Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 315.00Impact Factor 2023: 2
The purpose of the Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology is to foster advancements of knowledge and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and professionals in education and research, covering a broad cross-section of technical disciplines.
The journal will publish original articles on current and potential applications, case studies, and education in intelligent systems, fuzzy systems, and web-based systems for engineering and other technical fields in science and technology. The journal focuses on the disciplines of computer science, electrical engineering, manufacturing engineering, industrial engineering, chemical engineering, mechanical engineering, civil engineering, engineering management, bioengineering, and biomedical engineering. The scope of the journal also includes developing technologies in mathematics, operations research, technology management, the hard and soft sciences, and technical, social and environmental issues.
Authors: Pandey, Vibha | Choubey, Siddhartha | Patra, Jyotiprakash | Mall, Shachi | Choubey, Abha
Article Type: Research Article
Abstract: Automated reading of license plate and its detection is a crucial component of the competent transportation system. Toll payment and parking management e-payment systems may benefit from this software’s features. License plate detection and identification algorithms abound, and each has its own set of strengths and weaknesses. Computer vision has advanced rapidly in terms of new breakthroughs and techniques thanks to the emergence and proliferation of deep learning principles across several branches of AI. The practice of automating the monitoring process in traffic management, parking management, and police surveillance has become much more effective thanks to the development of Automatic …License Plate Recognition (ALPR). Even though license plate recognition (LPR) is a technology that is extensively utilized and has been developed, there is still a significant amount of work to be done before it can achieve its full potential. In the last several years, there have been substantial advancements in both the scientific community’s methodology and its level of efficiency. In this era of deep learning, there have been numerous developments and techniques established for LPR, and the purpose of this research is to review and examine those developments and approaches. In light of this, the authors of this study suggest a four-stage technique to automated license plate detection and identification (ALPDR), which includes, image pre-processing, license plate extraction, character segmentation, and character recognition. And the first three phases are known as “extraction,” “pre-processing,” and “segmentation,” and each of these processes has been shown to benefit from its own unique technique. In light of the fact that character recognition is an essential component of license plate identification and detection, the Convolution Neural Network (CNN), MobileNet, Inception V3, and ResNet 50 have all been put through their paces in this regard. Show more
Keywords: Data security, secure image analysis, automatic license plate recognition, segmentation, image classification, convolution neural network, character recognition
DOI: 10.3233/JIFS-235400
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-23, 2024
Authors: Wu, Chengding | Xu, Zhaoping | Liu, Liang | Yang, Tao
Article Type: Research Article
Abstract: There are limitations of personalization in Advanced Driver Assistance Systems (ADAS) that have a serious impact on driver acceptance and satisfaction. This study investigates driving style recognition method to achieve personalization of longitudinal driving behavior. Currently, driving style recognition algorithms for Personalized Adaptive Cruise Control (PACC) rely on integrated recognition. However, disturbances in the driving cycle may lead to changes in a driver’s integrated driving style. Therefore, the integrated driving style cannot accurately and comprehensively reflect the driver’s driving style. To solve this problem, a new driving style recognition method for PACC is proposed, which considers integrated driving style and …driving cycle. Firstly, the method calculates the constructed feature parameters of driving cycle and style, and then reduces the dimensionality of the feature parameter matrix by principal component analysis (PCA). Secondly, a two-stage clustering algorithm with self-organizing mapping networks and K-means clustering (SOM-K-means) is used to obtain the type labels. Then, a transient recognition model based on random forest (RF) is established and the hyperparameters of this model are optimized by sparrow search algorithm (SSA). Based on this, a comprehensive driving style recognition model is established using analytic hierarchy process (AHP). Finally, the validity of the proposed method is verified by a natural dataset. The method incorporates the driving cycle into driving style recognition and provides guidance for improving the personalization of adaptive cruise control system. Show more
Keywords: Personalized adaptive cruise control, SOM-K-means two-stage clustering, random forest (RF), sparrow search algorithm (SSA), driving style recognition
DOI: 10.3233/JIFS-235045
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Atef, Shimaa | El-Seidy, Essam | Reda, Naglaa M.
Article Type: Research Article
Abstract: Decisions in many dilemmas are based on a combination of factors, including as incentive, punishment, reputation, and memory. The impact of memory information on cooperative evolution in multi-round games is a decision-making process in group evolution. The iterated prisoner’s dilemma is an excellent model for the development of cooperation amongst the payoff-maximizing individuals. Since tit-for-tat proved successful in Axelrod’s repeated prisoner’s dilemma tournaments, there has been a great deal of interest in creating new strategies. Every iterative prisoner’s dilemma method bases its decision-making on a specific duration of past contacts with the opponent, which is referred to as the memory’s …size. This study examines the impact of strategy memory size on the evolutionary stability of n-person iterated prisoner’s dilemma strategies. In this paper, we address the role that memory plays in decision-making. We interested in the model of the Iterated Prisoner’s Dilemma game for three players with memory two, and we will look at strategies with similar behavior, such as Tit-For-Tat (TFT) strategies as well as Win Stay-Lose Shift (WSLS) strategies. As a result of this paper, we have shown that the effect of memory length is almost non-existent in the competitions of strategies that we studied. Show more
Keywords: Memory-Two, Tit-For-Tat strategies (TFT), three-players iterated prisoner’s dilemma game (3P-IPD), transition matrix, Win Stay-Lose Shift strategies (WSLS)
DOI: 10.3233/JIFS-233690
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Chen, Zhipeng | Liu, Xiao | Qin, Jianhua
Article Type: Research Article
Abstract: To solve the problem that the walking jitter of quadruped robots leads to the degradation of clarity of visual imaging, a quadruped robot visual imaging jitter compensation algorithm based on the theory of walking jitter is proposed. The D-H coordinate transformation method is used to establish the coordinate system of each joint of the leg. The kinetic equations of the leg are derived from the relationship between the rotational velocity and the moment of the leg joint, and the kinetic equilibrium equations of the quadruped robot body are established based on the spatial moment equilibrium theorem; the spring-mass model of …the leg of the quadruped robot is used to construct the kinetic equations of the leg jittering, and the kinetic equations of the body jittering are derived using the moment equilibrium condition of the body center of gravity position and under the effect of the leg and body jitter to obtain the visual imaging device jitter quantity; finally, the tremor quantity is combined with the jitter quantity and rotation matrix to derive the walking jitter mathematical model of the quadruped robot visual imager, and the jitter compensation algorithm of quadruped robot visual imager is verified. The experimental results show that compared with the traditional Wiener filter algorithm for jitter compensation and the BP neural network jitter compensation algorithm, this algorithm improves the visual imaging by 10.8% and 3.3% in the two evaluation indexes of peak signal-to-noise ratio and structural similarity, respectively, and the de-jittering effect is better. Show more
Keywords: Quadruped robot, visual imaging, walking jitter, compensation algorithm
DOI: 10.3233/JIFS-235345
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Liu, Gan | Qi, Guirong | Wan, Sanyu
Article Type: Research Article
Abstract: Imbalanced data is a serious binary classification difficulty in forecasting the well-being of the elderly. This paper improves the Smote algorithm from the algorithm and sample dimensions to tackle the issue of imbalanced distribution of questionnaire data. The k-means Smote is combined with RBFNN as K-RBFNN Smote in the algorithm dimension and add FCM link to resample the minority set in the sample dimension as FCM K-RBFNN Smote. In order to improve the generalization of models, the RUS module is added to the algorithm. Experiments are carried out on four improved Smote technologies and two existing Smote technologies combined with …XGBoost, which is superior than the other five conventional classification models. The experimental results indicate that the performance order is RUS FCM K-RBFNN Smote > K-RBFNN Smote > FCM K-RBFNN Smote > RUS K-RBFNN Smote > K-Means Smote > FCM Smote. The RUS FCM K-RBFNN method has been identified as the optimal approach for enhancing performance, resulting in a 98.58% accuracy rate. In conclusion, Smote algorithm undergoes the implementation of K-RBFNN shows greater performance and the enhancement of FCM and RUS relies on the structure of sampling. Show more
Keywords: RUS FCM K-RBFNN Smote, XGBoost, imbalanced data, elderly well-being classification
DOI: 10.3233/JIFS-235213
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2024
Authors: Allouche, Moez | Dahech, Karim | Gaubert, Jean-Paul
Article Type: Research Article
Abstract: This paper proposes a multi-objective H2 /H ∞ maximum power tracking control of a variable speed wind turbine to minimize the H2 tracking error and ensure the H ∞ model reference-tracking performance, simultaneously. The optimal condition is obtained via a boost converter use, which adapts the load impedance to the wind turbine generator. Thus, based on the fuzzy T-S model, a multi-objective Maximum Power Point Tracking (MPPT) controller is developed, ensuring maximum power transfer, despite wind speed variation and system uncertainty. To specify the optimal trajectory to follow, a TS reference model is proposed taking as input the optimal …rectified DC current. The conditions of stability and stabilization are expressed in terms of linear matrix inequality (LMI) for uncertain and disturbed T-S models leading to determining the controller gains. Finally, an example of MPP tracking applied to a Wind Energy Conversion System (WECS) illustrates the effectiveness of the proposed fuzzy control law. Show more
