Pub Date : 2024-09-13DOI: 10.1007/s40747-024-01552-7
Meiqin Wu, Sining Ma, Jianping Fan
Multi-attribute group decision-making is an important research field in decision science, and its theories and methods have been widely applied to engineering, economics and management. However, as the information embedded volume and complexity of decision-making expand, the diversity and heterogeneity of decision-making groups present significant challenges to the decision-making process. In order to effectively address these challenges, this paper defines the concept of spherical Z-number, which is a fuzzy number that takes into account a wide range of evaluation and its reliability. Additionally, a group decision-making model in a spherical Z-number environment is proposed. First, an objective phased tracking method is used to determine expert weights, maintain the consistency in decision-making group evaluations. The gained and lost dominance score method is combined with prospect theory to integrate expert psychological behavior when facing risks. The proposed method considers both group utility and individual regret, and balances the gains and losses of various options in the decision-making process. Finally, in response to the 3R principle, the model is employed to address the shared e-bike recycling supplier selection problem and to assess the viability of the decision-making outcomes. The results demonstrate that the model is robust in the context of varying parameter configurations. Moreover, the correlation coefficients between its ranking outcomes and those of alternative methodologies are all above 0.77, and its average superiority degree is 1.121, which is considerably higher than that of other methods. Consequently, the model's effectiveness and superiority are substantiated.
多属性群体决策是决策科学的一个重要研究领域,其理论和方法已被广泛应用于工程、经济和管理领域。然而,随着决策所蕴含的信息量和复杂性的不断扩大,决策群体的多样性和异质性给决策过程带来了巨大的挑战。为了有效应对这些挑战,本文定义了球形 Z 数的概念,它是一种考虑到广泛评价及其可靠性的模糊数。此外,本文还提出了球形 Z 数环境下的群体决策模型。首先,采用客观分阶段跟踪法确定专家权重,保持决策小组评价的一致性。得失优势得分法与前景理论相结合,整合了专家面对风险时的心理行为。所提出的方法既考虑了群体效用,又考虑了个体遗憾,平衡了决策过程中各种方案的得失。最后,根据 3R 原则,该模型被用于解决共享电动自行车回收供应商选择问题,并评估决策结果的可行性。结果表明,该模型在不同参数配置的情况下是稳健的。此外,其排序结果与其他方法之间的相关系数均在 0.77 以上,平均优越度为 1.121,大大高于其他方法。因此,该模型的有效性和优越性得到了证实。
{"title":"A spherical Z-number multi-attribute group decision making model based on the prospect theory and GLDS method","authors":"Meiqin Wu, Sining Ma, Jianping Fan","doi":"10.1007/s40747-024-01552-7","DOIUrl":"https://doi.org/10.1007/s40747-024-01552-7","url":null,"abstract":"<p>Multi-attribute group decision-making is an important research field in decision science, and its theories and methods have been widely applied to engineering, economics and management. However, as the information embedded volume and complexity of decision-making expand, the diversity and heterogeneity of decision-making groups present significant challenges to the decision-making process. In order to effectively address these challenges, this paper defines the concept of spherical Z-number, which is a fuzzy number that takes into account a wide range of evaluation and its reliability. Additionally, a group decision-making model in a spherical Z-number environment is proposed. First, an objective phased tracking method is used to determine expert weights, maintain the consistency in decision-making group evaluations. The gained and lost dominance score method is combined with prospect theory to integrate expert psychological behavior when facing risks. The proposed method considers both group utility and individual regret, and balances the gains and losses of various options in the decision-making process. Finally, in response to the 3R principle, the model is employed to address the shared e-bike recycling supplier selection problem and to assess the viability of the decision-making outcomes. The results demonstrate that the model is robust in the context of varying parameter configurations. Moreover, the correlation coefficients between its ranking outcomes and those of alternative methodologies are all above 0.77, and its average superiority degree is 1.121, which is considerably higher than that of other methods. Consequently, the model's effectiveness and superiority are substantiated.</p>","PeriodicalId":10524,"journal":{"name":"Complex & Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142174680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-09DOI: 10.1007/s40747-024-01585-y
Yanzhe Wang, Qian Yang, Weiwei Qu
