ click behaviors in the click context encoder. We further apply a two-stage fusion strategy to obtain the final relevance scores. The examination predictor estimates the examination probability of each document. We further utilize learnable filters to attenuate log noise and obtain purer input features in both relevance estimator and examination predictor, and investigate different combination functions to integrate relevance scores and examination probabilities into click prediction. Extensive experiment results on two real-world session datasets prove that TRA-CM outperforms existing click models in both click prediction and relevance estimation tasks. Show more
Keywords: BERT, click model, click prediction, deep learning, web search
DOI: 10.3233/JIFS-236894
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Lizhu, Yue | Qian, Wang
Article Type: Research Article
Abstract: With the rapid development of big data and continuous optimization of online shopping platforms, personalized recommendation has become a standard feature of recommendation methods. In order to effectively provide personalized recommendations to customers, improve recommendation accuracy, and customer satisfaction, it is necessary to consider customers’ preferences for multiple product attributes when making product recommendations. However, existing recommendation methods require precise calculation of product attribute weights, which is computationally expensive, complex, and often results in unstable weight values. This paper proposes a multi-attribute recommendation method based on consumer decision preference information that overcomes the need for weights and reflects personalized customer …preferences. Based on the acquisition of customer product attribute preference sequences, a partial order relation for recommended products is constructed using partial order set theory. Finally, the recommended products are determined through the partial order Hasse diagram, where the top layer elements of the Hasse diagram represent the recommended product set. This method addresses challenges that traditional content-based recommendations cannot overcome. The experiment in this paper uses a dataset of 30,000 records from Beeradvocate beer reviews. The experimental results show that, compared to traditional multi-attribute recommendation methods, this method only requires decision-maker preference information to complete product recommendations, requiring less information and having lower computational costs, resulting in more robust results. Show more
Keywords: Multi-attribute recommendation, partial order set, decision preference, hasse diagram, personalization
DOI: 10.3233/JIFS-231724
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Huang, Mengtao | Wang, Jiaxuan
Article Type: Research Article
Abstract: Pedestrian trajectory prediction plays a crucial role in autonomous driving, as its accuracy directly affects the autonomous driving system’s comprehension of the environment and subsequent decision-making processes. Current trajectory prediction methods tend to oversimplify pedestrians to mere point coordinates, utilizing positional information to infer interactions among individuals while overlooking the temporal correlations between them, thereby excessively simplifying pedestrian characteristics. To address the aforementioned issues, this paper proposes a trajectory prediction model for autonomous driving applications, that takes into account both pedestrian motion characteristics and scene interaction. The model optimizes the LSTM unit structure twice, serving to learn correlations among long …trajectories of pedestrians and to integrate multiple forms of information into the neighborhood interaction module. Furthermore, our model introduces dual attention mechanisms for individuals and scenes, focusing on the key motion points of individual pedestrians and their interactive behavior with others in busy scenarios. The efficacy of the model was validated on the MOT16 pedestrian dataset and the Daimler pedestrian path prediction dataset, outperforming mainstream methods with 8% and 10% reductions in Average Displacement Error and Final Displacement Error respectively. Show more
Keywords: Trajectory prediction, automated driving, CNN-LSTM, deep learning
DOI: 10.3233/JIFS-236271
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2024
Authors: Yu, Xingping | Yang, Yang
Article Type: Research Article
Abstract: The rapid advancement of communication and information technology has led to the expansion and blossoming of digital music. Recently, music feature extraction and classification have emerged as a research hotspot due to the difficulty of quickly and accurately retrieving the music that consumers are looking for from a large volume of music repositories. Traditional approaches to music classification rely heavily on a wide variety of synthetically produced aural features. In this research, we propose a novel approach to selecting the musical genre from user playlists by using a classification and feature selection machine learning model. To filter, normalise, and eliminate …missing variables, we collect information on the playlist’s music genre and user history. The characteristics of this data are then selected using a convolutional belief transfer Gaussian model (CBTG) and a fuzzy recurrent adversarial encoder neural network (FRAENN). The experimental examination of a number of music genre selection datasets includes measures of training accuracy, mean average precision, F-1 score, root mean squared error (RMSE), and area under the curve (AUC). Results show that this model can both create a respectable classification result and extract valuable feature representation of songs using a wide variety of criteria. Show more
Keywords: Music genre selection, user playlists, machine learning, classification, feature selection
DOI: 10.3233/JIFS-235478
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Gul, Rimsha | Bashir, Maryam
Article Type: Research Article
Abstract: As the volume of data continues to grow, the significance of text classification is on the rise. This vast amount of data majorly exists in the form of texts. Effective data preparation is essential to extract sentiment data from this vast amount of text, as irrelevant and redundant information can impede valuable insights. Feature selection is an important step in the data preparation phase as it eliminates irrelevant and insignificant features from the huge features set. There exist a large body of work related to feature selection for image processing but limited research is done for text data. While some …studies recognize the significance of feature selection in text classification, but there is still need for more efficient sentiment analysis models that optimize feature selection and reduce computational. This manuscript aims to bridge these gaps by introducing a hybrid multi-objective evolutionary algorithm as a feature selection mechanism, combining the power of multiple objectives and evolutionary processes. The approach combines two feature selection techniques within a binary classification model: a filter method, Information Gain (IG), and an evolutionary wrapper method, Binary Multi-Objective Grey Wolf Optimizer (BMOGWO). Experimental evaluations are conducted across six diverse datasets. It achieves a reduction of over 90 percent in feature size while improving accuracy by nearly nine percent. These results showcase the model’s efficiency in terms of computational time and its efficacy in terms of higher classification accuracy which improves sentiment analysis performance. This improvement can be beneficial for various applications, including recommendation systems, reviews analysis, and public opinion observation. However, it’s crucial to acknowledge certain limitations of this study. These encompass the need for broader classifier evaluation, and scalability considerations with larger datasets. These identified limitations serve as directions for future research and the enhancement of the proposed approach. Show more
