<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Vietri sul Mare, Italy
$ stefano.rovetta@unige.it (S. Rovetta); zied.mnasri@enit.utm.tn (Z. Mnasri); francesco.masulli@unige.it
(F. Masulli); alberto.cabri@dibris.unige.it (A. Cabri)</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Anomaly detection based on interval-valued fuzzy sets: Application to rare sound event detection</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Stefano Rovetta</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Zied Mnasri</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Francesco Masulli</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alberto Cabri</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>DIBRIS, Università degli studi di Genova</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>ENIT, University Tunis El Manar</institution>
          ,
          <country country="TN">Tunisia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>Audio signal processing is moving towards detecting and/or defining rare/anomalous sounds. The application of such an anomaly detection problem can be easily extended to audio surveillance systems. Thus, a rare sound event detection method for road trafic monitoring is proposed in this paper, including detection of hazardous events, i.e., road accidents. The method is based on combining anomaly detection techniques, such as variational autoencoders (VAE) and Interval-valued fuzzy sets. The VAE is used to calculate the reconstruction error of the input audio segment. Based on this reconstruction error, a fuzzy membership function, composed of an optimistic/upper component and a pessimistic/lower component, is calculated. Finally, a probabilistic method for interval comparison is used to calculate the membership score, hence to evaluate the interval-valued fuzzy sets. Finally, classification into anomalous/normal events is obtained by defuzzification. Results show that with a careful parameter setting, the proposed method outperforms the state-of-the-art one-class SVM for anomaly detection.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Anomalous sound event detection</kwd>
        <kwd>anomaly detection</kwd>
        <kwd>variational autoencoder</kwd>
        <kwd>fuzzy membership</kwd>
        <kwd>interval-valued fuzzy sets</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Anomaly/outlierness/novelty can be defined in diferent ways [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]: (a) by scarcity, as events
occurring with low frequency; (b) by characteristics, as events difering from normal events;
(c) by meaning, as events carrying a diferent meaning than normal events. In the specific
application of road audio surveillance, Anomalous events are mainly car accidents and other
events indicating potential hazards like tire skidding, harsh braking, etc., whereas the Normal
class covers all other events that may happen on the road, e.g. sound of cars, pedestrians, horn
blowing and any other non-hazardous event. This is a particular instance, focused only on
anomalous sound categories, of the Sound Event Detection (SED) problem.
      </p>
      <p>This problem can be formalized either as a classification task for all perceived events, or as
detection of only anomalous/outlier/novel events. In either case, two major issues make this
task dificult: first, background noise that fully or partly masks all events, making the resulting
signals highly variable; secondly, the rareness of the “interesting” events, such as car accidents,
which makes them more dificult to model accurately for scarcity of data.</p>
      <p>
        This implies that not only classes are fuzzy, but the membership itself to any class is afected
by a degree of uncertainty. In this case, interval-valued fuzzy sets [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] provide an alternative to
crisp clustering or type-1 fuzzy sets, for which uncertainty would have to be precisely modelled,
either by identification or, more typically, by arbitrary design.
      </p>
      <p>
        We state the problem as a classification task based on generative models where the final
decision is taken by comparing the inferred interval-valued memberships to the diferent classes,
using a classical metric of interval comparison, named degree of preference [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. This process
allows making the final Normal/Anomalous class decision without discarding the information
about uncertainty expressed by the 2-component fuzzy membership.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Related work</title>
      <p>SED is a relatively young discipline, that has emerged since nearly a decade. Sound recognition
methods in general proceed by segmenting signals into fixed-length, possibly overlapping frames
of relatively short duration (fractions of a second). For anomalous SED, anomaly detection
and supervised/unsupervised recognition methods are then applied on the obtained, fixed-size
feature vectors.</p>
      <p>
        Several methods have been built around generative models, such as hidden Markov models
using Gaussian mixture models. Examples of this approach are Ntalampiras et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and
Heittola et al. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Discriminative methods have also been employed, mainly based on support
vector machines (SVM) and neural networks (NN). Examples are Foggia et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] using one-class
SVM models for each class. The present authors proposed an ensemble one-class SVM-NN
model [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], where one-class SVM detects anomalous data and a NN classifies events.
