Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (469)

Search Parameters:
Keywords = generalized type-2 fuzzy

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
28 pages, 13595 KiB  
Article
Research on Optimization of Diesel Engine Speed Control Based on UKF-Filtered Data and PSO Fuzzy PID Control
by Jun Fu, Shuo Gu, Lei Wu, Nan Wang, Luchen Lin and Zhenghong Chen
Processes 2025, 13(3), 777; https://doi.org/10.3390/pr13030777 - 7 Mar 2025
Abstract
With the continuous development of industrial automation, diesel engines play an increasingly important role in various types of construction machinery and power generation equipment. Improving the dynamic and static performance of the speed control system of single-cylinder diesel engines can not only significantly [...] Read more.
With the continuous development of industrial automation, diesel engines play an increasingly important role in various types of construction machinery and power generation equipment. Improving the dynamic and static performance of the speed control system of single-cylinder diesel engines can not only significantly improve the efficiency of the equipment, but also effectively reduce energy consumption and emissions. Particle swarm optimization (PSO) fuzzy PID control algorithms have been widely used in many complex engineering problems due to their powerful global optimization capability and excellent adaptability. Currently, PSO-based fuzzy PID control research mainly integrates hybrid algorithmic strategies to avoid the local optimum problem, and lacks optimization of the dynamic noise suppression of the input error and the rate of change of the error. This makes the algorithm susceptible to the coupling of the system uncertainty and measurement disturbances during the parameter optimization process, leading to performance degradation. For this reason, this study proposes a new framework based on the synergistic optimization of the untraceable Kalman filter (UKF) and PSO fuzzy PID control for the speed control system of a single-cylinder diesel engine. A PSO-optimized fuzzy PID controller is designed by obtaining accurate speed estimation data using the UKF. The PSO is capable of quickly adjusting the fuzzy PID parameters so as to effectively alleviate the nonlinearity and uncertainty problems during the operation of diesel engines. By establishing a Matlab/Simulink simulation model, the diesel engine speed step response experiments (i.e., startup experiments) and load mutation experiments were carried out, and the measurement noise and process noise were imposed. The simulation results show that the optimized diesel engine speed control system is able to reduce the overshoot by 76%, shorten the regulation time by 58%, and improve the noise reduction by 25% compared with the conventional PID control. Compared with the PSO fuzzy PID control algorithm without UKF noise reduction, the optimized scheme reduces the overshoot by 20%, shortens the regulation time by 48%, and improves the noise reduction effect by 23%. The results show that the PSO fuzzy PID control method with integrated UKF has superior control performance in terms of system stability and accuracy. The algorithm significantly improves the responsiveness and stability of diesel engine speed, achieves better control effect in the optimization of diesel engine speed control, and provides a useful reference for the optimization of other diesel engine control systems. In addition, this study establishes the GT-POWER model of a 168 F single-cylinder diesel engine, and compares the cylinder pressure and fuel consumption under four operating conditions through bench tests to ensure the physical reasonableness of the kinetic input parameters and avoid algorithmic optimization on the distorted front-end model. Full article
(This article belongs to the Section Process Control and Monitoring)
Show Figures

Figure 1

Figure 1
<p>Diesel engine speed control system schematic diagram.</p>
Full article ">Figure 2
<p>Diesel engine system schematic diagram.</p>
Full article ">Figure 3
<p>Schematic diagram of the overall architecture of the speed control system.</p>
Full article ">Figure 4
<p>Diesel engine test bench.</p>
Full article ">Figure 5
<p>GT-POWER model of 168 F single cylinder diesel engine.</p>
Full article ">Figure 6
<p>Comparison of cylinder pressure under different loads.</p>
Full article ">Figure 7
<p>Fuel consumption comparison chart under different loads.</p>
Full article ">Figure 8
<p>Schematic diagram of overall technical scheme.</p>
Full article ">Figure 9
<p>Schematic diagram of the PSO fuzzy PID controller based on UKF data.</p>
Full article ">Figure 10
<p>UKF algorithm flowchart.</p>
Full article ">Figure 11
<p>Unscented kalman filtering noise reduction effect diagram.</p>
Full article ">Figure 12
<p>Characteristic face of the fuzzy inference system: (<b>a</b>) <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <msub> <mrow> <mi>k</mi> </mrow> <mrow> <mi>p</mi> </mrow> </msub> </mrow> </semantics></math> (Proportional term characteristic surface), (<b>b</b>) <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <msub> <mrow> <mi>k</mi> </mrow> <mrow> <mi>i</mi> </mrow> </msub> </mrow> </semantics></math> (Integral term characteristic surface), (<b>c</b>) <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <msub> <mrow> <mi>k</mi> </mrow> <mrow> <mi>d</mi> </mrow> </msub> </mrow> </semantics></math> (Derivative term characteristic surface).</p>
Full article ">Figure 13
<p>Particle swarm optimization flowchart.</p>
Full article ">Figure 14
<p>Fitness value optimization results.</p>
Full article ">Figure 15
<p>Model of fuzzy PID control algorithm optimized by particle swarm optimization based on UKF in Matlab/Simulink (R2022b).</p>
Full article ">Figure 16
<p>Model of PID, Fuzzy PID, Fuzzy PID based on data of UKF, and PSO Fuzzy PID based on data of UKF in Matlab/Simulink (R2022b).</p>
Full article ">Figure 17
<p>Step response experiment results.</p>
Full article ">Figure 18
<p>Load disturbance experiment results.</p>
Full article ">
22 pages, 9597 KiB  
Article
Research on Fuzzy Control of Methanol Distillation Based on SHAP (SHapley Additive exPlanations) Interpretability and Generative Artificial Intelligence
by Yuhan Gong, Qinyu Zhang, Yuxian Ren, Zhike Liu and Mohamad Tarmizi Abu Seman
Sensors 2025, 25(5), 1308; https://doi.org/10.3390/s25051308 - 21 Feb 2025
Viewed by 339
Abstract
The most important control parameters in the methanol distillation process, which are directly related to product quality and yield, are the temperature, pressure and water content of the finished product at the top of the column. In order to adapt to the development [...] Read more.
The most important control parameters in the methanol distillation process, which are directly related to product quality and yield, are the temperature, pressure and water content of the finished product at the top of the column. In order to adapt to the development trend of modern industrial technology to be more accurate, faster and more stable, the fusion of multi-sensor data puts forward higher requirements. Traditional control methods, such as PID control and fuzzy control, have the disadvantages of low heterogeneous data processing capability, poor response speed and low control accuracy when dealing with complex industrial process detection and control. For the control of tower top temperature and pressure in the methanol distillation industry, this study innovatively combines generative artificial intelligence and a type II fuzzy neural network, using a GAN for data preprocessing and a type II fuzzy neural network for steady-state inverse prediction to construct the GAN-T2FNN temperature and pressure control model for an atmospheric pressure tower. Comparison experiments with other neural network models and traditional PID control models show that the GAN-T2FNN model has a better performance in terms of prediction accuracy and fitting effect, with a minimum MAE value of 0.1828, which is more robust, and an R2 Score of 0.9854, which is closer to 1, for the best overall model performance. Finally, the SHAP model was used to analyze the influence mechanism of various parameters on the temperature and pressure at the top of the atmospheric column, which provides a more comprehensive reference and guidance for the precise control of the methanol distillation process. Full article
Show Figures

