Home / Journals / IASC / Vol.24, No.1, 2018
Special Issues
  • Open AccessOpen Access

    ARTICLE

    Fault Diagnoses of Hydraulic Turbine Using the Dimension Root Similarity Measure of Single-valued Neutrosophic Sets

    Jun Ye
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 1-8, 2018, DOI:10.1080/10798587.2016.1261955
    Abstract This paper proposes a dimension root distance and its similarity measure of single-valued neutrosophic sets (SVNSs), and then develops the fault diagnosis method of hydraulic turbine by using the dimension root similarity measure of SVNSs. By the similarity measures between the fault diagnosis patterns and a testing sample with single-valued neutrosophic information and the relation indices, we can determine the main fault type and the ranking order of various vibration faults for predicting some possible fault trend. Then, the comparison of the fault diagnoses of hydraulic turbine based of the proposed dimension root similarity measure More >

  • Open AccessOpen Access

    ARTICLE

    An Efficient Hybrid Algorithm for a Bi-objectives Hybrid Flow Shop Scheduling

    S. M. Mousavia, M. Zandiehb
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 9-16, 2018, DOI:10.1080/10798587.2016.1261956
    Abstract This paper considers the problem of scheduling n independent jobs in g-stage hybrid flow shop environment. To address the realistic assumptions of the proposed problem, two additional traits were added to the scheduling problem. These include setup times, and the consideration of maximum completion time together with total tardiness as objective function. The problem is to determine a schedule that minimizes a convex combination of objectives. A procedure based on hybrid the simulated annealing; genetic algorithm and local search so-called HSA-GA-LS are proposed to handle this problem approximately. The performance of the proposed algorithm is More >

  • Open AccessOpen Access

    ARTICLE

    Sox Compliance with OEE, Enterprise Modeling and Temporal-ABC

    K. Donald Thama, Asad M. Madnib
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 17-26, 2018, DOI:10.1080/10798587.2017.1284411
    Abstract The Sarbanes-Oxley (SOX) Act 2002 resulted from the mounting accounting and corporate scandals in the late 1990s and early 2000s. Since the passage of the SOX Act, companies are facing even greater challenges to meet raised expectations to provide accurate, visible, and timely information for SOX compliance. This research puts forth a systems design framework to achieve a real time, accurate, consistently traceable and easily verifiable SOX compliant technology. Our multidisciplinary and integrative systems design incorporates Overall Equipment Effectiveness (OEE) to ensure effective business performance within a knowledge represented company modeled as Enveloped Activity Based More >

  • Open AccessOpen Access

    ARTICLE

    Study for Multi-Resources Spatial Data Fusion Methods in Big Data Environment

    Zhiquan Huanga,b, Yu Fua, Fuchu Daia
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 29-34, 2018, DOI:10.1080/10798587.2016.1267237
    Abstract The rapid development and extensive application of geographic information system (GIS) and the advent of the age of big data bring about the generation of multi-resources spatial data, which makes data integration and fusion share more difficult due to the differences on data source, data accuracy and data modal. Meanwhile, study for multi-resources spatial data fusion methods has an important practical significance for reducing the production cost of geographic data, accelerating the updating speed of existing geographical information and improving the quality of GIS big data. To expound the formation and developing trends of multi-resources More >

  • Open AccessOpen Access

    ARTICLE

    A Complex Networked Method of Sorting Negotiation Demand Based on Answer Set Programs

    Hui Wang, Liang Li, Long-yun Gao, Wu Chen
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 35-40, 2018, DOI:10.1080/10798587.2016.1267238
    Abstract With the development of big data science, handling intensive knowledge in the complex network becomes more and more important. Knowledge representation of multi-agent negotiation in the complex network plays an important role in big data science. As a modern approach to declarative programming, answer set programming is widely applied in representing the multi-agent negotiation knowledge in recent years. But almost all the relevant negotiation models are based on complete rational agents, which make the negotiation process complex and low efficient. Sorting negotiation demands is the most key step in creating an efficient negotiation model to More >

  • Open AccessOpen Access

    ARTICLE

    Verifiable Outsourcing of High-Degree Polynomials and Tts Application in Keyword Search