Keywords: Multi-objective fuzzy tracking control, maximum power point tracking (MPPT), linear matrix inequalities (LMIs), robust control, T-S fuzzy model
DOI: 10.3233/JIFS-222887
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Xiong, Haoyu | Yang, Leixin | Fang, Gang | Li, Junwei | Xiang, Yu | Zhang, Yaping
Article Type: Research Article
Abstract: Test-time augmentation (TTA) has become a widely adopted technique in the computer vision field, which can improve the prediction performance of models by aggregating the predictions of multiple augmented test samples without additional training or hyperparameter tuning. While previous research has demonstrated the effectiveness of TTA in visual tasks, its application in natural language processing (NLP) tasks remains challenging due to complexities such as varying text lengths, discretization of word elements, and missing word elements. These unfavorable factors make it difficult to preserve the label invariance of the standard TTA method for augmented text samples. Therefore, this paper proposes a …novel TTA technique called Defy, which combines nearest-neighbor anomaly detection algorithm and an adaptive weighting network architecture with a bidirectional KL divergence entropy regularization term between the original sample and the aggregated sample, to encourage the model to make more consistent and reliable predictions for various augmented samples. Additionally, by comparing with Defy, the paper further explores the problem that common TTA methods may impair the semantic meaning of the text during augmentation, leading to a shift in the model’s prediction results from correct to corrupt. Extensive experimental results demonstrate that Defy consistently outperforms existing TTA methods in various text classification tasks and brings consistent improvements across different mainstream models. Show more
Keywords: Test-time augmentation, test-time robustification, text classification, language model, anomaly detection
DOI: 10.3233/JIFS-236010
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Shengbin, Liang | Haoran, Sun | Fuqi, Sun | Hongjian, Wu | Wencai, Du
Article Type: Research Article
Abstract: Mild cognitive impairment (MCI) is a syndrome that occurs in the preclinical stage of Alzheimer’s disease (AD) and is also an early signal of the onset of AD. Early detection and accurate differentiation between MCI and AD populations, and providing them with effective intervention and treatment, are of great significance for preventing or delaying the onset of AD. In this paper, we propose a deep learning model, SE-DenseNet, that combines channel attention and dense connectivity networks and apply it to the field of magnetic resonance imaging (MRI) data recognition for the diagnosis of AD and MCI. First, to extract MRI …features with high quality, a slicing algorithm based on two-dimensional image information entropy is proposed to obtain AD brain lesion features with stronger representation ability. Second, in terms of model structure, SENet is introduced as a channel attention module and redistribute the weight of image features in the channel dimension; use DenseNet as the main architecture to maximize information flow, and each layer is directly interconnected with subsequent layers. It enables the network to learn and extract relevant features from the input data and improve the classification ability of the network. Finally, our proposed model is validated on the Alzheimer’s Disease Neuroimaging Initiative (ADNI) dataset, the results have shown that the accuracy for the four classification tasks of AD-NC, AD-MCI, NC-MCI, and AD-NC-MCI can reach 98.12%, 97.42%, 97.42%, and 95.24%, respectively. At the same time, the sensitivity and specificity have also achieved satisfactory results, exhibited a high performance in comparison with the classic machine learning algorithm and several existing state-of-the-art deep learning methods, demonstrating the proposed method is a powerful tool for the early diagnosis and detection of AD. Show more
Keywords: Alzheimer’s disease classification, computer aided diagnosis, medical image processing, megnetic resonance imaging, deep learning
DOI: 10.3233/JIFS-236542
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-21, 2024
Authors: Karthika, K. | Rangasamy, Devi Priya
Article Type: Research Article
Abstract: In today’s digital era, the security of sensitive data such as Aadhaar data is of utmost importance. To ensure the privacy and integrity of this data, a conceptual framework is proposed that employs the Diffie-Hellman key exchange protocol and Hash-based Message Authentication Code (HMAC) to enhance the security. The proposed system begins with the preprocessing phase, which includes removing noise, standardizing formats and validating the integrity of the data. Next, the data is segmented into appropriate sections to enable efficient storage and retrieval in the cloud. Each segment is further processed to extract meaningful features, ensuring that the relevant information …is preserved while reducing the risk of unauthorized access. For safeguarding the stored Aadhaar data, the system employs the Diffie-Hellman key exchange protocol which allows the data owner and the cloud service provider to establish a shared secret key without exposing it to potential attackers. Additionally, HMAC is implemented to verify the identity of users during the login process. HMAC enhances security by leveraging cryptographic hash functions and a shared secret key to produce a distinct code for each login attempt. This mechanism effectively protects the confidentiality and integrity of stored data. The combination of Diffie-Hellman key exchange and HMAC authentication provides a robust security framework for Aadhaar data. It ensures that the data remains encrypted and inaccessible without the secret key, while also verifying the identity of users during the login process. This comprehensive approach helps preventing unauthorized access thereby protecting against potential attacks, instilling trust and confidence in the security of Aadhaar data stored in the cloud. Results of the article depict that the proposed scheme achieve 0.19 s of encryption time and 0.05 s of decryption time. Show more
Keywords: Hash based message authentication code (HMAC), cryptographic hash functions, Diffie Hellman, communications
DOI: 10.3233/JIFS-234641
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2024
Authors: Vijaya Lakshmi, A. | Vaitheki, K. | Suresh Joseph, K.
Article Type: Research Article
Abstract: Over the years, numerous optimization problems have been addressed utilizing meta-heuristic algorithms. Continuing initiatives have always been to create and develop new, practical algorithms. This work proposes a novel meta-heuristic approach employing the slender Loris optimization algorithm (SLOA), miming slender Loris behavior. The behavior includes foraging, hunting, migration and communication with each other. The ultimate goal of the devised algorithm is to replicate the food-foraging behaviour of Slender Loris (SL) and the quick movement of SL when threatened (i.e.) their escape from predators and also mathematically modelled the special communication techniques of SL using their urine scent smell. SLOA modelled …SL’s slow food foraging behaviour as the exploitation phase, and moving between the tree and escaping from a predator is modelled as the exploration phase. The Eyesight of slender Loris plays a vital role in food foraging during nighttime in dim light. The operator’s Eyesight is modelled based on the angle of inclination of SL. The urine scent intensity is used here to be instrumental in preventing already exploited territory activities, which improves algorithm performance. The suggested algorithm is assessed and tested against nineteen benchmark test operations and evaluated for effectiveness with standard widely recognized meta-heuristics algorithms. The result shows SLOA performing better and achieving near-optimal solutions and dominance in exploration–exploitation balance in most cases than the existing state-of-the-art algorithms. Show more
Keywords: Slender loris optimization algorithm, exploitation and exploration, optimization problems, swarm intelligence algorithm, metaheuristic
DOI: 10.3233/JIFS-236737
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Dai, Songsong
Article Type: Research Article
Abstract: The well-known iterative boolean-like law a →(a → b ) = a → b can be generalized to the functional equation I (x , I (x , y )) = I (x , y ), where I is a fuzzy implication. In this paper, we discuss an approximation of the equation, I (x , I (x , y )) ≈ I (x , y ), i.e., the law is approximately valid. Furthermore, we study the property of approximation preserving with respect to compositions of fuzzy implications. Finally, we give a necessary condition and a sufficient condition for the approximate equation of (S , N )-implications.
Keywords: Functional equation, iterative boolean-like law, fuzzy implication, (S, N)-implication
DOI: 10.3233/JIFS-233435
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-8, 2024
Authors: Zhou, Yinwei | Hu, Jun
Article Type: Research Article
Abstract: The rough set model has been extended to interval rough number decision systems, but the existing studies do not consider interval rough number decision systems with missing values. To this end, a rough set model of incomplete interval rough number decision systems (IIRNDSs) is proposed, and its uncertainty measures are investigated. Firstly, the similarity of two incomplete interval rough numbers (IIRNs) are defined by calculating their optimistic and pessimistic distances of the lower and upper approximation intervals of IIRNs. Then, the rough sets in IIRNDSs are constructed by the induced similarity relation. Next, four uncertainty measures, including approximation accuracy, approximation …roughness, conditional entropy, and decision rough entropy are given, which exhibit a monotonic variation with changes in the size of attribute sets, α, and θ. Finally, the experimental results demonstrate the proposed rough set model of IIRNDSs is feasible and effective. Show more
Keywords: Incomplete interval rough number decision systems, interval rough number, similarity relation, uncertainty measure, rough sets
DOI: 10.3233/JIFS-237320
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Wan, Huanyu | Qiu, Dong
Article Type: Research Article
Abstract: In order to explore effective management strategies in the context of epidemics, this study introduces a novel concept: Trapezoidal type-2 fuzzy linguistic intuitionistic fuzzy set (TrT2FLIFS) and proposes a trapezoidal type-2 fuzzy linguistic intuitionistic fuzzy matrix game (TrT2FLIFMG). Subsequently, employing sentiment analysis based on the BosonNLP sentiment lexicon, the study extracts comment data from Weibo related to epidemics made by users and calculates their textual scores. These two methods are integrated and applied to policy selection in epidemic management, along with the introduction of a new ranking function to compare the importance of alternative policies. Finally, a comparative analysis with …existing methods is conducted to validate the effectiveness of the proposed approach. Show more
Keywords: Matrix game, sentiment analysis, trapezoidal type-2 fuzzy linguistic intuitionistic fuzzy number, ranking function, pandemic management
DOI: 10.3233/JIFS-237319
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-19, 2024
Authors: Mohammed Mustafa, M. | Kalpana Devi, S. | Althaf Ali, A. | Gunavathie, M.A.