Figure 1

Figure 1
<p>The production process of chemical raw materials and their downstream products.</p>
Full article ">Figure 2
<p>Methanol distillation process diagram.</p>
Full article ">Figure 3
<p>GAN architecture diagram.</p>
Full article ">Figure 4
<p>Inverse steady-state predictive control strategy based on type II fuzzy neural network models.</p>
Full article ">Figure 5
<p>Schematic diagram of type II fuzzy neural network.</p>
Full article ">Figure 6
<p>(<b>a</b>) Performance of different models for tower top temperature prediction. (<b>b</b>) Performance of different models for tower top pressure prediction.</p>
Full article ">Figure 7
<p>(<b>a</b>) Performance evaluation of the tower top temperature model; (<b>b</b>) performance evaluation of the tower top pressure model.</p>
Full article ">Figure 8
<p>Top pressure of an atmospheric tower.</p>
Full article ">Figure 9
<p>Top temperature of atmospheric tower.</p>
Full article ">Figure 10
<p>Thousandths ratio of water precipitated from an atmospheric tower.</p>
Full article ">Figure 11
<p>SHAP values of methanol overhead temperature in atmospheric columns (T1, T2 and T3 represent pre-distillation column, pressurized column and atmospheric column, respectively).</p>
Full article ">Figure 12
<p>SHAP values of methanol overhead pressure in atmospheric columns (T1, T2 and T3 represent pre-distillation column, pressurized column and atmospheric column, respectively).</p>
Full article ">
19 pages, 1580 KiB  
Article
Optimizing Tourist Destination Selection Using AHP and Fuzzy AHP Based on Individual Preferences for Personalized Tourism
by Parida Jewpanya, Pinit Nuangpirom, Warisa Nakkiew, Siwasit Pitjamit and Pakpoom Jaichomphu
Sustainability 2025, 17(3), 1116; https://doi.org/10.3390/su17031116 - 29 Jan 2025
Viewed by 1349
Abstract
Tourism is a dynamic industry that significantly contributes to the global economy, driven by the increasingly diverse preferences of tourists. Addressing these preferences requires sophisticated decision-making models capable of handling the uncertainty and subjectivity of human judgments. This study proposes sustainable models for [...] Read more.
Tourism is a dynamic industry that significantly contributes to the global economy, driven by the increasingly diverse preferences of tourists. Addressing these preferences requires sophisticated decision-making models capable of handling the uncertainty and subjectivity of human judgments. This study proposes sustainable models for effectively capturing and evaluating individual tourist preferences using the Analytic Hierarchy Process (AHP) and the Fuzzy Analytic Hierarchy Process (Fuzzy AHP). These models leverage the strengths of the AHP to construct a flexible decision-making framework that adapts to diverse tourist preferences, offering personalized recommendations. In this study, three main criteria are considered: types of tourism, tourism facilities, and tourism areas. Tourists are encouraged to provide their preferences for these criteria and sub-criteria, enabling the AHP and Fuzzy AHP to recommend suitable destinations. An analysis was conducted with 30 respondents providing pairwise comparisons of the tourism criteria, which were then used to generate tourist attraction recommendations using both the AHP and Fuzzy AHP. The study assessed respondents’ satisfaction with the recommendations, finding that both methods were effective, with a slight preference for the Fuzzy AHP due to its ability to better capture individual preferences. The results underscore the potential of these models in sustainably enhancing decision support systems in the tourism industry, offering tailored recommendations that align more closely with tourist expectations. Full article
(This article belongs to the Section Tourism, Culture, and Heritage)
Show Figures

Figure 1

Figure 1
<p>The AHP method.</p>
Full article ">Figure 2
<p>Decision-making according to the AHP method.</p>
Full article ">Figure 3
<p>The FAHP method.</p>
Full article ">Figure 4
<p>The fuzzy membership function.</p>
Full article ">Figure 5
<p>The hierarchy structure of the case study.</p>
Full article ">
16 pages, 9155 KiB  
Review
A Bibliometric Review of Type-3 Fuzzy Logic Applications
by Fevrier Valdez, Oscar Castillo and Patricia Melin
Mathematics 2025, 13(3), 375; https://doi.org/10.3390/math13030375 - 24 Jan 2025
Viewed by 633
Abstract
In this paper, we provide an overview of type-3 fuzzy logic systems (T3FLSs) and their applications in a general way. The contribution of this paper is to analyze and review, in the best way possible, applications in several fields utilizing type-3 fuzzy logic [...] Read more.
In this paper, we provide an overview of type-3 fuzzy logic systems (T3FLSs) and their applications in a general way. The contribution of this paper is to analyze and review, in the best way possible, applications in several fields utilizing type-3 fuzzy logic systems. Recently, many algorithms are receiving more and more attention in this area, and for this reason, an overview of this field is important. This article provides an overview of the most important applications in which intelligent computing methods based on T3FLSs are used. The main goal of this paper is to thoroughly explore these applications and identify emerging scientific trends in the adoption of intelligent methods, particularly those involving T3FLSs. To achieve this, we use the VosViewer software to construct and visualize bibliometric networks. VosViewer is a free, Java-based tool designed for analyzing and visualizing bibliometric data. This program is used for the creation of maps of papers, authors, etc., and the development of maps for keywords, countries, research groups, and more. Full article
(This article belongs to the Special Issue Advanced Methods in Fuzzy Control and Their Applications)
Show Figures

Figure 1

Figure 1
<p>Example of an IT3FS.</p>
Full article ">Figure 2
<p>PRISMA diagram flow for type-3 fuzzy publications.</p>
Full article ">Figure 3
<p>Number of works per year for the ‘type-3 fuzzy logic’ topic in the 2014–2013 year range.</p>
Full article ">Figure 4
<p>Network of authors with the query ‘type-3 fuzzy logic system’.</p>
Full article ">Figure 5
<p>Cluster for the topic ‘type-3 fuzzy logic system’.</p>
Full article ">Figure 6
<p>Topic-highlighted network with the topic ‘type-3 fuzzy logic system’.</p>
Full article ">Figure 7
<p>Topic of ‘Country Network’ with the topic ‘type-3 fuzzy logic system’.</p>
Full article ">Figure 8
<p>Times cited and publications over time in the WoS, 2005–2025.</p>
Full article ">Figure 9
<p>Cluster for the topic ‘type-3 fuzzy logic system’ from the WoS.</p>
Full article ">
30 pages, 3938 KiB  
Article
Cognitive Method for Synthesising a Fuzzy Controller Mathematical Model Using a Genetic Algorithm for Tuning
by Serhii Vladov
Big Data Cogn. Comput. 2025, 9(1), 17; https://doi.org/10.3390/bdcc9010017 - 20 Jan 2025
Viewed by 712
Abstract
In this article, a fuzzy controller mathematical model synthesising method that uses cognitive computing and a genetic algorithm for automated tuning and adaptation to changing environmental conditions has been developed. The technique consists of 12 stages, including creating the control objects’ mathematical model [...] Read more.
In this article, a fuzzy controller mathematical model synthesising method that uses cognitive computing and a genetic algorithm for automated tuning and adaptation to changing environmental conditions has been developed. The technique consists of 12 stages, including creating the control objects’ mathematical model and tuning the controller coefficients using classical methods. The research pays special attention to the error parameters and their derivative fuzzification, which simplifies the development of logical rules and helps increase the stability of the systems. The fuzzy controller parameters were tuned using a genetic algorithm in a computational experiment based on helicopter flight data. The results show an increase in the integral quality criterion from 85.36 to 98.19%, which confirms an increase in control efficiency by 12.83%. The fuzzy controller use made it possible to significantly improve the helicopter turboshaft engines’ gas-generator rotor speed control performance, reducing the first and second types of errors by 2.06…12.58 times compared to traditional methods. Full article
Show Figures