    Jun Yea, Xianlin Zhoub, Zheng Xuc, Yong Dingd
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 41-46, 2018, DOI:10.1080/10798587.2016.1267239
    Abstract In big data era, people cannot afford more and more complex computation work due to the constrained computation resources. The high reliability, strong processing capacity, large storage space of cloud computing makes the resource-constrained clients remotely operate the heavy computation task with the help of cloud server. In this paper, a new algorithm for secure outsourcing of high degree polynomials is proposed. We introduce a camouflage technique, which the real polynomial will be disguised to the untrusted cloud server. In addition, the input and output will not be revealed in the computation process and the More >

  • Open AccessOpen Access

    ARTICLE

    Meteorological Correction Model of IBIS-L System in the Slope Deformation Monitoring

    Xiaoqing Zuoa, Hongchu Yua, Chenbo Zib, Xiaokun Xub, Liqi Wangb, Haibo Liub
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 47-54, 2018, DOI:10.1080/10798587.2016.1267240
    Abstract Micro deformation monitoring system (IBIS-L) using high frequency microwave as signal for transmission, is easily affected by meteorology. How to eliminate the meteorological influence effectively, and extract useful information from the big data becomes a key to monitor the slope deformation with high precision by the IBIS-L system. Evaluation of the optimum meteorological correction mode for Slope Deformation Monitoring to ensure the accuracy of measurement is considered. This objective was realized by model construction technology, which uses calculation  formula of Microwave Refraction rate, and the radial distance from the target point to the IBIS-L system to estimate More >

  • Open AccessOpen Access

    ARTICLE

    Design of a System to Generate a Four Quadrant Signal at High-Frequency

    Yichi Zhanga, Hongbin Wangb
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 55-64, 2018, DOI:10.1080/10798587.2016.1267241
    Abstract In order to research biological cells, a well-established physical method can be used, that is electrorotation. To achieve electrorotation system, a signal oscillator or a signal generator is always needed. The signal generator is used for generating signals with phase shift and transfers it to the electro chamber. The frequency range of the output signal is generally between 20 Hz to 100 MHz for the signal generator, but for high frequency range, like 100 MHz to 1 GHz, the signal generator is hard to control and the linear properties for the output signal is not good enough to do… More >

  • Open AccessOpen Access

    ARTICLE

    Building Ontology for Different Emotional Contexts and Multilingual Environment in Opinion Mining

    Wan Taoa,b, Tao Liua,b
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 65-72, 2018, DOI:10.1080/10798587.2016.1267243
    Abstract With the explosive growth of various social media applications, individuals and organizations are increasingly using their contents (e.g. reviews, forum discussions, blogs, micro-blogs, comments, and postings in social network sites) for decision-making. These contents are typical big data. Opinion mining or sentiment analysis focuses on how to extract emotional semantics from these big data to help users to get a better decision. That is not an easy task, because it faces many problems, such as different context may make the meaning of the same word change variously, at the same time multilingual environment restricts the More >

  • Open AccessOpen Access

    ARTICLE

    Analyzing and Assessing Reviews on Jd.com

    Jie Liua,b,c,d, Xiaodong Fud, Jin Liua,b,c, Yunchuan Suna,e
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 73-80, 2018, DOI:10.1080/10798587.2016.1267244
    Abstract Reviews are contents written by users to express opinions on products or services. The information contained in reviews is valuable to users who are going to make decisions on products or services. However, there are numbers of reviews for popular products, and the quality of reviews is not always good. It’s necessary to pick out reviews, which are in high quality from numbers of reviews to assist user in making decision. In this paper, we collected 21,501 reviews flagged as good from 499,253 products on JD.com. We observed the level of users is an important More >

  • Open AccessOpen Access

    ARTICLE

    Electro-Mechanical Impedance Based Position Identification of Bolt Loosening Using LibSVM

    Yuxiang Zhanga, Xin Zhanga, Jiazhao Chenb, Jianhai Yanga
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 81-88, 2018, DOI:10.1080/10798587.2016.1267245
    Abstract Bolt loosening is a common structural failure, which received extensive attention from many industrial departments. Because the uneven stress on different directions of a bolt is the common reason that the bolt becomes loose, it is quite important to carry out the research about sensitive detection of bolt loosening. Using Agilent 4924A instrument, this paper precedes the loosening test of bolts based on Electro-Mechanical Impedance (EMI), on an aluminum plate instead of flange plate for simplification. And the electromechanical admittance is given according to the fundamental equation of PiezoMaterial Lead Zirconate Titanate (PZT). Specifically, the More >

