首页 > 最新文献

Complex & Intelligent Systems最新文献

英文 中文
A spherical Z-number multi-attribute group decision making model based on the prospect theory and GLDS method 基于前景理论和 GLDS 方法的球形 Z 数多属性群体决策模型
IF 5.8 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-09-13 DOI: 10.1007/s40747-024-01552-7
Meiqin Wu, Sining Ma, Jianping Fan

Multi-attribute group decision-making is an important research field in decision science, and its theories and methods have been widely applied to engineering, economics and management. However, as the information embedded volume and complexity of decision-making expand, the diversity and heterogeneity of decision-making groups present significant challenges to the decision-making process. In order to effectively address these challenges, this paper defines the concept of spherical Z-number, which is a fuzzy number that takes into account a wide range of evaluation and its reliability. Additionally, a group decision-making model in a spherical Z-number environment is proposed. First, an objective phased tracking method is used to determine expert weights, maintain the consistency in decision-making group evaluations. The gained and lost dominance score method is combined with prospect theory to integrate expert psychological behavior when facing risks. The proposed method considers both group utility and individual regret, and balances the gains and losses of various options in the decision-making process. Finally, in response to the 3R principle, the model is employed to address the shared e-bike recycling supplier selection problem and to assess the viability of the decision-making outcomes. The results demonstrate that the model is robust in the context of varying parameter configurations. Moreover, the correlation coefficients between its ranking outcomes and those of alternative methodologies are all above 0.77, and its average superiority degree is 1.121, which is considerably higher than that of other methods. Consequently, the model's effectiveness and superiority are substantiated.

多属性群体决策是决策科学的一个重要研究领域,其理论和方法已被广泛应用于工程、经济和管理领域。然而,随着决策所蕴含的信息量和复杂性的不断扩大,决策群体的多样性和异质性给决策过程带来了巨大的挑战。为了有效应对这些挑战,本文定义了球形 Z 数的概念,它是一种考虑到广泛评价及其可靠性的模糊数。此外,本文还提出了球形 Z 数环境下的群体决策模型。首先,采用客观分阶段跟踪法确定专家权重,保持决策小组评价的一致性。得失优势得分法与前景理论相结合,整合了专家面对风险时的心理行为。所提出的方法既考虑了群体效用,又考虑了个体遗憾,平衡了决策过程中各种方案的得失。最后,根据 3R 原则,该模型被用于解决共享电动自行车回收供应商选择问题,并评估决策结果的可行性。结果表明,该模型在不同参数配置的情况下是稳健的。此外,其排序结果与其他方法之间的相关系数均在 0.77 以上,平均优越度为 1.121,大大高于其他方法。因此,该模型的有效性和优越性得到了证实。
{"title":"A spherical Z-number multi-attribute group decision making model based on the prospect theory and GLDS method","authors":"Meiqin Wu, Sining Ma, Jianping Fan","doi":"10.1007/s40747-024-01552-7","DOIUrl":"https://doi.org/10.1007/s40747-024-01552-7","url":null,"abstract":"<p>Multi-attribute group decision-making is an important research field in decision science, and its theories and methods have been widely applied to engineering, economics and management. However, as the information embedded volume and complexity of decision-making expand, the diversity and heterogeneity of decision-making groups present significant challenges to the decision-making process. In order to effectively address these challenges, this paper defines the concept of spherical Z-number, which is a fuzzy number that takes into account a wide range of evaluation and its reliability. Additionally, a group decision-making model in a spherical Z-number environment is proposed. First, an objective phased tracking method is used to determine expert weights, maintain the consistency in decision-making group evaluations. The gained and lost dominance score method is combined with prospect theory to integrate expert psychological behavior when facing risks. The proposed method considers both group utility and individual regret, and balances the gains and losses of various options in the decision-making process. Finally, in response to the 3R principle, the model is employed to address the shared e-bike recycling supplier selection problem and to assess the viability of the decision-making outcomes. The results demonstrate that the model is robust in the context of varying parameter configurations. Moreover, the correlation coefficients between its ranking outcomes and those of alternative methodologies are all above 0.77, and its average superiority degree is 1.121, which is considerably higher than that of other methods. Consequently, the model's effectiveness and superiority are substantiated.</p>","PeriodicalId":10524,"journal":{"name":"Complex & Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142174680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A collision-free transition path planning method for placement robots in complex environments 复杂环境中放置机器人的无碰撞过渡路径规划方法
IF 5.8 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-09-09 DOI: 10.1007/s40747-024-01585-y
Yanzhe Wang, Qian Yang, Weiwei Qu

In Automated Fiber Placement (AFP), the substantial structure of the placement robot, the variable mold shapes, and the limited free space pose significant challenges for planning collision-free robot transitions. The task involves planning a collision-free path within the robot's high-dimensional configuration space. Informed RRT* is a common approach for such problems but often struggles with efficiency and path quality in environments with large informed sampling spaces influenced by obstacles. To address these issues, this paper proposes an improved Informed RRT* algorithm with a Local Knowledge Acceleration sampling strategy (LKA-Informed RRT*), aimed at enhancing planning efficiency and adaptability in complex obstacle settings. An Adaptive Sampling Control (ASC) rate is introduced, measuring the algorithm’s convergence speed, guides the algorithm to switch between informed and local sampling adaptively. The proposed local sampling method uses failure nodes from the exploration process to estimate obstacle distributions, steering sampling toward regions that expedite path convergence. Experimental results show that LKA-Informed RRT* significantly outperforms state-of-the-art algorithms in convergence efficiency and path cost. Compared to the original Informed RRT*, the proposed method reduces planning time by about 60%, substantially boosting efficiency for collision-free transitions in complex environments.