In Automated Fiber Placement (AFP), the substantial structure of the placement robot, the variable mold shapes, and the limited free space pose significant challenges for planning collision-free robot transitions. The task involves planning a collision-free path within the robot's high-dimensional configuration space. Informed RRT* is a common approach for such problems but often struggles with efficiency and path quality in environments with large informed sampling spaces influenced by obstacles. To address these issues, this paper proposes an improved Informed RRT* algorithm with a Local Knowledge Acceleration sampling strategy (LKA-Informed RRT*), aimed at enhancing planning efficiency and adaptability in complex obstacle settings. An Adaptive Sampling Control (ASC) rate is introduced, measuring the algorithm’s convergence speed, guides the algorithm to switch between informed and local sampling adaptively. The proposed local sampling method uses failure nodes from the exploration process to estimate obstacle distributions, steering sampling toward regions that expedite path convergence. Experimental results show that LKA-Informed RRT* significantly outperforms state-of-the-art algorithms in convergence efficiency and path cost. Compared to the original Informed RRT*, the proposed method reduces planning time by about 60%, substantially boosting efficiency for collision-free transitions in complex environments.
{"title":"A collision-free transition path planning method for placement robots in complex environments","authors":"Yanzhe Wang, Qian Yang, Weiwei Qu","doi":"10.1007/s40747-024-01585-y","DOIUrl":"https://doi.org/10.1007/s40747-024-01585-y","url":null,"abstract":"<p>In Automated Fiber Placement (AFP), the substantial structure of the placement robot, the variable mold shapes, and the limited free space pose significant challenges for planning collision-free robot transitions. The task involves planning a collision-free path within the robot's high-dimensional configuration space. Informed RRT* is a common approach for such problems but often struggles with efficiency and path quality in environments with large informed sampling spaces influenced by obstacles. To address these issues, this paper proposes an improved Informed RRT* algorithm with a Local Knowledge Acceleration sampling strategy (LKA-Informed RRT*), aimed at enhancing planning efficiency and adaptability in complex obstacle settings. An Adaptive Sampling Control (ASC) rate is introduced, measuring the algorithm’s convergence speed, guides the algorithm to switch between informed and local sampling adaptively. The proposed local sampling method uses failure nodes from the exploration process to estimate obstacle distributions, steering sampling toward regions that expedite path convergence. Experimental results show that LKA-Informed RRT* significantly outperforms state-of-the-art algorithms in convergence efficiency and path cost. Compared to the original Informed RRT*, the proposed method reduces planning time by about 60%, substantially boosting efficiency for collision-free transitions in complex environments.</p>","PeriodicalId":10524,"journal":{"name":"Complex & Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142158781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network traffic intrusion detection technology plays an important role in host and platform security. At present, machine learning and deep learning methods are often used for network traffic intrusion detection. However, the imbalance of relevant data sets will cause the model algorithm to learn the features of the majority categories and ignore the features of the minority categories, which will seriously affect the precision of network intrusion detection models. The number of samples of the attacks is much less than the number of normal samples. The classification performance on unbalanced data sets is poor and can not identify the minority attack samples well. To solve these problems, this paper proposed the resampling mechanism, which used random undersampling for the majority categories samples and K-Smote oversampling for the minority categories samples, so as to generate a more balanced data set and improve the model's detection rate for the minority categories. This paper proposed the Self-Attention with Gate (SAG) and BiGRU network model for intrusion detection on the CICIDS2017 data set, which can fully extract high-dimensional information from data samples and improve the detection rate of network attacks. The Self-Attention with Gate mechanism (SAG) based on the Transformer performed the feature extraction, filtered the irrelevant noise information, then extracted the long-distance dependency temporal sequence features by the BiGRU network, and obtained the classification results through the SoftMax classifier. Compared to the experimental results of other algorithms, such as Random Forest (RF) and BiGRU, it can be found that the overall classification precision for the SAG-BiGRU model in this paper is much higher and also has a good effect on the NSL-KDD data set.