Article Type: Research Article
Abstract: Wireless body sensor networks have gained significant importance across diverse fields, including environmental monitoring, healthcare, and sports. This research is concentrated on sports applications, specifically exploring the viability of a wireless body area network tailored for high-performing athletes. The paper is divided into three sections. First, the design of the node location that is used for real-time monitoring of a sportsperson in which the node position, such as the human thigh, foot, arm, wrist, and chest, was estimated and the best position was selected. Second, the accuracy of an application when related to the other schemes such as TDMA with …ZigBee and RA-TDMA & PA-TDMA was done. The reliability using RA-TDMA performed well and showed approximately 98% reliability. Finally, the features of wireless communiqués that affect the presentation of the network for RA-TDMA were estimated, such as delay and jitter. These findings collectively contribute to advancing the understanding of optimizing wireless body sensor networks for sports applications, with notable achievements including the identification of the arm as the optimal sensor placement, achieving a 98% success rate, and surpassing alternative techniques in network performance parameters like packet delivery rate. Show more
Keywords: Location points, real time scheduling, RATDMA, BSN
DOI: 10.3233/JIFS-234275
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Qu, Ying | Wang, Xuming
Article Type: Research Article
Abstract: In order to effectively prevent and control accidents, it is essential to trace back the causes of gas explosions in cities. The DT-AR(decision tree-association rule) algorithm is proposed as a quantitative analysis of gas accident features and causality. First, 210 gas explosion accident investigation reports were taken as samples. The gas accident causation system is divided into three aspects, including environmental factors, management factors and physical factors. Management factors were sorted into organizational-level and individual-level factors from the investigation reports. Second, the CART decision tree model was used to compare location features, organizational causality features, and individual causality features of …the piped and bottled gas accidents, and a decision tree model with the gas system fault site as the root node was built to filter the key feature variables. In order to reveal factor correlations and deep-level causation, the Apriori algorithm is used to mine accident association rules. The combinations on the branches of the decision tree are used as constraints to filter the critical causality rule, which improves the efficiency of association rule screening and enhances prediction accuracy. The results demonstrate that the DT-AR algorithm can evaluate the importance of variables, quickly locate effective combinations of factors, and mine the complete causal chain. The association rule is screened based on the constraint of the key element combination of the decision tree, which compensates for the low efficiency of the Apriori algorithm for association rule mining. In addition, the accident-caused excavation results provide an effective path for gas companies, outsourced service companies and administrative departments to implement gas safety chain supervision, which can address the problem of gas accident safety management failures and provide decision support for accident prevention. Show more
Keywords: 24model, decision tree model, association rule, gas explosion
DOI: 10.3233/JIFS-234372
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Singh, Surender | Sharma, Sonam
Article Type: Research Article
Abstract: A Single-valued neutrosophic set (SVNS) has recently been explored as a comprehensive tool to assess uncertain information due to varied human cognition. This notion stretches the domain of application of the classical fuzzy set and its extended versions. Various comparison measures based on SVNSs like distance measure, similarity measure, and, divergence measure have practical significance in the study of clustering analysis, pattern recognition, machine learning, and computer vision-related problems. Existing measures have some drawbacks in terms of precision and exclusion of information and produce unreasonable results in categorization problems. In this paper, we propose a generic method to define new …divergence measures based on common aggregation operators and discuss some algebraic properties of the proposed divergence measures. To further appreciate the proposed divergence measures, their application to pattern recognition has been investigated in conjunction with the prominent existing comparison measures based on SVNSs. The comparative assessment sensitivity analysis of the proposed measures establishes their edge over the existing ones because of appropriate classification results. Show more
Keywords: Single-valued neutrosophic set, aggregation operator, pattern recognition, divergence measure
DOI: 10.3233/JIFS-232369
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Sakthimohan, M. | Deny, J. | Rani, G. Elizabeth
Article Type: Research Article
Abstract: In general, wireless sensor networks are used in various industries, including environmental monitoring, military applications, and queue tracking. To support vital applications, it is crucial to ensure effectiveness and security. To prolong the network lifetime, most current works either introduce energy-preserving and dynamic clustering strategies to maintain the optimal energy level or attempt to address intrusion detection to fix attacks. In addition, some strategies use routing algorithms to secure the network from one or two attacks to meet this requirement, but many fewer solutions can withstand multiple types of attacks. So, this paper proposes a secure deep learning-based energy-efficient routing …(SDLEER) mechanism for WSNs that comes with an intrusion detection system for detecting attacks in the network. The proposed system overcomes the existing solutions’ drawbacks by including energy-efficient intrusion detection and prevention mechanisms in a single network. The system transfers the network’s data in an energy-aware manner and detects various kinds of network attacks in WSNs. The proposed system mainly comprises two phases, such as optimal cluster-based energy-aware routing and deep learning-based intrusion detection system. Initially, the cluster of sensor nodes is formed using the density peak k-mean clustering algorithm. After that, the proposed system applies an improved pelican optimization approach to select the cluster heads optimally. The data are transmitted to the base station via the chosen optimal cluster heads. Next, in the attack detection phase, the preprocessing operations, such as missing value imputation and normalization, are done on the gathered dataset. Next, the proposed system applies principal component analysis to reduce the dimensionality of the dataset. Finally, intrusion classification is performed by Smish activation included recurrent neural networks. The proposed system uses the NSL-KDD dataset to train and test it. The proposed one consumes a minimum energy of 49.67 mJ, achieves a better delivery rate of 99.92%, takes less lifetime of 5902 rounds, 0.057 s delay, and achieves a higher throughput of 0.99 Mbps when considering a maximum of 500 nodes in the network. Also, the proposed one achieves 99.76% accuracy for the intrusion detection. Thus, the simulation outcomes prove the superiority of the proposed SDLEER system over the existing schemes for routing and attack detection. Show more
Keywords: Wireless sensor networks, optimal cluster-based energy aware routing, intrusion detection system, cluster head selection, routing, dimensionality reduction, and deep learning
DOI: 10.3233/JIFS-235512
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Liu, Jianping | Chu, Xintao | Wang, Jian | Wang, Meng | Wang, Yingfei
Article Type: Research Article
Abstract: Due to the polysemy and complexity of the Chinese language, Chinese machine reading comprehension has always been a challenging task. To improve the semantic understanding and robustness of Chinese machine reading comprehension models, we propose a model that utilizes adversarial training algorithms and Permuted Language Model (PERT). Firstly, we employ the PERT pre-training model to embed paragraphs and questions into vector space to obtain corresponding sequential representations. Secondly, we use a multi-head self-attention mechanism to extract key textual information from the sequence and employ a Bi-GRU network to semantically fuse the output feature vectors, aiming to learn deep semantic representations …in the text. Finally, we introduce perturbations into the model training process. We achieve this by utilizing adversarial training algorithms such as Fast Gradient Method (FGM) and Projected Gradient Descent (PGD). These algorithms generate adversarial samples to enhance the model’s robustness and stability when facing diverse inputs. We conducted comparative experiments on the publicly available Chinese reading comprehension datasets CMRC2018 and DRCD. The experimental results show that our proposed model has achieved significant improvements in both EM and F1-Score compared to the baseline model. To validate the model’s generalization and robustness, we utilized ChatGPT to construct a scientific dataset that includes a large number of domain-specific terms, sentences with mixed Chinese and English, and complex comprehension tasks. Our model also performed remarkably well on the self-built dataset. In conclusion, the proposed model not only effectively enhances the understanding of semantic information in Chinese text but also demonstrates a certain level of generalization capability. Show more
Keywords: Machine reading comprehension, pre-trained model, adversarial training, Bi-GRU, multi-head self-attention mechanism
DOI: 10.3233/JIFS-234417
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Xiao, Yan | Liang, Jinqian
Article Type: Research Article
Abstract: In many real production scenarios, departmental organizations often exhibit a hierarchical structure, where departments cooperate with subordinate departments to optimize resource allocation and maximize their respective benefits. However, due to a lack of information or data, many model parameters in the allocation process cannot be precisely defined. In response to this challenge, an interval n -person hierarchical resource allocation model is proposed to achieve maximum economic benefit in uncertain environments. Based on the concepts of satisfactory degrees of comparing intervals and interval-valued cores of interval-valued n -person cooperative games, an auxiliary nonlinear programming model and method are developed to solve …the interval-valued cores of such cooperative games. The approach explicitly considers the inclusion and/or overlap relations between intervals, whereas the traditional interval ranking method may not guarantee the existence of interval-valued cores. The proposed method offers cooperative opportunities under uncertain conditions. Finally, the feasibility and applicability of the models and methods are demonstrated through a numerical example and comparison with other methods. Show more