在自动纤维铺放(AFP)过程中,铺放机器人的庞大结构、多变的模具形状和有限的自由空间给规划机器人无碰撞过渡带来了巨大挑战。这项任务涉及在机器人的高维配置空间内规划无碰撞路径。知情 RRT* 是解决此类问题的常用方法,但在受障碍物影响的大型知情采样空间环境中,其效率和路径质量往往难以保证。为了解决这些问题,本文提出了一种带有本地知识加速采样策略(LKA-Informed RRT*)的改进型知情 RRT* 算法,旨在提高复杂障碍物环境下的规划效率和适应性。该算法引入了自适应采样控制(ASC)率,用于衡量算法的收敛速度,引导算法在知情采样和局部采样之间自适应切换。所提出的局部采样方法利用探索过程中的故障节点来估计障碍物分布,引导采样向能加快路径收敛的区域进行。实验结果表明,LKA-Informed RRT* 在收敛效率和路径成本方面明显优于最先进的算法。与最初的知情 RRT* 相比,所提出的方法将规划时间缩短了约 60%,大大提高了在复杂环境中进行无碰撞过渡的效率。
{"title":"A collision-free transition path planning method for placement robots in complex environments","authors":"Yanzhe Wang, Qian Yang, Weiwei Qu","doi":"10.1007/s40747-024-01585-y","DOIUrl":"https://doi.org/10.1007/s40747-024-01585-y","url":null,"abstract":"<p>In Automated Fiber Placement (AFP), the substantial structure of the placement robot, the variable mold shapes, and the limited free space pose significant challenges for planning collision-free robot transitions. The task involves planning a collision-free path within the robot's high-dimensional configuration space. Informed RRT* is a common approach for such problems but often struggles with efficiency and path quality in environments with large informed sampling spaces influenced by obstacles. To address these issues, this paper proposes an improved Informed RRT* algorithm with a Local Knowledge Acceleration sampling strategy (LKA-Informed RRT*), aimed at enhancing planning efficiency and adaptability in complex obstacle settings. An Adaptive Sampling Control (ASC) rate is introduced, measuring the algorithm’s convergence speed, guides the algorithm to switch between informed and local sampling adaptively. The proposed local sampling method uses failure nodes from the exploration process to estimate obstacle distributions, steering sampling toward regions that expedite path convergence. Experimental results show that LKA-Informed RRT* significantly outperforms state-of-the-art algorithms in convergence efficiency and path cost. Compared to the original Informed RRT*, the proposed method reduces planning time by about 60%, substantially boosting efficiency for collision-free transitions in complex environments.</p>","PeriodicalId":10524,"journal":{"name":"Complex & Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142158781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SAGB: self-attention with gate and BiGRU network for intrusion detection SAGB:利用门和 BiGRU 网络进行自注意入侵检测
IF 5.8 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-09-09 DOI: 10.1007/s40747-024-01577-y
Zhanhui Hu, Guangzhong Liu, Yanping Li, Siqing Zhuang

Network traffic intrusion detection technology plays an important role in host and platform security. At present, machine learning and deep learning methods are often used for network traffic intrusion detection. However, the imbalance of relevant data sets will cause the model algorithm to learn the features of the majority categories and ignore the features of the minority categories, which will seriously affect the precision of network intrusion detection models. The number of samples of the attacks is much less than the number of normal samples. The classification performance on unbalanced data sets is poor and can not identify the minority attack samples well. To solve these problems, this paper proposed the resampling mechanism, which used random undersampling for the majority categories samples and K-Smote oversampling for the minority categories samples, so as to generate a more balanced data set and improve the model's detection rate for the minority categories. This paper proposed the Self-Attention with Gate (SAG) and BiGRU network model for intrusion detection on the CICIDS2017 data set, which can fully extract high-dimensional information from data samples and improve the detection rate of network attacks. The Self-Attention with Gate mechanism (SAG) based on the Transformer performed the feature extraction, filtered the irrelevant noise information, then extracted the long-distance dependency temporal sequence features by the BiGRU network, and obtained the classification results through the SoftMax classifier. Compared to the experimental results of other algorithms, such as Random Forest (RF) and BiGRU, it can be found that the overall classification precision for the SAG-BiGRU model in this paper is much higher and also has a good effect on the NSL-KDD data set.