{"title":"SAGB: self-attention with gate and BiGRU network for intrusion detection","authors":"Zhanhui Hu, Guangzhong Liu, Yanping Li, Siqing Zhuang","doi":"10.1007/s40747-024-01577-y","DOIUrl":"https://doi.org/10.1007/s40747-024-01577-y","url":null,"abstract":"<p>Network traffic intrusion detection technology plays an important role in host and platform security. At present, machine learning and deep learning methods are often used for network traffic intrusion detection. However, the imbalance of relevant data sets will cause the model algorithm to learn the features of the majority categories and ignore the features of the minority categories, which will seriously affect the precision of network intrusion detection models. The number of samples of the attacks is much less than the number of normal samples. The classification performance on unbalanced data sets is poor and can not identify the minority attack samples well. To solve these problems, this paper proposed the resampling mechanism, which used random undersampling for the majority categories samples and K-Smote oversampling for the minority categories samples, so as to generate a more balanced data set and improve the model's detection rate for the minority categories. This paper proposed the Self-Attention with Gate (SAG) and BiGRU network model for intrusion detection on the CICIDS2017 data set, which can fully extract high-dimensional information from data samples and improve the detection rate of network attacks. The Self-Attention with Gate mechanism (SAG) based on the Transformer performed the feature extraction, filtered the irrelevant noise information, then extracted the long-distance dependency temporal sequence features by the BiGRU network, and obtained the classification results through the SoftMax classifier. Compared to the experimental results of other algorithms, such as Random Forest (RF) and BiGRU, it can be found that the overall classification precision for the SAG-BiGRU model in this paper is much higher and also has a good effect on the NSL-KDD data set.</p>","PeriodicalId":10524,"journal":{"name":"Complex & Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142158782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-09DOI: 10.1007/s40747-024-01568-z
Sajid Khan, Hao Peng, Zhaoquan Gu, Sardar Usman, Namra Mukhtar
This paper proposes a robust image encryption algorithm that utilizes a Novel three-dimensional (3D) Chaotic map and an Enhanced Logistic Sine System (ELSS). We leverage the unpredictability of 3D chaotic dynamics alongside the complexity of ELSS and DNA Sequence to forge a formidable image encryption scheme. Firstly, the image pixels are converted from decimal to hexadecimal notation and sorted in a 1D pixel array carrying a unique sequence of three channels of the RGB image. Secondly, the secret key is appended to XOR, the values with that 1-D pixels array. Thirdly, values are sorted by performing the binary right shift operation and encoded into DNA. Fourthly, a novel chaotic map is used to perform scrambling operations. Lastly, a novel enormous keyspace ELSS is used to perform efficient Border and Cross-Border (B &CB) pixel exchange, further enhancing the encryption quality of the proposed algorithm. Comprehensive security analysis proved that the proposed algorithm exhibits remarkable resilience against powerful known and chosen plaintext attacks and other prevalent cryptanalysis attacks, including differential attacks and exhaustive key search attacks. Henceforth, the proposed algorithm’s superior security and low computational cost make it an ideal choice for real-time secure image communication across various platforms, including satellite, multimedia, and military communications.