Figure 1

Figure 1
<p>The closed-loop control system with a forward-loop controller structural diagram.</p>
Full article ">Figure 2
<p>The fuzzy controllers’ structure and a term set for describing the fuzzy controllers’ input and output variables.</p>
Full article ">Figure 3
<p>The fuzzy controllers’ generalised structure.</p>
Full article ">Figure 4
<p>The gas-generator rotor speed parameter recorded onboard the helicopter during the 256 s study interval: (<b>a</b>) input diagram, (<b>b</b>) reconstructed diagram (author’s research).</p>
Full article ">Figure 5
<p>Cluster analysis results: (<b>a</b>) training dataset, (<b>b</b>) test dataset.</p>
Full article ">Figure 6
<p>Membership function type for each input and output variable of the gas-generator rotor speed fuzzy controllers.</p>
Full article ">Figure 7
<p>The Nyquist hodograph and the unit radius circle result in a diagram.</p>
Full article ">Figure 8
<p>Diagram of random disturbance to the control object in the gas-generator rotor speed stabilisation system.</p>
Full article ">Figure 9
<p>The gas-generator rotor r.p.m. changes (in absolute values), resulting in oscillograms.</p>
Full article ">
19 pages, 5354 KiB  
Article
Advanced Optimization Algorithm Combining a Fuzzy Inference System for Vehicular Communications
by Teguh Indra Bayu, Yung-Fa Huang, Jeang-Kuo Chen, Cheng-Hsiung Hsieh, Budhi Kristianto, Erwien Christianto and Suharyadi Suharyadi
Future Internet 2025, 17(1), 46; https://doi.org/10.3390/fi17010046 - 20 Jan 2025
Viewed by 534
Abstract
The use of a static modulation coding scheme (MCS), such as 7, and resource keep probability (Prk) value, such as 0.8, was proven to be insufficient to achieve the best packet reception ratio (PRR) performance. Various adaptation techniques have [...] Read more.
The use of a static modulation coding scheme (MCS), such as 7, and resource keep probability (Prk) value, such as 0.8, was proven to be insufficient to achieve the best packet reception ratio (PRR) performance. Various adaptation techniques have been used in the following years. This work introduces a novel optimization algorithm approach called the fuzzy inference reinforcement learning (FIRL) sequence for adaptive parameter configuration in cellular vehicle-to-everything (C-V2X) mode-4 communication networks. This innovative method combines a Sugeno-type fuzzy inference system (FIS) control system with a Q-learning reinforcement learning algorithm to optimize the PRR as the key metric for overall network performance. The FIRL sequence generates adaptive configuration parameters for Prk and MCS index values each time the Long-Term Evolution (LTE) packet is generated. Simulation results demonstrate the effectiveness of this optimization algorithm approach, achieving up to a 169.83% improvement in performance compared to static baseline parameters. Full article
Show Figures

Figure 1

Figure 1
<p>Simulation scenario diagram.</p>
Full article ">Figure 2
<p>Sugeno-FIS diagram.</p>
Full article ">Figure 3
<p>Fuzzy input membership function of distance.</p>
Full article ">Figure 4
<p>Fuzzy input membership functions of CSI.</p>
Full article ">Figure 5
<p>Fuzzy output membership functions of the output <span class="html-italic">P<sub>rk</sub></span>.</p>
Full article ">Figure 6
<p>FIRL flowchart.</p>
Full article ">Figure 7
<p>PRR comparison result for 100 vehicles.</p>
Full article ">Figure 8
<p>PRR comparison result for 200 vehicles.</p>
Full article ">Figure 9
<p>PRR comparison result for 300 vehicles.</p>
Full article ">Figure 10
<p>PRR comparison result for 400 vehicles.</p>
Full article ">Figure 11
<p>PRR comparison against total number of vehicles.</p>
Full article ">
21 pages, 4506 KiB  
Article
Biometric-Based Key Generation and User Authentication Using Voice Password Images and Neural Fuzzy Extractor
by Alexey Sulavko, Irina Panfilova, Daniil Inivatov, Pavel Lozhnikov, Alexey Vulfin and Alexander Samotuga
Appl. Syst. Innov. 2025, 8(1), 13; https://doi.org/10.3390/asi8010013 - 17 Jan 2025
Viewed by 618
Abstract
This work is devoted to the development of a biometric authentication system and the generation of a cryptographic key or a long password of 1024 bits based on a voice password, which ensures the protection of a biometric template from compromise. A new [...] Read more.
This work is devoted to the development of a biometric authentication system and the generation of a cryptographic key or a long password of 1024 bits based on a voice password, which ensures the protection of a biometric template from compromise. A new hybrid neural network model based on two types of trigonometric correlation neurons was proposed. The model is capable of recording correlation links between features and is resistant to data extraction attacks. The experiments were conducted on our own AIC-spkr-130 dataset and the publicly available RedDots, including recordings of user voices in different psycho-emotional states (sleepy state, alcohol intoxication). The results show that the proposed neural fuzzy extractor model provides an equal error probability level of EER = 2.1%. Full article
(This article belongs to the Section Artificial Intelligence)
Show Figures