Keywords: Feature selection, sentiment analysis, multi-objective optimization, evolutionary algorithms
DOI: 10.3233/JIFS-234615
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Zhao, Xiaoqing | Xu, Miaomiao | Li, Yanbing | Huang, Hao | Silamu, Wushour
Article Type: Research Article
Abstract: This research focuses on Scene Text Recognition (STR), a crucial component in various applications of artificial intelligence such as image retrieval, office automation, and intelligent traffic systems. Recent studies have shown that semantic-aware approaches significantly improve the performance of STR tasks, with context-aware STR methods becoming mainstream. Among these, the fusion of visual and language models has shown remarkable effectiveness. We propose a novel method (PABINet) that incorporates three key components: a Visual-Language Decoder, a Language Model, and a Fusion Model. First, during training, the Visual-Language Decoder masks the original labels in the Transformer decoder using permutation masks, with each …mask being unique. This enhances word memorization and learning through contextual semantic information, resulting in robust semantic knowledge. During the inference stage, the Visual-Language Decoder employs autonomous Autoregressive model (AR) inference to generate results. Subsequently, the Language Model scrutinizes and corrects the output of the Visual-Language Encoder using a cloze mask approach, achieving context-aware, autonomous, bidirectional inference. Finally, the Fusion Model concatenates and refines the outputs of both models through iterative layers.Experimental results demonstrate that our PABINet performs exceptionally well when handling various quality images. When trained with synthetic data, PABINet achieves a new STR benchmark (average accuracy of 92.41%), and when trained with real data, it establishes new state-of-the-art results (average accuracy of 96.28%). Show more
Keywords: Scene text recognition, language model, visual-language decoder
DOI: 10.3233/JIFS-237135
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Chen, Hongan | Zhang, Zongfu | Luo, Qingjia | Chen, Rongbin | Zhao, Yang
Article Type: Research Article
Abstract: Existing methods for recognizing partial discharge patterns in power cables do not utilize fuzzy clustering of the discharge signals, resulting in poor quality and low recall and precision of the pattern recognition. To address this, we propose a new approach for partial discharge pattern recognition in cables using Gustafson-Kessel(GK) Fuzzy Clustering. The method involves acquiring signals from a power cable partial discharge monitoring system and then processing the signals with GK fuzzy clustering. The clustered discharge signals are filtered with wavelet packet transforms before input into an improved adaptive resonance theory(ART) neural network for final pattern recognition. Experiments demonstrate the …new technique achieves up to 98.7% recall and 85.6% precision for discharge pattern recognition, with discharge signal Signal Noise Ratio(SNR) between 55 dB and 62 dB and maximum recognition accuracy reaching 98%. The proposed fuzzy clustering-based pattern recognition approach significantly enhances partial discharge diagnostics for power cable monitoring. Show more
Keywords: Gustafson-Kessel(GK) fuzzy clustering, power cable, partial discharge, pattern recognition, wavelet packet transform
DOI: 10.3233/JIFS-235945
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Sharma, Itika | Gupta, Sachin Kumar
Article Type: Research Article
Abstract: UAVs or Drones can be used to support wireless communication by acting as flying or mobile Base Stations for the accumulation of the different types of data to train the models. However, in traditional or DL-based UAVs, the raw data is sent from the devices to the centralized server, which causes problems in terms of the privacy of the devices and the UAVs’ communication resources or limited processing. Therefore, the issue with DL-based UAVs is that sending the original data to the centralized body raises questions about security and privacy. The transmission of distributed, unprocessed data from the drones to …the cloud, including interactive media information data types, requires a significant amount of network bandwidth and more energy, which has an enormous effect on several trade-offs, including communication rates and computation latencies. Data packet loss caused by asynchronous transmission, which doesn’t prevent peer-to-peer communication, is a concern with AFL-based UAVs. Therefore, in order to address the aforementioned issues, we have introduced SFL-based UAVs that focus on creating algorithms in which the models simultaneously update the server as they wait for all of the chosen devices to communicate. The proposed framework enables a variety of devices, including mobile and UAV devices, to train or learn their algorithms for machine learning before updating the models and parameters simultaneously to servers or manned aerial data centers for model buildup without transferring their original private information. This decreases packet loss and privacy threats while also enhancing round effectiveness as well as model accuracy. The comparative analysis of AFL and SFL techniques in terms of accuracy, global rounds, and communication rounds are offered. Simulation findings suggest that the proposed methodology improves in terms of global rounds and accuracy. Show more
Keywords: UAV, training, raw data, FL, AFL, SFL etc
DOI: 10.3233/JIFS-235275
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2024
Authors: Guo, Hong | Yang, Jin | Yang, Jun
Article Type: Research Article
Abstract: This paper proposes a method of using machine learning and an evolutionary algorithm to solve the flexible job shop problem (FJSP). Specifically, a back propagation (BP) neural network is used as the machine learning method, the most widely used genetic algorithm (GA) is employed as the optimized object to address the machine-selection sub-problem of the FJSP, and particle swarm optimization (PSO) is utilized to solve the operation-order sub-problem of the FJSP. At present, evolutionary algorithms such as the GA, PSO, ant colony algorithm, simulated annealing algorithm, and their optimization algorithms are widely used to solve the FJSP; however, none of …them optimizes the initial solutions. Because each of these algorithms only focuses on solving a single FJSP, they can only use randomly generated initial solutions and cannot determine whether the initial solutions are good or bad. Based on these standard evolutionary algorithms and their optimized versions, the JSON object was introduced in this study to cluster and reconstruct FJSPs such that the machine learning strategies can be used to optimize the initial solutions. Specifically, the BP neural networks are trained so that the generalization of BP neural networks can be used to judge whether the initial solutions of the FJSPs are good or bad. This approach enables the bad solutions to be filtered out and the good solutions to be maintained as the initial solutions. Extensive experiments were performed to test the proposed algorithm. They demonstrated that it was feasible and effective. The contribution of this approach consists of reconstructing the mathematical model of the FJSP so that machine learning strategies can be introduced to optimize the algorithms for the FJSP. This approach seems to be a new direction for introducing more interesting machine learning methodologies to solve the FJSP. Show more
Keywords: Flexible job shop scheduling problem, mechanical engineering, evolutionary algorithms, machine learning
DOI: 10.3233/JIFS-224021
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-19, 2024
Authors: Tomy, Navin | Johnson, T.P.
Article Type: Research Article
Abstract: This paper deals with lattice isomorphic L -topological spaces. We are concerned with a question: Under what conditions will a lattice isomorphic L -topological spaces be L -homeomorphic. We give contributions to this question in three different ways.