Keywords: Hierarchical structure, resource allocation, uncertain environment, interval n-person cooperative game, nonlinear programming model
DOI: 10.3233/JIFS-191941
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Yu, Dan | Wu, Jun | He, Yongling
Article Type: Research Article
Abstract: The distributed robust optimal allocation method for multi-microgrid interconnected systems usually involves a large number of variables and constraints, and the computational complexity is high in practical applications, which makes it difficult to solve the problem. Therefore, a distributed robust optimal allocation method for multi-microgrid interconnection systems based on multi-objective swarm algorithm is proposed. A distributed robust optimization configuration constraint index model for multi-microgrid interconnection system is established. Considering the influence of energy storage technology operation characteristics on its service life, a micro-grid hybrid energy storage capacity optimization configuration model with the minimum annual comprehensive energy storage cost as the …objective function is established with charge and discharge power and residual power as the constraint conditions. The multi-objective swarm algorithm is used to realize the optimization model of distributed robust configuration microgrid interconnection system. By determining the power capacity configuration of the optimal energy storage system and the corresponding frequency dividing points, the power capacity configuration of the optimal energy storage system and the corresponding frequency dividing points are determined. The hybrid energy storage configuration model of multi-microgrid interconnection system is established with the minimum alternative operating cost as the objective function, so as to realize the distributed robust optimal configuration of multi-microgrid interconnection system. The simulation results show that the distributed configuration of multi-microgrid interconnection system with the proposed method has good robustness and strong optimization control ability. Show more
Keywords: Multi-objective bee colony algorithm, multi-microgrid, interconnection system, robust allocation
DOI: 10.3233/JIFS-235092
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Li, Guofa | Wang, Jinfu | He, Jialong | Wang, Jili | Hou, Tianwei
Article Type: Research Article
Abstract: The reliability of machine tool components, particularly the tool magazine manipulator, significantly affects the overall performance of the machine tool. To address the challenge of accurately evaluating the manipulator’s health status using a single performance indicator, this study proposes a method that combines Fuzzy Comprehensive Evaluation (FCE) and a Combined Weighting Method (CWM). By considering both subjective and objective factors, this method provides a comprehensive evaluation of the manipulator’s health status, enhancing the accuracy and reliability of the assessment. The method utilizes fuzzy distribution to construct membership matrices for different health levels and adopts the CWM that combines the Entropy …Weight Method (EWM) and Analytic Hierarchy Process (AHP) to determine the combined weights of the health evaluation indices. This approach improves the accuracy and reliability by considering multiple indicators and objectively weighting them based on their importance. The current health status of the manipulator is evaluated using the fuzzy weighted average operator and the maximum membership principle. Moreover, a fault prediction method based on Particle Swarm Optimization (PSO) and GM(1,1) is proposed to overcome the information gap and small sample problems. The proposed model’s prediction accuracy is verified by comparing it with other models, demonstrating its effectiveness and reliability. Show more
Keywords: Health status evaluation, fault prediction, fuzzy comprehensive evaluation, grey model, particle swarm optimization
DOI: 10.3233/JIFS-233028
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Ajitha Gladis, K.P. | Srinivasan, R. | Sugashini, T. | Ananda Raj, S.P.
Article Type: Research Article
Abstract: Visual impairment people have many difficulties in everyday life, including communicating and getting information, as well as navigating independently and safely. Using auditory alerts, our study hopes to improve the lives of visually impaired individuals by alerting them to items in their path. In this research, a Video-based Smart object detection model named Smart YOLO Glass has been proposed for visually impaired persons. A Paddling - Paddling Squeeze and Attention YOLO Network model is trained with multiple images to detect outdoor objects to assist visually impaired people. In order to calculate the distance between a blind person and obstacles when …moving from one location to another, the proposed method additionally included a distance-measuring sensor. The visually impaired will benefit from this system’s information about around objects and assistance with independent navigation. Recall, accuracy, specificity, precision, and F-measure were among the metrics used to evaluate the proposed strategy. Because there is less time complexity, the user can see the surrounding environment in real time. When comparing the proposed technique to Med glasses, DL smart glass, and DL-FDS, the total accuracy is improved by 7.6%, 4.8%, and 3.1%, respectively. Show more
Keywords: Visual impairment, deep learning, outdoor object detection, wearable system, YOLO network
DOI: 10.3233/JIFS-234453
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Zhu, Meng-Meng | Mao, Jun-Jun | Xu, Wei
Article Type: Research Article
Abstract: Linguistic preference relations with self-confidence (LPRs-SC) are the preference relation that can reflect the decision maker’s (DM) confidence psychology and has received widespread attention for their simple form and multiple information. Currently, arithmetic studies of LPRs-SC are conducted separately for preference relations and self-confidence. In addition, personalized individual semantics (PIS) is an important tool in large-scale decision-making to reflect the differences in the semantic understanding of DMs. However, the confidence level in LPRs-SC limits the preference relation to a certain extent and the linguistic representations of these two components are usually different. This means that it is not only necessary …to propose an arithmetic rule that can express the restrictive relationship between the two but also to construct a model that can extract the PIS of preference relation and confidence respectively. Besides, we constructed a two-stage consensus reaching process (CRP) based on the specificity of the LPRs-SC structure when enhancing group harmony. The process takes self-confidence as an independent source of information, delineates the adjusted categories in detail, and builds an adjustment model accordingly. Finally, the example and comparative analyses verify the merits of the proposed PIS in terms of consistency enhancement and CRP in terms of speed and accuracy harmonization. Show more
Keywords: Personalized individual semantics, linguistic preference relations with self-confidence, consensus reaching process, large scale decision making
DOI: 10.3233/JIFS-236552
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-19, 2024
Authors: Prabu Sankar, N. | Usha, D.
Article Type: Research Article
Abstract: This research paper presents a novel approach to improving healthcare services in rural areas by leveraging the potential of Fuzzy Intelligence Systems, Internet of Bodies (IoB) devices, and Blockchain technology. It begins by exploring the design and development of a Blockchain-based Patients Record System (BPRS), which ensures secure, transparent, and tamper-proof storage of patient medical records. The paper then delves into the fabrication of advanced IoB devices, specifically designed to study and monitor the health of rural populations. These devices, integrated with Fuzzy Intelligence Systems, provide efficient and reliable data capture, interpretation, and decision-making support. The highlight of the study …is the innovative integration of the IoB enabled Patient Monitoring System with the BPRS, which ensures real-time data synchronization and secure access to patient data for authorized personnel. The system collectively promotes efficient healthcare delivery, data privacy, and patient safety in rural areas. Show more
Keywords: Fuzzy intelligence systems, blockchain-based patients record system, internet of bodies devices, rural health monitoring, integrated healthcare system
DOI: 10.3233/JIFS-233752
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-9, 2024
Authors: Kahraman, Cengiz
Article Type: Research Article
Abstract: Intuitionistic fuzzy sets aims at taking the hesitancy of an expert into account in assigning a membership degree or a non-membership degree. The direct assignment of decimal numbers for membership and non-membership degrees of an element in intuitionistic fuzzy sets is not practical. Besides, the assigned degrees are generally composed of one digit or at most two digits after dot. This problem has not been addressed as much as it deserves in the literature. The hypothesis of the paper is that the determination of proportional relationships between membership and non-membership degrees is more appropriate than the direct assignment to obtain …the degrees. Proportional intuitionistic fuzzy (PIF) sets require only the proportion relations between an intuitionistic fuzzy set’s parameters. The accuracy of the results obtained with multi-criteria decision-making models definitely depends on how accurately the membership degrees are determined. In this paper, we extend Combinative distance-based assessment (CODAS) method by using single-valued proportional intuitionistic fuzzy sets. We compare the proposed PIF CODAS method with ordinary fuzzy CODAS method. A cloud service provider selection problem is handled to show the validity of the proposed PIF CODAS method. Additionally, a comparative analysis and a sensitivity analysis together with a discussion are presented. Show more
Keywords: Proportional intuitionistic fuzzy sets, aggregation operators, multi-criteria decision making, CODAS, Cloud service provider selection
DOI: 10.3233/JIFS-237389
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-19, 2024
Authors: Zhan, Qiuyan | Saeid, A. Borumand | Davvaz, Bijan
Article Type: Research Article
Abstract: The aim of this paper is to investigate several operators on L -algebras. At first, closure (interior) operators on L -algebras are defined and some properties of them are obtained. Then, existential operators and universal operators on L -algebras are studied, a one-to-one correspondence between the set of all quantifier operators and the set of all relative complete subalgebras of CKL -algebras is constructed. Furthermore, very true operators on L -algebras are investigated and by giving a very true ideal of a very true L -algebra, quotient structures on very true L -algebras are established.