网络流量入侵检测技术在主机和平台安全方面发挥着重要作用。目前,机器学习和深度学习方法常被用于网络流量入侵检测。然而,相关数据集的不平衡性会导致模型算法学习多数类别的特征而忽略少数类别的特征,严重影响网络入侵检测模型的精度。攻击样本的数量远远少于正常样本的数量。在不平衡数据集上的分类性能较差,不能很好地识别少数攻击样本。为了解决这些问题,本文提出了重采样机制,即对多数类样本采用随机欠采样,对少数类样本采用 K-Smote 超采样,从而生成更均衡的数据集,提高模型对少数类样本的检测率。本文在 CICIDS2017 数据集上提出了用于入侵检测的带门自注意(SAG)和 BiGRU 网络模型,可以充分提取数据样本的高维信息,提高网络攻击的检测率。基于Transformer的Self-Attention with Gate机制(SAG)进行特征提取,过滤无关噪声信息,然后通过BiGRU网络提取长距离依赖时序特征,并通过SoftMax分类器得到分类结果。与随机森林(RF)和 BiGRU 等其他算法的实验结果相比,可以发现本文中的 SAG-BiGRU 模型的整体分类精度要高得多,而且在 NSL-KDD 数据集上也有很好的效果。
{"title":"SAGB: self-attention with gate and BiGRU network for intrusion detection","authors":"Zhanhui Hu, Guangzhong Liu, Yanping Li, Siqing Zhuang","doi":"10.1007/s40747-024-01577-y","DOIUrl":"https://doi.org/10.1007/s40747-024-01577-y","url":null,"abstract":"<p>Network traffic intrusion detection technology plays an important role in host and platform security. At present, machine learning and deep learning methods are often used for network traffic intrusion detection. However, the imbalance of relevant data sets will cause the model algorithm to learn the features of the majority categories and ignore the features of the minority categories, which will seriously affect the precision of network intrusion detection models. The number of samples of the attacks is much less than the number of normal samples. The classification performance on unbalanced data sets is poor and can not identify the minority attack samples well. To solve these problems, this paper proposed the resampling mechanism, which used random undersampling for the majority categories samples and K-Smote oversampling for the minority categories samples, so as to generate a more balanced data set and improve the model's detection rate for the minority categories. This paper proposed the Self-Attention with Gate (SAG) and BiGRU network model for intrusion detection on the CICIDS2017 data set, which can fully extract high-dimensional information from data samples and improve the detection rate of network attacks. The Self-Attention with Gate mechanism (SAG) based on the Transformer performed the feature extraction, filtered the irrelevant noise information, then extracted the long-distance dependency temporal sequence features by the BiGRU network, and obtained the classification results through the SoftMax classifier. Compared to the experimental results of other algorithms, such as Random Forest (RF) and BiGRU, it can be found that the overall classification precision for the SAG-BiGRU model in this paper is much higher and also has a good effect on the NSL-KDD data set.</p>","PeriodicalId":10524,"journal":{"name":"Complex & Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142158782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integration of a novel 3D chaotic map with ELSS and novel cross-border pixel exchange strategy for secure image communication 将新型 3D 混沌地图与 ELSS 和新型跨境像素交换策略相结合,实现安全图像通信
IF 5.8 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-09-09 DOI: 10.1007/s40747-024-01568-z
Sajid Khan, Hao Peng, Zhaoquan Gu, Sardar Usman, Namra Mukhtar

This paper proposes a robust image encryption algorithm that utilizes a Novel three-dimensional (3D) Chaotic map and an Enhanced Logistic Sine System (ELSS). We leverage the unpredictability of 3D chaotic dynamics alongside the complexity of ELSS and DNA Sequence to forge a formidable image encryption scheme. Firstly, the image pixels are converted from decimal to hexadecimal notation and sorted in a 1D pixel array carrying a unique sequence of three channels of the RGB image. Secondly, the secret key is appended to XOR, the values with that 1-D pixels array. Thirdly, values are sorted by performing the binary right shift operation and encoded into DNA. Fourthly, a novel chaotic map is used to perform scrambling operations. Lastly, a novel enormous keyspace ELSS is used to perform efficient Border and Cross-Border (B &CB) pixel exchange, further enhancing the encryption quality of the proposed algorithm. Comprehensive security analysis proved that the proposed algorithm exhibits remarkable resilience against powerful known and chosen plaintext attacks and other prevalent cryptanalysis attacks, including differential attacks and exhaustive key search attacks. Henceforth, the proposed algorithm’s superior security and low computational cost make it an ideal choice for real-time secure image communication across various platforms, including satellite, multimedia, and military communications.

本文提出了一种利用新型三维(3D)混沌图和增强逻辑正弦系统(ELSS)的稳健图像加密算法。我们利用三维混沌动力学的不可预测性以及增强对数正弦系统和 DNA 序列的复杂性来构建一个强大的图像加密方案。首先,将图像像素从十进制转换为十六进制,并在一维像素阵列中进行排序,其中包含 RGB 图像三个通道的唯一序列。其次,将秘钥与该一维像素阵列中的值进行 XOR。第三,通过二进制右移操作对数值进行排序,并将其编码到 DNA 中。第四,使用新颖的混沌图进行加扰操作。最后,新颖的巨大密钥空间 ELSS 被用来执行高效的边界和跨境(B &CB )像素交换,进一步提高了拟议算法的加密质量。全面的安全性分析证明,所提出的算法对强大的已知和选择明文攻击以及其他流行的密码分析攻击(包括差分攻击和穷举密钥搜索攻击)具有显著的抵御能力。因此,该算法具有卓越的安全性和较低的计算成本,是卫星、多媒体和军事通信等各种平台实时安全图像通信的理想选择。
{"title":"Integration of a novel 3D chaotic map with ELSS and novel cross-border pixel exchange strategy for secure image communication","authors":"Sajid Khan, Hao Peng, Zhaoquan Gu, Sardar Usman, Namra Mukhtar","doi":"10.1007/s40747-024-01568-z","DOIUrl":"https://doi.org/10.1007/s40747-024-01568-z","url":null,"abstract":"<p>This paper proposes a robust image encryption algorithm that utilizes a Novel three-dimensional (3D) Chaotic map and an Enhanced Logistic Sine System <b>(ELSS)</b>. We leverage the unpredictability of 3D chaotic dynamics alongside the complexity of ELSS and DNA Sequence to forge a formidable image encryption scheme. Firstly, the image pixels are converted from decimal to hexadecimal notation and sorted in a 1D pixel array carrying a unique sequence of three channels of the RGB image. Secondly, the secret key is appended to XOR, the values with that 1-D pixels array. Thirdly, values are sorted by performing the binary right shift operation and encoded into DNA. Fourthly, a novel chaotic map is used to perform scrambling operations. Lastly, a novel enormous keyspace <b>ELSS</b> is used to perform efficient Border and Cross-Border (<b>B</b> &amp;<b>CB</b>) pixel exchange, further enhancing the encryption quality of the proposed algorithm. Comprehensive security analysis proved that the proposed algorithm exhibits remarkable resilience against powerful known and chosen plaintext attacks and other prevalent cryptanalysis attacks, including differential attacks and exhaustive key search attacks. Henceforth, the proposed algorithm’s superior security and low computational cost make it an ideal choice for real-time secure image communication across various platforms, including satellite, multimedia, and military communications.</p>","PeriodicalId":10524,"journal":{"name":"Complex & Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142158780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced EDAS methodology for multiple-criteria group decision analysis utilizing linguistic q-rung orthopair fuzzy hamacher aggregation operators 利用语言q-rung正交模糊哈马赫聚合算子的增强型EDAS方法进行多标准群体决策分析
IF 5.8 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-09-06 DOI: 10.1007/s40747-024-01586-x
Jawad Ali, Waqas Ali, Haifa Alqahtani, Muhammad I. Syam

