首页 > 最新文献

International Journal of Knowledge-Based and Intelligent Engineering Systems最新文献

英文 中文
On the optimal multi-objective design of fractional order PID controller with antlion optimization 用蚂蚁雄兵优化分数阶 PID 控制器的多目标优化设计
IF 0.6 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-07-03 DOI: 10.3233/kes-230176
Mangal Singh, Mahesh Singh, Shimpy Ralhan, Apoorva Shastri
This study introduces an optimal multi-objective design approach for a robust multimachine Fractional Order PID Controller (FOPID) using the Antlion algorithm. The research focuses on the need for effective stabilizers in multimachine power systems by employing traditional speed-based lead-lag FOPID controllers. The study formulates a multi-objective problem, optimizing the damping factor and damping ratio of lightly damped electromechanical modes to maximize a composite set of objective functions, tackled through the Antlion algorithm. Stability analysis of Single-Machine Infinite-Bus (SMIB) and multimachine power systems is conducted based on rotor speed and power deviation minimization in the time domain response, along with damping ratio and eigenvalue analysis. The proposed approach is implemented and tested on three IEEE test cases, showcasing significant improvements in stability through the reduction of maximum overshoot (Mp) and settling time (ts) of speed deviation. Comparative analysis with other optimization-based FOPID controllers underscores the superiority of the proposed approach in enhancing stability in multimachine power systems. The main impact of this research lies in its contribution to the advancement of stability enhancement techniques in multimachine power systems, offering a systematic framework for optimal FOPID controller design and empowering decision-making processes in power engineering.
本研究介绍了一种使用 Antlion 算法的鲁棒性多机分数阶 PID 控制器 (FOPID) 的多目标优化设计方法。研究的重点是在多机电力系统中采用传统的基于速度的前导滞后 FOPID 控制器,以满足有效稳定器的需求。研究提出了一个多目标问题,即优化轻阻尼机电模式的阻尼系数和阻尼比,以最大化一组复合目标函数,并通过 Antlion 算法加以解决。基于时域响应中转子速度和功率偏差最小化以及阻尼比和特征值分析,对单机无限总线(SMIB)和多机电力系统进行了稳定性分析。所提出的方法在三个 IEEE 测试案例中进行了实施和测试,通过减少速度偏差的最大过冲(Mp)和稳定时间(ts),显著提高了稳定性。与其他基于优化的 FOPID 控制器的对比分析表明,所提出的方法在增强多机电力系统稳定性方面具有优势。这项研究的主要影响在于它对多机电力系统稳定性增强技术的进步做出了贡献,为 FOPID 控制器的优化设计提供了一个系统框架,并增强了电力工程决策过程的能力。
{"title":"On the optimal multi-objective design of fractional order PID controller with antlion optimization","authors":"Mangal Singh, Mahesh Singh, Shimpy Ralhan, Apoorva Shastri","doi":"10.3233/kes-230176","DOIUrl":"https://doi.org/10.3233/kes-230176","url":null,"abstract":"This study introduces an optimal multi-objective design approach for a robust multimachine Fractional Order PID Controller (FOPID) using the Antlion algorithm. The research focuses on the need for effective stabilizers in multimachine power systems by employing traditional speed-based lead-lag FOPID controllers. The study formulates a multi-objective problem, optimizing the damping factor and damping ratio of lightly damped electromechanical modes to maximize a composite set of objective functions, tackled through the Antlion algorithm. Stability analysis of Single-Machine Infinite-Bus (SMIB) and multimachine power systems is conducted based on rotor speed and power deviation minimization in the time domain response, along with damping ratio and eigenvalue analysis. The proposed approach is implemented and tested on three IEEE test cases, showcasing significant improvements in stability through the reduction of maximum overshoot (Mp) and settling time (ts) of speed deviation. Comparative analysis with other optimization-based FOPID controllers underscores the superiority of the proposed approach in enhancing stability in multimachine power systems. The main impact of this research lies in its contribution to the advancement of stability enhancement techniques in multimachine power systems, offering a systematic framework for optimal FOPID controller design and empowering decision-making processes in power engineering.","PeriodicalId":44076,"journal":{"name":"International Journal of Knowledge-Based and Intelligent Engineering Systems","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141837885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Eternal 1-security number of a fuzzy graph with level J 等级为 J 的模糊图的永恒 1 安全数
IF 0.6 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-07-02 DOI: 10.3233/kes-240290
Mary Jiny D, G. Navamani, R. Shanmugapriya, Raman Kumar, Željko Stević, Rajender Kumar, Sandeep Kumar
The eternal 1-secure set, strategically protects graphical structures against attacks by placing sentinels within dominating sets. This study adapts this concept to real-world scenarios, like emergency response systems, by addressing challenges such as roadblocks and traffic congestion. We introduce the secure set and the eternal 1-secure set for fuzzy graphs based on edge membership levels J. Our analysis examines the relationship between the security number of a fuzzy graph G at level J and the domination number of its spanning subgraph at level J, demonstrating the potential of the eternal 1-secure set to enhance security measures in dynamic environments.
