{"title":"Bi-channel hybrid GAN attention based anomaly detection system for multi-domain SDN environment","authors":"Saranya Prabu, Jayashree Padmanabhan","doi":"10.3233/jifs-233668","DOIUrl":"https://doi.org/10.3233/jifs-233668","url":null,"abstract":"Software-Defined Networking (SDN) is a strategy that leads the network via software by separating its control plane from the underlying forwarding plane. In support of a global digital network, multi-domain SDN architecture emerges as a viable solution. However, the complex and ever-evolving nature of network threats in a multi-domain environment presents a significant security challenge for controllers in detecting abnormalities. Moreover, multi-domain anomaly detection poses a daunting problem due to the need to process vast amounts of data from diverse domains. Deep learning models have gained popularity for extracting high-level feature representations from massive datasets. In this work, a novel deep neural network architecture, supervised learning based LD-BiHGA (Low Dimensional Bi-channel Hybrid GAN Attention) system is designed to learn class-specific features for accurate anomaly detection. Two asymmetric GANs are employed for learning the normal and abnormal network flows separately. Then, to extract more relevant features, a bi-channel attention mechanism is added. This is the first study to introduce an innovative hybrid architecture that merges bi-channel hybrid GANs with attention models for the purpose of anomaly detection in a multi-domain SDN environment that effectively handles real-time unbalanced data. The suggested architecture demonstrates its effectiveness on three benchmark datasets, achieving an average accuracy improvement of 7.225% on balanced datasets and 3.335% on imbalanced datasets compared to previous intrusion detection system (IDS) architectures in the literature.","PeriodicalId":54795,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":"154 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135974026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved SSD lightweight network with coordinate attention for aircraft target recognition in scene videos","authors":"Weidong Li, Zhenying Li, Chisheng Wang, Xuehai Zhang, Jinlong Duan","doi":"10.3233/jifs-231423","DOIUrl":"https://doi.org/10.3233/jifs-231423","url":null,"abstract":"Accurate identification and monitoring of aircraft on the airport surface can assist managers in rational scheduling and reduce the probability of aircraft conflicts, an important application value for constructing a \"smart airport.\" For the airport surface video monitoring, there are small aircraft targets, aircraft obscuring each other, and affected by different weather, the aircraft target clarity is low, and other complex monitoring problems. In this paper, a lightweight model network for video aircraft recognition in airport field video in complex environments is proposed based on SSD network incorporating coordinate attention mechanism. First, the model designs a lightweight feature extraction network with five feature extraction layers. Each feature extraction layer consists of two modules, Block_A and Block_I. The Block_A module incorporates the coordinate attention mechanism and the channel attention mechanism to improve the detection of obscured aircraft and to enhance the detection of small targets. The Block_I module uses multi-scale feature fusion to extract feature information with rich semantic meaning to enhance the feature extraction capability of the network in complex environments. Then, the designed feature extraction network is applied to the improved SSD detection algorithm, which enhances the recognition accuracy of airport field aircraft in complex environments. It was tested and subjected to ablation experiments under different complex weather conditions. The results show that compared with the Faster R-CNN, SSD, and YOLOv3 models, the detection accuracy of the improved model has been increased by 3.2% , 14.3% , and 10.9% , respectively, and the model parameters have been reduced by 83.9% , 73.1% , and 78.2% respectively. Compared with the YOLOv5 model, the model parameters are reduced by 38.9% when the detection accuracy is close, and the detection speed is increased by 24.4% , reaching 38.2fps, which can well meet the demand for real-time detection of aircraft on airport surfaces.","PeriodicalId":54795,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":"153 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135974027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Rahim, Fazli Amin, ElSayed M. Tag Eldin, Hamiden Abd El-Wahed Khalifa, Sadique Ahmad