  • Open AccessOpen Access

    ARTICLE

    Public Health Emergency Management and Multi-Source Data Technology in China

    Xinzhi Wanga, Yi Liub, Hui Zhanga, Qiuju Maa, Zhidong Caoc
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 89-96, 2018, DOI:10.1080/10798587.2016.1267246
    Abstract Public health emergency is governed by the physical rules, which are related to the propagation of diseases in the physical space, and the social rules, which are related to government structures, social behaviors, and social media in cyber space. Effective preparedness and response of public health emergency is strongly related to interoperation, collaboration and cooperation among different levels of government agencies and among different regions, as well as information flow and data mining between agencies and general public. In this paper, we review the technologies using multi-source data for public health emergency in China. At More >

  • Open AccessOpen Access

    ARTICLE

    A Hot Event Influence Scope Assessment Method in Cyber-Physical Space For Big Data Application

    Yunlan Xuea, Lingyu Xub, Jie Yub, Gaowei Zhangb
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 97-106, 2018, DOI:10.1080/10798587.2016.1267247
    Abstract The increase of scale and complexity of Internet big data presents unprecedented opportunities on Cyber-Physical Systems (CPS). The incompleteness and incredibility of Internet big data are challenging issues for confirming the event influence scope. To solve the above problem, we propose CyberPhysical Space Event Model (CPSEM) to analyze event influence in multi-viewer, which maps real data into Cyber Space (CS) and Physical Space (PS). In addition, we propose Event Influence Scope Detection Algorithm (EISDA) to detect the scope of a hot event in Cyber Space and Physical Space. More >

  • Open AccessOpen Access

    ARTICLE

    Enhancing Knowledge Management and Decision-Making Capability of China’s Emergency Operations Center Using Big Data

    Yefeng Maa, Hui Zhangb
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 107-114, 2018, DOI:10.1080/10798587.2016.1267249
    Abstract Emerging communication and computing technologies such as social media, Internet of Things and big data provide great opportunities to improve information management systems for emergency operations. This paper studies the issues of information management at China’s Emergency Operations Center (EOC), and proposes a data-driven knowledge management system (KMS) to support decisionmaking, coordination, and collaboration within EOCs and with the public. In the proposed KMS, big data analytics is employed to gather and analyze information from different knowledge domains and track how a crisis evolves in physical world and in cyber space. The proposed system aims More >

  • Open AccessOpen Access

    ARTICLE

    Research on Application of Location Technology in 3D Virtual Environment Modeling System for Substation Switch Indicator

    Lijuan Qina,b, Ting Wangb, Chen Yaob
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 115-122, 2018, DOI:10.1080/10798587.2016.1267250
    Abstract Substation inspection work plays a very important role in ensuring the normal production and the safe operation of a transformer substation. Use of a substation inspection robot can effectively solve the omission problems of a manual inspection. It can further improve the unmanned and automation of substation and improve security of station. A substation inspection system requires the establishment of a spatial position relation between the robot and the inspection object in the monitoring station. Key technology is the spatial location of the object being detected in the substation. The position of inspection object is… More >

  • Open AccessOpen Access

    ARTICLE

    The Big Data Analysis on the Camera-based Face Image in Surveillance Cameras*

    Zhiguo Yan, Zheng Xu, Jie Dai
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 123-132, 2018, DOI:10.1080/10798587.2016.1267251
    Abstract In the Big-Data era, currently how to automatically realize acquisition, refining and fast retrieval of the target information in a surveillance video has become an urgent demand in the public security video surveillance field. This paper proposes a new gun-dome camera cooperative system, which solves the above problem partly. The system adopts a master-slave static panorama-variable view dualcamera cooperative video-monitoring system. In this dual-camera system the gun camera static camera) with a wide viewing -angle lenses is in charge of the pedestrian detection and the dome camera can maneuver its focus and cradle orientation to More >

  • Open AccessOpen Access

    ARTICLE

    The Study on Evaluation Method of Urban Network Security in the Big Data Era

    Qingyuan Zhoua, Jianjian Luob
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 133-138, 2018, DOI:10.1080/10798587.2016.1267444
    Abstract Big data is an emerging paradigm applied to datasets whose size is beyond the ability of commonly used software tools to capture, manage, and process the data within a tolerable elapsed time. In a Smarter City, available resources are harnessed safely, sustainably and efficiently to achieve positive, measurable economic and societal outcomes. Most of the challenges of Big Data in Smart Cities are multi-dimensional and can be addressed from different multidisciplinary perspectives. Based on the above considerations, this paper combined the PSR method, the fuzzy logic model and the entropy weight method in an empirical More >