      </p>
      <p>
        Unsupervised learning has often been preferred to cope with the issues described.
Selfsupervised neural networks, such as autoencoders, are well suited to this task. We can mention
Wei et al. [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] using a reconstruction autoencoder to compute the anomaly score through metric
learning, and Purohit et al. [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] employing a deep autoencoder. Variational autoencoders (VAE)
[
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], learning a hidden generative representation of the data, are especially interesting.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Proposed method</title>
      <p>
        As mentioned, the method uses multiple generative models that learn individual classes, and
compares interval-valued memberships by using the degree of preference. It proceeds as follows:
• In the training phase, a dedicated VAE model is learnt on each subset containing only
one type of events, i.e. Normal or Anomalous.
• In the test phase, the RMSE error is calculated between the input, i.e. the feature vector
representing the signal, and the reconstructed output of each VAE model.
• For each input signal , the output error  , of each VAE (1 ≤  ≤  and 1 ≤  ≤ , for
 samples and  classes) is used to compute a fuzzy membership function, that provides
a measure of closeness of the signal to the event class on which the VAE model had been
trained. In our case, for each input sample  = 2 interval membership functions are
computed, corresponding to the Normal category and the Anomalous one.
• The membership function associated to each event category, i.e. Normal/Anomalous,
is composed of a low/pessimistic component and an upper/optimistic component,
respectively. The values of both components form the interval-valued fuzzy membership
function interval (cf. Figure 2).
• Finally, interval comparison is applied using a probabilistic method [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], first to measure
the degree of preference of each interval-valued membership function, and subsequently
to detect the corresponding event category.
      </p>
      <sec id="sec-3-1">
        <title>3.1. Variational autoencoder</title>
        <p>The variational autoencoder (VAE) is a reconstruction network learning a compressed
representation of the input to reconstruct the output. The encoding layer stores the parameters of a
probability distribution, e.g., mean and variance, representing the input in a latent space. Then,
the decoder uses the probability distribution to generate an approximated reconstruction of
the input data. Hence the encoder approximates the probability distribution of the identity
function. Given a feature vector , the VAE aims to find the probability of  with respect to
its representation ,</p>
        <p>∫︁
 () =</p>
        <p>(|) () .</p>
        <p>The network has parameters of  () (average and variance) as its hidden parameters. Using
variational inference on a maximum likelihood ojective, the encoder output is trained so that its
probability approximates  (|). The reconstruction RMSE can then be obtained as follows:
 =
√︂ ∑︀=1( − ′)2 ,

(1)
(2)
where  and ′ ( = 1, . . . ,  ) are the input and the output feature vectors for each autoencoder.
To compensate for class imbalance, a priori class probabilities are used to compute thresholds.</p>
        <p>
          In the present work, the VAE employs convolutional layers. The input features are extracted
from the spectrogram, i.e. Mel-frequency cepstral coeficients (MFCC) and log-Energy, with
their first and second derivatives ( Δ and Δ-Δ). The choice of these features is motivated by
their proved performance in the state-of-the-art methods of SED [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ], in particular road trafic
surveillance [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Fuzzy membership function</title>
        <p>The membership of each input signal  to each event  is computed from on the corresponding
VAE’s output error  , , and its value is the interval between two membership components: a)
Pessimistic/Lower membership  , , minimum when the sample is an outlier w.r.t. class , i.e.
 , &gt;   , and b) Optimistic/Upper membership  , , maximum when the sample is classified
in class , i.e.  , &lt;   (cf. (3)).
 , ( , ) =
{︃ 1</p>
        <p>, if  , ≤  
−  
0 if  , &gt;</p>
        <p>⎧
 , ( , ) = ⎨ 2
⎩
1 if  , ≤</p>
        <p>, if   &lt;  , ≤ 2 
−  
0 if  , &gt; 2 
(3)</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Interval comparison</title>
        <p>
          For each class model , the reconstruction error  , is used to generate the interval membership
, = [ , ( , ),  , ( , )]. To make the final decision, intervals must be compared for each
 ∈ {1, 2}. Interval comparison is a particular case of fuzzy number comparison, broadly
investigated since several years [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], using several methods, including probabilistic [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] and
possiblistic [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] ones, among others.