永恒的 "1-安全集 "通过在支配集内设置哨兵,从战略上保护图形结构免受攻击。本研究通过应对路障和交通拥堵等挑战,将这一概念应用到应急响应系统等现实场景中。我们的分析研究了模糊图 G 在 J 层的安全数与其跨子图在 J 层的支配数之间的关系,证明了永恒 1 安全集在动态环境中增强安全措施的潜力。
{"title":"Eternal 1-security number of a fuzzy graph with level J","authors":"Mary Jiny D, G. Navamani, R. Shanmugapriya, Raman Kumar, Željko Stević, Rajender Kumar, Sandeep Kumar","doi":"10.3233/kes-240290","DOIUrl":"https://doi.org/10.3233/kes-240290","url":null,"abstract":"The eternal 1-secure set, strategically protects graphical structures against attacks by placing sentinels within dominating sets. This study adapts this concept to real-world scenarios, like emergency response systems, by addressing challenges such as roadblocks and traffic congestion. We introduce the secure set and the eternal 1-secure set for fuzzy graphs based on edge membership levels J. Our analysis examines the relationship between the security number of a fuzzy graph G at level J and the domination number of its spanning subgraph at level J, demonstrating the potential of the eternal 1-secure set to enhance security measures in dynamic environments.","PeriodicalId":44076,"journal":{"name":"International Journal of Knowledge-Based and Intelligent Engineering Systems","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141838394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interval type-2 fuzzy approach for retinopathy detection in fundus images 用区间-2 型模糊方法检测眼底图像中的视网膜病变
IF 0.7 Q3 Engineering Pub Date : 2024-05-16 DOI: 10.3233/kes-230443
A. Ashir
In the manuscript, an automatic approach for analysis and detection of various stages of retinopathy defects in human eyes has been proposed. The approach consists of a robust preprocessing technique of the retina fundus image to mitigate the effects of noise and poor lightening in the image. To realize a compressive analysis of the defects, methods for extracting blood vessels and optic disc in the fundus image has also been developed. Adaptive Histogram Equalization (AHE), median filtering and Connected Component Analysis techniques were used in separating blood vessels and optic disc from each fundus image. The pre-processing utilizes canny edge detection and Morphological Closing on the fundus image. An interval type-2 fuzzy (IT2F) clustering is applied to segments an input image into four clusters. These four clusters from the fuzzy segmentation are further analyzed to extract various stages of retinopathy abnormalities (e.g., Hemorrhage, hard exudates etc.). The extracted blood vessels and optic disc are removed from the analysis to enhance the defects detection process. Experiments were conducted on DIARETDB1 database. The experimental results obtained are validated using the ground-truth images contained in DIARETDB1 database. Impressive results are recorded throughout the experiment. Hard-Exudates and Hemorrhage were detected from the fundus images and results from similarity indexes such as, accuracy (94.11%) sensitivity (93.03%) and specificity (98.45%) were recorded.
手稿中提出了一种自动分析和检测人眼视网膜病变各阶段缺陷的方法。该方法包括对视网膜眼底图像进行稳健的预处理技术,以减轻图像中的噪声和亮度不佳的影响。为了实现对缺陷的压缩分析,还开发了提取眼底图像中血管和视盘的方法。在从每张眼底图像中分离血管和视盘时,使用了自适应直方图均衡化(AHE)、中值滤波和连接成分分析技术。预处理采用了边缘检测(canny edge detection)和眼底图像形态合成(Morphological Closing)技术。应用区间 2 型模糊(IT2F)聚类技术将输入图像分割成四个聚类。对模糊分割的这四个簇进行进一步分析,以提取视网膜病变异常的各个阶段(如出血、硬性渗出等)。提取的血管和视盘将从分析中移除,以加强缺陷检测过程。实验是在 DIARETDB1 数据库上进行的。实验结果使用 DIARETDB1 数据库中的地面实况图像进行了验证。整个实验过程记录了令人印象深刻的结果。从眼底图像中检测出了硬性渗出和出血,并记录了相似性指标的结果,如准确率(94.11%)、灵敏度(93.03%)和特异性(98.45%)。
{"title":"Interval type-2 fuzzy approach for retinopathy detection in fundus images","authors":"A. Ashir","doi":"10.3233/kes-230443","DOIUrl":"https://doi.org/10.3233/kes-230443","url":null,"abstract":"In the manuscript, an automatic approach for analysis and detection of various stages of retinopathy defects in human eyes has been proposed. The approach consists of a robust preprocessing technique of the retina fundus image to mitigate the effects of noise and poor lightening in the image. To realize a compressive analysis of the defects, methods for extracting blood vessels and optic disc in the fundus image has also been developed. Adaptive Histogram Equalization (AHE), median filtering and Connected Component Analysis techniques were used in separating blood vessels and optic disc from each fundus image. The pre-processing utilizes canny edge detection and Morphological Closing on the fundus image. An interval type-2 fuzzy (IT2F) clustering is applied to segments an input image into four clusters. These four clusters from the fuzzy segmentation are further analyzed to extract various stages of retinopathy abnormalities (e.g., Hemorrhage, hard exudates etc.). The extracted blood vessels and optic disc are removed from the analysis to enhance the defects detection process. Experiments were conducted on DIARETDB1 database. The experimental results obtained are validated using the ground-truth images contained in DIARETDB1 database. Impressive results are recorded throughout the experiment. Hard-Exudates and Hemorrhage were detected from the fundus images and results from similarity indexes such as, accuracy (94.11%) sensitivity (93.03%) and specificity (98.45%) were recorded.","PeriodicalId":44076,"journal":{"name":"International Journal of Knowledge-Based and Intelligent Engineering Systems","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141127272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast retrieval of multi-modal embeddings for e-commerce applications 为电子商务应用快速检索多模态嵌入信息