Figure 1

Figure 1
<p>Construction of the averaged spectrum.</p>
Full article ">Figure 2
<p>Encoder architecture for feature extraction.</p>
Full article ">Figure 3
<p>Decoder architecture.</p>
Full article ">Figure 4
<p>Authentication process based on a CNN committee and NNBCC.</p>
Full article ">Figure 5
<p>Calculation and visualization of the distance from the “center of mass” to the images.</p>
Full article ">Figure 6
<p>Arrangement of images in subspaces at different functionals: (<b>a</b>) Thresholds <math display="inline"><semantics> <msub> <mi>t</mi> <mn>1</mn> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>t</mi> <mn>2</mn> </msub> </semantics></math> in the subspace of a pair of features (symmetrical regarding the <span class="html-italic">y</span>-axis) and on the probability density plot of meta-features obtained using the metric (<a href="#FD2-asi-08-00013" class="html-disp-formula">2</a>). (<b>b</b>) Thresholds <math display="inline"><semantics> <msub> <mi>t</mi> <mn>1</mn> </msub> </semantics></math> (blue lines) and <math display="inline"><semantics> <msub> <mi>t</mi> <mn>2</mn> </msub> </semantics></math> (red lines) in the positively correlated subspace of a pair of features (symmetric about the y and x axes) and on the probability density plot of meta-features obtained using the metric (<a href="#FD4-asi-08-00013" class="html-disp-formula">4</a>). (<b>c</b>) Thresholds <math display="inline"><semantics> <msub> <mi>t</mi> <mn>1</mn> </msub> </semantics></math> (blue lines) and <math display="inline"><semantics> <msub> <mi>t</mi> <mn>2</mn> </msub> </semantics></math> (red lines) in the negatively correlated subspace of a pair of features (symmetric about the y and x axes) and on the probability density plot of meta-features obtained using the metric (<a href="#FD4-asi-08-00013" class="html-disp-formula">4</a>).</p>
Full article ">Figure 7
<p>Algorithm for calibration of fuzzy neural extractor parameters.</p>
Full article ">Figure 8
<p>Schematic of neuron formation from three sectors and three types of neurons.</p>
Full article ">Figure 9
<p>Best EER values according to the results of the experiment: (<b>a</b>) AIC-spkr-130 (EER ≈ 0.055), (<b>b</b>) RedDots (EER ≈ 0.15), (<b>c</b>) AIC-spkr-130 (EER ≈ 0.044), (<b>d</b>) RedDots (EER ≈ 0.061), (<b>e</b>) AIC-spkr-130 (EER ≈ 0.021), (<b>f</b>) RedDots (EER ≈ 0.032).</p>
Full article ">Figure 9 Cont.
<p>Best EER values according to the results of the experiment: (<b>a</b>) AIC-spkr-130 (EER ≈ 0.055), (<b>b</b>) RedDots (EER ≈ 0.15), (<b>c</b>) AIC-spkr-130 (EER ≈ 0.044), (<b>d</b>) RedDots (EER ≈ 0.061), (<b>e</b>) AIC-spkr-130 (EER ≈ 0.021), (<b>f</b>) RedDots (EER ≈ 0.032).</p>
Full article ">Figure 10
<p>Comparison of oscillograms of the original voice image and its noisy versions.</p>
Full article ">
20 pages, 499 KiB  
Article
Definition of Triangular Norms and Triangular Conorms on Subfamilies of Type-2 Fuzzy Sets
by Pablo Hernández-Varela, Francisco Javier Talavera, Susana Cubillo, Carmen Torres-Blanc and Jorge Elorza
Axioms 2025, 14(1), 27; https://doi.org/10.3390/axioms14010027 - 31 Dec 2024
Viewed by 488
Abstract
In certain stages of the application of a type-2 fuzzy logic system, it is necessary to perform operations between input or output fuzzy variables in order to compute the union, intersection, aggregation, complement, and so forth. In this context, operators that satisfy the [...] Read more.
In certain stages of the application of a type-2 fuzzy logic system, it is necessary to perform operations between input or output fuzzy variables in order to compute the union, intersection, aggregation, complement, and so forth. In this context, operators that satisfy the axioms of t-norms and t-conorms are of particular significance, as they are applied to model intersection and union, respectively. Furthermore, the existence of a range of these operators allows for the selection of the t-norm or t-conorm that offers the optimal performance, in accordance with the specific context of the system. In this paper, we obtain new t-norms and t-conorms on some important subfamilies of the set of functions from [0,1] to [0,1]. The structure of these families provides a more solid algebraic foundation for the applications. In particular, we define these new operators on the subsets of the functions that are convex, normal, and normal and convex, as well as the functions taking only the values 0 or 1 and the subset of functions whose support is a finite union of closed intervals. These t-norms and t-conorms are generalized to the type-2 fuzzy set framework. Full article
(This article belongs to the Special Issue Advances in Fuzzy Logic with Applications)
Show Figures

Figure 1

Figure 1
<p>Example for the operations ⊔, ⊓, and ¬.</p>
Full article ">Figure 2
<p>Examples of <math display="inline"><semantics> <msup> <mi>f</mi> <mi>L</mi> </msup> </semantics></math> and <math display="inline"><semantics> <msup> <mi>f</mi> <mi>R</mi> </msup> </semantics></math>.</p>
Full article ">Figure 3
<p>Examples of operations ⊓ and ⊔ in <math display="inline"><semantics> <mrow> <mi mathvariant="bold">C</mi> <mo>∖</mo> <mi mathvariant="bold">N</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>Examples of operations ⊥, ⊤, <math display="inline"><semantics> <mrow> <mo>▲</mo> <mo>=</mo> <mo>⊓</mo> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mo>▼</mo> <mo>=</mo> <mo>⊔</mo> </mrow> </semantics></math> on <math display="inline"><semantics> <mrow> <mi mathvariant="bold">N</mi> <mo>∖</mo> <mi mathvariant="bold">C</mi> </mrow> </semantics></math>.</p>
Full article ">
23 pages, 13780 KiB  
Article
Intuitionistic Fuzzy Set Guided Fast Fusion Transformer for Multi-Polarized Petrographic Image of Rock Thin Sections
by Bowei Chen, Bo Yan, Wenqiang Wang, Wenmin He, Yongwei Wang, Lei Peng, Andong Wang and Li Chen
Symmetry 2024, 16(12), 1705; https://doi.org/10.3390/sym16121705 - 23 Dec 2024
Viewed by 828
Abstract
The fusion of multi-polarized petrographic images of rock thin sections involves the fusion of feature information from microscopic images of rock thin sections illuminated under both plane-polarized and orthogonal-polarized light. During the fusion process of rock thin section images, the inherent high resolution [...] Read more.
The fusion of multi-polarized petrographic images of rock thin sections involves the fusion of feature information from microscopic images of rock thin sections illuminated under both plane-polarized and orthogonal-polarized light. During the fusion process of rock thin section images, the inherent high resolution and abundant feature information of the images pose substantial challenges in terms of computational complexity when dealing with massive datasets. In engineering applications, to ensure the quality of image fusion while meeting the practical requirements for high-speed processing, this paper proposes a novel fast fusion Transformer. The model leverages a soft matching algorithm based on intuitionistic fuzzy sets to merge redundant tokens, effectively mitigating the negative effects of asymmetric dependencies between tokens. The newly generated artificial tokens serve as brokers for the Query (Q), forming a novel lightweight fusion strategy. Both subjective visual observations and quantitative analyses demonstrate that the Transformer proposed in this paper is comparable to existing fusion methods in terms of performance while achieving a notable enhancement in its inference efficiency. This is made possible by the attention paradigm, which is equivalent to a generalized form of linear attention, and the newly designed loss function. The model has been experimented on with multiple datasets of different rock types and has exhibited robust generalization capabilities. It provides potential for future research in diverse geological conditions and broader application scenarios. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