{"title":"p, q-Spherical fuzzy sets and their aggregation operators with application to third-party logistic provider selection","authors":"Muhammad Rahim, Fazli Amin, ElSayed M. Tag Eldin, Hamiden Abd El-Wahed Khalifa, Sadique Ahmad","doi":"10.3233/jifs-235297","DOIUrl":"https://doi.org/10.3233/jifs-235297","url":null,"abstract":"The selection of an appropriate third-party logistics (3PL) provider has become an inescapable option for shippers in today’s business landscape, as the outsourcing of logistics activities continues to increase. Choosing the 3PL supplier that best meets their requirements is one of the most difficult difficulties that logistics consumers face. Effective decision-making (DM) is critical in dealing with such scenarios, allowing shippers to make well-informed decisions within a restricted timeframe. The importance of DM arises from the possible financial repercussions of poor decisions, which can result in significant financial losses. In this regard, we introduce p, q-spherical fuzzy set (p, q-SFS), a novel concept that extends the concept of T-spherical fuzzy sets (T-SFSs). p, q-SFS is a comprehensive representation tool for capturing imprecise information. The main contribution of this article is to define the basic operations and a series of averaging and geometric AOs under p, q-spherical fuzzy (p, q-SF) environment. In addition, we establish several fundamental properties of the proposed aggregation operators (AOs). Based on these AOs, we propose a stepwise algorithm for multi-criteria DM (MCDM) problems. Finally, a real-life case study involving the selection of a 3PL provider is shown to validate the applicability of the proposed approach.","PeriodicalId":54795,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":"9 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135973646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Sendhil, A. Arulmurugan, G. Jose Moses, R. Kaviarasan, P. Ramadoss
{"title":"Earlier detection of occult peritoneal metastasis by Pro_Segment in gastric cancer employing augmented deep learning techniques in big data with medical IoT (MIoT)","authors":"R. Sendhil, A. Arulmurugan, G. Jose Moses, R. Kaviarasan, P. Ramadoss","doi":"10.3233/jifs-233510","DOIUrl":"https://doi.org/10.3233/jifs-233510","url":null,"abstract":"Occult peritoneal metastasis often emerges in sick persons having matured gastric cancer (GC) and is inexpertly detected with presently feasible instruments. Due to the existence of peritoneal metastasis that prevents the probability of healing crucial operation, there relies upon a discontented requirement for an initial diagnosis to accurately recognize sick persons having occult peritoneal metastasis. The proffered paradigm of this chapter identifies the initial phases of occult peritoneal metastasis in GC. The initial phase accompanies metabolomics for inspecting biomarkers. If the sick person undergoes the initial signs of occult peritoneal metastasis in GC, early detection is conducted. Yet, the physical prognosis of this cancer cannot diagnose it, and so, automated detection of the images by dissecting the preoperational Computed Tomography (CT) images by conditional random fields accompanying Pro-DAE (Post-processing Denoising Autoencoders) and the labeling in the images is rid by denoising strainers; later, the ensued images and the segmented images experience the Graph Convolutional Networks (GCN), and the outcome feature graph information experience the enhanced categorizer (Greywold and Cuckoo Search Naïve Bayes categorizer) procedure that is employed for initial diagnosis of cancer. Diagnosis of cancer at the initial phase certainly lessens the matured phases of cancer. Hence, this medical information is gathered and treated for diagnosing the sickness.","PeriodicalId":54795,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":"152 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135973885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PS-Merge operator in the classification of gait biomarkers: A preliminary approach to eXplainable Artificial Intelligence","authors":"Eddy Sánchez-DelaCruz, Sameem Abdul-Kareem, Pilar Pozos-Parra","doi":"10.3233/jifs-235053","DOIUrl":"https://doi.org/10.3233/jifs-235053","url":null,"abstract":"Background: Many neurodegenerative diseases affect human gait. Gait analysis is an example of a non-invasive manner to diagnose these diseases. Nevertheless, gait analysis is difficult to do because patients with different neurodegenerative diseases may have similar human gaits. Machine learning algorithms may improve the correct identification of these pathologies. However, the problem with many classification algorithms is a lack of transparency and interpretability for the final user. Methods: In this study, we implemented the PS-Merge operator for the classification, employing gait biomarkers of a public dataset. Results: The highest classification percentage was 83.77%, which means an acceptable degree of reliability. Conclusions: Our results show that PS-Merge has the ability to explain how the algorithm chooses an option, i.e., the operator can be seen as a first step to obtaining an eXplainable Artificial Intelligence (XAI).","PeriodicalId":54795,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135973801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Baghavathi Priya, P. Sheela Rani, S.P. Chokkalingam, A. Prathik, M. Mohan, G. Anitha, M. Thangavel, S. Suthir