IF 0.7 Q3 Engineering Pub Date : 2024-05-16 DOI: 10.3233/kes-240006
Alessandro Abluton, Daniele Ciarlo, Luigi Portinale
In this paper, we introduce a retrieval framework designed for e-commerce applications, which employs a multi-modal approach to represent items of interest. This approach incorporates both textual descriptions and images of products, alongside a locality-sensitive hashing (LSH) indexing scheme for rapid retrieval of potentially relevant products. Our focus is on a data-independent methodology, where the indexing mechanism remains unaffected by the specific dataset, while the multi-modal representation is learned beforehand. Specifically, we utilize a multi-modal architecture, CLIP, to learn a latent representation of items by combining text and images in a contrastive manner. The resulting item embeddings encapsulate both the visual and textual information of the products, which are then subjected to various types of LSH for balancing between result quality and retrieval speed. We present the findings of our experiments conducted on two real-world datasets sourced from e-commerce platforms, comprising both product images and textual descriptions. Promising results have been achieved, demonstrating favorable retrieval time and average precision. These results were obtained through testing the approach with a specifically selected set of queries and with synthetic queries generated using a Large Language Model.
在本文中,我们介绍了一个专为电子商务应用设计的检索框架,该框架采用多模态方法来表示感兴趣的项目。这种方法结合了产品的文字描述和图片,并采用了对位置敏感的哈希(LSH)索引方案,用于快速检索潜在的相关产品。我们的重点是一种与数据无关的方法,索引机制不受特定数据集的影响,而多模态表示则是事先学习的。具体来说,我们利用多模态架构 CLIP,以对比方式结合文本和图像来学习项目的潜在表示。由此产生的项目嵌入包涵了产品的视觉和文本信息,然后对其进行各种类型的 LSH,以在结果质量和检索速度之间取得平衡。我们介绍了在两个真实世界数据集上进行的实验结果,这些数据集来自电子商务平台,包括产品图片和文本描述。实验取得了令人满意的结果,显示了良好的检索时间和平均精确度。这些结果是通过使用专门选定的查询集和使用大型语言模型生成的合成查询对该方法进行测试后得出的。
{"title":"Fast retrieval of multi-modal embeddings for e-commerce applications","authors":"Alessandro Abluton, Daniele Ciarlo, Luigi Portinale","doi":"10.3233/kes-240006","DOIUrl":"https://doi.org/10.3233/kes-240006","url":null,"abstract":"In this paper, we introduce a retrieval framework designed for e-commerce applications, which employs a multi-modal approach to represent items of interest. This approach incorporates both textual descriptions and images of products, alongside a locality-sensitive hashing (LSH) indexing scheme for rapid retrieval of potentially relevant products. Our focus is on a data-independent methodology, where the indexing mechanism remains unaffected by the specific dataset, while the multi-modal representation is learned beforehand. Specifically, we utilize a multi-modal architecture, CLIP, to learn a latent representation of items by combining text and images in a contrastive manner. The resulting item embeddings encapsulate both the visual and textual information of the products, which are then subjected to various types of LSH for balancing between result quality and retrieval speed. We present the findings of our experiments conducted on two real-world datasets sourced from e-commerce platforms, comprising both product images and textual descriptions. Promising results have been achieved, demonstrating favorable retrieval time and average precision. These results were obtained through testing the approach with a specifically selected set of queries and with synthetic queries generated using a Large Language Model.","PeriodicalId":44076,"journal":{"name":"International Journal of Knowledge-Based and Intelligent Engineering Systems","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141127579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DeepGAN: Utilizing generative adversarial networks for improved deep learning DeepGAN:利用生成对抗网络改进深度学习
IF 0.7 Q3 Engineering Pub Date : 2024-05-16 DOI: 10.3233/kes-230326
E. V, Jenefa A, Thiyagu T.M, Lincy A, Antony Taurshia