  • Open AccessOpen Access

    ARTICLE

    The Research of Address Message of an Unknown Single Protocol Data Frame

    Zheng Jiea,b, Li Jianpinga
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 139-144, 2018, DOI:10.1080/10798587.2016.1267445
    Abstract Network protocols are sets of standards for certain network communications. The identification and analysis of network protocol are of significance to network management and security. There are various technologies of protocol identification, but in the process of identification protocols, in order to simplify the identification process and improve the efficiency of protocol identification, unknown mixed multi-protocol needs to be separated into single protocol so as to make further identification. This paper presents an efficient method to determine the single protocol address message based on the previous research of separating unknown mixed data frame into single More >

  • Open AccessOpen Access

    ARTICLE

    On an Optimization Method Based on Z-Numbers and the Multi-Objective Evolutionary Algorithm

    Dong Qiu, Rongwen Dong, Shuqiao Chen, Andi Li
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 147-150, 2018, DOI:10.1080/10798587.2017.1327153
    Abstract In this paper, we research the optimization problems with multiple Z-number valued objectives. First, we convert Z-numbers to classical fuzzy numbers to simplify the calculation. A new dominance relationship of two fuzzy numbers based on the lower limit of the possibility degree is proposed. Then according to this dominance relationship, we present a multi-objective evolutionary algorithm to solve the optimization problems. Finally, a simple example is used to demonstrate the validity of the suggested algorithm. More >

  • Open AccessOpen Access

    ARTICLE

    Numerical Solution of Fuzzy Equations with Z-numbers Using Neural Networks

    Raheleh Jafaria, Wen Yua, Xiaoou Lib
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 151-158, 2018, DOI:10.1080/10798587.2017.1327154
    Abstract In this paper, the uncertainty property is represented by the Z-number as the coefficients of the fuzzy equation. This modification for the fuzzy equation is suitable for nonlinear system modeling with uncertain parameters. We also extend the fuzzy equation into dual type, which is natural for linearin-parameter nonlinear systems. The solutions of these fuzzy equations are the controllers when the desired references are regarded as the outputs. The existence conditions of the solutions (controllability) are proposed. Two types of neural networks are implemented to approximate solutions of the fuzzy equations with Z-number coefficients. More >

  • Open AccessOpen Access

    ARTICLE

    The Identification of Job Satisfaction under Z-Information

    S. Z. Eyupoglua, K. I. Jabbarovab, K. R. Aliyevac
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 159-164, 2018, DOI:10.1080/10798587.2017.1327156
    Abstract Complexities in organizational and economical environments have lead psychologists, management scholars, and economists to investigate the multi-dimensional essence of job satisfaction. Unfortunately, existing studies are based on exact data, whereas relevant information is imperfect. To deal with imprecise and partially reliable information, Zadeh proposed the concept of a Z-number. In this paper we consider the Z-number valued rule based model to represent the relationship between job satisfaction and the facets/factors influencing job satisfaction. A real-world job satisfaction index evaluation problem is used to illustrate the suggested approach More >

  • Open AccessOpen Access

    ARTICLE

    Failure Mode and Effects Analysis Based on Z-numbers

    Wen Jiang, Chunhe Xie, Boya Wei, Yongchuan Tang
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 165-172, 2018, DOI:10.1080/10798587.2017.1327158
    Abstract The main objective of this paper is to propose a new method for failure mode and effects analysis (FMEA) based on Z-numbers. In the proposed method, firstly, Z-numbers are used to perform the valuations (Z-valuation) of the risk factors like occurrence (O), severity (S) and detection (D). Secondly, the Z-valuations of the risk factors are integrated by fuzzy weighted mean method. A new risk priority number named as ZRPN is calculated to prioritize failure modes based on a modified method of ranking fuzzy numbers. Finally, a case study for the rotor blades of an aircraft More >

  • Open AccessOpen Access

    ARTICLE

    Modeling of Consumer Buying Behaviour Using Z-Number Concept

    Gunay Sadikoglu
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 173-178, 2018, DOI:10.1080/10798587.2017.1327159
    Abstract Consumer behaviour has always been of a great interest in marketing research. The consumer buying behaviour has become an integral part of strategic market planning and includes mental, emotional and physical activities. The consumer behaviour and decision-making process are usually subject to uncertainties related to influences of socio-cultural, psychological and personal factors. In this paper, the Z-number concept is applied for handling uncertainties in analysing the consumer buying behaviour. More >