Keywords: L-homeomorphism, quasi L-homeomorphism, lattice isomorphism, pL-homeomorphism
DOI: 10.3233/JIFS-234375
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Chen, Junzhuo | Lu, Zonghan | Kang, Shitong
Article Type: Research Article
Abstract: In the wake of the global spread of monkeypox, accurate disease recognition has become crucial. This study introduces an improved SE-InceptionV3 model, embedding the SENet module and incorporating L2 regularization into the InceptionV3 framework to enhance monkeypox disease detection. Utilizing the Kaggle monkeypox dataset, which includes images of monkeypox and similar skin conditions, our model demonstrates a noteworthy accuracy of 96.71% on the test set, outperforming conventional methods and deep learning models. The SENet module’s channel attention mechanism significantly elevates feature representation, while L2 regularization ensures robust generalization. Extensive experiments validate the model’s superiority in precision, recall, and F1 score, …highlighting its effectiveness in differentiating monkeypox lesions in diverse and complex cases. The study not only provides insights into the application of advanced CNN architectures in medical diagnostics but also opens avenues for further research in model optimization and hyperparameter tuning for enhanced disease recognition. Show more
Keywords: CNN, InceptionV3, SENet, L2 regularization, monkeypox disease, deep learning
DOI: 10.3233/JIFS-237232
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Pandey, Vibha | Choubey, Siddhartha | Patra, Jyotiprakash | Mall, Shachi | Choubey, Abha
Article Type: Research Article
Abstract: Automated reading of license plate and its detection is a crucial component of the competent transportation system. Toll payment and parking management e-payment systems may benefit from this software’s features. License plate detection and identification algorithms abound, and each has its own set of strengths and weaknesses. Computer vision has advanced rapidly in terms of new breakthroughs and techniques thanks to the emergence and proliferation of deep learning principles across several branches of AI. The practice of automating the monitoring process in traffic management, parking management, and police surveillance has become much more effective thanks to the development of Automatic …License Plate Recognition (ALPR). Even though license plate recognition (LPR) is a technology that is extensively utilized and has been developed, there is still a significant amount of work to be done before it can achieve its full potential. In the last several years, there have been substantial advancements in both the scientific community’s methodology and its level of efficiency. In this era of deep learning, there have been numerous developments and techniques established for LPR, and the purpose of this research is to review and examine those developments and approaches. In light of this, the authors of this study suggest a four-stage technique to automated license plate detection and identification (ALPDR), which includes, image pre-processing, license plate extraction, character segmentation, and character recognition. And the first three phases are known as “extraction,” “pre-processing,” and “segmentation,” and each of these processes has been shown to benefit from its own unique technique. In light of the fact that character recognition is an essential component of license plate identification and detection, the Convolution Neural Network (CNN), MobileNet, Inception V3, and ResNet 50 have all been put through their paces in this regard. Show more
Keywords: Data security, secure image analysis, automatic license plate recognition, segmentation, image classification, convolution neural network, character recognition
DOI: 10.3233/JIFS-235400
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-23, 2024
Authors: Wu, Chengding | Xu, Zhaoping | Liu, Liang | Yang, Tao
Article Type: Research Article
Abstract: There are limitations of personalization in Advanced Driver Assistance Systems (ADAS) that have a serious impact on driver acceptance and satisfaction. This study investigates driving style recognition method to achieve personalization of longitudinal driving behavior. Currently, driving style recognition algorithms for Personalized Adaptive Cruise Control (PACC) rely on integrated recognition. However, disturbances in the driving cycle may lead to changes in a driver’s integrated driving style. Therefore, the integrated driving style cannot accurately and comprehensively reflect the driver’s driving style. To solve this problem, a new driving style recognition method for PACC is proposed, which considers integrated driving style and …driving cycle. Firstly, the method calculates the constructed feature parameters of driving cycle and style, and then reduces the dimensionality of the feature parameter matrix by principal component analysis (PCA). Secondly, a two-stage clustering algorithm with self-organizing mapping networks and K-means clustering (SOM-K-means) is used to obtain the type labels. Then, a transient recognition model based on random forest (RF) is established and the hyperparameters of this model are optimized by sparrow search algorithm (SSA). Based on this, a comprehensive driving style recognition model is established using analytic hierarchy process (AHP). Finally, the validity of the proposed method is verified by a natural dataset. The method incorporates the driving cycle into driving style recognition and provides guidance for improving the personalization of adaptive cruise control system. Show more
Keywords: Personalized adaptive cruise control, SOM-K-means two-stage clustering, random forest (RF), sparrow search algorithm (SSA), driving style recognition
DOI: 10.3233/JIFS-235045
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Atef, Shimaa | El-Seidy, Essam | Reda, Naglaa M.
Article Type: Research Article
Abstract: Decisions in many dilemmas are based on a combination of factors, including as incentive, punishment, reputation, and memory. The impact of memory information on cooperative evolution in multi-round games is a decision-making process in group evolution. The iterated prisoner’s dilemma is an excellent model for the development of cooperation amongst the payoff-maximizing individuals. Since tit-for-tat proved successful in Axelrod’s repeated prisoner’s dilemma tournaments, there has been a great deal of interest in creating new strategies. Every iterative prisoner’s dilemma method bases its decision-making on a specific duration of past contacts with the opponent, which is referred to as the memory’s …size. This study examines the impact of strategy memory size on the evolutionary stability of n-person iterated prisoner’s dilemma strategies. In this paper, we address the role that memory plays in decision-making. We interested in the model of the Iterated Prisoner’s Dilemma game for three players with memory two, and we will look at strategies with similar behavior, such as Tit-For-Tat (TFT) strategies as well as Win Stay-Lose Shift (WSLS) strategies. As a result of this paper, we have shown that the effect of memory length is almost non-existent in the competitions of strategies that we studied. Show more
Keywords: Memory-Two, Tit-For-Tat strategies (TFT), three-players iterated prisoner’s dilemma game (3P-IPD), transition matrix, Win Stay-Lose Shift strategies (WSLS)
DOI: 10.3233/JIFS-233690
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Chen, Zhipeng | Liu, Xiao | Qin, Jianhua
Article Type: Research Article
Abstract: To solve the problem that the walking jitter of quadruped robots leads to the degradation of clarity of visual imaging, a quadruped robot visual imaging jitter compensation algorithm based on the theory of walking jitter is proposed. The D-H coordinate transformation method is used to establish the coordinate system of each joint of the leg. The kinetic equations of the leg are derived from the relationship between the rotational velocity and the moment of the leg joint, and the kinetic equilibrium equations of the quadruped robot body are established based on the spatial moment equilibrium theorem; the spring-mass model of …the leg of the quadruped robot is used to construct the kinetic equations of the leg jittering, and the kinetic equations of the body jittering are derived using the moment equilibrium condition of the body center of gravity position and under the effect of the leg and body jitter to obtain the visual imaging device jitter quantity; finally, the tremor quantity is combined with the jitter quantity and rotation matrix to derive the walking jitter mathematical model of the quadruped robot visual imager, and the jitter compensation algorithm of quadruped robot visual imager is verified. The experimental results show that compared with the traditional Wiener filter algorithm for jitter compensation and the BP neural network jitter compensation algorithm, this algorithm improves the visual imaging by 10.8% and 3.3% in the two evaluation indexes of peak signal-to-noise ratio and structural similarity, respectively, and the de-jittering effect is better. Show more