        </p>
        <p>
          Interval comparison aims to rank real intervals. The heuristic approach developed in [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]
has the advantage of not relying on midpoints for interval comparison. This makes sense
particularly in the case of fuzzy numbers or confidence intervals.
        </p>
        <p>
          The degree of preference Π( &gt; ) of  = [1, 2] over  = [1, 2] is defined in [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] as:
We observe that Π( &gt; ) + Π( &gt; ) = 1. Moreover,
Π( &gt; ) = max(0, 2 − 1) − max(0, 1 − 2) .
        </p>
        <p>(2 − 1) + (2 − 1)
︂{ if  ≡  then
if 2 &lt; 1 then
Π( &gt; ) = Π( &gt; ) = 0.5,
Π( &gt; ) = 1.</p>
        <p>We employ this comparison to rank class memberships , ,  ∈ {1, }. The defuzzification
for the final decision simply consists in choosing the “least preferred” (minimum-error) one:</p>
        <p>Event() = arg =m1,i..n., {Π(, &gt; ,̸= )} ,</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Experiments and results</title>
      <sec id="sec-4-1">
        <title>4.1. Audio database</title>
        <p>
          Diferent audio trafic datasets are suggested in the literature, such as AXA database [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ], WASN
[
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] and MIVIA dataset [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. The latter has the advantage to be the only open-access database
for audio trafic surveillance. It contains nearly one hour of trafic sounds that were recorded in
a real road environment at 23 locations in the province of Salerno, Italy, either in city center,
highways or country roads. The database is segmented in 57 clips, of nearly one minute each,
that were annotated manually. The annotation file includes the event labels, e.g. accident, tire
skidding, horn blowing, etc., and the onset and ofset times. Some audio events are considered
as Anomalous, i.e. car crash, tire skidding and harsh braking, whereas all other events are
considered as Normal, such as the sound of cars and pedestrians, and the background noise.
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Parameter setting</title>
        <p>The main parameter adjustment concerns the setting of the thresholds   . Diferent values
were experimentally optimized. Thresholds were pondered using the complementary of the
proportion of each class as a weighting coeficient. Thus, the threshold   for each class
 = 1, . . . ,  of each VAE’s error was set as the baseline VAE’s threshold  0 pondered by the
weight  = 1 −  , where  is the proportion of samples of Class . Table 1 summarizes the
values.
(4)
(5)
(6)</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Experimental protocol</title>
        <p>
          The experimental work aims to detect audio events on roads. To do so, features were extracted
from the selected audio database, MIVIA DB [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ], then experiments were realized following the
steps described in Section 3.
        </p>
        <p>Regarding the first step, i.e. feature extraction, data augmentation was realized to cope
with the issue of rareness of Anomalous samples, so that more data is obtained through the
segmentation of the audio signals into short frames, with a duration of 250 ms, with a high
overlap rate, i.e. 75%. Nevertheless, it is worth noting that all training segments, whether
belonging to Normal or Anomalous, contain background street noise.</p>
        <p>Regarding neural networks training, the VAE network was constructed using convolutional
layers, using an input feature vector made of log-energy and MFCC features, along with their
ifrst and second derivatives ( Δ and Δ-Δ). 80% of the extracted data were utilized for training
and validation, whereas test was realized on the remaining 20%.</p>
      </sec>
      <sec id="sec-4-4">
        <title>4.4. Analysis of results</title>
        <p>The evaluation results are listed in Table 2. These results correspond correspond to a
state-ofthe-art method, i.e. OC-SVM (used for benchmarking), and to the proposed method (event-based
VAE with fuzzy membership). For the latter, the values of the event weights were { }=1,...,
were varied to find the tradeof between data distribution and the global performance. For
evaluation purposes, standard metrics were calculated, i.e. overall accuracy (), precision
( ), recall () and  1 scores, defined as in (7):
 =  ,  =  ,  1 =
 
2  ,
 + 
(7)
where  ,  and  ( ∈ {1, 2}) are the number of ground-truth, estimated and correctly
detected events for Normal and Anomalous class, respectively.</p>
        <p>The results mentioned in Table 2 show the eficiency of using an interval-valued fuzzy
membership function to improve anomaly detection. The main advantages of using such a
method can be summarized as follows:
• The proposed methods outperforms the state-of-the-art OC-SVM, in terms of overall
accuracy and balance between class-based metrics.