本文提出了一种利用新型三维(3D)混沌图和增强逻辑正弦系统(ELSS)的稳健图像加密算法。我们利用三维混沌动力学的不可预测性以及增强对数正弦系统和 DNA 序列的复杂性来构建一个强大的图像加密方案。首先,将图像像素从十进制转换为十六进制,并在一维像素阵列中进行排序,其中包含 RGB 图像三个通道的唯一序列。其次,将秘钥与该一维像素阵列中的值进行 XOR。第三,通过二进制右移操作对数值进行排序,并将其编码到 DNA 中。第四,使用新颖的混沌图进行加扰操作。最后,新颖的巨大密钥空间 ELSS 被用来执行高效的边界和跨境(B &CB )像素交换,进一步提高了拟议算法的加密质量。全面的安全性分析证明,所提出的算法对强大的已知和选择明文攻击以及其他流行的密码分析攻击(包括差分攻击和穷举密钥搜索攻击)具有显著的抵御能力。因此,该算法具有卓越的安全性和较低的计算成本,是卫星、多媒体和军事通信等各种平台实时安全图像通信的理想选择。
{"title":"Integration of a novel 3D chaotic map with ELSS and novel cross-border pixel exchange strategy for secure image communication","authors":"Sajid Khan, Hao Peng, Zhaoquan Gu, Sardar Usman, Namra Mukhtar","doi":"10.1007/s40747-024-01568-z","DOIUrl":"https://doi.org/10.1007/s40747-024-01568-z","url":null,"abstract":"<p>This paper proposes a robust image encryption algorithm that utilizes a Novel three-dimensional (3D) Chaotic map and an Enhanced Logistic Sine System <b>(ELSS)</b>. We leverage the unpredictability of 3D chaotic dynamics alongside the complexity of ELSS and DNA Sequence to forge a formidable image encryption scheme. Firstly, the image pixels are converted from decimal to hexadecimal notation and sorted in a 1D pixel array carrying a unique sequence of three channels of the RGB image. Secondly, the secret key is appended to XOR, the values with that 1-D pixels array. Thirdly, values are sorted by performing the binary right shift operation and encoded into DNA. Fourthly, a novel chaotic map is used to perform scrambling operations. Lastly, a novel enormous keyspace <b>ELSS</b> is used to perform efficient Border and Cross-Border (<b>B</b> &<b>CB</b>) pixel exchange, further enhancing the encryption quality of the proposed algorithm. Comprehensive security analysis proved that the proposed algorithm exhibits remarkable resilience against powerful known and chosen plaintext attacks and other prevalent cryptanalysis attacks, including differential attacks and exhaustive key search attacks. Henceforth, the proposed algorithm’s superior security and low computational cost make it an ideal choice for real-time secure image communication across various platforms, including satellite, multimedia, and military communications.</p>","PeriodicalId":10524,"journal":{"name":"Complex & Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142158780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-06DOI: 10.1007/s40747-024-01586-x
Jawad Ali, Waqas Ali, Haifa Alqahtani, Muhammad I. Syam
The linguistic q-rung orthopair fuzzy ((L^{q}ROF)) set serves as a useful way of presenting uncertain information by offering more space for decision experts. In the present research, we first link the concepts of Hamacher t-norm and t-conorm with the frame of (L^{q}ROF) numbers to develop and analyze the innovative (L^{q}ROF) Hamacher operations. Then, following the proposed Hamacher’s norm operations, a series of aggregation operators including (L^{q}ROF) weighted averaging, (L^{q}ROF) ordered weighted averaging, (L^{q}ROF) hybrid averaging, (L^{q}ROF) weighted geometric, (L^{q}ROF) ordered weighted geometric, (L^{q}ROF) hybrid geometric operators are investigated. Some interesting aspects of these AOs are also presented. We further develop evaluation based on distance from average solution (EDAS) approach in light of the newly outlined concepts to cope with (L^{q}ROF) decision-making problems where the weight information of criteria is fully unknown, ultimately, the practicality of the framed approach is demonstrated through an empirical case, and a detailed analysis is carried out to showcase the methodology dominance.