Figure 1
<p>Thin section images of rocks of different species and polarization modes with a scaling dimension of 500 micrometer.</p>
Full article ">Figure 2
<p>Structure of the proposed fast rock thin sections image fusion broker Transformer.</p>
Full article ">Figure 3
<p>The diagrams on the <b>left</b> and <b>right</b> are respectively the schematic representations of the broker attention module and the linear attention module.</p>
Full article ">Figure 4
<p>The demonstration of the fusion process of various types of rock thin section images. Each row represents a set of rock data, while each column corresponds to an image category. “Pp” and “Op” are abbreviations for “plane-polarized” and “orthogonal polarization”, respectively. The small red circles represent feature markers that have been detected.</p>
Full article ">Figure 5
<p>The fusion results of images of dacitic crystal–lithic–vitric welded tuff by different models. (<b>a</b>) Nestfuse. (<b>b</b>) SEDRFuse. (<b>c</b>) DDcGAN. (<b>d</b>) DenseFuse. (<b>e</b>) DIDFuse. (<b>f</b>) U2Fusion. (<b>g</b>) STDFusion. (<b>h</b>) Our proposed model. The small red boxes are areas of significant difference that have been selected. The larger box is a zoomed-in display of the area, for a clearer comparison of the fusion effect.</p>
Full article ">Figure 6
<p>The fusion results of granite images by different models. (<b>a</b>) Nestfuse. (<b>b</b>) SEDRFuse. (<b>c</b>) DDcGAN. (<b>d</b>) DenseFuse. (<b>e</b>) DIDFuse. (<b>f</b>) U2Fusion. (<b>g</b>) STDFusion. (<b>h</b>) Our proposed model. The small red boxes are areas of significant difference that have been selected. The larger box is a zoomed-in display of the area, for a clearer comparison of the fusion effect.</p>
Full article ">Figure 7
<p>Fusion results for high- and low-resolution images: (<b>a</b>–<b>d</b>) show fused images with a resolution of 480 × 384, while (<b>e</b>–<b>h</b>) show fused images with a resolution of 1280 × 1024.</p>
Full article ">Figure 8
<p>Feature matching results: (<b>a</b>–<b>d</b>) show images with a resolution of 1280 × 1024, while (<b>e</b>–<b>h</b>) represent images with a resolution of 480 × 384. Red lines indicate correctly matched feature pairs.</p>
Full article ">Figure 9
<p>Correlation between the estimated spatial error and the Dice coefficient in three attention mechanisms: (<b>a</b>) Softmax, (<b>b</b>) Linear, and (<b>c</b>) Broker.</p>
Full article ">Figure 10
<p>Comparison of cumulative probability distributions for different loss functions on image fusion performance. The metrics represented by each graph are: (<b>a</b>) MI, (<b>b</b>) PSNR, (<b>c</b>) SF, (<b>d</b>) SSIM, (<b>e</b>) <math display="inline"><semantics> <msup> <mi>Q</mi> <mrow> <mi>A</mi> <mi>B</mi> <mo>/</mo> <mi>F</mi> </mrow> </msup> </semantics></math>, (<b>f</b>) CE, and (<b>g</b>) RMSE.</p>
Full article ">Figure 11
<p>Panels (<b>a</b>–<b>h</b>) represent the CEST MRI images acquired at saturation durations of 17, 25, 33, 52, 60, 68, 76, and 84 min, respectively. Panel (<b>i</b>) shows the output result obtained by fusing this series of images.</p>
Full article ">
20 pages, 9510 KiB  
Article
Generalized Type-2 Fuzzy Approach for Parameter Adaptation in the Whale Optimization Algorithm
by Leticia Amador-Angulo, Oscar Castillo, Patricia Melin and Zong Woo Geem
Mathematics 2024, 12(24), 4031; https://doi.org/10.3390/math12244031 - 22 Dec 2024
Viewed by 939
Abstract
An enhanced whale optimization algorithm (WOA) through the implementation of a generalized type-2 fuzzy logic system (GT2FLS) is outlined. The initial idea is to improve the efficacy of the original WOA using a GT2FLS to find the optimal values of the [...] Read more.
An enhanced whale optimization algorithm (WOA) through the implementation of a generalized type-2 fuzzy logic system (GT2FLS) is outlined. The initial idea is to improve the efficacy of the original WOA using a GT2FLS to find the optimal values of the r1 and r2 parameters of the WOA, for the case of optimizing mathematical functions. In the WOA algorithm, r1 is a variable that affects the new position of the whale in the search space, in this case, affecting the exploration, and r2 is a variable that has an effect on finding the local optima, which is an important factor for the exploration. The efficiency of a fuzzy WOA with a GT2FLS (FWOA-GT2FLS) is highlighted by presenting the excellent results of the case study of the benchmark function optimization. A relevant analysis and comparison with a bio-inspired algorithm based on artificial bees is also presented. Statistical tests and comparisons with other bio-inspired algorithms and the initial WOA, with type-1 FLS (FWOA-T1FLS) and interval type-2 FLS (FWOA-IT2FLS), are presented. For each of the methodologies, the metric for evaluation is the average of the minimum squared errors. Full article
Show Figures

Figure 1

Figure 1
<p>Visualization of the idea for the fuzzy WOA–GT2FLS.</p>
Full article ">Figure 2
<p>Visual representation of a GT2MF.</p>
Full article ">Figure 3
<p>FOU of a GT2MF.</p>
Full article ">Figure 4
<p>General structure of a GT2FLS.</p>
Full article ">Figure 5
<p>Example of an <math display="inline"><semantics> <mo>∝</mo> </semantics></math>-plane.</p>
Full article ">Figure 6
<p>Proposed structure of the GT2FLS.</p>
Full article ">Figure 7
<p>Graphical illustration of the ScaleTriScaleGaussT2MF.</p>
Full article ">Figure 8
<p>Representation of the surface of the output for <math display="inline"><semantics> <mrow> <mover accent="true"> <mrow> <msub> <mi>r</mi> <mn>1</mn> </msub> </mrow> <mo stretchy="true">→</mo> </mover> </mrow> </semantics></math>.</p>
Full article ">Figure 9
<p>Fuzzy rules of the GT2FLS.</p>
Full article ">Figure 10
<p>Plots of the functions: (<b>a</b>) Sphere, Griewangk; (<b>b</b>) Rastringin, Shewefel; (<b>c</b>) Sum of Different Power, Zakharov; (<b>d</b>) Dixon and Price, Levy; (<b>e</b>) Sum Squares and Rotated Hyper-Ellipsoid.</p>
Full article ">Figure 10 Cont.
<p>Plots of the functions: (<b>a</b>) Sphere, Griewangk; (<b>b</b>) Rastringin, Shewefel; (<b>c</b>) Sum of Different Power, Zakharov; (<b>d</b>) Dixon and Price, Levy; (<b>e</b>) Sum Squares and Rotated Hyper-Ellipsoid.</p>
Full article ">Figure 11
<p>Behavior of the Levy function with 500 dimensions.</p>
Full article ">
49 pages, 33277 KiB  
Article
Efficient Frequency Management for Hybrid AC/DC Power Systems Based on an Optimized Fuzzy Cascaded PI−PD Controller
by Awadh Ba Wazir, Sultan Alghamdi, Abdulraheem Alobaidi, Abdullah Ali Alhussainy and Ahmad H. Milyani
Energies 2024, 17(24), 6402; https://doi.org/10.3390/en17246402 - 19 Dec 2024
Viewed by 1009
Abstract
A fuzzy cascaded PI−PD (FCPIPD) controller is proposed in this paper to optimize load frequency control (LFC) in the linked electrical network. The FCPIPD controller is composed of fuzzy logic, proportional integral, and proportional derivative with filtered derivative mode controllers. Utilizing renewable energy [...] Read more.
A fuzzy cascaded PI−PD (FCPIPD) controller is proposed in this paper to optimize load frequency control (LFC) in the linked electrical network. The FCPIPD controller is composed of fuzzy logic, proportional integral, and proportional derivative with filtered derivative mode controllers. Utilizing renewable energy sources (RESs), a dual-area hybrid AC/DC electrical network is used, and the FCPIPD controller gains are designed via secretary bird optimization algorithm (SBOA) with aid of a novel objective function. Unlike the conventional objective functions, the proposed objective function is able to specify the desired LFCs response. Under different load disturbance situations, a comparison study is conducted to compare the performance of the SBOA-based FCPIPD controller with the one-to-one (OOBO)-based FCPIPD controller and the earlier LFC controllers published in the literature. The simulation’s outcomes demonstrate that the SBOA-FCPIPD controller outperforms the existing LFC controllers. For instance, in the case of variable load change and variable RESs profile, the SBOA-FCPIPD controller has the best integral time absolute error (ITAE) value. The SBOA-FCPIPD controller’s ITAE value is 0.5101, while sine cosine adopted an improved equilibrium optimization algorithm-based adaptive type 2 fuzzy PID controller and obtained 4.3142. Furthermore, the work is expanded to include electric vehicle (EV), high voltage direct current (HVDC), generation rate constraint (GRC), governor dead band (GDB), and communication time delay (CTD). The result showed that the SBOA-FCPIPD controller performs well when these components are equipped to the system with/without reset its gains. Also, the work is expanded to include a four-area microgrid system (MGS), and the SBOA-FCPIPD controller excelled the SBOA-CPIPD and SBOAPID controllers. Finally, the SBOA-FCPIPD controller showed its superiority against various controllers for the two-area conventionally linked electrical network. Full article
(This article belongs to the Section F2: Distributed Energy System)
Show Figures