Keywords: L-algebra, closure (interior) operator, existential (universal) operator, very true operator
DOI: 10.3233/JIFS-234370
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-11, 2024
Authors: Mohan, Prakash | Aishwarya, S.
Article Type: Research Article
Abstract: Price changes in construction materials have a significant impact on building construction projects. Such price variations occur at random and at varying rates over time. A system that can estimate the magnitude and quantity of the change in material prices with reasonable accuracy is required. The primary goal is to create a machine-learning model that can predict the type of building material chosen based on environmental factors. The compressive strength of concrete is critical in defining its mechanical qualities. Long laboratory testing is needed to determine the compressive strength of concrete. The capacity of powerful machine learning algorithms to forecast …concrete compressive strength speeds up these lengthy experimental methods while also lowering expenses. This study provides abilities to precisely anticipate and categorize numerous qualities and traits of distinct materials. The framework includes a broad dataset that details materials, composition, and performance characteristics. Machine learning algorithms such as logistic regression (LR), decision trees (DT), and random forests (RF) train models on the training data. The models are hyper-parameter tweaked and feature developed to achieve the most outstanding performance. The k-fold method is used throughout the training and assessment phase to guarantee robustness and reduce bias. The F1 score and Receiver Operating Characteristic-Area Under Curve (ROC-AUC) curve are two performance measures used to measure how accurate and predictive the trained models are. The study findings provide insights into the qualities of the materials, facilitating improved material selection, quality assurance, and decision-making in the building sector. In the analyses, the best accuracy value was 99.92%, and the precision value was 88.83% using the LR algorithm. As a result, it was determined that the LR algorithm had the least execution 57.826 ms, and is thus the most suitable for use in concrete compressive strength estimation. Show more
Keywords: Building materials, machine learning algorithms, feature selection, model training, K-fold, performance evaluation
DOI: 10.3233/JIFS-236111
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Lin, Guangbo | Duan, Ninggui
Article Type: Research Article
Abstract: Integrating the E-commerce system with an enterprise resource planning tool can help the firm improve performance, maintain customers, and increase sales. In Enterprise Resource Planning, integration features can be provided either as developed features or as separate assignments and contributions. Problems with the online platform, improper addresses, rejected payments, and especially apparent transactions are frequent problems for online buyers. The enhanced Adaptive Ant Colony Optimization is utilized to optimize the rural E-commerce express of transportation. Several innovative routes can lower the downlink transportation cost and reach all collecting places with a fast delivery route. Convolutional Neural Networks were utilized to …increase the collective innovation of the E-commerce platform and simplify network communication. E-commerce is a mechanism used to market information services and products. Hence, ERP-AACO-CNN has been designed to integrate Enterprise Resource Planning and E-commerce, and business operations can stream smoothly from the front to the back of the business. Statistics on sales orders, customers, stock levels, price, and essential performance measurement systems. The automated invoices, frequent communications, financial report preparation, product and service delivery, and material requirements planning. The most significant results will likely finance businesses that employ it as a stimulant for a wide-ranging process improvement. In addition, E-commerce is a valuable innovation that connects buyers and sellers in various corners of the globe. Customer satisfaction is projected to be more significant than fault detection at 95.2 % accuracy for the proposed method’s E-commerce system with the superior value. According to client demand, an E-commerce system is the most accurate development at a given input level, and a future ERP is 64.9% efficient. The proposed approach has a 24.5% random error rate and a 13.2% mean square error rate. A comparison of E-commerce and enterprise ERP precision to the proposed technique yields 83.8% better results. Show more
Keywords: Adaptive ant colony optimization, enterprise resource planning, convolutional neural networks, E-commerce system
DOI: 10.3233/JIFS-237998
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: He, Fuyun | Feng, Huiling | Tang, Xiaohu
Article Type: Research Article
Abstract: The segmentation of neuronal morphology in electron microscopy images is crucial for the analysis and understanding of neuronal function. However, most of the existing segmentation methods are not suitable for challenging datasets where the neuronal structure is contaminated by noise or has interrupted parts. In this paper, we propose a segmentation method based on deep learning to determine the location information of neurons and reduce the influence of image noise in the data. Specifically, we adapt our neuron dataset based on UNet by using convolution with BN fusion and multi-input feature fusion. The method is named REDAFNet. The model simplifies …the model structure and enhances the generalization ability by fusing the convolution layer and BN layer. The noise interference in the data was reduced by multi-input feature fusion, and the ability to understand and express the data was enhanced. The method takes a neuron image as input and its pixel segmentation map as output. Experimental results show that the segmentation accuracy of the proposed method is 91.96%, 93.86% and 80.25% on the ISBI2012 dataset, U-RISC retinal neuron dataset and N2DH-GOWT1 stem cell dataset, respectively. Compared with the existing segmentation methods, the proposed method can extract more complete feature information and achieve more accurate segmentation. Show more
Keywords: Image segmentation, convolutional neural network, UNet, neuron image
DOI: 10.3233/JIFS-236286
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Du, Xueke | Li, Wenli | Wei, Xiaowen
Article Type: Research Article
Abstract: The fees of different certification services are charged in different ways: For example, T-mall.com (one of the leading e-commerce platforms in China) uses a total certification service , where each type of seller participating in the platform must purchase certification services; Pinduoduo.com (another Chinese e-commerce platform) uses an alternative certification service , where after paying a transaction fee, each seller participating in the platform can choose whether to purchase certification services. This paper studies how the choice of certification services affects the participation decisions of both sellers and buyers, as well as the revenue and quality level (the proportion of …high-quality sellers of all participating sellers) of a platform. According to previous research, network externalities also affect sellers’ and buyers’ participation strategies. Studies on the effectiveness of different certification services for e-commerce platforms have rarely considered both positive and negative network externalities. The results of constructed game-theoretic models show that both the certification capability and the certification cost play critical roles in determining which certification services can generate more revenue. If a platform provides certification services, the total certification service always generates a higher quality level than the alternative certification service. Furthermore, the applicable scope of certification services (defined as the certification strategy space), can be broadened by increasing both the profit ratio (the ratio between the profit of H-type sellers and L-type sellers) and the value ratio (the ratio between the value of H-type sellers and L-type sellers). Counterintuitively, a higher certification capability does not always yield a higher certification fee. Show more
Keywords: Certification services, E-commerce platforms, information asymmetries, network externalities, certification capability
DOI: 10.3233/JIFS-234621
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2024
Authors: Wang, Hanpeng | Xiong, Hengen
Article Type: Research Article
Abstract: An improved genetic algorithm is proposed for the Job Shop Scheduling Problem with Minimum Total Weight Tardiness (JSSP/TWT). In the proposed improved genetic algorithm, a decoding method based on the Minimum Local Tardiness (MLT) rule of the job is proposed by using the commonly used chromosome coding method of job numbering, and a chromosome recombination operator based on the decoding of the MLT rule is added to the basic genetic algorithm flow. As a way to enhance the quality of the initialized population, a non-delay scheduling combined with heuristic rules for population initialization. and a PiMX (Precedence in Machine crossover) …crossover operator based on the priority of processing on the machine is designed. Comparison experiments of simulation scheduling under different algorithm configurations are conducted for randomly generated larger scale JSSP/TWT. Statistical analysis of the experimental evidence indicates that the genetic algorithm based on the above three improvements exhibits significantly superior performance for JSSP/TWT solving: faster convergence and better scheduling solutions can be obtained. Show more
Keywords: Improved genetic algorithm, total weight tardiness, minimum local tardiness, PiMX
DOI: 10.3233/JIFS-236712
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Zhang, Dabin | Yu, Zehui | Ling, Liwen | Hu, Huanling | Lin, Ruibin
Article Type: Research Article
Abstract: As CO2 emissions continue to rise, the problem of global warming is becoming increasingly serious. It is important to provide a robust management decision-making basis for the reductions of carbon emissions worldwide by predicting carbon emissions accurately. However, affected by various factors, the prediction of carbon emissions is challenging due to its nonlinear and nonstationary characteristics. Thus, we propose a combination forecast model, named CEEMDAN-GWO-SVR, which incorporates multiple features to predict trends in China’s carbon emissions. First, the impact of online search attention and public health emergencies are considered in carbon emissions prediction. Since the impact of different variables …on carbon emissions is lagged, the grey relational degree is used to identify the appropriate lag series. Second, irrelevant features are eliminated through RFECV. To address the issue of feature redundancy of online search attention, we propose a dimensionality reduction method based on keyword classification. Finally, to evaluate the features of the proposed framework, four evaluation indicators are tested in multiple machine learning models. The best-performed model (SVR) is optimized by CEEMDAN and GWO to enhance prediction accuracy. The empirical results indicate that the proposed framework maintains good performance in both multi-scenario and multi-step prediction. Show more
Keywords: Carbon emissions prediction, online search attention, machine learning, time series forecasting
DOI: 10.3233/JIFS-236451
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Luo, Zhenrong | Jiang, Lei
Article Type: Research Article
Abstract: In order to construct an evaluation index system suitable for tourism management classroom teaching, this article evaluates the teaching effectiveness of teachers and improves the teaching quality of tourism management courses. This article is based on developmental evaluation theory, using Analytic Hierarchy Process, Project Response Theory, and CIPP model to construct an indicator system suitable for tourism management classroom teaching. Then, based on the collected data of 5763 students, the reliability and effectiveness of the tool and indicator system were first verified. Then, the variable of teacher teaching style was introduced to construct an OLS regression model for empirical research. …The research will summarize teacher and student data collected through the platform and conduct reliability analysis in SPSS 22.0 software, using Cronbach α The credibility of coefficient testing and evaluation tools. Cronbach in Environmental Fundamentals α The cβoefficient value is 0.8350. Cronbach for resource allocation α The coefficient is 0.735, and the Cronbah of the implementation process α Cronb Bach with a coefficient of 0.7 47 for teaching performance α The coefficient is 0.7240, indicating that rat ings has high reliability. Research has found that among the four specific types, the holistic type has the greatest impact on the specific situation, the holistic type has the greatest impact on the environmental foundation and resource allocation, and the legislative type has the greatest impact on the implementation process and teaching performance. Show more
Keywords: Tourism management, AHP method, CIPP model, teaching style
DOI: 10.3233/JIFS-235844
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-14, 2024
Authors: Vaikunta Pai, T. | Singh, Manmohan | Shaik, Nazeer | Ashokkumar, C. | Anuradha, D. | Gangopadhyay, Amit | Rao, Goda Srinivasa | Reddy, T.Sunilkumar | Nagaraju, D.