{"title":"Enhanced EDAS methodology for multiple-criteria group decision analysis utilizing linguistic q-rung orthopair fuzzy hamacher aggregation operators","authors":"Jawad Ali, Waqas Ali, Haifa Alqahtani, Muhammad I. Syam","doi":"10.1007/s40747-024-01586-x","DOIUrl":"https://doi.org/10.1007/s40747-024-01586-x","url":null,"abstract":"<p>The linguistic q-rung orthopair fuzzy (<span>(L^{q}ROF)</span>) set serves as a useful way of presenting uncertain information by offering more space for decision experts. In the present research, we first link the concepts of Hamacher t-norm and t-conorm with the frame of <span>(L^{q}ROF)</span> numbers to develop and analyze the innovative <span>(L^{q}ROF)</span> Hamacher operations. Then, following the proposed Hamacher’s norm operations, a series of aggregation operators including <span>(L^{q}ROF)</span> weighted averaging, <span>(L^{q}ROF)</span> ordered weighted averaging, <span>(L^{q}ROF)</span> hybrid averaging, <span>(L^{q}ROF)</span> weighted geometric, <span>(L^{q}ROF)</span> ordered weighted geometric, <span>(L^{q}ROF)</span> hybrid geometric operators are investigated. Some interesting aspects of these AOs are also presented. We further develop evaluation based on distance from average solution (EDAS) approach in light of the newly outlined concepts to cope with <span>(L^{q}ROF)</span> decision-making problems where the weight information of criteria is fully unknown, ultimately, the practicality of the framed approach is demonstrated through an empirical case, and a detailed analysis is carried out to showcase the methodology dominance.</p>","PeriodicalId":10524,"journal":{"name":"Complex & Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142142450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-28DOI: 10.1007/s40747-024-01604-y
Jianxin Tang, Shihui Song, Qian Du, Yabing Yao, Jitao Qu
The influence maximization problem that has drawn a great deal of attention from researchers aims to identify a subset of influential spreaders that can maximize the expected influence spread in social networks. Existing works on the problem primarily concentrate on developing non-adaptive policies, where all seeds will be ignited at the very beginning of the diffusion after the identification. However, in non-adaptive policies, budget redundancy could occur as a result of some seeds being naturally infected by other active seeds during the diffusion process. In this paper, the adaptive seeding policies are investigated for the intractable adaptive influence maximization problem. Based on deep learning model, a novel approach named graph convolutional networks with self-attention mechanism (ATGCN) is proposed to address the adaptive influence maximization as a regression task. A controlling parameter is introduced for the adaptive seeding model to make a tradeoff between the spreading delay and influence coverage. The proposed approach leverages the self-attention mechanism to dynamically assign importance weight to node representations efficiently to capture the node influence feature information relevant to the adaptive influence maximization problem. Finally, intensive experimental findings on six real-world social networks demonstrate the superiorities of the adaptive seeding policy over the state-of-the-art baseline methods to the conventional influence maximization problem. Meanwhile, the proposed adaptive seeding policy ATGCN improves the influence spread rate by up to 7% in comparison to the existing state-of-the-art greedy-based adaptive seeding policy.
{"title":"Graph convolutional networks with the self-attention mechanism for adaptive influence maximization in social networks","authors":"Jianxin Tang, Shihui Song, Qian Du, Yabing Yao, Jitao Qu","doi":"10.1007/s40747-024-01604-y","DOIUrl":"https://doi.org/10.1007/s40747-024-01604-y","url":null,"abstract":"<p>The influence maximization problem that has drawn a great deal of attention from researchers aims to identify a subset of influential spreaders that can maximize the expected influence spread in social networks. Existing works on the problem primarily concentrate on developing non-adaptive policies, where all seeds will be ignited at the very beginning of the diffusion after the identification. However, in non-adaptive policies, budget redundancy could occur as a result of some seeds being naturally infected by other active seeds during the diffusion process. In this paper, the adaptive seeding policies are investigated for the intractable adaptive influence maximization problem. Based on deep learning model, a novel approach named graph convolutional networks with self-attention mechanism (ATGCN) is proposed to address the adaptive influence maximization as a regression task. A controlling parameter is introduced for the adaptive seeding model to make a tradeoff between the spreading delay and influence coverage. The proposed approach leverages the self-attention mechanism to dynamically assign importance weight to node representations efficiently to capture the node influence feature information relevant to the adaptive influence maximization problem. Finally, intensive experimental findings on six real-world social networks demonstrate the superiorities of the adaptive seeding policy over the state-of-the-art baseline methods to the conventional influence maximization problem. Meanwhile, the proposed adaptive seeding policy ATGCN improves the influence spread rate by up to 7% in comparison to the existing state-of-the-art greedy-based adaptive seeding policy.</p>","PeriodicalId":10524,"journal":{"name":"Complex & Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142085525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-28DOI: 10.1007/s40747-024-01603-z