{"title":"XAutn: Blockchain-based cross domain authentication for digital certificates in the education sector","authors":"S. Baghavathi Priya, P. Sheela Rani, S.P. Chokkalingam, A. Prathik, M. Mohan, G. Anitha, M. Thangavel, S. Suthir","doi":"10.3233/jifs-235140","DOIUrl":"https://doi.org/10.3233/jifs-235140","url":null,"abstract":"Traditional testimony and electronic endorsements are extremely challenging to uphold and defend, and there is a problem with challenging authentication. The identity of the student is typically not recognized when it comes to requirements for access to a student’s academic credentials that are scattered over numerous sites. This is an issue with cross-domain authentication methods. On the one hand, whenever the volume of cross-domain authentication requests increases dramatically, the response time can become intolerable because of the slow throughput associated with blockchain mechanisms. These systems still do not give enough thought to the cross-domain scenario’s anonymity problem. This research proposes an effective cross-domain authentication mechanism called XAutn that protects anonymity and integrates seamlessly through the present Certificate Transparency (CT) schemes. XAutn protects privacy and develops a fast response correctness evaluation method that is based on the RSA (Rivest, Shamir, and Adleman) cryptographic accumulator, Zero Knowledge Proof Algorithm, and Proof of Continuous work consensus Algorithm (POCW). We also provide a privacy-aware computation authentication approach to strengthen the integrity of the authentication messages more securely and counteract the discriminatory analysis of malevolent requests. This research is primarily used to validate identities in a blockchain network, which makes it possible to guarantee their authenticity and integrity while also increasing security and privacy. The proposed technique greatly outperformed the current methods in terms of authentication time, period required for storage, space for storage, and overall processing cost. The proposed method exhibits a speed gain of authentication of roughly 9% when compared to traditional blockchain systems. The security investigation and results from experiments demonstrate how the proposed approach is more reliable and trustworthy.","PeriodicalId":54795,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":"60 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135410135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Li-Ling Peng, Xiao-Feng Bi, Guo-Feng Fan, Ze-Ping Wang, Wei-Chiang Hong
{"title":"Analysis and prediction of novel coronavirus pneumonia epidemic using hybrid response surface method with time-series and random forest","authors":"Li-Ling Peng, Xiao-Feng Bi, Guo-Feng Fan, Ze-Ping Wang, Wei-Chiang Hong","doi":"10.3233/jifs-231588","DOIUrl":"https://doi.org/10.3233/jifs-231588","url":null,"abstract":"This paper proposes a new epidemic prediction model that hybridizes several models, such as the autoregressive integrated moving average model (ARIMA), random forest (RF), and response surface method (RSM). The modeling process based on ensemble empirical mode decomposition (EEMD) is particularly suitable for dealing with non-stationary and nonlinear data. ARIMA’s timeliness and difference have strong deterministic information extraction ability. RF is robust and stable, with fast speed, and strong generalization ability. Under the adjustability and correspondence of the response surface, the comprehensiveness of the model is well demonstrated. Taking the United States as an example, the proposed ARIMA-RF-RSM model is used to explore the development mechanism of the early epidemic according to the data of the early epidemic of coronavirus disease 2019 (COVID-19). The proposed model has high prediction accuracy (mean absolute percentage error (MAPE) is 1.97% and root mean square error (RSME) is 7.24%). It helps to take effective prevention and control measures in time. In addition, the model has universal applicability to the analysis of disease transmission in relevant areas.","PeriodicalId":54795,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":"61 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135410336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On type-2 cyclic associative groupoids and inflationary pseudo general residuated lattices","authors":"Xiaogang An, Mingming Chen","doi":"10.3233/jifs-232966","DOIUrl":"https://doi.org/10.3233/jifs-232966","url":null,"abstract":"This paper explores the relationship between fuzzy logic algebra and non associative