In the realm of deep learning, Generative Adversarial Networks (GANs) have emerged as a topic of significant interest for their potential to enhance model performance and enable effective data augmentation. This paper addresses the existing challenges in synthesizing high-quality data and harnessing the capabilities of GANs for improved deep learning outcomes. Unlike traditional approaches that heavily rely on manually engineered data augmentation techniques, our work introduces a novel framework that leverages DeepGANs to autonomously generate diverse and high-fidelity data. Our experiments encompass a diverse spectrum of datasets, including images, text, and time series data. In the context of image classification tasks, we conduct experiments on the widely recognized CIFAR-10 dataset, which consists of 50,000 image samples. Our results demonstrate the remarkable efficacy of DeepGANs in enhancing model performance across various data domains. Notably, in image classification using the CIFAR-10 dataset, our innovative approach achieves an impressive accuracy of 97.2%. This represents a substantial advancement beyond conventional CNN models, underscoring the profound impact of DeepGANs in the realm of deep learning. In summary, this research sheds light on DeepGANs as a fundamental component in the pursuit of enhanced deep learning performance. Our framework not only overcomes existing limitations but also heralds a new era of data augmentation, with generative adversarial networks leading the way. The attainment of an accuracy rate of 97.2% on CIFAR-10 serves as a compelling testament to the transformative potential of DeepGANs, solidifying their pivotal role in the future of deep learning. This promises the development of more robust, adaptive, and accurate models across a myriad of applications, marking a significant contribution to the field.
在深度学习领域,生成对抗网络(GANs)因其在提高模型性能和实现有效数据增强方面的潜力而成为备受关注的话题。本文探讨了在合成高质量数据和利用 GANs 的能力以提高深度学习成果方面存在的挑战。与严重依赖人工设计的数据增强技术的传统方法不同,我们的工作引入了一个新颖的框架,利用 DeepGANs 自主生成多样化的高保真数据。我们的实验涵盖了各种数据集,包括图像、文本和时间序列数据。在图像分类任务方面,我们在广受认可的 CIFAR-10 数据集上进行了实验,该数据集由 50,000 个图像样本组成。我们的结果表明,DeepGANs 在提高各种数据领域的模型性能方面具有显著功效。值得注意的是,在使用 CIFAR-10 数据集进行图像分类时,我们的创新方法达到了令人印象深刻的 97.2% 的准确率。这代表了超越传统 CNN 模型的重大进步,凸显了 DeepGAN 在深度学习领域的深远影响。总之,这项研究揭示了 DeepGANs 作为追求增强深度学习性能的基本组成部分的意义。我们的框架不仅克服了现有的局限性,还预示着以生成式对抗网络为主导的数据增强新时代的到来。在 CIFAR-10 上达到 97.2% 的准确率有力地证明了 DeepGANs 的变革潜力,巩固了其在未来深度学习中举足轻重的地位。这有望在众多应用中开发出更强大、更自适应、更准确的模型,为该领域做出重大贡献。
{"title":"DeepGAN: Utilizing generative adversarial networks for improved deep learning","authors":"E. V, Jenefa A, Thiyagu T.M, Lincy A, Antony Taurshia","doi":"10.3233/kes-230326","DOIUrl":"https://doi.org/10.3233/kes-230326","url":null,"abstract":"In the realm of deep learning, Generative Adversarial Networks (GANs) have emerged as a topic of significant interest for their potential to enhance model performance and enable effective data augmentation. This paper addresses the existing challenges in synthesizing high-quality data and harnessing the capabilities of GANs for improved deep learning outcomes. Unlike traditional approaches that heavily rely on manually engineered data augmentation techniques, our work introduces a novel framework that leverages DeepGANs to autonomously generate diverse and high-fidelity data. Our experiments encompass a diverse spectrum of datasets, including images, text, and time series data. In the context of image classification tasks, we conduct experiments on the widely recognized CIFAR-10 dataset, which consists of 50,000 image samples. Our results demonstrate the remarkable efficacy of DeepGANs in enhancing model performance across various data domains. Notably, in image classification using the CIFAR-10 dataset, our innovative approach achieves an impressive accuracy of 97.2%. This represents a substantial advancement beyond conventional CNN models, underscoring the profound impact of DeepGANs in the realm of deep learning. In summary, this research sheds light on DeepGANs as a fundamental component in the pursuit of enhanced deep learning performance. Our framework not only overcomes existing limitations but also heralds a new era of data augmentation, with generative adversarial networks leading the way. The attainment of an accuracy rate of 97.2% on CIFAR-10 serves as a compelling testament to the transformative potential of DeepGANs, solidifying their pivotal role in the future of deep learning. This promises the development of more robust, adaptive, and accurate models across a myriad of applications, marking a significant contribution to the field.","PeriodicalId":44076,"journal":{"name":"International Journal of Knowledge-Based and Intelligent Engineering Systems","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141127377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advanced CoCoSo method for uncertain MAGDM: Evaluating college students’ entrepreneurial skills 针对不确定 MAGDM 的高级 CoCoSo 方法:评估大学生的创业技能
IF 0.7 Q3 Engineering Pub Date : 2024-03-14 DOI: 10.3233/kes-230096
Lijun Li, Zhuolin Xiao