The linguistic q-rung orthopair fuzzy ((L^{q}ROF)) set serves as a useful way of presenting uncertain information by offering more space for decision experts. In the present research, we first link the concepts of Hamacher t-norm and t-conorm with the frame of (L^{q}ROF) numbers to develop and analyze the innovative (L^{q}ROF) Hamacher operations. Then, following the proposed Hamacher’s norm operations, a series of aggregation operators including (L^{q}ROF) weighted averaging, (L^{q}ROF) ordered weighted averaging, (L^{q}ROF) hybrid averaging, (L^{q}ROF) weighted geometric, (L^{q}ROF) ordered weighted geometric, (L^{q}ROF) hybrid geometric operators are investigated. Some interesting aspects of these AOs are also presented. We further develop evaluation based on distance from average solution (EDAS) approach in light of the newly outlined concepts to cope with (L^{q}ROF) decision-making problems where the weight information of criteria is fully unknown, ultimately, the practicality of the framed approach is demonstrated through an empirical case, and a detailed analysis is carried out to showcase the methodology dominance.

语言q-rung正对模糊((L^{q}ROF))集为决策专家提供了更大的空间,是呈现不确定信息的一种有效方式。在本研究中,我们首先将哈马赫 t-norm 和 t-conorm 的概念与 (L^{q}ROF) 数的框架联系起来,开发并分析了创新的 (L^{q}ROF) 哈马赫运算。然后,根据提出的哈马赫规范运算,研究了一系列聚合算子,包括:(L^{q}ROF) 加权平均算子、(L^{q}ROF) 有序加权平均算子、(L^{q}ROF) 混合平均算子、(L^{q}ROF) 加权几何算子、(L^{q}ROF) 有序加权几何算子、(L^{q}ROF) 混合几何算子。还介绍了这些算符的一些有趣的方面。我们根据新提出的概念进一步发展了基于平均解距离的评估(EDAS)方法,以应对标准权重信息完全未知的(L^{q}ROF)决策问题,最终通过一个经验案例证明了框架方法的实用性,并进行了详细分析以展示该方法的优势。
{"title":"Enhanced EDAS methodology for multiple-criteria group decision analysis utilizing linguistic q-rung orthopair fuzzy hamacher aggregation operators","authors":"Jawad Ali, Waqas Ali, Haifa Alqahtani, Muhammad I. Syam","doi":"10.1007/s40747-024-01586-x","DOIUrl":"https://doi.org/10.1007/s40747-024-01586-x","url":null,"abstract":"<p>The linguistic q-rung orthopair fuzzy (<span>(L^{q}ROF)</span>) set serves as a useful way of presenting uncertain information by offering more space for decision experts. In the present research, we first link the concepts of Hamacher t-norm and t-conorm with the frame of <span>(L^{q}ROF)</span> numbers to develop and analyze the innovative <span>(L^{q}ROF)</span> Hamacher operations. Then, following the proposed Hamacher’s norm operations, a series of aggregation operators including <span>(L^{q}ROF)</span> weighted averaging, <span>(L^{q}ROF)</span> ordered weighted averaging, <span>(L^{q}ROF)</span> hybrid averaging, <span>(L^{q}ROF)</span> weighted geometric, <span>(L^{q}ROF)</span> ordered weighted geometric, <span>(L^{q}ROF)</span> hybrid geometric operators are investigated. Some interesting aspects of these AOs are also presented. We further develop evaluation based on distance from average solution (EDAS) approach in light of the newly outlined concepts to cope with <span>(L^{q}ROF)</span> decision-making problems where the weight information of criteria is fully unknown, ultimately, the practicality of the framed approach is demonstrated through an empirical case, and a detailed analysis is carried out to showcase the methodology dominance.</p>","PeriodicalId":10524,"journal":{"name":"Complex & Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142142450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph convolutional networks with the self-attention mechanism for adaptive influence maximization in social networks 具有自我关注机制的图卷积网络在社交网络中实现自适应影响力最大化
IF 5.8 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-08-28 DOI: 10.1007/s40747-024-01604-y
Jianxin Tang, Shihui Song, Qian Du, Yabing Yao, Jitao Qu