Article Type: Research Article
Abstract: As the demand for energy in India continues to surge, accurate forecasting becomes paramount for efficient resource allocation and sustainable development. This study proposes an innovative approach to forecasting Indian primary energy demand by integrating Artificial Intelligence (AI) techniques with Fuzzy Auto-regressive Distributed Lag (FADL) models. FADL models, incorporating fuzzy logic, allow for a nuanced representation of uncertainties and complexities within the energy demand dynamics. In this research, historical energy consumption data is analysed using FADL models with both symmetric and non-symmetric triangular coefficients, enhancing the model’s adaptability to the inherent uncertainties associated with energy forecasting. This study addresses the …urgent need for enhanced energy planning models in the context of sustainable development. Our research aims to provide a comprehensive framework for predicting future Total Final Consumption (TFC) in alignment with the Indian National Energy Plan’s net-zero emissions target by 2035. Recognizing the limitations of current models, our research introduces a novel approach that integrates advanced algorithms and methodologies, offering a more flexible and realistic assessment of TFC trends. The primary objective of this study is to develop an improved energy planning model that surpasses existing projections by incorporating sophisticated algorithms. We aim to refine Show more
Keywords: Auto-regressive, distributed lag, energy consumption, forecast, triangular coefficient
DOI: 10.3233/JIFS-240729
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Ma, Chengfei | Yang, Xiaolei | Lu, Heng | He, Siyuan | Liu, Yongshan
Article Type: Research Article
Abstract: When calculating participants’ contribution to federated learning, addressing issues such as the inability to collect complete test data and the impact of malicious and dishonest participants on the global model is necessary. This article proposes a federated aggregation method based on cosine similarity approximation Shapley value method contribution degree. Firstly, a participant contribution calculation model combining cosine similarity and the approximate Shapley value method was designed to obtain the contribution values of the participants. Then, based on the calculation model of participant contribution, a federated aggregation algorithm is proposed, and the aggregation weights of each participant in the federated aggregation …process are calculated by their contribution values. Finally, the gradient parameters of the global model were determined and propagated to all participants to update the local model. Experiments were conducted under different privacy protection parameters, data noise parameters, and the proportion of malicious participants. The results showed that the accuracy of the algorithm model can be maintained at 90% and 65% on the MNIST and CIFAR-10 datasets, respectively. This method can reasonably and accurately calculate the contribution of participants without a complete test dataset, reducing computational costs to a certain extent and can resist the influence of the aforementioned participants. Show more
Keywords: Federated aggregation algorithm, contribution assessment, cosine similarity, Shapley value, equitable distribution
DOI: 10.3233/JIFS-236977
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Pandey, Sakshi Dev | Ranadive, A.S. | Samanta, Sovan | Dubey, Vivek Kumar
Article Type: Research Article
Abstract: Several methodologies have been proposed in the literature of graph theory for depicting collaboration among entities. However, in these studies, the measure of collaboration is taken based on the crisp graphical properties and discusses only its positive effects. In this manuscript, we discuss the simultaneous collaboration and competition that are observed among individuals, organizations, countries, communities and many others. The notion of bipolar fuzzy bunch graph (BFBG) is introduced in this study to effectively capture the positive and negative effects of both the terms collaboration and competition, which is jointly called coopetition. The goal of this paper is to introduce …an improved representation and analytical measure for coopetition. To further enrich the literature on competition graphs, the notion of survival and winning competition among species has been introduced and also provides its bipolar fuzzy competition degrees. We also introduce two types of coopetition measures to understand the ranking structure of entities (i.e. which node batter collaborates and competes with other nodes) in the network: a) bipolar fuzzy coopetition degree and b) bipolar fuzzy coopatition index. In the form of a bipolar fuzzy coopetition graph, we find evidence to validate our framework and computations. We gathered research articles on COVID-19 and their citations over a specific time period from a specific journal. To demonstrate our approach, we displayed bipolar fuzzy collaboration and competition of various countries on COVID-19 and classified their rankings based on their positive and negative coopetition indices. Show more
Keywords: Bipolar fuzzy bunch degree, communication potential effect (CPE), bipolar fuzzy mixed graph, winning and survival competition, coopetition degree, coopetition index
DOI: 10.3233/JIFS-234061
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-20, 2024
Authors: Ding, Xiaomei | Ding, Huaibao | Zhou, Fei
Article Type: Research Article
Abstract: Given that cloud computing is a relatively new field of study, there is an urgent need for comprehensive approaches to resource provisioning and the allocation of Internet of Things (IoT) services across cloud infrastructure. Other challenging aspects of cloud computing include IoT resource virtualization and disseminating IoT services among available cloud resources. To meet deadlines, optimize application execution times, efficiently use cloud resources, and identify the optimal service location, service placement plays a crucial role in installing services on existing virtual resources within a cloud-based environment. To achieve load balance in the fog computing infrastructure and ensure optimal resource allocation, …this work proposes a meta-heuristic approach based on the cat swarm optimization method. For more clarity in the difference between the work presented in this research and other similar works, we named the proposed technique MH-CSO. The algorithm incorporates a resource check parameter to determine the accessibility and suitability of resources in different situations. This conclusion was drawn after evaluating the proposed solution in the ifogsim environment and comparing it with particle swarm and ant colony optimization techniques. The findings demonstrate that the proposed solution successfully optimizes key parameters, including runtime and energy usage. Show more
Keywords: Load balancing, cat swarm optimization, fog computing, resource allocation and IoT
DOI: 10.3233/JIFS-233418
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Zhou, Ruohan | Chen, Wei | Xie, Congjin
Article Type: Research Article
Abstract: The field of business management involves a large amount of data and information sources, including market data, customer data, supply chain data, etc. In order to quantify and analyze different resources, help enterprises better plan and allocate resources, and improve resource utilization efficiency, a clustering analysis based digital resource integration algorithm for business management is studied. Build a business management digital resource integration framework, including data layer, integration layer, and storage layer, to integrate and store data from different sources of business management databases, thereby facilitating unified management and utilization of digital resources by enterprises. The data layer collects data …from different business management databases and stores it in the database according to different sources; The integration layer preprocesses the collected data, simply fixes errors and missing information in the data, and improves data quality. Adopting a feature extraction method based on the projection direction uncorrelation strategy of the labeled power set conversion method, the useful feature information of digital resources in enterprise management can be effectively extracted; Based on the two-step clustering analysis method, business management digital resources are clustered according to similar characteristics to complete the classification and integration of business management digital resources, and improve the efficiency of resource utilization; The storage layer adopts the Security Information Diffusion Algorithm (IDA) storage model to store integrated and classified digital resources managed by enterprises, ensuring data security and effectively preventing data leakage and illegal access. The experimental results show that the digital resource structure of business management integrated by this algorithm is clear, with a data redundancy of less than 8% and a difference of less than 11% . The time consumption for data integration is less than 2.11 minutes, indicating good resource integration ability. Show more
Keywords: Cluster analysis, business administration, digitization, resource integration, data storage, resource sharing
DOI: 10.3233/JIFS-235573
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Rachamadugu, Sandeep Kumar | Pushphavathi, T.P.