With the in-depth implementation of the innovative development-driven strategy of “mass innovation and entrepreneurship” put forward by the state, colleges and universities, as the main positions for cultivating innovative and entrepreneurial talents, have set up a multi-level and all-round training system for college students’ innovative and entrepreneurial ability according to the relevant policies and implementation opinions of the state for deepening innovation and entrepreneurship education in colleges and universities, and actively promoted the improvement of college students’ innovative and entrepreneurial ability. The college students’ innovation and entrepreneurship ability evaluation could be regarded as the classical multiple attribute group decision making (MAGDM) issue. The PULTSs could well depict uncertain information during the college students’ innovation and entrepreneurship ability evaluation and the combined compromise solution (CoCoSo) method is appropriate to stable the decision-making results. In this paper, the probabilistic uncertain linguistic combined compromise solution (PUL-CoCoSo) method based on the probabilistic uncertain linguistic sets (PULTSs) and combined compromise solution method is proposed for multiple attribute group decision making (MAGDM). The weights of attribute based on the CRITIC method are obtained under PULTSs. Finally, an application related to the college students’ innovation and entrepreneurship ability evaluation is utilized to demonstrate the usage of the developed algorithms.
随着国家提出的 "大众创新、万众创业 "的创新发展驱动战略的深入实施,高校作为培养创新创业人才的主阵地,根据国家深化高校创新创业教育的相关政策和实施意见,建立了多层次、全方位的大学生创新创业能力培养体系,积极促进大学生创新创业能力的提高。大学生创新创业能力评价可视为经典的多属性群体决策(MAGDM)问题。PULTSs 可以很好地描述大学生创新创业能力评价过程中的不确定性信息,而组合折中解(CoCoSo)方法适合于稳定决策结果。本文提出了基于概率不确定语言集(PULTSs)的概率不确定语言组合折中解(PUL-CoCoSo)方法和组合折中解方法,用于多属性分组决策(MAGDM)。在 PULTSs 下获得了基于 CRITIC 方法的属性权重。最后,通过一个与大学生创新创业能力评价相关的应用,展示了所开发算法的使用情况。
{"title":"Advanced CoCoSo method for uncertain MAGDM: Evaluating college students’ entrepreneurial skills","authors":"Lijun Li, Zhuolin Xiao","doi":"10.3233/kes-230096","DOIUrl":"https://doi.org/10.3233/kes-230096","url":null,"abstract":"With the in-depth implementation of the innovative development-driven strategy of “mass innovation and entrepreneurship” put forward by the state, colleges and universities, as the main positions for cultivating innovative and entrepreneurial talents, have set up a multi-level and all-round training system for college students’ innovative and entrepreneurial ability according to the relevant policies and implementation opinions of the state for deepening innovation and entrepreneurship education in colleges and universities, and actively promoted the improvement of college students’ innovative and entrepreneurial ability. The college students’ innovation and entrepreneurship ability evaluation could be regarded as the classical multiple attribute group decision making (MAGDM) issue. The PULTSs could well depict uncertain information during the college students’ innovation and entrepreneurship ability evaluation and the combined compromise solution (CoCoSo) method is appropriate to stable the decision-making results. In this paper, the probabilistic uncertain linguistic combined compromise solution (PUL-CoCoSo) method based on the probabilistic uncertain linguistic sets (PULTSs) and combined compromise solution method is proposed for multiple attribute group decision making (MAGDM). The weights of attribute based on the CRITIC method are obtained under PULTSs. Finally, an application related to the college students’ innovation and entrepreneurship ability evaluation is utilized to demonstrate the usage of the developed algorithms.","PeriodicalId":44076,"journal":{"name":"International Journal of Knowledge-Based and Intelligent Engineering Systems","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140243558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LogTODIM framework for MAGDM with neutrosophic sets: Energy conservation and emission reduction case 中性集 MAGDM 的 LogTODIM 框架:节能减排案例
IF 0.7 Q3 Engineering Pub Date : 2024-03-14 DOI: 10.3233/kes-230076
Pan Jiang
The significant acceleration of China’s urbanization process has greatly promoted economic development. At the same time, the massive construction of urban buildings has also caused many problems such as environmental pollution and increased energy consumption. Therefore, in architectural design, it is particularly important to pay attention to the sustainable development of the environment, handle the relationship between good people and nature under the guidance of the concept of green development, and focus on the recycling of resources. Focusing on resource utilization in architectural design and based on certain planning can better control the construction process of urban buildings, save energy consumption, reduce construction costs, and contribute to the green development of cities. The comprehensive evaluation of energy conservation and emission reduction of construction projects is a classical MAGDM problems. Recently, the Logarithmic TODIM (LogTODIM) method has been employed to cope with MAGDM issues. The single-valued neutrosophic sets (SVNSs) are used as a tool for characterizing uncertain information during the comprehensive evaluation of energy conservation and emission reduction of construction projects. In this paper, the single-valued neutrosophic number Logarithmic TODIM (SVNN-LogTODIM) method is built to solve the MAGDM under SVNSs. In the end, a numerical case study for comprehensive evaluation of energy conservation and emission reduction of construction projects is given to validate the proposed method.