The influence maximization problem that has drawn a great deal of attention from researchers aims to identify a subset of influential spreaders that can maximize the expected influence spread in social networks. Existing works on the problem primarily concentrate on developing non-adaptive policies, where all seeds will be ignited at the very beginning of the diffusion after the identification. However, in non-adaptive policies, budget redundancy could occur as a result of some seeds being naturally infected by other active seeds during the diffusion process. In this paper, the adaptive seeding policies are investigated for the intractable adaptive influence maximization problem. Based on deep learning model, a novel approach named graph convolutional networks with self-attention mechanism (ATGCN) is proposed to address the adaptive influence maximization as a regression task. A controlling parameter is introduced for the adaptive seeding model to make a tradeoff between the spreading delay and influence coverage. The proposed approach leverages the self-attention mechanism to dynamically assign importance weight to node representations efficiently to capture the node influence feature information relevant to the adaptive influence maximization problem. Finally, intensive experimental findings on six real-world social networks demonstrate the superiorities of the adaptive seeding policy over the state-of-the-art baseline methods to the conventional influence maximization problem. Meanwhile, the proposed adaptive seeding policy ATGCN improves the influence spread rate by up to 7% in comparison to the existing state-of-the-art greedy-based adaptive seeding policy.

影响力最大化问题引起了研究人员的极大关注,该问题旨在识别有影响力的传播者子集,从而最大化社交网络中的预期影响力传播。有关该问题的现有研究主要集中于开发非适应性政策,即在识别后的传播初期点燃所有种子。然而,在非自适应策略中,由于一些种子在扩散过程中会被其他活跃种子自然感染,因此可能会出现预算冗余。本文针对难以解决的自适应影响最大化问题,研究了自适应播种策略。基于深度学习模型,本文提出了一种名为 "具有自我关注机制的图卷积网络(ATGCN)"的新方法,将自适应影响力最大化作为一项回归任务来处理。自适应播种模型引入了一个控制参数,以便在传播延迟和影响覆盖率之间做出权衡。所提出的方法利用自我关注机制为节点表征有效地动态分配重要性权重,以捕捉与自适应影响力最大化问题相关的节点影响力特征信息。最后,在六个真实社交网络上的深入实验结果表明,自适应播种策略在传统影响力最大化问题上优于最先进的基线方法。同时,与现有最先进的基于贪婪的自适应播种策略相比,所提出的自适应播种策略 ATGCN 将影响力扩散率提高了 7%。
{"title":"Graph convolutional networks with the self-attention mechanism for adaptive influence maximization in social networks","authors":"Jianxin Tang, Shihui Song, Qian Du, Yabing Yao, Jitao Qu","doi":"10.1007/s40747-024-01604-y","DOIUrl":"https://doi.org/10.1007/s40747-024-01604-y","url":null,"abstract":"<p>The influence maximization problem that has drawn a great deal of attention from researchers aims to identify a subset of influential spreaders that can maximize the expected influence spread in social networks. Existing works on the problem primarily concentrate on developing non-adaptive policies, where all seeds will be ignited at the very beginning of the diffusion after the identification. However, in non-adaptive policies, budget redundancy could occur as a result of some seeds being naturally infected by other active seeds during the diffusion process. In this paper, the adaptive seeding policies are investigated for the intractable adaptive influence maximization problem. Based on deep learning model, a novel approach named graph convolutional networks with self-attention mechanism (ATGCN) is proposed to address the adaptive influence maximization as a regression task. A controlling parameter is introduced for the adaptive seeding model to make a tradeoff between the spreading delay and influence coverage. The proposed approach leverages the self-attention mechanism to dynamically assign importance weight to node representations efficiently to capture the node influence feature information relevant to the adaptive influence maximization problem. Finally, intensive experimental findings on six real-world social networks demonstrate the superiorities of the adaptive seeding policy over the state-of-the-art baseline methods to the conventional influence maximization problem. Meanwhile, the proposed adaptive seeding policy ATGCN improves the influence spread rate by up to 7% in comparison to the existing state-of-the-art greedy-based adaptive seeding policy.</p>","PeriodicalId":10524,"journal":{"name":"Complex & Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142085525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accuracy is not enough: a heterogeneous ensemble model versus FGSM attack 仅有准确性是不够的:异质集合模型与 FGSM 攻击的比较
IF 5.8 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-08-28 DOI: 10.1007/s40747-024-01603-z
Reham A. Elsheikh, M. A. Mohamed, Ahmed Mohamed Abou-Taleb, Mohamed Maher Ata

In this paper, based on facial landmark approaches, the possible vulnerability of ensemble algorithms to the FGSM attack has been assessed using three commonly used models: convolutional neural network-based antialiasing (A_CNN), Xc_Deep2-based DeepLab v2, and SqueezeNet (Squ_Net)-based Fire modules. Firstly, the three individual deep learning classifier-based Facial Emotion Recognition (FER) classifications have been developed; the predictions from all three classifiers are then merged using majority voting to develop the HEM_Net-based ensemble model. Following that, an in-depth investigation of their performance in the case of attack-free has been carried out in terms of the Jaccard coefficient, accuracy, precision, recall, F1 score, and specificity. When applied to three benchmark datasets, the ensemble-based method (HEM_Net) significantly outperforms in terms of precision and reliability while also decreasing the dimensionality of the input data, with an accuracy of 99.3%, 87%, and 99% for the Extended Cohn-Kanade (CK+), Real-world Affective Face (RafD), and Japanese female facial expressions (Jaffee) data, respectively. Further, a comprehensive analysis of the drop in performance of every model affected by the FGSM attack is carried out over a range of epsilon values (the perturbation parameter). The results from the experiments show that the advised HEM_Net model accuracy declined drastically by 59.72% for CK + data, 42.53% for RafD images, and 48.49% for the Jaffee dataset when the perturbation increased from A to E (attack levels). This demonstrated that a successful Fast Gradient Sign Method (FGSM) can significantly reduce the prediction performance of all individual classifiers with an increase in attack levels. However, due to the majority voting, the proposed HEM_Net model could improve its robustness against FGSM attacks, indicating that the ensemble can lessen deception by FGSM adversarial instances. This generally holds even as the perturbation level of the FGSM attack increases.