Keywords: Quadruped robot, visual imaging, walking jitter, compensation algorithm
DOI: 10.3233/JIFS-235345
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Liu, Gan | Qi, Guirong | Wan, Sanyu
Article Type: Research Article
Abstract: Imbalanced data is a serious binary classification difficulty in forecasting the well-being of the elderly. This paper improves the Smote algorithm from the algorithm and sample dimensions to tackle the issue of imbalanced distribution of questionnaire data. The k-means Smote is combined with RBFNN as K-RBFNN Smote in the algorithm dimension and add FCM link to resample the minority set in the sample dimension as FCM K-RBFNN Smote. In order to improve the generalization of models, the RUS module is added to the algorithm. Experiments are carried out on four improved Smote technologies and two existing Smote technologies combined with …XGBoost, which is superior than the other five conventional classification models. The experimental results indicate that the performance order is RUS FCM K-RBFNN Smote > K-RBFNN Smote > FCM K-RBFNN Smote > RUS K-RBFNN Smote > K-Means Smote > FCM Smote. The RUS FCM K-RBFNN method has been identified as the optimal approach for enhancing performance, resulting in a 98.58% accuracy rate. In conclusion, Smote algorithm undergoes the implementation of K-RBFNN shows greater performance and the enhancement of FCM and RUS relies on the structure of sampling. Show more
Keywords: RUS FCM K-RBFNN Smote, XGBoost, imbalanced data, elderly well-being classification
DOI: 10.3233/JIFS-235213
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2024
Authors: Allouche, Moez | Dahech, Karim | Gaubert, Jean-Paul
Article Type: Research Article
Abstract: This paper proposes a multi-objective H2 /H ∞ maximum power tracking control of a variable speed wind turbine to minimize the H2 tracking error and ensure the H ∞ model reference-tracking performance, simultaneously. The optimal condition is obtained via a boost converter use, which adapts the load impedance to the wind turbine generator. Thus, based on the fuzzy T-S model, a multi-objective Maximum Power Point Tracking (MPPT) controller is developed, ensuring maximum power transfer, despite wind speed variation and system uncertainty. To specify the optimal trajectory to follow, a TS reference model is proposed taking as input the optimal …rectified DC current. The conditions of stability and stabilization are expressed in terms of linear matrix inequality (LMI) for uncertain and disturbed T-S models leading to determining the controller gains. Finally, an example of MPP tracking applied to a Wind Energy Conversion System (WECS) illustrates the effectiveness of the proposed fuzzy control law. Show more
Keywords: Multi-objective fuzzy tracking control, maximum power point tracking (MPPT), linear matrix inequalities (LMIs), robust control, T-S fuzzy model
DOI: 10.3233/JIFS-222887
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Xiong, Haoyu | Yang, Leixin | Fang, Gang | Li, Junwei | Xiang, Yu | Zhang, Yaping
Article Type: Research Article
Abstract: Test-time augmentation (TTA) has become a widely adopted technique in the computer vision field, which can improve the prediction performance of models by aggregating the predictions of multiple augmented test samples without additional training or hyperparameter tuning. While previous research has demonstrated the effectiveness of TTA in visual tasks, its application in natural language processing (NLP) tasks remains challenging due to complexities such as varying text lengths, discretization of word elements, and missing word elements. These unfavorable factors make it difficult to preserve the label invariance of the standard TTA method for augmented text samples. Therefore, this paper proposes a …novel TTA technique called Defy, which combines nearest-neighbor anomaly detection algorithm and an adaptive weighting network architecture with a bidirectional KL divergence entropy regularization term between the original sample and the aggregated sample, to encourage the model to make more consistent and reliable predictions for various augmented samples. Additionally, by comparing with Defy, the paper further explores the problem that common TTA methods may impair the semantic meaning of the text during augmentation, leading to a shift in the model’s prediction results from correct to corrupt. Extensive experimental results demonstrate that Defy consistently outperforms existing TTA methods in various text classification tasks and brings consistent improvements across different mainstream models. Show more
Keywords: Test-time augmentation, test-time robustification, text classification, language model, anomaly detection
DOI: 10.3233/JIFS-236010
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Shengbin, Liang | Haoran, Sun | Fuqi, Sun | Hongjian, Wu | Wencai, Du
Article Type: Research Article
Abstract: Mild cognitive impairment (MCI) is a syndrome that occurs in the preclinical stage of Alzheimer’s disease (AD) and is also an early signal of the onset of AD. Early detection and accurate differentiation between MCI and AD populations, and providing them with effective intervention and treatment, are of great significance for preventing or delaying the onset of AD. In this paper, we propose a deep learning model, SE-DenseNet, that combines channel attention and dense connectivity networks and apply it to the field of magnetic resonance imaging (MRI) data recognition for the diagnosis of AD and MCI. First, to extract MRI …features with high quality, a slicing algorithm based on two-dimensional image information entropy is proposed to obtain AD brain lesion features with stronger representation ability. Second, in terms of model structure, SENet is introduced as a channel attention module and redistribute the weight of image features in the channel dimension; use DenseNet as the main architecture to maximize information flow, and each layer is directly interconnected with subsequent layers. It enables the network to learn and extract relevant features from the input data and improve the classification ability of the network. Finally, our proposed model is validated on the Alzheimer’s Disease Neuroimaging Initiative (ADNI) dataset, the results have shown that the accuracy for the four classification tasks of AD-NC, AD-MCI, NC-MCI, and AD-NC-MCI can reach 98.12%, 97.42%, 97.42%, and 95.24%, respectively. At the same time, the sensitivity and specificity have also achieved satisfactory results, exhibited a high performance in comparison with the classic machine learning algorithm and several existing state-of-the-art deep learning methods, demonstrating the proposed method is a powerful tool for the early diagnosis and detection of AD. Show more
Keywords: Alzheimer’s disease classification, computer aided diagnosis, medical image processing, megnetic resonance imaging, deep learning
DOI: 10.3233/JIFS-236542
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-21, 2024
Authors: Karthika, K. | Rangasamy, Devi Priya
Article Type: Research Article
Abstract: In today’s digital era, the security of sensitive data such as Aadhaar data is of utmost importance. To ensure the privacy and integrity of this data, a conceptual framework is proposed that employs the Diffie-Hellman key exchange protocol and Hash-based Message Authentication Code (HMAC) to enhance the security. The proposed system begins with the preprocessing phase, which includes removing noise, standardizing formats and validating the integrity of the data. Next, the data is segmented into appropriate sections to enable efficient storage and retrieval in the cloud. Each segment is further processed to extract meaningful features, ensuring that the relevant information …is preserved while reducing the risk of unauthorized access. For safeguarding the stored Aadhaar data, the system employs the Diffie-Hellman key exchange protocol which allows the data owner and the cloud service provider to establish a shared secret key without exposing it to potential attackers. Additionally, HMAC is implemented to verify the identity of users during the login process. HMAC enhances security by leveraging cryptographic hash functions and a shared secret key to produce a distinct code for each login attempt. This mechanism effectively protects the confidentiality and integrity of stored data. The combination of Diffie-Hellman key exchange and HMAC authentication provides a robust security framework for Aadhaar data. It ensures that the data remains encrypted and inaccessible without the secret key, while also verifying the identity of users during the login process. This comprehensive approach helps preventing unauthorized access thereby protecting against potential attacks, instilling trust and confidence in the security of Aadhaar data stored in the cloud. Results of the article depict that the proposed scheme achieve 0.19 s of encryption time and 0.05 s of decryption time. Show more
Keywords: Hash based message authentication code (HMAC), cryptographic hash functions, Diffie Hellman, communications
DOI: 10.3233/JIFS-234641
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2024
Authors: Vijaya Lakshmi, A. | Vaitheki, K. | Suresh Joseph, K.