Figure 1

Figure 1
<p>The hybrid multi-source IPS under study.</p>
Full article ">Figure 2
<p>The LFC model of the hybrid multi-source IPS under study.</p>
Full article ">Figure 3
<p>The FCPIPD controller’s structure.</p>
Full article ">Figure 4
<p>The MFs for (<b>a</b>) <math display="inline"><semantics> <mrow> <mi mathvariant="normal">A</mi> <mi mathvariant="normal">C</mi> <mi mathvariant="normal">E</mi> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi mathvariant="normal">A</mi> <mi mathvariant="normal">C</mi> <mi mathvariant="normal">E</mi> </mrow> </semantics></math> derivative (<b>b</b>) <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>u</mi> </mrow> <mrow> <mo> </mo> <mi>F</mi> <mi>L</mi> <mi>C</mi> </mrow> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>The FLCs input-output correlation control surface.</p>
Full article ">Figure 6
<p>The remarkably used objective functions to determine controller parameters.</p>
Full article ">Figure 7
<p>Secretary bird hunting behavior [<a href="#B50-energies-17-06402" class="html-bibr">50</a>].</p>
Full article ">Figure 8
<p>Secretary bird’s strategy for escape [<a href="#B50-energies-17-06402" class="html-bibr">50</a>].</p>
Full article ">Figure 9
<p>General scheme of the proposed tuning approach.</p>
Full article ">Figure 10
<p>The tendency convergence of SBOA and OOBO.</p>
Full article ">Figure 11
<p>Frequency deviation responses of region-1 under scenario 1.</p>
Full article ">Figure 12
<p>Frequency deviation responses of region-2 under scenario 1.</p>
Full article ">Figure 13
<p>Tie-line power deviation responses under scenario 1.</p>
Full article ">Figure 14
<p>The load pattern and RESs profile for scenario 2.</p>
Full article ">Figure 15
<p>Frequency deviation responses of region-1 under scenario 2.</p>
Full article ">Figure 16
<p>Frequency deviation responses of region-2 under scenario 2.</p>
Full article ">Figure 17
<p>Tie-line power deviation responses under scenario 2.</p>
Full article ">Figure 18
<p>The load pattern and RESs profile for scenario 3.</p>
Full article ">Figure 19
<p>Frequency deviation responses of region-1 under scenario 3.</p>
Full article ">Figure 20
<p>Frequency deviation responses of region-2 under scenario 3.</p>
Full article ">Figure 21
<p>Tie-line power deviation responses under scenario 3.</p>
Full article ">Figure 22
<p>Actual RESs profile: (<b>a</b>) Solar radiation, (<b>b</b>) PV output, (<b>c</b>) Wind speed, (<b>d</b>) WEG output.</p>
Full article ">Figure 23
<p>Frequency deviation responses of region-1 under scenario 4.</p>
Full article ">Figure 24
<p>Frequency deviation responses of region-2 under scenario 4.</p>
Full article ">Figure 25
<p>Tie-line power deviation responses under scenario 4.</p>
Full article ">Figure 26
<p>Experimental validation set-up.</p>
Full article ">Figure 27
<p>Frequency responses of region-1 under scenario 4 using SBOA-FCPIPD controller.</p>
Full article ">Figure 28
<p>Frequency responses of region-2 under scenario 4 using SBOA-FCPIPD controller.</p>
Full article ">Figure 29
<p>Tie-line power responses under scenario 4 using SBOA-FCPIPD controller.</p>
Full article ">Figure 30
<p>PV output.</p>
Full article ">Figure 31
<p>WEG output.</p>
Full article ">Figure 32
<p>Frequency deviation responses of region-1 under robustness analysis.</p>
Full article ">Figure 33
<p>Frequency deviation responses of region-2 under robustness analysis.</p>
Full article ">Figure 34
<p>Tie-line power deviation responses under robustness analysis.</p>
Full article ">Figure 35
<p>The hybrid multi-source IPS with EV, HVDC, GRC, GDB, and CTD.</p>
Full article ">Figure 36
<p>The LFCs responses with CTD = 0/15 ms. (<b>a</b>) Frequency deviation of region-1. (<b>b</b>) Frequency deviation of region-2. (<b>c</b>) Tie-line power deviation.</p>
Full article ">Figure 37
<p>The LFCs responses with CTD = 0/20 ms. (<b>a</b>) Frequency deviation of region-1. (<b>b</b>) Frequency deviation of region-2. (<b>c</b>) Tie-line power deviation.</p>
Full article ">Figure 38
<p>The LFCs responses with CTD = 0/25 ms. (<b>a</b>) Frequency deviation of region-1. (<b>b</b>) Frequency deviation of region-2. (<b>c</b>) Tie-line power deviation.</p>
Full article ">Figure 39
<p>The LFCs responses with CTD = 0/50 ms. (<b>a</b>) Frequency deviation of region-1. (<b>b</b>) Frequency deviation of region-2. (<b>c</b>) Tie-line power deviation.</p>
Full article ">Figure 40
<p>The LFCs responses with CTD = 0/100 ms. (<b>a</b>) Frequency deviation of region-1. (<b>b</b>) Frequency deviation of region-2. (<b>c</b>) Tie-line power deviation.</p>
Full article ">Figure 41
<p>The schematic diagram of the proposed four-area MGS.</p>
Full article ">Figure 42
<p>Simulink model of the proposed four-area MGS.</p>
Full article ">Figure 43
<p>Frequency deviation responses of MG-1 under the effect of CTD.</p>
Full article ">Figure 44
<p>Frequency deviation responses of MG-2 under the effect of Δ<math display="inline"><semantics> <mrow> <msub> <mrow> <mi>P</mi> </mrow> <mrow> <mi>L</mi> </mrow> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 45
<p>Frequency deviation responses of MG-3 under the effect of <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>T</mi> </mrow> <mrow> <mi>W</mi> <mi>E</mi> <mi>G</mi> </mrow> </msub> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>T</mi> </mrow> <mrow> <mi>P</mi> <mi>V</mi> </mrow> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 46
<p>Frequency deviation responses of MG-4 under the effect of <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>T</mi> </mrow> <mrow> <mi>D</mi> <mi>E</mi> <mi>G</mi> </mrow> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 47
<p>Power deviation responses of MG-1 under the effect of <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>T</mi> </mrow> <mrow> <mi>D</mi> <mi>E</mi> <mi>G</mi> </mrow> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 48
<p>Power deviation responses of MG-2 under the effect of CTD.</p>
Full article ">Figure 49
<p>Power deviation responses of MG-3 under the effect of Δ<math display="inline"><semantics> <mrow> <msub> <mrow> <mi>P</mi> </mrow> <mrow> <mi>L</mi> </mrow> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 50
<p>Power deviation responses of MG-4 under the effect of <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>T</mi> </mrow> <mrow> <mi>W</mi> <mi>E</mi> <mi>G</mi> </mrow> </msub> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>T</mi> </mrow> <mrow> <mi>P</mi> <mi>V</mi> </mrow> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 51
<p>The Simulink model of the two-area conventional IPS.</p>
Full article ">Figure 52
<p>The time-varying delay pattern.</p>
Full article ">Figure 53
<p>Frequency response of area-1 under the effect time-varying/time-fixed delay.</p>
Full article ">Figure 54
<p>Frequency response of area-2 under the effect of time-varying/time-fixed delay.</p>
Full article ">Figure 55
<p>Tie-line power response under the effect of time-varying/time-fixed delay.</p>
Full article ">Figure 56
<p>ACEs curves of the conventional IPS using proposed and conventional LFC.</p>
Full article ">Figure 57
<p>Frequency responses of the conventional IPS using proposed and conventional LFC.</p>
Full article ">Figure 58
<p>Power responses of the conventional IPS using proposed and conventional LFC.</p>
Full article ">
21 pages, 2457 KiB  
Article
Blockchain-Assisted Verifiable and Multi-User Fuzzy Search Encryption Scheme
by Xixi Yan, Pengyu Cheng, Yongli Tang and Jing Zhang
Appl. Sci. 2024, 14(24), 11740; https://doi.org/10.3390/app142411740 - 16 Dec 2024
Viewed by 644
Abstract
Searchable encryption (SE) allows users to efficiently retrieve data from encrypted cloud data, but most of the existing SE solutions only support precise keyword search. Fuzzy searchable encryption agrees with practical situations well in the cloud environment, as search keywords that are misspelled [...] Read more.
Searchable encryption (SE) allows users to efficiently retrieve data from encrypted cloud data, but most of the existing SE solutions only support precise keyword search. Fuzzy searchable encryption agrees with practical situations well in the cloud environment, as search keywords that are misspelled to some extent can still generate search trapdoors that are as effective as correct keywords. In scenarios where multiple users can search for ciphertext, most fuzzy searchable encryption schemes ignore the security issues associated with malicious cloud services and are inflexible in multi-user scenarios. For example, in medical application scenarios where malicious cloud servers may exist, diverse types of files need to correspond to doctors in the corresponding departments, and there is a lack of fine-grained access control for sharing decryption keys for different types of files. In the application of medical cloud storage, malicious cloud servers may return incorrect ciphertext files. Since diverse types of files need to be guaranteed to be accessible by doctors in the corresponding departments, sharing decryption keys with the corresponding doctors for different types of files is an issue. To solve these problems, a verifiable fuzzy searchable encryption with blockchain-assisted multi-user scenarios is proposed. Locality-sensitive hashing and bloom filters are used to realize multi-keyword fuzzy search, and the bigram segmentation algorithm is optimized for keyword conversion to improve search accuracy. To realize fine-grained access control in multi-user scenarios, ciphertext-policy attribute-based encryption (CP-ABE) is used to distribute the shared keys. In response to the possibility of malicious servers tampering with or falsifying users’ search results, the scheme leverages the blockchain’s technical features of decentralization, non-tamperability, and traceability, and uses smart contracts as a trusted third party to carry out the search work, which not only prevents keyword-guessing attacks within the cloud server, but also solves the verification work of search results. The security analysis leads to the conclusion that the scheme is secure under the adaptively chosen-keyword attack. Full article
Show Figures