Article Type: Research Article
Abstract: This paper introduces an innovative approach, the LS-SLM (Local Search with Smart Local Moving) technique, for enhancing the efficiency of article recommendation systems based on community detection and topic modeling. The methodology undergoes rigorous evaluation using a comprehensive dataset extracted from the “dblp. v12.json” citation network. Experimental results presented herein provide a clear depiction of the superior performance of the LS-SLM technique when compared to established algorithms, namely the Louvain Algorithm (LA), Stochastic Block Model (SBM), Fast Greedy Algorithm (FGA), and Smart Local Moving (SLM). The evaluation metrics include accuracy, precision, specificity, recall, F-Score, modularity, Normalized Mutual Information (NMI), betweenness …centrality (BTC), and community detection time. Notably, the LS-SLM technique outperforms existing solutions across all metrics. For instance, the proposed methodology achieves an accuracy of 96.32%, surpassing LA by 16% and demonstrating a 10.6% improvement over SBM. Precision, a critical measure of relevance, stands at 96.32%, showcasing a significant advancement over GCR-GAN (61.7%) and CR-HBNE (45.9%). Additionally, sensitivity analysis reveals that the LS-SLM technique achieves the highest sensitivity value of 96.5487%, outperforming LA by 14.2%. The LS-SLM also demonstrates superior specificity and recall, with values of 96.5478% and 96.5487%, respectively. The modularity performance is exceptional, with LS-SLM obtaining 95.6119%, significantly outpacing SLM, FGA, SBM, and LA. Furthermore, the LS-SLM technique excels in community detection time, completing the process in 38,652 ms, showcasing efficiency gains over existing techniques. The BTC analysis indicates that LS-SLM achieves a value of 94.6650%, demonstrating its proficiency in controlling information flow within the network. Show more
Keywords: Recommender Systems (RS), BagofWords (BoW), Pearson Correlation Co-efficient based Latent Dirichlet Allocation (PCC-LDA), Linear Scaling based Smart Local Moving (LS-SLM), Time Frequency and Inverse Document Frequency (TF-IDF), Community detection
DOI: 10.3233/JIFS-233851
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Zhang, Yonghong | Li, Shouwei | Li, Jingwei | Tang, Xiaoyu
Article Type: Research Article
Abstract: Electricity market violations affect the overall operations of the electricity market. This paper explores the evolutionary stability strategies of electricity generation enterprises and electricity consumers under two modes: traditional regulation and blockchain regulation to analyze blockchain technology’s mechanism and conditions in solving electricity market violations. The experimental results indicate that the likelihood of consumers accepting electricity and the regulatory capacity of regulatory agencies play a crucial role in determining the violation approach adopted by electricity generation enterprises. Under traditional regulatory models, due to information asymmetry, regulatory agencies may not be able to detect violations promptly. Meanwhile, electricity consumers may choose …to accept violations by power generation companies due to high appeal costs. Blockchain technology enables regulatory agencies to improve their regulatory capabilities by eliminating information asymmetry, reducing the cost of complaints from electricity consumers, thereby elevating the risk for enterprises engaging in market violations and optimizing the evolutionary game towards an optimum state. Show more
Keywords: Blockchain technology, electricity market, violation regulation, evolutionary game
DOI: 10.3233/JIFS-238041
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Zhang, Juwei | Wang, Jing | Liu, Mingjun | Li, Zhihui
Article Type: Research Article
Abstract: Assessing the effectiveness of physical education instruction, students’ learning, and the feedback received from the teaching process are all vital components of the physical education teaching process in colleges and universities. Improving the quality of physical education instruction in these settings is essential. With its ability to drive the digital revolution of physical education in schools, intelligent technology is bringing about significant changes in the field of education and drawing attention from people from all walks of life. To assess intelligent technology’s impact on physical education instruction in a scientific manner, this study utilizes the latest intelligent analysis and sensing …data mining to design an intelligent physical education measurement and evaluation model, which utilizes GPS positioning, built-in maps, and gravity sensing to provide real-time feedback on the trajectory, distance, and time of the movement, and then calculates the real-time and average speed of the movement, as different students’ body postures to achieve the the same effect when the required speed is not the same, this paper randomly selected students with different BMI index for empirical analysis. The experimental results show that the principal components of the factor analysis extracted four common factors with a cumulative contribution rate of 69.5%, and the test-retest reliability of the four dimensions is 0.665–0.862. Show more
Keywords: Intelligent analysis, sensor data mining, physical education, physical measurement and evaluation
DOI: 10.3233/JIFS-235410
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-16, 2024
Authors: Lalitha, V. | Latha, B.
Article Type: Research Article
Abstract: The most valuable information of Hyperspectral Image (HSI) should be processed properly. Using dimensionality reduction techniques in two distinct approaches, we created a structure for HSI to collect physiological and diagnostic information. The tissue Oxygen Saturation Level (StO2 ) was extracted using the HSI approach as a physiological characteristic for stress detection. Our research findings suggest that this unique characteristic may not be affected by humidity or temperature in the environment. Comparing the standard StO2 reference and pressure concentrations, the social stress assessments showed a substantial variance and considerable practical differentiation. The proposed system has already been evaluated on …tumor images from rats with head and neck cancers using a spectrum from 450 to 900 nm wavelength. The Fourier transformation was developed to improve precision, and normalize the brightness and mean spectrum components. The analysis of results showed that in a difficult situation where awareness could be inexpensive due to feature possibilities for rapid classification tasks and significant in measuring the structure of HSI analysis for cancer detection throughout the surgical resection of wildlife. Our proposed model improves performance measures such as reliability at 89.62% and accuracy at 95.26% when compared with existing systems. Show more
Keywords: Hyperspectral Image, dimensionality reduction, stress tests, cancer detection, fourier coefficients
DOI: 10.3233/JIFS-236935
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Fan, Jianping | Chai, Mingxuan | Wu, Meiqin
Article Type: Research Article
Abstract: In this manuscript, we construct a Multi-Criteria Decision-Making (MCDM) model to study the new energy vehicle (NEV) battery supplier selection problem. Firstly, we select criteria to build an evaluation index system. Secondly, SAWARA and MEREC methods are used to calculate subjective and objective weights in the ranking process, respectively, and PTIHFS (Probabilistic Triangular Intuitionistic Hesitant Fuzzy Set) is employed to describe the decision maker’s accurate preferences in performing the calculation of subjective weights. Then, the game theory is used to find the satisfactory weights. We use TFNs to describe the original information in the MARCOS method to obtain the optimal …alternative. Finally, a correlation calculation using Spearman coefficients is carried out to compare with existing methods and prove the model’s validity. Show more
Keywords: PTIHFS, SWARA, MEREC, MARCOS, game theory
DOI: 10.3233/JIFS-231975
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-19, 2024
Authors: Wang, Youwei | Feng, Lizhou
Article Type: Research Article
Abstract: A new bootstrap-aggregating (bagging) ensemble learning algorithm is proposed based on classification certainty and semantic correlation to improve the classification accuracy of ensemble learning. First, two predetermined thresholds are introduced to construct the long and short-text sample subsets, and different deep learning methods are compared to construct the optimal base classifier groups for each sample subsets. Then, the random sampling method employed in traditional bagging classification algorithms is improved, and a threshold group based random sampling method is proposed to obtain long and short training sample subsets of each iteration. Finally, the sample classification certainty of the base classifiers for …different categories is defined, and the semantic correlation information is integrated with the traditional weighted voting classifier ensemble method to avoid the loss of important information during the sampling process. The experimental results on multiple datasets demonstrate that the algorithm significantly improves text classification accuracy and outperforms typical deep learning algorithms. The proposed algorithm achieves the improvements of approximately 0.082, 0.061 and 0.019 on CNews dataset when the F1 measurement is used over the traditional ensemble learning algorithms such as random forest, M_ADA_A_SMV and CNN_SVM_LR. Moreover, it achieves the best F1 values of 0.995, 0.985, and 0.989 on the datasets of Spam, CNews, and SogouCS datasets, respectively, when compared with the ensemble learning algorithms using different base classifiers. Show more
Keywords: Ensemble learning, weak classifier, text classification, deep learning, random sampling
DOI: 10.3233/JIFS-236422
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Devi, Salam Jayachitra | Doley, Juwar | Gupta, Vivek Kumar
Article Type: Research Article