Reham A. Elsheikh, M. A. Mohamed, Ahmed Mohamed Abou-Taleb, Mohamed Maher Ata
In this paper, based on facial landmark approaches, the possible vulnerability of ensemble algorithms to the FGSM attack has been assessed using three commonly used models: convolutional neural network-based antialiasing (A_CNN), Xc_Deep2-based DeepLab v2, and SqueezeNet (Squ_Net)-based Fire modules. Firstly, the three individual deep learning classifier-based Facial Emotion Recognition (FER) classifications have been developed; the predictions from all three classifiers are then merged using majority voting to develop the HEM_Net-based ensemble model. Following that, an in-depth investigation of their performance in the case of attack-free has been carried out in terms of the Jaccard coefficient, accuracy, precision, recall, F1 score, and specificity. When applied to three benchmark datasets, the ensemble-based method (HEM_Net) significantly outperforms in terms of precision and reliability while also decreasing the dimensionality of the input data, with an accuracy of 99.3%, 87%, and 99% for the Extended Cohn-Kanade (CK+), Real-world Affective Face (RafD), and Japanese female facial expressions (Jaffee) data, respectively. Further, a comprehensive analysis of the drop in performance of every model affected by the FGSM attack is carried out over a range of epsilon values (the perturbation parameter). The results from the experiments show that the advised HEM_Net model accuracy declined drastically by 59.72% for CK + data, 42.53% for RafD images, and 48.49% for the Jaffee dataset when the perturbation increased from A to E (attack levels). This demonstrated that a successful Fast Gradient Sign Method (FGSM) can significantly reduce the prediction performance of all individual classifiers with an increase in attack levels. However, due to the majority voting, the proposed HEM_Net model could improve its robustness against FGSM attacks, indicating that the ensemble can lessen deception by FGSM adversarial instances. This generally holds even as the perturbation level of the FGSM attack increases.
{"title":"Accuracy is not enough: a heterogeneous ensemble model versus FGSM attack","authors":"Reham A. Elsheikh, M. A. Mohamed, Ahmed Mohamed Abou-Taleb, Mohamed Maher Ata","doi":"10.1007/s40747-024-01603-z","DOIUrl":"https://doi.org/10.1007/s40747-024-01603-z","url":null,"abstract":"<p>In this paper, based on facial landmark approaches, the possible vulnerability of ensemble algorithms to the FGSM attack has been assessed using three commonly used models: convolutional neural network-based antialiasing (A_CNN), Xc_Deep2-based DeepLab v2, and SqueezeNet (Squ_Net)-based Fire modules. Firstly, the three individual deep learning classifier-based Facial Emotion Recognition (FER) classifications have been developed; the predictions from all three classifiers are then merged using majority voting to develop the HEM_Net-based ensemble model. Following that, an in-depth investigation of their performance in the case of attack-free has been carried out in terms of the Jaccard coefficient, accuracy, precision, recall, F1 score, and specificity. When applied to three benchmark datasets, the ensemble-based method (HEM_Net) significantly outperforms in terms of precision and reliability while also decreasing the dimensionality of the input data, with an accuracy of 99.3%, 87%, and 99% for the Extended Cohn-Kanade (CK+), Real-world Affective Face (RafD), and Japanese female facial expressions (Jaffee) data, respectively. Further, a comprehensive analysis of the drop in performance of every model affected by the FGSM attack is carried out over a range of epsilon values (the perturbation parameter). The results from the experiments show that the advised HEM_Net model accuracy declined drastically by 59.72% for CK + data, 42.53% for RafD images, and 48.49% for the Jaffee dataset when the perturbation increased from A to E (attack levels). This demonstrated that a successful Fast Gradient Sign Method (FGSM) can significantly reduce the prediction performance of all individual classifiers with an increase in attack levels. However, due to the majority voting, the proposed HEM_Net model could improve its robustness against FGSM attacks, indicating that the ensemble can lessen deception by FGSM adversarial instances. This generally holds even as the perturbation level of the FGSM attack increases.</p>","PeriodicalId":10524,"journal":{"name":"Complex & Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142085549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-28DOI: 10.1007/s40747-024-01550-9
Zhenguo Zhang, Tianhao Ma, Yadan Zhao, Shuai Yu, Fan Zhou
In this paper, a multi-fault tolerant controller considering actuator saturation is proposed. Based on the adaptive dynamic programming(ADP) algorithm, the fault tolerant control of the reconfigurable manipulator with sensor and actuator faults are carried out. Firstly, combined with the state space expression, the nonlinear transformation of sensor fault is performed by adopting the differential homeomorphism principle. An improved cost function is constructed based on the fault estimation function obtained by the fault observer, and combined with hyperbolic tangent function to deal with input constraint problem. Then, an evaluation neural network (NN) is established and the Hamilton–Jacobi–Bellman (HJB) equation is solved by online strategy iterative algorithm. Furthermore, based on Lyapunov theorem, the stability of reconfigurable manipulator systems with multi-fault are proved. Lastly, the simulation studies are used to certify the effectiveness of the presented fault tolerant control (FTC) scheme.