Figure 1

Figure 1
<p>p-stable element mapping.</p>
Full article ">Figure 2
<p>System model.</p>
Full article ">Figure 3
<p>LSH-Bloom Architectural Diagram.</p>
Full article ">Figure 4
<p>The index tree.</p>
Full article ">Figure 5
<p>(<b>a</b>) Index generation time. (<b>b</b>) The search matching time when search keyword number is 3. (<b>c</b>) The search matching time when the file number is 2000. (<b>d</b>) The fuzzy search accuracy. Zhong, H. et al (2020) refers to the scheme in ref. [<a href="#B15-applsci-14-11740" class="html-bibr">15</a>], Li, X. et al (2022) refers to the scheme in ref. [<a href="#B21-applsci-14-11740" class="html-bibr">21</a>], Li, J. et al (2022) refers to the scheme in ref. [<a href="#B28-applsci-14-11740" class="html-bibr">28</a>] and Fu, S. et al (2021) refers to the scheme in ref. [<a href="#B29-applsci-14-11740" class="html-bibr">29</a>].</p>
Full article ">
43 pages, 1877 KiB  
Article
Construction of General Types of Fuzzy Implications Produced by Comparing Different t-Conorms: An Application Case Using Meteorological Data
by Athina Daniilidou, Avrilia Konguetsof and Basil Papadopoulos
Symmetry 2024, 16(12), 1633; https://doi.org/10.3390/sym16121633 - 9 Dec 2024
Viewed by 923
Abstract
The objective of this paper is to compare a fuzzy implication produced by t-conorm probor with three other fuzzy implications constructed by t-conorms max, Einstein, and Lukasiewicz. Firstly, in methodology, six pairs of combinations of five t-conorm comparisons are performed in order to [...] Read more.
The objective of this paper is to compare a fuzzy implication produced by t-conorm probor with three other fuzzy implications constructed by t-conorms max, Einstein, and Lukasiewicz. Firstly, in methodology, six pairs of combinations of five t-conorm comparisons are performed in order to find the ranking order of five fuzzy implications. Moreover, the evaluation and calculation of the four fuzzy implications (probor, max, Einstein, and Lukasiewicz) are made using meteorological data, fuzzifying the crisp values of temperature and humidity, constructing four membership degree functions, and inserting as inputs the membership degrees of meteorological variables into the two variables of the fuzzy implications. Finally, extensive tests are made so as to find which membership degree function and which fuzzy implication receives the best and the worst results. The key findings are that the application of isosceles trapezium to the fuzzy implications of Probor and Einstein gives the best values, while fuzzy implication Lukasiewicz, although it was found to be first in the ranking order, is rejected due to unreliable results. As a result, the crucial role of these implications lies in the fact that they are non-symmetrical, i.e., there is a clear difference between the cause and the causal. Full article
(This article belongs to the Special Issue Symmetry and Asymmetry in Nonlinear Partial Differential Equations)
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) shows the three-dimensional form of define 5 of the three variables m, x, y; <a href="#symmetry-16-01633-f001" class="html-fig">Figure 1</a>. (<b>b</b>) shows the projection of the three-dimensional form onto the rectangular system xx’ yy’.</p>
Full article ">
17 pages, 1893 KiB  
Article
New Insights into Fuzzy Genetic Algorithms for Optimization Problems
by Oleksandr Syzonov, Stefania Tomasiello and Nicola Capuano
Algorithms 2024, 17(12), 549; https://doi.org/10.3390/a17120549 - 2 Dec 2024
Viewed by 991
Abstract
In this paper, we shed light on the use of two types of fuzzy genetic algorithms, which stand out from the literature due to the innovative ideas behind them. One is the Gendered Fuzzy Genetic Algorithm, where the crossover mechanism is regulated by [...] Read more.
In this paper, we shed light on the use of two types of fuzzy genetic algorithms, which stand out from the literature due to the innovative ideas behind them. One is the Gendered Fuzzy Genetic Algorithm, where the crossover mechanism is regulated by the gender and the age of the population to generate offspring through proper fuzzy rules. The other one is the Elegant Fuzzy Genetic Algorithm, where the priority of the parent genome is updated based on the child’s fitness. Both algorithms present a significant computational burden. To speed up the computation, we propose to adopt a nearest-neighbor caching strategy. We first performed several experiments, using some well-known benchmark functions, and tried different types of membership functions and logical connectives. Afterward, some additional benchmarks were retrieved from the literature for a fair comparison against published results, which were obtained by means of former variants of fuzzy genetic algorithms. A real-world application problem, which was retrieved from the literature and dealt with rice production, was also tackled. All the numerical results show the potential of the proposed strategy. Full article
(This article belongs to the Special Issue Numerical Optimization and Algorithms: 2nd Edition)
Show Figures