本文基于面部地标方法,使用三种常用模型评估了集合算法可能受到 FGSM 攻击的脆弱性:基于卷积神经网络的抗锯齿(A_CNN)、基于 Xc_Deep2 的 DeepLab v2 和基于 SqueezeNet(Squ_Net)的 Fire 模块。首先,开发了基于深度学习分类器的三种单独的面部情感识别(FER)分类;然后,使用多数投票法合并所有三种分类器的预测结果,以开发基于 HEM_Net 的集合模型。随后,从杰卡德系数、准确度、精确度、召回率、F1 分数和特异性等方面对它们在无攻击情况下的性能进行了深入研究。当应用于三个基准数据集时,基于集合的方法(HEM_Net)在精确度和可靠性方面明显优于其他方法,同时还降低了输入数据的维度,在扩展 Cohn-Kanade (CK+)、真实世界情感人脸 (RafD) 和日本女性面部表情 (Jaffee) 数据中的精确度分别为 99.3%、87% 和 99%。此外,我们还对受 FGSM 攻击影响的每个模型的性能下降情况进行了综合分析,分析范围包括ε值(扰动参数)。实验结果表明,当扰动从 A 增加到 E(攻击级别)时,建议的 HEM_Net 模型准确率在 CK + 数据中急剧下降了 59.72%,在 RafD 图像中下降了 42.53%,在 Jaffee 数据集中下降了 48.49%。这表明,随着攻击等级的增加,成功的快速梯度符号法(FGSM)可以显著降低所有单个分类器的预测性能。然而,由于采用了多数投票制,拟议的 HEM_Net 模型可以提高其对 FGSM 攻击的鲁棒性,这表明该集合可以减少 FGSM 对抗实例的欺骗性。即使 FGSM 攻击的扰动水平增加,这种情况一般也能保持不变。
{"title":"Accuracy is not enough: a heterogeneous ensemble model versus FGSM attack","authors":"Reham A. Elsheikh, M. A. Mohamed, Ahmed Mohamed Abou-Taleb, Mohamed Maher Ata","doi":"10.1007/s40747-024-01603-z","DOIUrl":"https://doi.org/10.1007/s40747-024-01603-z","url":null,"abstract":"<p>In this paper, based on facial landmark approaches, the possible vulnerability of ensemble algorithms to the FGSM attack has been assessed using three commonly used models: convolutional neural network-based antialiasing (A_CNN), Xc_Deep2-based DeepLab v2, and SqueezeNet (Squ_Net)-based Fire modules. Firstly, the three individual deep learning classifier-based Facial Emotion Recognition (FER) classifications have been developed; the predictions from all three classifiers are then merged using majority voting to develop the HEM_Net-based ensemble model. Following that, an in-depth investigation of their performance in the case of attack-free has been carried out in terms of the Jaccard coefficient, accuracy, precision, recall, F1 score, and specificity. When applied to three benchmark datasets, the ensemble-based method (HEM_Net) significantly outperforms in terms of precision and reliability while also decreasing the dimensionality of the input data, with an accuracy of 99.3%, 87%, and 99% for the Extended Cohn-Kanade (CK+), Real-world Affective Face (RafD), and Japanese female facial expressions (Jaffee) data, respectively. Further, a comprehensive analysis of the drop in performance of every model affected by the FGSM attack is carried out over a range of epsilon values (the perturbation parameter). The results from the experiments show that the advised HEM_Net model accuracy declined drastically by 59.72% for CK + data, 42.53% for RafD images, and 48.49% for the Jaffee dataset when the perturbation increased from A to E (attack levels). This demonstrated that a successful Fast Gradient Sign Method (FGSM) can significantly reduce the prediction performance of all individual classifiers with an increase in attack levels. However, due to the majority voting, the proposed HEM_Net model could improve its robustness against FGSM attacks, indicating that the ensemble can lessen deception by FGSM adversarial instances. This generally holds even as the perturbation level of the FGSM attack increases.</p>","PeriodicalId":10524,"journal":{"name":"Complex & Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142085549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive dynamic programming-based multi-fault tolerant control of reconfigurable manipulator with input constraint 基于自适应动态编程的带输入约束的可重构机械手多故障容错控制
IF 5.8 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-08-28 DOI: 10.1007/s40747-024-01550-9
Zhenguo Zhang, Tianhao Ma, Yadan Zhao, Shuai Yu, Fan Zhou

In this paper, a multi-fault tolerant controller considering actuator saturation is proposed. Based on the adaptive dynamic programming(ADP) algorithm, the fault tolerant control of the reconfigurable manipulator with sensor and actuator faults are carried out. Firstly, combined with the state space expression, the nonlinear transformation of sensor fault is performed by adopting the differential homeomorphism principle. An improved cost function is constructed based on the fault estimation function obtained by the fault observer, and combined with hyperbolic tangent function to deal with input constraint problem. Then, an evaluation neural network (NN) is established and the Hamilton–Jacobi–Bellman (HJB) equation is solved by online strategy iterative algorithm. Furthermore, based on Lyapunov theorem, the stability of reconfigurable manipulator systems with multi-fault are proved. Lastly, the simulation studies are used to certify the effectiveness of the presented fault tolerant control (FTC) scheme.