中国城市化进程的明显加快极大地促进了经济发展。与此同时,城市建筑的大量建设也带来了环境污染、能源消耗增加等诸多问题。因此,在建筑设计中,注重环境的可持续发展,在绿色发展理念的指导下处理好人与自然的关系,注重资源的循环利用显得尤为重要。在建筑设计中注重资源利用,在一定的规划基础上,可以更好地控制城市建筑的建设过程,节约能源消耗,降低建设成本,为城市的绿色发展做出贡献。建设项目节能减排综合评价是一个经典的 MAGDM 问题。最近,人们采用对数 TODIM(LogTODIM)方法来解决 MAGDM 问题。在建设项目节能减排综合评价过程中,单值中性集(SVNS)被用作表征不确定信息的工具。本文建立了单值中性数对数 TODIM(SVNN-LogTODIM)方法来求解 SVNS 下的 MAGDM。最后,给出了一个用于建筑项目节能减排综合评价的数值案例研究,以验证所提出的方法。
{"title":"LogTODIM framework for MAGDM with neutrosophic sets: Energy conservation and emission reduction case","authors":"Pan Jiang","doi":"10.3233/kes-230076","DOIUrl":"https://doi.org/10.3233/kes-230076","url":null,"abstract":"The significant acceleration of China’s urbanization process has greatly promoted economic development. At the same time, the massive construction of urban buildings has also caused many problems such as environmental pollution and increased energy consumption. Therefore, in architectural design, it is particularly important to pay attention to the sustainable development of the environment, handle the relationship between good people and nature under the guidance of the concept of green development, and focus on the recycling of resources. Focusing on resource utilization in architectural design and based on certain planning can better control the construction process of urban buildings, save energy consumption, reduce construction costs, and contribute to the green development of cities. The comprehensive evaluation of energy conservation and emission reduction of construction projects is a classical MAGDM problems. Recently, the Logarithmic TODIM (LogTODIM) method has been employed to cope with MAGDM issues. The single-valued neutrosophic sets (SVNSs) are used as a tool for characterizing uncertain information during the comprehensive evaluation of energy conservation and emission reduction of construction projects. In this paper, the single-valued neutrosophic number Logarithmic TODIM (SVNN-LogTODIM) method is built to solve the MAGDM under SVNSs. In the end, a numerical case study for comprehensive evaluation of energy conservation and emission reduction of construction projects is given to validate the proposed method.","PeriodicalId":44076,"journal":{"name":"International Journal of Knowledge-Based and Intelligent Engineering Systems","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140242928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced computer network security assessment through employing an integrated LogTODIM-TOPSIS technique under interval neutrosophic sets 通过采用区间中性集下的集成 LogTODIM-TOPSIS 技术加强计算机网络安全性评估
IF 0.7 Q3 Engineering Pub Date : 2024-03-07 DOI: 10.3233/kes-230239
Qiongqiong Sun, Longfei Yang
In the context of the development of the new era, computer network technology has become an indispensable and important technological means in people’s daily work and life. Through network technology, information resources can be collected, integrated, processed, and applied, thereby improving information analysis and mining capabilities, constructing big data environments for various industries, providing convenient and fast intelligent information services, and promoting social transformation and development. However, in practical development, network security issues seriously affect information security and social stability, and computer viruses and hackers pose a huge threat to computer systems. The computer network security evaluation is the MAGDM problems. Recently, the Logarithmic TODIM (LogTODIM) and TOPSIS technique has been utilized to cope with MAGDM issues. The interval neutrosophic sets (INSs) are utilized as a technique for characterizing uncertain information during the computer network security evaluation. In this paper, the interval neutrosophic number Logarithmic TODIM-TOPSIS (INN-LogTODIM-TOPSIS) technique is conducted to solve the MAGDM under INSs. Finally, a numerical case study for computer network security evaluation is utilized to validate the proposed technique. The prime contributions of this paper are put forward: (1) The entropy technique based on score values and accuracy value are conducted to obtain weight information under INSs; (2) an integrated INN-LogTODIM-TOPSIS technique is conducted to put forward the MAGDM issue; (3) An illustrative example for computer network security evaluation has been accomplished to put forward the INN-LogTODIM-TOPSIS technique.