Figure 1

Figure 1
<p>Linguistic variable, terms, and syntactic rules.</p>
Full article ">Figure 2
<p>A simple example of a min-heap scheme.</p>
Full article ">Figure 3
<p>Fitness linguistic variable with trapezoidal MFs (<math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mrow> <mi>f</mi> <mi>i</mi> <mi>t</mi> <mi>n</mi> <mi>e</mi> <mi>s</mi> <mi>s</mi> </mrow> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 4
<p>Diversity linguistic variable with trapezoidal MFs (<math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mrow> <mi>d</mi> <mi>i</mi> <mi>v</mi> <mi>e</mi> <mi>r</mi> <mi>s</mi> <mi>i</mi> <mi>t</mi> <mi>y</mi> </mrow> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 5
<p>First set of benchmark functions. Average fitness value for the following: (<b>a</b>) D = 5; (<b>b</b>) D = 1000.</p>
Full article ">Figure 6
<p>Rastrigin function (D = 5). Average fitness value after 500 generations with the following: (<b>a</b>) Pi-shaped MF; (<b>b</b>) Trapezoidal MF.</p>
Full article ">Figure 7
<p>Comparison against state-of-the-art approaches in [<a href="#B24-algorithms-17-00549" class="html-bibr">24</a>] (<math display="inline"><semantics> <mrow> <mi>D</mi> <mo>=</mo> <mn>1000</mn> </mrow> </semantics></math>; 1000 generations) for the following: (<b>a</b>) The Ackley function; (<b>b</b>) The Rastrigin function; (<b>c</b>) The Shwefel function.</p>
Full article ">Figure 8
<p>Average fitness value over the generations for the following: (<b>a</b>) The <math display="inline"><semantics> <msub> <mi>g</mi> <mn>1</mn> </msub> </semantics></math> function; (<b>b</b>) The <math display="inline"><semantics> <msub> <mi>g</mi> <mn>2</mn> </msub> </semantics></math> function.</p>
Full article ">Figure 9
<p>TSP: shortest path length by each approach.</p>
Full article ">Figure 10
<p><span class="html-italic">r</span> vs. <span class="html-italic">p</span>.</p>
Full article ">Figure 11
<p>The rice production problem: best solutions.</p>
Full article ">
21 pages, 59527 KiB  
Article
Recognition and Classification of Typical Building Shapes Based on YOLO Object Detection Models
by Xiao Wang, Haizhong Qian, Limin Xie, Xu Wang and Bohao Li
ISPRS Int. J. Geo-Inf. 2024, 13(12), 433; https://doi.org/10.3390/ijgi13120433 - 2 Dec 2024
Viewed by 944
Abstract
The recognition and classification of building shapes are the prerequisites and foundation for building simplification, matching, and change detection, which have always been important research problems in the field of cartographic generalization. Due to the ambiguity and uncertainty of building shape outlines, it [...] Read more.
The recognition and classification of building shapes are the prerequisites and foundation for building simplification, matching, and change detection, which have always been important research problems in the field of cartographic generalization. Due to the ambiguity and uncertainty of building shape outlines, it is difficult to describe them using unified rules, which has always limited the quality and automation level of building shape recognition. In response to the above issues, by introducing object detection technology in computer vision, this article proposes a building shape recognition and classification method based on the YOLO object detection model. Firstly, for different types of buildings, four levels of building training data samples are constructed, and YOLOv5, YOLOv8, YOLOv9, and YOLOv9 integrating attention modules are selected for training. The trained models are used to test the shape judgment of buildings in the dataset and verify the learning effectiveness of the models. The experimental results show that the YOLO model can accurately classify and locate the shape of buildings, and its recognition and detection effect have the ability to simulate advanced human visual cognition, which provides a new solution for the fuzzy shape recognition of buildings with complex outlines and local deformation. Full article
Show Figures

Figure 1

Figure 1
<p>Typical types of building shapes.</p>
Full article ">Figure 2
<p>Network architecture of YOLOv9.</p>
Full article ">Figure 3
<p>The GELAN module of YOLOv9 [<a href="#B46-ijgi-13-00433" class="html-bibr">46</a>].</p>
Full article ">Figure 4
<p>The introduction position of attention modules.</p>
Full article ">Figure 5
<p>The introduction position of attention modules [<a href="#B49-ijgi-13-00433" class="html-bibr">49</a>].</p>
Full article ">Figure 6
<p>The introduction position of attention modules [<a href="#B50-ijgi-13-00433" class="html-bibr">50</a>].</p>
Full article ">Figure 7
<p>The structures of CAM and SAM in the NAM module [<a href="#B51-ijgi-13-00433" class="html-bibr">51</a>].</p>
Full article ">Figure 8
<p>The structure of the SimAM attention module [<a href="#B52-ijgi-13-00433" class="html-bibr">52</a>].</p>
Full article ">Figure 9
<p>Recognition procedure of building shape based on YOLO object detection model.</p>
Full article ">Figure 10
<p>Examples of test datasets: (<b>a</b>) single building; (<b>b</b>) complex scene; (<b>c</b>) large-area scene.</p>
Full article ">Figure 11
<p>Misidentification examples of building shape: (<b>a</b>) F-like; (<b>b</b>) cross-like.</p>
Full article ">Figure 12
<p>Detection results of YOLOv9e on Test Dataset 2: (<b>a</b>) standard shape; (<b>b</b>) complex contour; (<b>c</b>) local deformation; (<b>d</b>) complex contour combined with local deformation.</p>
Full article ">Figure 13
<p>Simulation of advanced human visual cognition by YOLO models: (<b>a</b>) abstract summarizing; (<b>b</b>) edge detection; (<b>c</b>) fuzzy judgment; (<b>d</b>) local recognition; (<b>e</b>) analogical reasoning; (<b>f</b>) visual extension.</p>
Full article ">Figure 14
<p>Comparison between (<b>a</b>) GNN method and (<b>b</b>) YOLOv9e + CBAM with complex shapes.</p>
Full article ">
Back to TopTop