{"title":"Adaptive dynamic programming-based multi-fault tolerant control of reconfigurable manipulator with input constraint","authors":"Zhenguo Zhang, Tianhao Ma, Yadan Zhao, Shuai Yu, Fan Zhou","doi":"10.1007/s40747-024-01550-9","DOIUrl":"https://doi.org/10.1007/s40747-024-01550-9","url":null,"abstract":"<p>In this paper, a multi-fault tolerant controller considering actuator saturation is proposed. Based on the adaptive dynamic programming(ADP) algorithm, the fault tolerant control of the reconfigurable manipulator with sensor and actuator faults are carried out. Firstly, combined with the state space expression, the nonlinear transformation of sensor fault is performed by adopting the differential homeomorphism principle. An improved cost function is constructed based on the fault estimation function obtained by the fault observer, and combined with hyperbolic tangent function to deal with input constraint problem. Then, an evaluation neural network (NN) is established and the Hamilton–Jacobi–Bellman (HJB) equation is solved by online strategy iterative algorithm. Furthermore, based on Lyapunov theorem, the stability of reconfigurable manipulator systems with multi-fault are proved. Lastly, the simulation studies are used to certify the effectiveness of the presented fault tolerant control (FTC) scheme.</p>","PeriodicalId":10524,"journal":{"name":"Complex & Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142085580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-21DOI: 10.1007/s40747-024-01587-w
Yingnan Han, Tianyang Li, Qingzhu Wang
This paper addresses the challenge of large-scale electric vehicle (EV) charging scheduling during peak demand periods, such as holidays or rush hours. The growing EV industry has highlighted the shortcomings of current scheduling plans, which struggle to manage surge large-scale charging demands effectively, thus posing challenges to the EV charging management system. Deep reinforcement learning, known for its effectiveness in solving complex decision-making problems, holds promise for addressing this issue. To this end, we formulate the problem as a Markov decision process (MDP). We propose a deep Q-learning (DQN) based algorithm to improve EV charging service quality as well as minimizing average queueing times for EVs and average idling times for charging devices (CDs). In our proposed methodology, we design two types of states to encompass global scheduling information, and two types of rewards to reflect scheduling performance. Based on this designing, we developed three modules: a fine-grained feature extraction module for effectively extracting state features, an improved noise-based exploration module for thorough exploration of the solution space, and a dueling block for enhancing Q value evaluation. To assess the effectiveness of our proposal, we conduct three case studies within a complex urban scenario featuring 34 charging stations and 899 scheduled EVs. The results of these experiments demonstrate the advantages of our proposal, showcasing its superiority in effectively locating superior solutions compared to current methods in the literature, as well as its efficiency in generating feasible charging scheduling plans for large-scale EVs. The code and data are available by accessing the hyperlink: https://github.com/paperscodeyouneed/A-Noisy-Dueling-Architecture-for-Large-Scale-EV-ChargingScheduling/tree/main/EV%20Charging%20Scheduling.