• Overall accuracy rates are enhanced, reaching 95% for the proposed method, vs. 84% for
OC-SVM. Also, the precision, recall and F1 score obtained are more balanced between
Normal and Anomalous classes, notwithstanding their disproportional distribution.
• The efect of using unbalanced weights is more evidenced, with higher accuracy when
 is higher for the Anomalous class.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Discussion and conclusion</title>
      <p>This paper presented a novel method of anomaly detection, based on interval-valued fuzzy
sets. A direct application in road trafic surveillance allows detecting hazardous events such as
car accidents using audio signals. The proposed method is based on combining two anomaly
detection tools, i.e. auto-regressive VAE’s and interval-valued fuzzy sets. Finally, a probabilistic
interval comparison method, denoted as degree of preference, is utilized for defuzzification, i.e.
detecting the corresponding class.</p>
      <p>The main results can be summarized as follows: a) Spectrogram-extracted features are the
most suitable to approach such a problem; b) unbalanced weights, where the least abundant class
receives the highest weight, contribute to enhance the results; and c) interval-valued fuzzy sets
seem more eficient than crisp one-class SVM to detect anomaly. As an outlook, the proposed
method could be further improved in two directions: either by making it semi-supervised, as
only normal data can be collected and trained, or fully unsupervised, by not using labels any
more.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>This work was carried out in the framework of the project Xpert funded by the University of
Genova.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Sodemann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. P.</given-names>
            <surname>Ross</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. J.</given-names>
            <surname>Borghetti</surname>
          </string-name>
          ,
          <article-title>A review of anomaly detection in automated surveillance</article-title>
          ,
          <source>IEEE Transactions on Systems, Man, and Cybernetics</source>
          , Part C
          <volume>42</volume>
          (
          <year>2012</year>
          )
          <fpage>1257</fpage>
          -
          <lpage>1272</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Mendel</surname>
          </string-name>
          ,
          <string-name>
            <surname>R. I. B. John,</surname>
          </string-name>
          <article-title>Type-2 fuzzy sets made simple</article-title>
          ,
          <source>IEEE Transactions on Fuzzy Systems</source>
          <volume>10</volume>
          (
          <year>2002</year>
          )
          <fpage>117</fpage>
          -
          <lpage>127</lpage>
          . doi:
          <volume>10</volume>
          .1109/91.995115.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>P.</given-names>
            <surname>Sevastianov</surname>
          </string-name>
          ,
          <article-title>Numerical methods for interval and fuzzy number comparison based on the probabilistic approach and dempster-shafer theory</article-title>
          ,
          <source>Information Sciences 177</source>
          (
          <year>2007</year>
          )
          <fpage>4645</fpage>
          -
          <lpage>4661</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ntalampiras</surname>
          </string-name>
          , I. Potamitis,
          <string-name>
            <given-names>N.</given-names>
            <surname>Fakotakis</surname>
          </string-name>
          ,
          <article-title>Probabilistic novelty detection for acoustic surveillance under real-world conditions</article-title>
          ,
          <source>IEEE Transactions on Multimedia</source>
          <volume>13</volume>
          (
          <year>2011</year>
          )
          <fpage>713</fpage>
          -
          <lpage>719</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>T.</given-names>
            <surname>Heittola</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mesaros</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Eronen</surname>
          </string-name>
          , T. Virtanen,
          <article-title>Context-dependent sound event detection</article-title>
          ,
          <source>EURASIP Journal on Audio, Speech, and Music Processing</source>
          <year>2013</year>
          (
          <year>2013</year>
          )
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>P.</given-names>
            <surname>Foggia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Petkov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Saggese</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Strisciuglio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Vento</surname>
          </string-name>
          ,
          <article-title>Audio surveillance of roads: A system for detecting anomalous sounds</article-title>
          ,
          <source>IEEE transactions on Intelligent Transportation Systems</source>
          <volume>17</volume>
          (
          <year>2015</year>
          )
          <fpage>279</fpage>
          -
          <lpage>288</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Rovetta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Mnasri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Masulli</surname>
          </string-name>