在新时代发展背景下,计算机网络技术已经成为人们日常工作和生活中不可或缺的重要技术手段。通过网络技术,可以对信息资源进行收集、整合、处理和应用,从而提高信息分析和挖掘能力,为各行各业构建大数据环境,提供方便快捷的智能信息服务,促进社会转型和发展。然而,在实际发展中,网络安全问题严重影响信息安全和社会稳定,计算机病毒和黑客对计算机系统构成巨大威胁。计算机网络安全评估是 MAGDM 的难题。最近,人们利用对数 TODIM(LogTODIM)和 TOPSIS 技术来解决 MAGDM 问题。在计算机网络安全评估过程中,区间中性集(INS)被用作描述不确定信息的一种技术。本文采用区间中性数对数 TODIM-TOPSIS (INN-LogTODIM-TOPSIS)技术来解决 INSs 下的 MAGDM 问题。最后,利用计算机网络安全评估的数值案例研究验证了所提出的技术。本文的主要贡献在于:(1)基于分值和准确度值的熵技术获得了 INS 下的权重信息;(2)综合 INN-LogTODIM-TOPSIS 技术提出了 MAGDM 问题;(3)通过计算机网络安全评估的示例研究提出了 INN-LogTODIM-TOPSIS 技术。
{"title":"Enhanced computer network security assessment through employing an integrated LogTODIM-TOPSIS technique under interval neutrosophic sets","authors":"Qiongqiong Sun, Longfei Yang","doi":"10.3233/kes-230239","DOIUrl":"https://doi.org/10.3233/kes-230239","url":null,"abstract":"In the context of the development of the new era, computer network technology has become an indispensable and important technological means in people’s daily work and life. Through network technology, information resources can be collected, integrated, processed, and applied, thereby improving information analysis and mining capabilities, constructing big data environments for various industries, providing convenient and fast intelligent information services, and promoting social transformation and development. However, in practical development, network security issues seriously affect information security and social stability, and computer viruses and hackers pose a huge threat to computer systems. The computer network security evaluation is the MAGDM problems. Recently, the Logarithmic TODIM (LogTODIM) and TOPSIS technique has been utilized to cope with MAGDM issues. The interval neutrosophic sets (INSs) are utilized as a technique for characterizing uncertain information during the computer network security evaluation. In this paper, the interval neutrosophic number Logarithmic TODIM-TOPSIS (INN-LogTODIM-TOPSIS) technique is conducted to solve the MAGDM under INSs. Finally, a numerical case study for computer network security evaluation is utilized to validate the proposed technique. The prime contributions of this paper are put forward: (1) The entropy technique based on score values and accuracy value are conducted to obtain weight information under INSs; (2) an integrated INN-LogTODIM-TOPSIS technique is conducted to put forward the MAGDM issue; (3) An illustrative example for computer network security evaluation has been accomplished to put forward the INN-LogTODIM-TOPSIS technique.","PeriodicalId":44076,"journal":{"name":"International Journal of Knowledge-Based and Intelligent Engineering Systems","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140258201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on neural networks in computer network security evaluation and prediction methods 计算机网络安全评估和预测方法中的神经网络研究
IF 0.7 Q3 Engineering Pub Date : 2024-03-03 DOI: 10.3233/kes-230407
Hanyu Wei, Xu Zhao, Baolan Shi
Anomaly detection in networks to identify intrusions is a common and successful security measure used in many different types of network infrastructure. Network data traffic has increased due to the proliferation of viruses and other forms of cyber-attacks as network technology and applications have developed quickly. The limitations of classical intrusion detection, such as poor detection accuracy, high false negatives, and dependence on dimensionality reduction methods, become more apparent in the face of massive traffic volumes and characteristic information. That’s why IoT infrastructures often use Software-Defined Networking (SDN), allowing for better network adaptability and control. Hence, this paper’s convolutional neural network-based Security Evaluation Model (CNN-SEM) is proposed to secure the source SDN controller from traffic degradation and protect the source network from DDoS assaults. The proposed CNN-SEM system might defend against DDoS assaults once discovered by applying and testing a Convolutional Neural Network (CNN). The model can automatically extract the useful aspects of incursion samples, allowing for precise classification of such data. The detection and mitigation modules evaluate the proposed SDN security system’s performance, and the findings showed promise against next-generation DDoS assaults. The experimental results show the CNN-SEM achieves a high accuracy ratio of 96.6%, a detection ratio of 97.1%, precision ratio of 97.2%, a performance ratio of 95.1% and an enhanced security rate of 98.1% compared to other methods.
