{"title":"Big data clustering using fuzzy based energy efficient clustering and MobileNet V2","authors":"Lakshmi Srinivasulu Dandugala, Koneru Suvarna Vani","doi":"10.3233/jifs-230387","DOIUrl":"https://doi.org/10.3233/jifs-230387","url":null,"abstract":"Big data analytics (BDA) is a systematic way to analyze and detect various patterns, relationships, and trends in vast amounts of data. Big data analysis and processing require significant effort, techniques, and equipment. The Hadoop framework software uses the MapReduce approach to do large-scale data analysis using parallel processing in order to generate results as soon as possible. Due to the traditional algorithm’s longer execution time and difficulty in processing big amounts of data, this is one of the main issues. Clusters are highly correlated inside each other but are not highly correlated with one another. The technique of effectively allocating limited resources is known as an optimization algorithm for clustering. For processing large amounts of data with several dimensions, the conventional optimization approach is insufficient. By using a fuzzy method, this can be prevented. In this paper, we proposed Fuzzy based energy efficient clustering approach to enhance the clustering mechanism. In summary, Fuzzy based energy efficient clustering introduces a function that measures the distance between the cluster center and the instance, which aids in improved clustering, and we then present the MobileNet V2 model to improve efficiency and speed up computation. To enhance the method’s performance and reduce its time complexity, the distributed database simulates the shared memory space and parallelizes on the MapReduce framework on the Hadoop cloud computing platform. The proposed approach is evaluated using performance metrics such as Accuracy, Precision, Adjusted Rand Index (ARI), Recall, F1-Score, and Normalized Mutual Information (NMI). The experimental findings indicate that the proposed approach outperforms the existing techniques in terms of clustering accuracy.","PeriodicalId":54795,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":"6 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135869724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wenchao Jiang, Xiaolei Yang, Yuqi Zang, Xumei Yuan, Rui Liu
{"title":"Picture hesitant fuzzy grey compromise relational bidirectional projection method with application in multi-attribute recommendation","authors":"Wenchao Jiang, Xiaolei Yang, Yuqi Zang, Xumei Yuan, Rui Liu","doi":"10.3233/jifs-233016","DOIUrl":"https://doi.org/10.3233/jifs-233016","url":null,"abstract":"In view of the technical defects of the existing grey relational projection method, a new grey compromise relational bidirectional projection method is proposed. By incorporating the information expression advantage of picture hesitant fuzzy number, the distance formula of picture hesitant fuzzy statistics is constructed based on the centralized trend measurement and discrete trend measurement in descriptive statistics. On this basis, a multi-attribute recommendation method of picture hesitant fuzzy grey compromise relational bidirectional projection is proposed by combining compromise idea and bidirectional projection technology. The validity and advantage of this method are verified by numerical analysis, which also suggested the rationality of the picture hesitant fuzzy statistical distance and the grey compromise relational bidirectional projection method.","PeriodicalId":54795,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":"57-58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136067518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy difference operators derived from overlap functions","authors":"Songsong Dai, Haifeng Song, Yingying Xu, Lei Du","doi":"10.3233/jifs-234501","DOIUrl":"https://doi.org/10.3233/jifs-234501","url":null,"abstract":"This paper introduces the concept of (O, N)-difference, for an overlap function O and a fuzzy negation N. (O, N)-differences are weaker than fuzzy difference constructed from positive and continuous t-norms and fuzzy negations, in the sense that (O, N)-differences do not necessarily satisfy certain properties, as the right neutrality principle, but only weaker versions of these properties. This paper analyzes the main properties satisfied by (O, N)-differences, and provides a characterization of (O, N)-difference.","PeriodicalId":54795,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":"45 15","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136069383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of focus theory of choice in large scale multi-criteria group decision making","authors":"Le Jiang, Hongbin Liu","doi":"10.3233/jifs-234310","DOIUrl":"https://doi.org/10.3233/jifs-234310","url":null,"abstract":"Some risky multi-criteria group decision making problems include payoff and probability information. To deal with these problems, this study introduces a large scale multi-criteria group decision making model based on focus theory of choice. In this model, a group of experts’ linguistic evaluations on multiple criteria are first collected to form linguistic distributions. The positive foci of the linguistic distributions are computed and aggregated into the alternatives’ scores. It is noted that in this process the linguistic terms and probabilities are aggregated by using different rules. The positive foci of the alternatives’ scores are computed and the optimal alternative is selected. A pollution treatment evaluation problem is solved by using the proposed model, and simulation experiments and comparative analysis are given.","PeriodicalId":54795,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136069766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Xception model for disease detection in rice