Abstract: Object detection has made significant strides in recent years, but it remains a challenging task to accurately and quickly identify and detect objects. While humans can easily recognize objects in images or videos regardless of their appearance, computers face difficulties in this task. Object detection plays a crucial role in computer vision and finds applications in various domains such as healthcare, security, agriculture, home automation and more. To address the challenges of object detection, several techniques have been developed including RCNN, Faster RCNN, YOLO and Single Shot Detector (SSD). In this paper, we propose a modified YOLOv5s architecture that aims …to improve detection performance. Our modified architecture incorporates the C3Ghost module along with the SPP and SPPF modules in the YOLOv5s backbone network. We also utilize the Adam and Stochastic Gradient Descent (SGD) optimizers. The paper also provides an overview of three major versions of the YOLO object detection model: YOLOv3, YOLOv4 and YOLOv5. We discussed their respective performance analyses. For our evaluation, we collected a database of pig images from the ICAR-National Research Centre on Pig farm. We assessed the performance using four metrics such as Precision (P), Recall (R), F1-score and mAP @ 0.50. The computational results demonstrate that our method YOLOv5s architecture achieves a 0.0414 higher mAP while utilizing less memory space compared to the original YOLOv5s architecture. This research contributes to the advancement of object detection techniques and showcases the potential of our modified YOLOv5s architecture for improved performance in real world applications. Show more
Keywords: Object detection, YOLO, convolutional neural networks, pig, and computer vision
DOI: 10.3233/JIFS-231032
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-19, 2024
Authors: Abraham, Asha | Kayalvizhi, R. | Mohideen, Habeeb Shaik
Article Type: Research Article
Abstract: Nowadays, cancer has become more alarming. This paper discusses the most significant Ovarian Cancer, Epithelial Ovarian Cancer (EOC), due to the low survival rate. The proposed algorithm for this work is a ‘Multi classifier ShapRFECV based EOC’ (MSRFECV-EOC) subtype analysis technique that utilized the EOC data from the National Centre for Biotechnology Information and Cancer Cell Line Encyclopedia websites for early identification of EOC using Machine Learning Techniques. This approach increases the data size, balances different classes of the data, and cuts down the enormous number of features unrelated to the disease of interest to prevent overfitting. To incorporate these …functionalities, in the data preprocessing stage, OC-related gene names were taken from the Cancermine database and other OC-related works. Moreover, OC datasets were merged based on OC genes, and missing values of EOC subtypes were identified and imputed using Iterative Logistic Imputation. Synthetic Minority Oversampling Technique with an Edited Nearest Neighbors approach is applied to the imputed dataset. Next, in the Feature Selection phase, the most significant features for subtypes of EOC were identified by applying the Shapley Additive Explanations based on the Recursive Feature Elimination Cross-Validation (ShapRFECV) algorithm, preserving predefined features while selecting new EOC features. Eventually, an accuracy of 97% was achieved with Optuna-optimized Random Forest, which outperformed the existing models. SHAP plotted the most prominent features behind the classification. The Pickle tool saves much training time by preserving hidden parameter values of the model. In the final phase, by using the Stratified K Fold Stacking Classifier, the accuracy was improved to 98.9%. Show more
Keywords: Machine learning, Ovarian cancer, Pickle, multi classification, Random Forest
DOI: 10.3233/JIFS-236197
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Ren, Shujun | Wang, Yuanhong
Article Type: Research Article
Abstract: Image segmentation is critical in medical image processing for lesion detection, localisation, and subsequent diagnosis. Currently, computer-aided diagnosis (CAD) has played a significant role in improving diagnostic efficiency and accuracy. The segmentation task is made more difficult by the hazy lesion boundaries and uneven forms. Because standard convolutional neural networks (CNNs) are incapable of capturing global contextual information, adequate segmentation results are impossible to achieve. We propose a multiscale feature fusion network (MTC-Net) in this paper that integrates deep separable convolution and self-attentive modules in the encoder to achieve better local continuity of images and feature maps. In the decoder, …a multi-branch multi-scale feature fusion module (MSFB) is utilized to improve the network’s feature extraction capability, and it is integrated with a global cooperative aggregation module (GCAM) to learn more contextual information and adaptively fuse multi-scale features. To develop rich hierarchical representations of irregular forms, the suggested detail enhancement module (DEM) adaptively integrates local characteristics with their global dependencies. To validate the effectiveness of the proposed network, we conducted extensive experiments, evaluated on the public datasets of skin, breast, thyroid and gastrointestinal tract with ISIC2018, BUSI, TN3K and Kvasir-SEG. The comparison with the latest methods also verifies the superiority of our proposed MTC-Net in terms of accuracy. Our code on https://github.com/gih23/MTC-Net. Show more
Keywords: Medical image segmentation, multi-scale features, detail enhancement, feature fusion, deep learning
DOI: 10.3233/JIFS-237963
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-12, 2024
Authors: Chen, Sijia | Wang, Qingquan | Guo, Yuan
Article Type: Research Article
Abstract: Motivation: With the enhancement of people’s awareness of the protection of personal privacy information, how to provide better services on the premise of protecting users’ privacy has become an urgent problem to be solved. Therefore, it is a necessary motivation to build a network intelligent platform for privacy protection and integrated big data mining. Objective: In view of the existing network platform of data privacy leakage, low efficiency of data mining and user satisfaction is not high, this paper will adopt advanced privacy technology, to ensure the confidentiality of users’ personal information and security, to enhance the user …trust and use experience, to better meet the needs of users. Methods: In order to better protect the privacy of users, the network intelligent platform should adopt more advanced privacy protection technology. This paper uses the differential privacy algorithm to reduce the risk of data leakage and abuse, and ensure the accuracy and efficiency of data analysis and mining. In the design of the platform, the performance of the platform is fully taken into account to realize the secure storage and efficient processing of data, with good scalability and flexibility to meet the growing user needs and business needs. The performance of the network intelligent platform is also analyzed by experimental simulation. Result: The experimental results of this article indicated that in a network intelligent platform based on privacy protection and integrated big data mining, its data transmission encryption score was 9.5; the data storage encryption score was 9.8; the score of access control mechanism was 9.3; the privacy protection score was 9.6; the response time was 80 ms; the processing speed was 121GB/h; the user satisfaction rating was 6.6. Conclusion: This indicated that the network intelligent platform had good platform performance and user friendliness while ensuring data security and privacy protection. It could efficiently conduct data mining and ensure data security and privacy. Show more
Keywords: Construction of network intelligent platform, privacy protection, data mining, integrating big data
DOI: 10.3233/JIFS-236017
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Huang, Jui-Chan | Shu, Ming-Hung | Lin, Hsiang-Tsen | Day, Jen-Der
Article Type: Research Article
Abstract: With the fast advances of new energy vehicles, the EV battery technology needs to be further improved to follow the step. How to effectively diagnose the electric vehicle’s lithium battery fault becomes a hotspot in the academic circle. This study has proposed new method that uses the state of charge of the battery and self-coder depth to detect faults in the lithium battery group of electric vehicles. First, the study investigates the single lithium battery faults. Then, it builds a lithium battery group fault diagnosis model by integrating the battery charge state and denoising converter network. Finally, it uses a …dataset and retired battery group to validate the model’s performance. The results show that the proposed model achieves an accuracy of 93.18% and a recall rate of 93.73% in identifying the faults in the lithium batteries of the electric vehicles and its F1 value is as high as 0.95. Moreover, the modeling method has the lowest prediction error, indicating its high accuracy and robustness in diagnosing the faults of battery packs. This study aims to provide an effective solution for the fault diagnosis of lithium battery packs in electric vehicles. Show more
Keywords: Transformer framework, DAE, electric vehicle, lithium battery, fault diagnosis
DOI: 10.3233/JIFS-237796
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
Authors: Jumde, Amol | Keskar, Ravindra
Article Type: Research Article
Abstract: With tremendous evolution in the internet world, the internet has become a household thing. Internet users use search engines or personal assistants to request information from the internet. Search results are greatly dependent on the entered keywords. Casual users may enter a vague query due to lack of knowledge of the domain-specific words. We propose a query reformulation system that determines the context of the query, decides on keywords to be replaced and outputs a better-modified query. We propose strategies for keyword replacements and metrics for query betterment checks. We have found that if we project keywords into the vector …space of word projection using word embedding techniques and if the keyword replacement is correct, clusters of a new set of keywords become more cohesive. This assumption forms the basis of our proposed work. To prove the effectiveness of the proposed system, we applied it to the ad-hoc retrieval tasks over two benchmark corpora viz TREC-CDS 2014 and OHSUMED corpus. We indexed Whoosh search engine on these corpora and evaluated based on the given queries provided along with the corpus. Experimental results show that the proposed techniques achieved 9 to 11% improvement in precision and recall scores. Using Google’s popularity index, we also prove that the reformulated queries are not only more accurate but also more popular. The proposed system also applies to Conversational AI chatbots like ChatGPT, where users must rephrase their queries to obtain better results. Show more
Keywords: Query reformulation, WordNet, word embedding, whoosh, TREC
DOI: 10.3233/JIFS-236296
Citation: Journal of Intelligent & Fuzzy Systems, vol. Pre-press, no. Pre-press, pp. 1-19, 2024
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]