          ,
          <article-title>Detection of hazardous road events from audio streams: An ensemble outlier detection approach</article-title>
          ,
          <source>in: 2020 IEEE Conference on Evolving and Adaptive Intelligent Systems (EAIS)</source>
          , IEEE,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Q.</given-names>
            <surname>WEI</surname>
          </string-name>
          ,
          <string-name>
            <surname>Y. LIU</surname>
          </string-name>
          ,
          <article-title>Auto-encoder and metric-learning for anomalous sound detection task (</article-title>
          <year>2020</year>
          ). URL: http://dcase.community/challenge2020/index, preprint: http://dcase. community/documents/challenge2020/technical_reports/DCASE2020_Wei_
          <volume>49</volume>
          _t2.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>H.</given-names>
            <surname>Purohit</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Tanabe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Endo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Suefusa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Nikaido</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kawaguchi</surname>
          </string-name>
          ,
          <article-title>Deep autoencoding gmm-based unsupervised anomaly detection in acoustic signals and its hyper-parameter optimization</article-title>
          ,
          <source>in: Proceedings of the Detection and Classification of Acoustic Scenes and Events 2020 Workshop (DCASE2020)</source>
          , Tokyo, Japan,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>D. P.</given-names>
            <surname>Kingma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Welling</surname>
          </string-name>
          ,
          <article-title>Auto-encoding variational bayes</article-title>
          ,
          <source>Stat</source>
          <volume>1050</volume>
          (
          <year>2014</year>
          )
          <article-title>1</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Y.-M. Wang</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.-B. Yang</surname>
            ,
            <given-names>D.-L.</given-names>
          </string-name>
          <string-name>
            <surname>Xu</surname>
          </string-name>
          ,
          <article-title>A preference aggregation method through the estimation of utility intervals</article-title>
          ,
          <source>Computers &amp; Operations Research</source>
          <volume>32</volume>
          (
          <year>2005</year>
          )
          <fpage>2027</fpage>
          -
          <lpage>2049</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>E.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.-J.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <article-title>Comparison of fuzzy numbers based on the probability measure of fuzzy events</article-title>
          ,
          <source>Computers &amp; Mathematics with Applications</source>
          <volume>15</volume>
          (
          <year>1988</year>
          )
          <fpage>887</fpage>
          -
          <lpage>896</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>V.-N.</given-names>
            <surname>Huynh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Nakamori</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lawry</surname>
          </string-name>
          ,
          <article-title>A probability-based approach to comparison of fuzzy numbers and applications to target-oriented decision making</article-title>
          ,
          <source>IEEE Transactions on Fuzzy Systems</source>
          <volume>16</volume>
          (
          <year>2008</year>
          )
          <fpage>371</fpage>
          -
          <lpage>387</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kasperski</surname>
          </string-name>
          ,
          <article-title>A possibilistic approach to sequencing problems with fuzzy parameters</article-title>
          ,
          <source>Fuzzy Sets and Systems</source>
          <volume>150</volume>
          (
          <year>2005</year>
          )
          <fpage>77</fpage>
          -
          <lpage>86</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>M.</given-names>
            <surname>Sammarco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Detyniecki</surname>
          </string-name>
          , Crashzam:
          <article-title>Sound-based car crash detection</article-title>
          .,
          <source>in: Proceedings of Vehicle Technology and Intelligent Transport Systems (VEHITS)</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>27</fpage>
          -
          <lpage>35</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>R. M.</given-names>
            <surname>Alsina-Pagès</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Orga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Alías</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. C.</given-names>
            <surname>Socoró</surname>
          </string-name>
          ,
          <article-title>A wasn-based suburban dataset for anomalous noise event detection on dynamic road-trafic noise mapping</article-title>
          ,
          <source>Sensors</source>
          <volume>19</volume>
          (
          <year>2019</year>
          )
          <fpage>2480</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>