Article Type: Research Article
Abstract: Over the years, numerous optimization problems have been addressed utilizing meta-heuristic algorithms. Continuing initiatives have always been to create and develop new, practical algorithms. This work proposes a novel meta-heuristic approach employing the slender Loris optimization algorithm (SLOA), miming slender Loris behavior. The behavior includes foraging, hunting, migration and communication with each other. The ultimate goal of the devised algorithm is to replicate the food-foraging behaviour of Slender Loris (SL) and the quick movement of SL when threatened (i.e.) their escape from predators and also mathematically modelled the special communication techniques of SL using their urine scent smell. SLOA modelled …SL’s slow food foraging behaviour as the exploitation phase, and moving between the tree and escaping from a predator is modelled as the exploration phase. The Eyesight of slender Loris plays a vital role in food foraging during nighttime in dim light. The operator’s Eyesight is modelled based on the angle of inclination of SL. The urine scent intensity is used here to be instrumental in preventing already exploited territory activities, which improves algorithm performance. The suggested algorithm is assessed and tested against nineteen benchmark test operations and evaluated for effectiveness with standard widely recognized meta-heuristics algorithms. The result shows SLOA performing better and achieving near-optimal solutions and dominance in exploration–exploitation balance in most cases than the existing state-of-the-art algorithms. Show more
Keywords: Slender loris optimization algorithm, exploitation and exploration, optimization problems, swarm intelligence algorithm, metaheuristic
DOI: 10.3233/JIFS-236737
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Dai, Songsong
Article Type: Research Article
Abstract: The well-known iterative boolean-like law a →(a → b ) = a → b can be generalized to the functional equation I (x , I (x , y )) = I (x , y ), where I is a fuzzy implication. In this paper, we discuss an approximation of the equation, I (x , I (x , y )) ≈ I (x , y ), i.e., the law is approximately valid. Furthermore, we study the property of approximation preserving with respect to compositions of fuzzy implications. Finally, we give a necessary condition and a sufficient condition for the approximate equation of (S , N )-implications.
Keywords: Functional equation, iterative boolean-like law, fuzzy implication, (S, N)-implication
DOI: 10.3233/JIFS-233435
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-8, 2024
Authors: Zhou, Yinwei | Hu, Jun
Article Type: Research Article
Abstract: The rough set model has been extended to interval rough number decision systems, but the existing studies do not consider interval rough number decision systems with missing values. To this end, a rough set model of incomplete interval rough number decision systems (IIRNDSs) is proposed, and its uncertainty measures are investigated. Firstly, the similarity of two incomplete interval rough numbers (IIRNs) are defined by calculating their optimistic and pessimistic distances of the lower and upper approximation intervals of IIRNs. Then, the rough sets in IIRNDSs are constructed by the induced similarity relation. Next, four uncertainty measures, including approximation accuracy, approximation …roughness, conditional entropy, and decision rough entropy are given, which exhibit a monotonic variation with changes in the size of attribute sets, α, and θ. Finally, the experimental results demonstrate the proposed rough set model of IIRNDSs is feasible and effective. Show more
Keywords: Incomplete interval rough number decision systems, interval rough number, similarity relation, uncertainty measure, rough sets
DOI: 10.3233/JIFS-237320
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Wan, Huanyu | Qiu, Dong
Article Type: Research Article
Abstract: In order to explore effective management strategies in the context of epidemics, this study introduces a novel concept: Trapezoidal type-2 fuzzy linguistic intuitionistic fuzzy set (TrT2FLIFS) and proposes a trapezoidal type-2 fuzzy linguistic intuitionistic fuzzy matrix game (TrT2FLIFMG). Subsequently, employing sentiment analysis based on the BosonNLP sentiment lexicon, the study extracts comment data from Weibo related to epidemics made by users and calculates their textual scores. These two methods are integrated and applied to policy selection in epidemic management, along with the introduction of a new ranking function to compare the importance of alternative policies. Finally, a comparative analysis with …existing methods is conducted to validate the effectiveness of the proposed approach. Show more
Keywords: Matrix game, sentiment analysis, trapezoidal type-2 fuzzy linguistic intuitionistic fuzzy number, ranking function, pandemic management
DOI: 10.3233/JIFS-237319
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-19, 2024
Authors: Mohammed Mustafa, M. | Kalpana Devi, S. | Althaf Ali, A. | Gunavathie, M.A.
Article Type: Research Article
Abstract: Wireless body sensor networks have gained significant importance across diverse fields, including environmental monitoring, healthcare, and sports. This research is concentrated on sports applications, specifically exploring the viability of a wireless body area network tailored for high-performing athletes. The paper is divided into three sections. First, the design of the node location that is used for real-time monitoring of a sportsperson in which the node position, such as the human thigh, foot, arm, wrist, and chest, was estimated and the best position was selected. Second, the accuracy of an application when related to the other schemes such as TDMA with …ZigBee and RA-TDMA & PA-TDMA was done. The reliability using RA-TDMA performed well and showed approximately 98% reliability. Finally, the features of wireless communiqués that affect the presentation of the network for RA-TDMA were estimated, such as delay and jitter. These findings collectively contribute to advancing the understanding of optimizing wireless body sensor networks for sports applications, with notable achievements including the identification of the arm as the optimal sensor placement, achieving a 98% success rate, and surpassing alternative techniques in network performance parameters like packet delivery rate. Show more
Keywords: Location points, real time scheduling, RATDMA, BSN
DOI: 10.3233/JIFS-234275
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Qu, Ying | Wang, Xuming
Article Type: Research Article
Abstract: In order to effectively prevent and control accidents, it is essential to trace back the causes of gas explosions in cities. The DT-AR(decision tree-association rule) algorithm is proposed as a quantitative analysis of gas accident features and causality. First, 210 gas explosion accident investigation reports were taken as samples. The gas accident causation system is divided into three aspects, including environmental factors, management factors and physical factors. Management factors were sorted into organizational-level and individual-level factors from the investigation reports. Second, the CART decision tree model was used to compare location features, organizational causality features, and individual causality features of …the piped and bottled gas accidents, and a decision tree model with the gas system fault site as the root node was built to filter the key feature variables. In order to reveal factor correlations and deep-level causation, the Apriori algorithm is used to mine accident association rules. The combinations on the branches of the decision tree are used as constraints to filter the critical causality rule, which improves the efficiency of association rule screening and enhances prediction accuracy. The results demonstrate that the DT-AR algorithm can evaluate the importance of variables, quickly locate effective combinations of factors, and mine the complete causal chain. The association rule is screened based on the constraint of the key element combination of the decision tree, which compensates for the low efficiency of the Apriori algorithm for association rule mining. In addition, the accident-caused excavation results provide an effective path for gas companies, outsourced service companies and administrative departments to implement gas safety chain supervision, which can address the problem of gas accident safety management failures and provide decision support for accident prevention. Show more
Keywords: 24model, decision tree model, association rule, gas explosion
DOI: 10.3233/JIFS-234372
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Singh, Surender | Sharma, Sonam
Article Type: Research Article
Abstract: A Single-valued neutrosophic set (SVNS) has recently been explored as a comprehensive tool to assess uncertain information due to varied human cognition. This notion stretches the domain of application of the classical fuzzy set and its extended versions. Various comparison measures based on SVNSs like distance measure, similarity measure, and, divergence measure have practical significance in the study of clustering analysis, pattern recognition, machine learning, and computer vision-related problems. Existing measures have some drawbacks in terms of precision and exclusion of information and produce unreasonable results in categorization problems. In this paper, we propose a generic method to define new …divergence measures based on common aggregation operators and discuss some algebraic properties of the proposed divergence measures. To further appreciate the proposed divergence measures, their application to pattern recognition has been investigated in conjunction with the prominent existing comparison measures based on SVNSs. The comparative assessment sensitivity analysis of the proposed measures establishes their edge over the existing ones because of appropriate classification results. Show more
Keywords: Single-valued neutrosophic set, aggregation operator, pattern recognition, divergence measure
DOI: 10.3233/JIFS-232369
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Sakthimohan, M. | Deny, J. | Rani, G. Elizabeth
Article Type: Research Article