groupoid. As a groupoid which can satisfy type-2 cyclic associative (T2CA) law, T2CA-groupoid is characterized by generalized symmetry. Fuzzy logic algebra is a major direction in the study of fuzzy logic. Residuated lattices are a class of fuzzy logic algebras with widespread applications. The inflationary pseudo general residuated lattice (IPGRL), a generalization of the residuated lattice, does not need to satisfy the associative law and commutative law. Moreover, the greatest element of IPGRL is no longer the identity element. In this paper, the notion of T2CA-IPGRL (IPGRL in T2CA-groupoid) is proposed and its properties are investigated in combination with the study of IPGRL and T2CA-groupoid. In addition, the generalized symmetry and regularity of T2CA-groupoid are investigated based on the characteristics of commutative elements. Meanwhile, the decomposition of T2CA-root of band with T2CA-unipotent radical is studied as well. The result shows that every T2CA-root of band is the disjoint union of T2CA-unipotent radicals.","PeriodicalId":54795,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":"60 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135410132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Personal safety monitoring system of electric power construction site based on AIoT Technology","authors":"Hao Yuan, Hao Yang, Ruiqi Li, Jun Wang, Lin Tian","doi":"10.3233/jifs-235087","DOIUrl":"https://doi.org/10.3233/jifs-235087","url":null,"abstract":"For the purpose of real-time monitoring the hazard information on the electric power construction site, a personal safety monitoring system based on Artificial intelligence internet of things (AIoT) technology is designed. After the system sensing layer collects the gas information of the construction site through the gas sensor, limit current oxygen sensor and DS1820B temperature sensor, the edge computing device of the edge layer directly stores its calculation in the database of the platform layer through the data gateway. The Artificial Intelligence (AI) analysis module of this layer invokes the monitoring data of the power construction site of the database, and uses the personal safety identification method of the power construction site based on artificial intelligence technology, to complete the abnormal identification of monitoring data and realize personal safety monitoring. In addition, the system is also equipped with a power-fail detection module, which can collect the working voltage through the voltage transformer and compare it with the mains power standard to judge whether there is a power-fail risk, so as to prevent the problem of threatening personal safety due to the power-fail of the energized equipment. After testing, the system can monitor the operation status of the construction site in real time to protect personal safety.","PeriodicalId":54795,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":"61 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135410130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Post-disaster building damage detection using multi-source variational domain adaptation","authors":"Yundong Li, Yunlong Yan, Xiang Wang","doi":"10.3233/jifs-232613","DOIUrl":"https://doi.org/10.3233/jifs-232613","url":null,"abstract":"Timely detection of building damage after a disaster can provide support and help in saving lives and reducing losses. The emergence of transfer learning can solve the problem of difficulty in obtaining several labeled samples to train deep models. However, some degree of differences exists among different scenarios, which may affect the transfer performance. Furthermore, in reality, data can be collected from multiple historical scenarios but cannot be directly combined using single-source domain adaptation methods. Therefore, this study proposes a multi-source variational domain adaptation (MVDA) method to complete the task of post-disaster building assessment. The MVDA method consists of two stages: first, the distributions of each pair of source and target domains in specific feature spaces are aligned separately; second, the outputs of the pre-trained classifiers are aligned using domain-specific decision boundaries. This method maximizes the relevant information in the historical scene, solves the problem of inconsistent image classification in the current scene, and improves the migration efficiency from the history to the current disaster scene. The proposed approach is validated by two challenging multi-source transfer tasks using the post-disaster hurricane datasets. The average accuracy rate of 83.3% for the two tasks is achieved, obtaining an improvement of 0.9% compared with the state-of-the-art methods.","PeriodicalId":54795,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":"61 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135410335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}