本文提出了一种考虑执行器饱和的多故障容错控制器。基于自适应动态编程(ADP)算法,对存在传感器和执行器故障的可重构机械手进行了容错控制。首先,结合状态空间表达式,利用微分同构原理对传感器故障进行非线性变换。根据故障观测器获得的故障估计函数构建改进的成本函数,并结合双曲正切函数来处理输入约束问题。然后,建立评估神经网络(NN),并通过在线策略迭代算法求解汉密尔顿-雅各比-贝尔曼(HJB)方程。此外,基于 Lyapunov 定理,证明了多故障可重构机械手系统的稳定性。最后,通过仿真研究证明了所提出的容错控制(FTC)方案的有效性。
{"title":"Adaptive dynamic programming-based multi-fault tolerant control of reconfigurable manipulator with input constraint","authors":"Zhenguo Zhang, Tianhao Ma, Yadan Zhao, Shuai Yu, Fan Zhou","doi":"10.1007/s40747-024-01550-9","DOIUrl":"https://doi.org/10.1007/s40747-024-01550-9","url":null,"abstract":"<p>In this paper, a multi-fault tolerant controller considering actuator saturation is proposed. Based on the adaptive dynamic programming(ADP) algorithm, the fault tolerant control of the reconfigurable manipulator with sensor and actuator faults are carried out. Firstly, combined with the state space expression, the nonlinear transformation of sensor fault is performed by adopting the differential homeomorphism principle. An improved cost function is constructed based on the fault estimation function obtained by the fault observer, and combined with hyperbolic tangent function to deal with input constraint problem. Then, an evaluation neural network (NN) is established and the Hamilton–Jacobi–Bellman (HJB) equation is solved by online strategy iterative algorithm. Furthermore, based on Lyapunov theorem, the stability of reconfigurable manipulator systems with multi-fault are proved. Lastly, the simulation studies are used to certify the effectiveness of the presented fault tolerant control (FTC) scheme.</p>","PeriodicalId":10524,"journal":{"name":"Complex & Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142085580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A DQN based approach for large-scale EVs charging scheduling 基于 DQN 的大规模电动汽车充电调度方法
IF 5.8 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-08-21 DOI: 10.1007/s40747-024-01587-w
Yingnan Han, Tianyang Li, Qingzhu Wang

This paper addresses the challenge of large-scale electric vehicle (EV) charging scheduling during peak demand periods, such as holidays or rush hours. The growing EV industry has highlighted the shortcomings of current scheduling plans, which struggle to manage surge large-scale charging demands effectively, thus posing challenges to the EV charging management system. Deep reinforcement learning, known for its effectiveness in solving complex decision-making problems, holds promise for addressing this issue. To this end, we formulate the problem as a Markov decision process (MDP). We propose a deep Q-learning (DQN) based algorithm to improve EV charging service quality as well as minimizing average queueing times for EVs and average idling times for charging devices (CDs). In our proposed methodology, we design two types of states to encompass global scheduling information, and two types of rewards to reflect scheduling performance. Based on this designing, we developed three modules: a fine-grained feature extraction module for effectively extracting state features, an improved noise-based exploration module for thorough exploration of the solution space, and a dueling block for enhancing Q value evaluation. To assess the effectiveness of our proposal, we conduct three case studies within a complex urban scenario featuring 34 charging stations and 899 scheduled EVs. The results of these experiments demonstrate the advantages of our proposal, showcasing its superiority in effectively locating superior solutions compared to current methods in the literature, as well as its efficiency in generating feasible charging scheduling plans for large-scale EVs. The code and data are available by accessing the hyperlink: https://github.com/paperscodeyouneed/A-Noisy-Dueling-Architecture-for-Large-Scale-EV-ChargingScheduling/tree/main/EV%20Charging%20Scheduling.