Abstract: In general, wireless sensor networks are used in various industries, including environmental monitoring, military applications, and queue tracking. To support vital applications, it is crucial to ensure effectiveness and security. To prolong the network lifetime, most current works either introduce energy-preserving and dynamic clustering strategies to maintain the optimal energy level or attempt to address intrusion detection to fix attacks. In addition, some strategies use routing algorithms to secure the network from one or two attacks to meet this requirement, but many fewer solutions can withstand multiple types of attacks. So, this paper proposes a secure deep learning-based energy-efficient routing …(SDLEER) mechanism for WSNs that comes with an intrusion detection system for detecting attacks in the network. The proposed system overcomes the existing solutions’ drawbacks by including energy-efficient intrusion detection and prevention mechanisms in a single network. The system transfers the network’s data in an energy-aware manner and detects various kinds of network attacks in WSNs. The proposed system mainly comprises two phases, such as optimal cluster-based energy-aware routing and deep learning-based intrusion detection system. Initially, the cluster of sensor nodes is formed using the density peak k-mean clustering algorithm. After that, the proposed system applies an improved pelican optimization approach to select the cluster heads optimally. The data are transmitted to the base station via the chosen optimal cluster heads. Next, in the attack detection phase, the preprocessing operations, such as missing value imputation and normalization, are done on the gathered dataset. Next, the proposed system applies principal component analysis to reduce the dimensionality of the dataset. Finally, intrusion classification is performed by Smish activation included recurrent neural networks. The proposed system uses the NSL-KDD dataset to train and test it. The proposed one consumes a minimum energy of 49.67 mJ, achieves a better delivery rate of 99.92%, takes less lifetime of 5902 rounds, 0.057 s delay, and achieves a higher throughput of 0.99 Mbps when considering a maximum of 500 nodes in the network. Also, the proposed one achieves 99.76% accuracy for the intrusion detection. Thus, the simulation outcomes prove the superiority of the proposed SDLEER system over the existing schemes for routing and attack detection. Show more
Keywords: Wireless sensor networks, optimal cluster-based energy aware routing, intrusion detection system, cluster head selection, routing, dimensionality reduction, and deep learning
DOI: 10.3233/JIFS-235512
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Liu, Jianping | Chu, Xintao | Wang, Jian | Wang, Meng | Wang, Yingfei
Article Type: Research Article
Abstract: Due to the polysemy and complexity of the Chinese language, Chinese machine reading comprehension has always been a challenging task. To improve the semantic understanding and robustness of Chinese machine reading comprehension models, we propose a model that utilizes adversarial training algorithms and Permuted Language Model (PERT). Firstly, we employ the PERT pre-training model to embed paragraphs and questions into vector space to obtain corresponding sequential representations. Secondly, we use a multi-head self-attention mechanism to extract key textual information from the sequence and employ a Bi-GRU network to semantically fuse the output feature vectors, aiming to learn deep semantic representations …in the text. Finally, we introduce perturbations into the model training process. We achieve this by utilizing adversarial training algorithms such as Fast Gradient Method (FGM) and Projected Gradient Descent (PGD). These algorithms generate adversarial samples to enhance the model’s robustness and stability when facing diverse inputs. We conducted comparative experiments on the publicly available Chinese reading comprehension datasets CMRC2018 and DRCD. The experimental results show that our proposed model has achieved significant improvements in both EM and F1-Score compared to the baseline model. To validate the model’s generalization and robustness, we utilized ChatGPT to construct a scientific dataset that includes a large number of domain-specific terms, sentences with mixed Chinese and English, and complex comprehension tasks. Our model also performed remarkably well on the self-built dataset. In conclusion, the proposed model not only effectively enhances the understanding of semantic information in Chinese text but also demonstrates a certain level of generalization capability. Show more
Keywords: Machine reading comprehension, pre-trained model, adversarial training, Bi-GRU, multi-head self-attention mechanism
DOI: 10.3233/JIFS-234417
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Xiao, Yan | Liang, Jinqian
Article Type: Research Article
Abstract: In many real production scenarios, departmental organizations often exhibit a hierarchical structure, where departments cooperate with subordinate departments to optimize resource allocation and maximize their respective benefits. However, due to a lack of information or data, many model parameters in the allocation process cannot be precisely defined. In response to this challenge, an interval n -person hierarchical resource allocation model is proposed to achieve maximum economic benefit in uncertain environments. Based on the concepts of satisfactory degrees of comparing intervals and interval-valued cores of interval-valued n -person cooperative games, an auxiliary nonlinear programming model and method are developed to solve …the interval-valued cores of such cooperative games. The approach explicitly considers the inclusion and/or overlap relations between intervals, whereas the traditional interval ranking method may not guarantee the existence of interval-valued cores. The proposed method offers cooperative opportunities under uncertain conditions. Finally, the feasibility and applicability of the models and methods are demonstrated through a numerical example and comparison with other methods. Show more
Keywords: Hierarchical structure, resource allocation, uncertain environment, interval n-person cooperative game, nonlinear programming model
DOI: 10.3233/JIFS-191941
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Yu, Dan | Wu, Jun | He, Yongling
Article Type: Research Article
Abstract: The distributed robust optimal allocation method for multi-microgrid interconnected systems usually involves a large number of variables and constraints, and the computational complexity is high in practical applications, which makes it difficult to solve the problem. Therefore, a distributed robust optimal allocation method for multi-microgrid interconnection systems based on multi-objective swarm algorithm is proposed. A distributed robust optimization configuration constraint index model for multi-microgrid interconnection system is established. Considering the influence of energy storage technology operation characteristics on its service life, a micro-grid hybrid energy storage capacity optimization configuration model with the minimum annual comprehensive energy storage cost as the …objective function is established with charge and discharge power and residual power as the constraint conditions. The multi-objective swarm algorithm is used to realize the optimization model of distributed robust configuration microgrid interconnection system. By determining the power capacity configuration of the optimal energy storage system and the corresponding frequency dividing points, the power capacity configuration of the optimal energy storage system and the corresponding frequency dividing points are determined. The hybrid energy storage configuration model of multi-microgrid interconnection system is established with the minimum alternative operating cost as the objective function, so as to realize the distributed robust optimal configuration of multi-microgrid interconnection system. The simulation results show that the distributed configuration of multi-microgrid interconnection system with the proposed method has good robustness and strong optimization control ability. Show more
Keywords: Multi-objective bee colony algorithm, multi-microgrid, interconnection system, robust allocation
DOI: 10.3233/JIFS-235092
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Li, Guofa | Wang, Jinfu | He, Jialong | Wang, Jili | Hou, Tianwei
Article Type: Research Article
Abstract: The reliability of machine tool components, particularly the tool magazine manipulator, significantly affects the overall performance of the machine tool. To address the challenge of accurately evaluating the manipulator’s health status using a single performance indicator, this study proposes a method that combines Fuzzy Comprehensive Evaluation (FCE) and a Combined Weighting Method (CWM). By considering both subjective and objective factors, this method provides a comprehensive evaluation of the manipulator’s health status, enhancing the accuracy and reliability of the assessment. The method utilizes fuzzy distribution to construct membership matrices for different health levels and adopts the CWM that combines the Entropy …Weight Method (EWM) and Analytic Hierarchy Process (AHP) to determine the combined weights of the health evaluation indices. This approach improves the accuracy and reliability by considering multiple indicators and objectively weighting them based on their importance. The current health status of the manipulator is evaluated using the fuzzy weighted average operator and the maximum membership principle. Moreover, a fault prediction method based on Particle Swarm Optimization (PSO) and GM(1,1) is proposed to overcome the information gap and small sample problems. The proposed model’s prediction accuracy is verified by comparing it with other models, demonstrating its effectiveness and reliability. Show more
Keywords: Health status evaluation, fault prediction, fuzzy comprehensive evaluation, grey model, particle swarm optimization
DOI: 10.3233/JIFS-233028
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Ajitha Gladis, K.P. | Srinivasan, R. | Sugashini, T. | Ananda Raj, S.P.