plant","authors":"Rakesh Meena, Sunil Joshi, Sandeep Raghuwanshi","doi":"10.3233/jifs-230655","DOIUrl":"https://doi.org/10.3233/jifs-230655","url":null,"abstract":"Rice is a staple meal that helps people worldwide access sufficient food. However, this crop has several illnesses, significantly lowering its production and quality. Because of this, it is imperative to conduct early disease detection to halt the spread of infections. Because of this, it is desirable to develop an automatic system that will help agronomists, pathologists, and indeed growers in directly diagnosing rice diseases. This would allow for preventative measures to be done as quickly as feasible. In this day and age of artificial intelligence, researchers have experimented with various learning approaches to discover diseases that can affect rice plants. Deep learning has recently seen considerable use in many computer vision and image analysis fields, becoming one of the most prominent machine learning algorithms. Deep learning has also recently found substantial usage in many computer vision and picture analysis fields. On the other hand, deep learning methods have seen very little application in plant disease recognition, except for some ongoing research centered on the problem and using a public dataset of pictures magnified to show plant leaves. Because of their high computational complexity, which requires a huge memory cost, and the complexity of experimental materials’ backgrounds, which makes it difficult to train an efficient model, deep learning methods have only seen limited use in plant disease recognition. This is due to several factors, including the following: The Inception module was improved to recognise and detect rice plant illnesses in this research by substituting the original convolutions with architecture based on modified-Xception (M-Xception). In addition, ResNet extracts features by prioritising logarithm calculations over softmax calculations to get more consistent classification outcomes. The model’s training utilised a two-stage transfer learning process to produce an effective model. The results of the experiments reveal that the suggested approach can achieve the specified level of performance, with an average recognition fineness of 99.73% on the public dataset and 98.05% on the domestic dataset, respectively. Our proposed work is better as per existing methods and models.","PeriodicalId":54795,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":"90 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136069596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network awareness of security situation information security measurement method based on data mining","authors":"Jia Wang, Ke Zhang, Jingyuan Li","doi":"10.3233/jifs-233390","DOIUrl":"https://doi.org/10.3233/jifs-233390","url":null,"abstract":"Awareness of Network Security Situation (abbreviated as NSS for short) technology is in a period of vigorous development recently. NSS technology means network security situational awareness technology. It refers to the technology of collecting, processing, and analyzing various real-time information in the network to understand and evaluate the current network security status. It can not only find network security threats, but also reflect the NSS in the system security metrics, and provide users with targeted security protection measures. Based on data mining methods, this paper analyzed and models perceived threats and security events with data mining algorithms, and improved information security measurement methods based on association analysis. This paper proposed network security information analysis and NSS based on data mining, and analyzed the experimental results of network awareness of NSS information security measurement. The experimental results showed that when the Timer was 8, the accuracy of the awareness of NSS information security measurement method based on data mining can reach 92.89% . The data mining model had the highest accuracy of 93.14% in situation understanding and evaluation of KDDCup-99 dataset. The results showed that the model can accurately predict the NSS. When Timer was 6, the highest accuracy of the model was 92.71% . In general, the NSS prediction mining model based on KDDCup-99 can better understand, evaluate and predict the situation.","PeriodicalId":54795,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":"154 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136067517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid multi-source data fusion for word, sentence, aspect, and document-level sentiment analysis on real-time databases","authors":"Monika Agrawal, Nageswara Rao Moparthi","doi":"10.3233/jifs-234076","DOIUrl":"https://doi.org/10.3233/jifs-234076","url":null,"abstract":"Sentiment analysis (SA)at the sentence, aspect, and document levels determines the sentiment of particular aspect phrases in a given sentence. Due to their capacity to extract sentiment information from text in aspect-level sentiment classification, neural networks (NNs) have achieved significant success. Generally speaking, sufficiently sizable training corpora are necessary for NNs to be effective. The performance of NN-based systems is reduced by the small size of the aspect-level corpora currently available. In this research, we suggest a gated bilateral recurrent neural network (G-Bi-RNN) as a foundation for multi-source data fusion, their system offers sentiment information that several sources. We develop a uniform architecture specifically to include information from sentimental lexicons, including aspect- and sentence-level corpora. To further provide aspect-specific phrase representations for SA, we use G-Bi-RNN, a deep bilateral Transformer-based pre-trained language model. We assess our methods using SemEval 2014 datasets for laptops and