本文探讨了在节假日或高峰时段等需求高峰期进行大规模电动汽车(EV)充电调度所面临的挑战。电动汽车行业的不断发展凸显了当前调度计划的不足,难以有效管理激增的大规模充电需求,从而给电动汽车充电管理系统带来了挑战。深度强化学习因其在解决复杂决策问题方面的有效性而闻名,有望解决这一问题。为此,我们将问题表述为马尔可夫决策过程(MDP)。我们提出了一种基于深度 Q-learning (DQN) 的算法,以提高电动汽车充电服务质量,并最大限度地减少电动汽车的平均排队时间和充电设备(CD)的平均空闲时间。在我们提出的方法中,我们设计了两类状态来包含全局调度信息,以及两类奖励来反映调度性能。在此基础上,我们开发了三个模块:用于有效提取状态特征的细粒度特征提取模块、用于彻底探索解空间的改进型基于噪声的探索模块,以及用于增强 Q 值评估的决斗模块。为了评估我们建议的有效性,我们在一个复杂的城市场景中进行了三个案例研究,该场景中有 34 个充电站和 899 辆预定电动汽车。这些实验结果证明了我们建议的优势,与目前文献中的方法相比,我们的建议在有效定位优秀解决方案方面更具优势,在为大规模电动汽车生成可行的充电调度计划方面也更有效率。代码和数据可通过以下超链接获取:https://github.com/paperscodeyouneed/A-Noisy-Dueling-Architecture-for-Large-Scale-EV-ChargingScheduling/tree/main/EV%20Charging%20Scheduling。
{"title":"A DQN based approach for large-scale EVs charging scheduling","authors":"Yingnan Han, Tianyang Li, Qingzhu Wang","doi":"10.1007/s40747-024-01587-w","DOIUrl":"https://doi.org/10.1007/s40747-024-01587-w","url":null,"abstract":"<p>This paper addresses the challenge of large-scale electric vehicle (EV) charging scheduling during peak demand periods, such as holidays or rush hours. The growing EV industry has highlighted the shortcomings of current scheduling plans, which struggle to manage surge large-scale charging demands effectively, thus posing challenges to the EV charging management system. Deep reinforcement learning, known for its effectiveness in solving complex decision-making problems, holds promise for addressing this issue. To this end, we formulate the problem as a Markov decision process (MDP). We propose a deep Q-learning (DQN) based algorithm to improve EV charging service quality as well as minimizing average queueing times for EVs and average idling times for charging devices (CDs). In our proposed methodology, we design two types of states to encompass global scheduling information, and two types of rewards to reflect scheduling performance. Based on this designing, we developed three modules: a fine-grained feature extraction module for effectively extracting state features, an improved noise-based exploration module for thorough exploration of the solution space, and a dueling block for enhancing Q value evaluation. To assess the effectiveness of our proposal, we conduct three case studies within a complex urban scenario featuring 34 charging stations and 899 scheduled EVs. The results of these experiments demonstrate the advantages of our proposal, showcasing its superiority in effectively locating superior solutions compared to current methods in the literature, as well as its efficiency in generating feasible charging scheduling plans for large-scale EVs. The code and data are available by accessing the hyperlink: https://github.com/paperscodeyouneed/A-Noisy-Dueling-Architecture-for-Large-Scale-EV-ChargingScheduling/tree/main/EV%20Charging%20Scheduling.</p>","PeriodicalId":10524,"journal":{"name":"Complex & Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142013744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A general supply-inspect cost framework to regulate the reliability-usability trade-offs for few-shot inference 调节少量推理的可靠性-可用性权衡的一般供应-检查成本框架
IF 5.8 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-08-19 DOI: 10.1007/s40747-024-01599-6
Fernando Martínez-Plumed, Gonzalo Jaimovitch-López, Cèsar Ferri, María José Ramírez-Quintana, José Hernández-Orallo

Language models and other recent machine learning paradigms blur the distinction between generative and discriminative tasks, in a continuum that is regulated by the degree of pre- and post-supervision that is required from users, as well as the tolerated level of error. In few-shot inference, we need to find a trade-off between the number and cost of the solved examples that have to be supplied, those that have to be inspected (some of them accurate but others needing correction) and those that are wrong but pass undetected. In this paper, we define a new Supply-Inspect Cost Framework, associated graphical representations and comprehensive metrics that consider all these elements. To optimise few-shot inference under specific operating conditions, we introduce novel algorithms that go beyond the concept of rejection rules in both static and dynamic contexts. We illustrate the effectiveness of all these elements for a transformative domain, data wrangling, for which language models can have a huge impact if we are able to properly regulate the reliability-usability trade-off, as we do in this paper.

语言模型和其他最新的机器学习范式模糊了生成性任务和判别性任务之间的区别,它们是一个连续统一体,受用户所需的事前和事后监督程度以及可容忍的误差水平的制约。在少量推理中,我们需要在必须提供的求解示例的数量和成本、必须检查的示例(其中一些是准确的,但另一些需要纠正)和错误但未被发现的示例之间找到一个平衡点。在本文中,我们定义了一个新的 "供应-检查成本框架"、相关的图形表示和综合指标,以考虑所有这些要素。为了优化特定运行条件下的少量推断,我们引入了新的算法,超越了静态和动态情况下剔除规则的概念。我们说明了所有这些要素在数据处理这一变革性领域中的有效性,如果我们能够像本文所做的那样,适当调节可靠性与可用性之间的权衡,语言模型就能对该领域产生巨大的影响。
{"title":"A general supply-inspect cost framework to regulate the reliability-usability trade-offs for few-shot inference","authors":"Fernando Martínez-Plumed, Gonzalo Jaimovitch-López, Cèsar Ferri, María José Ramírez-Quintana, José Hernández-Orallo","doi":"10.1007/s40747-024-01599-6","DOIUrl":"https://doi.org/10.1007/s40747-024-01599-6","url":null,"abstract":"<p>Language models and other recent machine learning paradigms blur the distinction between generative and discriminative tasks, in a continuum that is regulated by the degree of pre- and post-supervision that is required from users, as well as the tolerated level of error. In few-shot inference, we need to find a trade-off between the number and cost of the solved examples that have to be supplied, those that have to be inspected (some of them accurate but others needing correction) and those that are wrong but pass undetected. In this paper, we define a new Supply-Inspect Cost Framework, associated graphical representations and comprehensive metrics that consider all these elements. To optimise few-shot inference under specific operating conditions, we introduce novel algorithms that go beyond the concept of rejection rules in both static and dynamic contexts. We illustrate the effectiveness of all these elements for a transformative domain, data wrangling, for which language models can have a huge impact if we are able to properly regulate the reliability-usability trade-off, as we do in this paper.</p>","PeriodicalId":10524,"journal":{"name":"Complex & Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142002827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Complex & Intelligent Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1