  • Open AccessOpen Access

    THEORY

    Zet Theory

    Mark J. Wierman
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 179-186, 2018, DOI:10.1080/10798587.2017.1327160
    Abstract The theory of Zets is presented and the standard techniques of set theory allows for the development of a rich algebra of Zets. It shows that Zets and fuzzy sets are essentially interchangeable. However, the fundamental manipulations, techniques, and definitions of Zets are simple and more amenable to analyze. For example, the extension principle is easy to define. More >

  • Open AccessOpen Access

    ARTICLE

    A Z-Number Valued Regression Model and Its Application

    Lala M. Zeinalovaa, O. H. Huseynovb, P. Sharghic
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 187-192, 2018, DOI:10.1080/10798587.2017.1327551
    Abstract Regression analysis is widely used for modeling of real-world processes in various fields. It should be noted that information relevant to real-world processes is characterized by imprecision and partial reliability. This involves combination of fuzzy and probabilistic uncertainties. Prof.. L. Zadeh introduced the concept of a Z-number as a formal construct for dealing with such information. The present stateof-the-art of regression analysis under Z-number valued information is very scarce. In this paper we consider a Z-number valued multiple regression analysis and its application to a real-world decisionmaking problem. The obtained results show applicability of the More >

  • Open AccessOpen Access

    ARTICLE

    Numerical Solution of Linear Regression Based on Z-Numbers by Improved Neural Network

    Somayeh Ezadia, Tofigh Allahviranloob
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 193-204, 2018, DOI:10.1080/10798587.2017.1328812
    Abstract In this article, the researcher at first focuses on introducing a linear regression based on the Z-number. In this regression, observations are real, but the coefficients and results of observations are unknown and in the form of Z-rating. Therefore, to estimate this type of regression, we have three distinct ways depending on different conditions dominating the problem. The three methods are a combination of artificial neural networks and fuzzy generalized improvements of the technique. Moreover the method of calculating the weights of the Z-number neural network has been mentioned and the stability of neural network More >

  • Open AccessOpen Access

    ARTICLE

    Z-Numbers and Type-2 Fuzzy Sets: A Representation Result

    R. A. Alieva,b, Vladik Kreinovichc
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 205-210, 2018, DOI:10.1080/10798587.2017.1330310
    Abstract Traditional [0; 1] based fuzzy sets were originally invented to describe expert knowledge expressed in terms of imprecise “fuzzy” words from the natural language. To make this description more adequate, several generalizations of the traditional [0; 1] based fuzzy sets have been proposed, among them type- 2 fuzzy sets and Z-numbers. The main objective of this paper is to study the relation between these two generalizations. As a result of this study, we show that if we apply data processing to Z-numbers, then we get type-2 sets of special type —that we call monotonic. We More >

  • Open AccessOpen Access

    ARTICLE

    Introduction to U-Number Calculus

    R. A. Alieva,b
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 211-216, 2018, DOI:10.1080/10798587.2017.1330311
    Abstract Commonsense reasoning plays a pivotal role in the development of intelligent systems for decisionmaking, system analysis, control and other applications. As Prof. L. Zadeh mentions a kernel of the theory of commonsense is the concept of usuality. Zadeh suggested main principles of the theory of usuality, unfortunately up to present day; a fundamental and systemic approach to reasoning with usual knowledge is not developed.
    In this study, we develop a new approach to calculus of usual numbers (U-numbers). We consider a U-number as a Z-number, where the second component is “usually”. Validity of the suggested approach More >

  • Open AccessOpen Access

    ARTICLE

    New Multi-layer Method for Z-number Ranking Using Hyperbolic Tangent Function and Convex Combination

    Somayeh Ezadia, Tofigh Allahviranloob
    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 217-221, 2018, DOI:10.1080/10798587.2017.1367146
    Abstract Many practical applications, under the definitive evolutionary state of the nature, the consequences of the decisions, mental states of a decision maker are required. Thus, the need is for a new concept in the analysis of decision-making. Zadeh has introduced this concept as the Z-number. Because the concept is relatively new, Z-number in fuzzy sets, hence, its basic theoretical aspects are yet undetermined. This paper presents a method for ranking Z-numbers. Hence, we propose a new method for ranking fuzzy numbers based on that of hyperbolic tangent function and convex combination. Then, using the same More >

Per Page:

Share Link