{"title":"A DQN based approach for large-scale EVs charging scheduling","authors":"Yingnan Han, Tianyang Li, Qingzhu Wang","doi":"10.1007/s40747-024-01587-w","DOIUrl":"https://doi.org/10.1007/s40747-024-01587-w","url":null,"abstract":"<p>This paper addresses the challenge of large-scale electric vehicle (EV) charging scheduling during peak demand periods, such as holidays or rush hours. The growing EV industry has highlighted the shortcomings of current scheduling plans, which struggle to manage surge large-scale charging demands effectively, thus posing challenges to the EV charging management system. Deep reinforcement learning, known for its effectiveness in solving complex decision-making problems, holds promise for addressing this issue. To this end, we formulate the problem as a Markov decision process (MDP). We propose a deep Q-learning (DQN) based algorithm to improve EV charging service quality as well as minimizing average queueing times for EVs and average idling times for charging devices (CDs). In our proposed methodology, we design two types of states to encompass global scheduling information, and two types of rewards to reflect scheduling performance. Based on this designing, we developed three modules: a fine-grained feature extraction module for effectively extracting state features, an improved noise-based exploration module for thorough exploration of the solution space, and a dueling block for enhancing Q value evaluation. To assess the effectiveness of our proposal, we conduct three case studies within a complex urban scenario featuring 34 charging stations and 899 scheduled EVs. The results of these experiments demonstrate the advantages of our proposal, showcasing its superiority in effectively locating superior solutions compared to current methods in the literature, as well as its efficiency in generating feasible charging scheduling plans for large-scale EVs. The code and data are available by accessing the hyperlink: https://github.com/paperscodeyouneed/A-Noisy-Dueling-Architecture-for-Large-Scale-EV-ChargingScheduling/tree/main/EV%20Charging%20Scheduling.</p>","PeriodicalId":10524,"journal":{"name":"Complex & Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142013744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-19DOI: 10.1007/s40747-024-01599-6
Fernando Martínez-Plumed, Gonzalo Jaimovitch-López, Cèsar Ferri, María José Ramírez-Quintana, José Hernández-Orallo
Language models and other recent machine learning paradigms blur the distinction between generative and discriminative tasks, in a continuum that is regulated by the degree of pre- and post-supervision that is required from users, as well as the tolerated level of error. In few-shot inference, we need to find a trade-off between the number and cost of the solved examples that have to be supplied, those that have to be inspected (some of them accurate but others needing correction) and those that are wrong but pass undetected. In this paper, we define a new Supply-Inspect Cost Framework, associated graphical representations and comprehensive metrics that consider all these elements. To optimise few-shot inference under specific operating conditions, we introduce novel algorithms that go beyond the concept of rejection rules in both static and dynamic contexts. We illustrate the effectiveness of all these elements for a transformative domain, data wrangling, for which language models can have a huge impact if we are able to properly regulate the reliability-usability trade-off, as we do in this paper.
{"title":"A general supply-inspect cost framework to regulate the reliability-usability trade-offs for few-shot inference","authors":"Fernando Martínez-Plumed, Gonzalo Jaimovitch-López, Cèsar Ferri, María José Ramírez-Quintana, José Hernández-Orallo","doi":"10.1007/s40747-024-01599-6","DOIUrl":"https://doi.org/10.1007/s40747-024-01599-6","url":null,"abstract":"<p>Language models and other recent machine learning paradigms blur the distinction between generative and discriminative tasks, in a continuum that is regulated by the degree of pre- and post-supervision that is required from users, as well as the tolerated level of error. In few-shot inference, we need to find a trade-off between the number and cost of the solved examples that have to be supplied, those that have to be inspected (some of them accurate but others needing correction) and those that are wrong but pass undetected. In this paper, we define a new Supply-Inspect Cost Framework, associated graphical representations and comprehensive metrics that consider all these elements. To optimise few-shot inference under specific operating conditions, we introduce novel algorithms that go beyond the concept of rejection rules in both static and dynamic contexts. We illustrate the effectiveness of all these elements for a transformative domain, data wrangling, for which language models can have a huge impact if we are able to properly regulate the reliability-usability trade-off, as we do in this paper.</p>","PeriodicalId":10524,"journal":{"name":"Complex & Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142002827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}