Article Type: Research Article
Abstract: Visual impairment people have many difficulties in everyday life, including communicating and getting information, as well as navigating independently and safely. Using auditory alerts, our study hopes to improve the lives of visually impaired individuals by alerting them to items in their path. In this research, a Video-based Smart object detection model named Smart YOLO Glass has been proposed for visually impaired persons. A Paddling - Paddling Squeeze and Attention YOLO Network model is trained with multiple images to detect outdoor objects to assist visually impaired people. In order to calculate the distance between a blind person and obstacles when …moving from one location to another, the proposed method additionally included a distance-measuring sensor. The visually impaired will benefit from this system’s information about around objects and assistance with independent navigation. Recall, accuracy, specificity, precision, and F-measure were among the metrics used to evaluate the proposed strategy. Because there is less time complexity, the user can see the surrounding environment in real time. When comparing the proposed technique to Med glasses, DL smart glass, and DL-FDS, the total accuracy is improved by 7.6%, 4.8%, and 3.1%, respectively. Show more
Keywords: Visual impairment, deep learning, outdoor object detection, wearable system, YOLO network
DOI: 10.3233/JIFS-234453
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Zhu, Meng-Meng | Mao, Jun-Jun | Xu, Wei
Article Type: Research Article
Abstract: Linguistic preference relations with self-confidence (LPRs-SC) are the preference relation that can reflect the decision maker’s (DM) confidence psychology and has received widespread attention for their simple form and multiple information. Currently, arithmetic studies of LPRs-SC are conducted separately for preference relations and self-confidence. In addition, personalized individual semantics (PIS) is an important tool in large-scale decision-making to reflect the differences in the semantic understanding of DMs. However, the confidence level in LPRs-SC limits the preference relation to a certain extent and the linguistic representations of these two components are usually different. This means that it is not only necessary …to propose an arithmetic rule that can express the restrictive relationship between the two but also to construct a model that can extract the PIS of preference relation and confidence respectively. Besides, we constructed a two-stage consensus reaching process (CRP) based on the specificity of the LPRs-SC structure when enhancing group harmony. The process takes self-confidence as an independent source of information, delineates the adjusted categories in detail, and builds an adjustment model accordingly. Finally, the example and comparative analyses verify the merits of the proposed PIS in terms of consistency enhancement and CRP in terms of speed and accuracy harmonization. Show more
Keywords: Personalized individual semantics, linguistic preference relations with self-confidence, consensus reaching process, large scale decision making
DOI: 10.3233/JIFS-236552
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-19, 2024
Authors: Prabu Sankar, N. | Usha, D.
Article Type: Research Article
Abstract: This research paper presents a novel approach to improving healthcare services in rural areas by leveraging the potential of Fuzzy Intelligence Systems, Internet of Bodies (IoB) devices, and Blockchain technology. It begins by exploring the design and development of a Blockchain-based Patients Record System (BPRS), which ensures secure, transparent, and tamper-proof storage of patient medical records. The paper then delves into the fabrication of advanced IoB devices, specifically designed to study and monitor the health of rural populations. These devices, integrated with Fuzzy Intelligence Systems, provide efficient and reliable data capture, interpretation, and decision-making support. The highlight of the study …is the innovative integration of the IoB enabled Patient Monitoring System with the BPRS, which ensures real-time data synchronization and secure access to patient data for authorized personnel. The system collectively promotes efficient healthcare delivery, data privacy, and patient safety in rural areas. Show more
Keywords: Fuzzy intelligence systems, blockchain-based patients record system, internet of bodies devices, rural health monitoring, integrated healthcare system
DOI: 10.3233/JIFS-233752
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-9, 2024
Authors: Kahraman, Cengiz
Article Type: Research Article
Abstract: Intuitionistic fuzzy sets aims at taking the hesitancy of an expert into account in assigning a membership degree or a non-membership degree. The direct assignment of decimal numbers for membership and non-membership degrees of an element in intuitionistic fuzzy sets is not practical. Besides, the assigned degrees are generally composed of one digit or at most two digits after dot. This problem has not been addressed as much as it deserves in the literature. The hypothesis of the paper is that the determination of proportional relationships between membership and non-membership degrees is more appropriate than the direct assignment to obtain …the degrees. Proportional intuitionistic fuzzy (PIF) sets require only the proportion relations between an intuitionistic fuzzy set’s parameters. The accuracy of the results obtained with multi-criteria decision-making models definitely depends on how accurately the membership degrees are determined. In this paper, we extend Combinative distance-based assessment (CODAS) method by using single-valued proportional intuitionistic fuzzy sets. We compare the proposed PIF CODAS method with ordinary fuzzy CODAS method. A cloud service provider selection problem is handled to show the validity of the proposed PIF CODAS method. Additionally, a comparative analysis and a sensitivity analysis together with a discussion are presented. Show more
Keywords: Proportional intuitionistic fuzzy sets, aggregation operators, multi-criteria decision making, CODAS, Cloud service provider selection
DOI: 10.3233/JIFS-237389
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-19, 2024
Authors: Zhan, Qiuyan | Saeid, A. Borumand | Davvaz, Bijan
Article Type: Research Article
Abstract: The aim of this paper is to investigate several operators on L -algebras. At first, closure (interior) operators on L -algebras are defined and some properties of them are obtained. Then, existential operators and universal operators on L -algebras are studied, a one-to-one correspondence between the set of all quantifier operators and the set of all relative complete subalgebras of CKL -algebras is constructed. Furthermore, very true operators on L -algebras are investigated and by giving a very true ideal of a very true L -algebra, quotient structures on very true L -algebras are established.
Keywords: L-algebra, closure (interior) operator, existential (universal) operator, very true operator
DOI: 10.3233/JIFS-234370
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Mohan, Prakash | Aishwarya, S.