在网络中进行异常检测以识别入侵,是许多不同类型的网络基础设施所采用的一种常见且成功的安全措施。随着网络技术和应用的快速发展,病毒和其他形式的网络攻击不断扩散,网络数据流量也随之增加。传统入侵检测的局限性,如检测精度低、误判率高、依赖降维方法等,在面对海量流量和特征信息时变得更加明显。这就是为什么物联网基础设施经常使用软件定义网络(Software-Defined Networking,SDN),以实现更好的网络适应性和控制性。因此,本文提出了基于卷积神经网络的安全评估模型(CNN-SEM),以确保源 SDN 控制器免受流量劣化的影响,并保护源网络免受 DDoS 攻击。通过应用和测试卷积神经网络(CNN),一旦发现 DDoS 攻击,本文提出的 CNN-SEM 系统就能抵御 DDoS 攻击。该模型可自动提取入侵样本的有用方面,从而对此类数据进行精确分类。检测和缓解模块评估了拟议的 SDN 安全系统的性能,结果表明该系统有望应对下一代 DDoS 攻击。实验结果表明,与其他方法相比,CNN-SEM 实现了 96.6% 的高准确率、97.1% 的检测率、97.2% 的精确率、95.1% 的性能比和 98.1% 的增强安全率。
{"title":"Research on neural networks in computer network security evaluation and prediction methods","authors":"Hanyu Wei, Xu Zhao, Baolan Shi","doi":"10.3233/kes-230407","DOIUrl":"https://doi.org/10.3233/kes-230407","url":null,"abstract":"Anomaly detection in networks to identify intrusions is a common and successful security measure used in many different types of network infrastructure. Network data traffic has increased due to the proliferation of viruses and other forms of cyber-attacks as network technology and applications have developed quickly. The limitations of classical intrusion detection, such as poor detection accuracy, high false negatives, and dependence on dimensionality reduction methods, become more apparent in the face of massive traffic volumes and characteristic information. That’s why IoT infrastructures often use Software-Defined Networking (SDN), allowing for better network adaptability and control. Hence, this paper’s convolutional neural network-based Security Evaluation Model (CNN-SEM) is proposed to secure the source SDN controller from traffic degradation and protect the source network from DDoS assaults. The proposed CNN-SEM system might defend against DDoS assaults once discovered by applying and testing a Convolutional Neural Network (CNN). The model can automatically extract the useful aspects of incursion samples, allowing for precise classification of such data. The detection and mitigation modules evaluate the proposed SDN security system’s performance, and the findings showed promise against next-generation DDoS assaults. The experimental results show the CNN-SEM achieves a high accuracy ratio of 96.6%, a detection ratio of 97.1%, precision ratio of 97.2%, a performance ratio of 95.1% and an enhanced security rate of 98.1% compared to other methods.","PeriodicalId":44076,"journal":{"name":"International Journal of Knowledge-Based and Intelligent Engineering Systems","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140267462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hellinger distance measures on Pythagorean fuzzy environment via their applications 毕达哥拉斯模糊环境上的海灵格距离度量及其应用
IF 0.7 Q3 Engineering Pub Date : 2024-02-26 DOI: 10.3233/kes-230150
Zhe Liu
Pythagorean fuzzy sets (PFSs) are a versatile tool for handling uncertain problems and have proven effective in practical applications. However, many existing Pythagorean fuzzy distance measures have counter-intuitive situations, making it challenging to measure the difference between PFSs accurately. To address this issue, we propose two distance measures for PFSs inspired by the Hellinger distance measure. We also explore the properties of the proposed measures and provide several comparative examples with existing measures for PFSs, illustrating their superior performance in processing fuzzy information from PFSs. Finally, we further develop a new decision-making method on top of the proposed measures and evaluate its performance in two applications.
毕达哥拉斯模糊集(PFS)是处理不确定问题的一种通用工具,在实际应用中已被证明非常有效。然而,许多现有的毕达哥拉斯模糊距离度量方法都存在反直觉的情况,这使得精确测量 PFS 之间的差异具有挑战性。为了解决这个问题,我们受海灵格距离度量的启发,提出了两种 PFS 的距离度量。我们还探讨了所提测量方法的特性,并提供了几个与现有 PFS 测量方法的比较实例,说明它们在处理来自 PFS 的模糊信息时表现出色。最后,我们在提出的度量方法基础上进一步开发了一种新的决策方法,并在两个应用中对其性能进行了评估。
{"title":"Hellinger distance measures on Pythagorean fuzzy environment via their applications","authors":"Zhe Liu","doi":"10.3233/kes-230150","DOIUrl":"https://doi.org/10.3233/kes-230150","url":null,"abstract":"Pythagorean fuzzy sets (PFSs) are a versatile tool for handling uncertain problems and have proven effective in practical applications. However, many existing Pythagorean fuzzy distance measures have counter-intuitive situations, making it challenging to measure the difference between PFSs accurately. To address this issue, we propose two distance measures for PFSs inspired by the Hellinger distance measure. We also explore the properties of the proposed measures and provide several comparative examples with existing measures for PFSs, illustrating their superior performance in processing fuzzy information from PFSs. Finally, we further develop a new decision-making method on top of the proposed measures and evaluate its performance in two applications.","PeriodicalId":44076,"journal":{"name":"International Journal of Knowledge-Based and Intelligent Engineering Systems","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140429699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Knowledge-Based and Intelligent Engineering Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1