restaurants. According to experimental findings, our method consistently outperforms cutting-edge techniques on all datasets. We use a number of well-known aspect-level SA datasets to assess the efficacy of our model. Experiments show that when compared to baseline models, the suggested model can produce state-of-the-art results.","PeriodicalId":54795,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136069226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ISODF-ENN:Imbalanced data mixed sampling method based on improved diffusion model and ENN","authors":"Zhenzhe Lv, Qicheng Liu","doi":"10.3233/jifs-233886","DOIUrl":"https://doi.org/10.3233/jifs-233886","url":null,"abstract":"In the era of big data, the complexity of data is increasing. Problems such as data imbalance and class overlap pose challenges to traditional classifiers. Meanwhile, the importance of imbalanced data has become increasingly prominent, it is necessary to find appropriate methods to enhance classification performance of classifiers on such datasets. In response, this paper proposes a mixed sampling method (ISODF-ENN) based on iterative self-organizing (ISODATA) denoising diffusion algorithm and edited nearest neighbors (ENN) data cleaning algorithm. The algorithm first uses iterative self-organizing clustering algorithm to divide minority class into different sub-clusters, then it uses denoising diffusion algorithm to generate new minority class data for each sub-cluster, and finally it uses ENN algorithm to preprocess majority class data to remove the overlap with the minority class data. Each sub-cluster is oversampled according to sampling ratio, so that the oversampled minority class data also conforms to the distribution of original minority class data. Experimental results on keel datasets demonstrate that the proposed method outperforms other methods in terms of F-value and AUC, effectively addressing the issues of class imbalance and class overlap.","PeriodicalId":54795,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":"116 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136069345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Pughazendi, K. Valarmathi, P.V. Rajaraman, S. Balaji
{"title":"Reliable cluster based data collection framework for IoT-big data healthcare applications","authors":"N. Pughazendi, K. Valarmathi, P.V. Rajaraman, S. Balaji","doi":"10.3233/jifs-233505","DOIUrl":"https://doi.org/10.3233/jifs-233505","url":null,"abstract":"Internet of Things (IoT) devices installed in hospital direct data unceasingly; in this manner, energy usage augments with the number of broadcasts too. In this paper, Reliable Cluster based Data Collection Framework (RCDCF) for IoT-Big Data Healthcare Applications (HA) is developed. During clustering process, the connected IoT devices are grouped into clusters. In clustering technique, the available IoT devices are gathered into groups. The device with high battery capacity and processing ability is selected as a cluster head (CH). Each member of the cluster is allocated multiple slots by applying a general function pooled by the Fog node and the entire devices. To perceive and eliminate outliers from the sensor data, Density-based spatial clustering of applications with noise (DBSCAN) method is utilized. To forecast the objective and subjective behaviours of the equipments, a Random Forest Deep Neural Network (RF-DNN) based classification model is utilized. By experimental results, it has been shown that RCDCF achieves 19% and 20% reduced energy consumption at Cloud and Fog centers, respectively. Moreover, RCDCF has 2.1% and 1.3% increased correctness of data at Cloud and Fog data centers, respectively, when compared to the existing framework.","PeriodicalId":54795,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136070684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimized deep learning-based intrusion detection framework for vehicular network","authors":"Ravula Vishnukumar, Mangayarkarasi Ramaiah","doi":"10.3233/jifs-233581","DOIUrl":"https://doi.org/10.3233/jifs-233581","url":null,"abstract":"The Internet’s evolution resulted in a massive amount of data. As a result, the internet has become more sophisticated and vulnerable to massive attacks. The attack detection system is a key feature for system security in modern networks. The IDS might be signature-based or detect anomalous behavior. Researchers recently created several detection algorithms for identifying network intrusions in vehicular network security, but they failed to detect intrusions effectively. For this reason, the optimal Deep Learning approach, namely Political Fractional Dingo Optimizer (PFDOX)-based Deep belief network is introduced for attack detection in network security for vehicles. The Internet of Vehicle simulation is done initially, and then the input data is passed into the pre-processing phase, which removes noise present in the data. Then, the feature extraction module receives the pre-processed data. The Deep Maxout Network is trained using the Fractional Dingo optimizer (FDOX)is utilized to detect normal and abnormal behavior. Fractional calculus and Dingo optimizer (DOX) are combined to create the proposed FDOX. Finally, intruder/attack types are classified using the Deep Belief Network, which is tuned using the PFDOX. The PFDOX is created by the assimilation of the DOX, Fractional Calculus, and Political Optimizer (PO). The experimental result shows that the designed PFDOX_DBN for attack type classification offers a better result based on f-measure, precision, and recall with the values of 0.924, 0.916, and 0.932, for the CIC-IDS2017 dataset.","PeriodicalId":54795,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":"12 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136231816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}