Article Type: Research Article
Abstract: Price changes in construction materials have a significant impact on building construction projects. Such price variations occur at random and at varying rates over time. A system that can estimate the magnitude and quantity of the change in material prices with reasonable accuracy is required. The primary goal is to create a machine-learning model that can predict the type of building material chosen based on environmental factors. The compressive strength of concrete is critical in defining its mechanical qualities. Long laboratory testing is needed to determine the compressive strength of concrete. The capacity of powerful machine learning algorithms to forecast …concrete compressive strength speeds up these lengthy experimental methods while also lowering expenses. This study provides abilities to precisely anticipate and categorize numerous qualities and traits of distinct materials. The framework includes a broad dataset that details materials, composition, and performance characteristics. Machine learning algorithms such as logistic regression (LR), decision trees (DT), and random forests (RF) train models on the training data. The models are hyper-parameter tweaked and feature developed to achieve the most outstanding performance. The k-fold method is used throughout the training and assessment phase to guarantee robustness and reduce bias. The F1 score and Receiver Operating Characteristic-Area Under Curve (ROC-AUC) curve are two performance measures used to measure how accurate and predictive the trained models are. The study findings provide insights into the qualities of the materials, facilitating improved material selection, quality assurance, and decision-making in the building sector. In the analyses, the best accuracy value was 99.92%, and the precision value was 88.83% using the LR algorithm. As a result, it was determined that the LR algorithm had the least execution 57.826 ms, and is thus the most suitable for use in concrete compressive strength estimation. Show more
Keywords: Building materials, machine learning algorithms, feature selection, model training, K-fold, performance evaluation
DOI: 10.3233/JIFS-236111
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Lin, Guangbo | Duan, Ninggui
Article Type: Research Article
Abstract: Integrating the E-commerce system with an enterprise resource planning tool can help the firm improve performance, maintain customers, and increase sales. In Enterprise Resource Planning, integration features can be provided either as developed features or as separate assignments and contributions. Problems with the online platform, improper addresses, rejected payments, and especially apparent transactions are frequent problems for online buyers. The enhanced Adaptive Ant Colony Optimization is utilized to optimize the rural E-commerce express of transportation. Several innovative routes can lower the downlink transportation cost and reach all collecting places with a fast delivery route. Convolutional Neural Networks were utilized to …increase the collective innovation of the E-commerce platform and simplify network communication. E-commerce is a mechanism used to market information services and products. Hence, ERP-AACO-CNN has been designed to integrate Enterprise Resource Planning and E-commerce, and business operations can stream smoothly from the front to the back of the business. Statistics on sales orders, customers, stock levels, price, and essential performance measurement systems. The automated invoices, frequent communications, financial report preparation, product and service delivery, and material requirements planning. The most significant results will likely finance businesses that employ it as a stimulant for a wide-ranging process improvement. In addition, E-commerce is a valuable innovation that connects buyers and sellers in various corners of the globe. Customer satisfaction is projected to be more significant than fault detection at 95.2 % accuracy for the proposed method’s E-commerce system with the superior value. According to client demand, an E-commerce system is the most accurate development at a given input level, and a future ERP is 64.9% efficient. The proposed approach has a 24.5% random error rate and a 13.2% mean square error rate. A comparison of E-commerce and enterprise ERP precision to the proposed technique yields 83.8% better results. Show more
Keywords: Adaptive ant colony optimization, enterprise resource planning, convolutional neural networks, E-commerce system
DOI: 10.3233/JIFS-237998
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: He, Fuyun | Feng, Huiling | Tang, Xiaohu
Article Type: Research Article
Abstract: The segmentation of neuronal morphology in electron microscopy images is crucial for the analysis and understanding of neuronal function. However, most of the existing segmentation methods are not suitable for challenging datasets where the neuronal structure is contaminated by noise or has interrupted parts. In this paper, we propose a segmentation method based on deep learning to determine the location information of neurons and reduce the influence of image noise in the data. Specifically, we adapt our neuron dataset based on UNet by using convolution with BN fusion and multi-input feature fusion. The method is named REDAFNet. The model simplifies …the model structure and enhances the generalization ability by fusing the convolution layer and BN layer. The noise interference in the data was reduced by multi-input feature fusion, and the ability to understand and express the data was enhanced. The method takes a neuron image as input and its pixel segmentation map as output. Experimental results show that the segmentation accuracy of the proposed method is 91.96%, 93.86% and 80.25% on the ISBI2012 dataset, U-RISC retinal neuron dataset and N2DH-GOWT1 stem cell dataset, respectively. Compared with the existing segmentation methods, the proposed method can extract more complete feature information and achieve more accurate segmentation. Show more
Keywords: Image segmentation, convolutional neural network, UNet, neuron image
DOI: 10.3233/JIFS-236286
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Du, Xueke | Li, Wenli | Wei, Xiaowen
Article Type: Research Article
Abstract: The fees of different certification services are charged in different ways: For example, T-mall.com (one of the leading e-commerce platforms in China) uses a total certification service , where each type of seller participating in the platform must purchase certification services; Pinduoduo.com (another Chinese e-commerce platform) uses an alternative certification service , where after paying a transaction fee, each seller participating in the platform can choose whether to purchase certification services. This paper studies how the choice of certification services affects the participation decisions of both sellers and buyers, as well as the revenue and quality level (the proportion of …high-quality sellers of all participating sellers) of a platform. According to previous research, network externalities also affect sellers’ and buyers’ participation strategies. Studies on the effectiveness of different certification services for e-commerce platforms have rarely considered both positive and negative network externalities. The results of constructed game-theoretic models show that both the certification capability and the certification cost play critical roles in determining which certification services can generate more revenue. If a platform provides certification services, the total certification service always generates a higher quality level than the alternative certification service. Furthermore, the applicable scope of certification services (defined as the certification strategy space), can be broadened by increasing both the profit ratio (the ratio between the profit of H-type sellers and L-type sellers) and the value ratio (the ratio between the value of H-type sellers and L-type sellers). Counterintuitively, a higher certification capability does not always yield a higher certification fee. Show more
Keywords: Certification services, E-commerce platforms, information asymmetries, network externalities, certification capability
DOI: 10.3233/JIFS-234621
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2024
Authors: Wang, Hanpeng | Xiong, Hengen
Article Type: Research Article
Abstract: An improved genetic algorithm is proposed for the Job Shop Scheduling Problem with Minimum Total Weight Tardiness (JSSP/TWT). In the proposed improved genetic algorithm, a decoding method based on the Minimum Local Tardiness (MLT) rule of the job is proposed by using the commonly used chromosome coding method of job numbering, and a chromosome recombination operator based on the decoding of the MLT rule is added to the basic genetic algorithm flow. As a way to enhance the quality of the initialized population, a non-delay scheduling combined with heuristic rules for population initialization. and a PiMX (Precedence in Machine crossover) …crossover operator based on the priority of processing on the machine is designed. Comparison experiments of simulation scheduling under different algorithm configurations are conducted for randomly generated larger scale JSSP/TWT. Statistical analysis of the experimental evidence indicates that the genetic algorithm based on the above three improvements exhibits significantly superior performance for JSSP/TWT solving: faster convergence and better scheduling solutions can be obtained. Show more
Keywords: Improved genetic algorithm, total weight tardiness, minimum local tardiness, PiMX
DOI: 10.3233/JIFS-236712
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]