The weapon and equipment operational requirement analysis (WEORA) is a necessary condition to win a future war, among which the acquisition of knowledge about weapons and equipment is a great challenge. The main challenge is that the existing weapons and equipment data fails to carry out structured knowledge representation, and knowledge navigation based on natural language cannot efficiently support the WEORA. To solve above problem, this research proposes a method based on question answering (QA) of weapons and equipment knowledge graph (WEKG) to construct and navigate the knowledge related to weapons and equipment in the WEORA. This method firstly constructs the WEKG, and builds a neutral network-based QA system over the WEKG by means of semantic parsing for knowledge navigation. Finally, the method is evaluated and a chatbot on the QA system is developed for the WEORA. Our proposed method has good performance in the accuracy and efficiency of searching target knowledge, and can well assist the WEORA.
{"title":"Operational Requirements Analysis Method Based on Question Answering of WEKG","authors":"Zhiwei Zhang, Yajie Dou, Xiangqian Xu, Yufeng Ma, Jiang Jiang, Yuejin Tan","doi":"10.23919/jsee.2024.000004","DOIUrl":"https://doi.org/10.23919/jsee.2024.000004","url":null,"abstract":"The weapon and equipment operational requirement analysis (WEORA) is a necessary condition to win a future war, among which the acquisition of knowledge about weapons and equipment is a great challenge. The main challenge is that the existing weapons and equipment data fails to carry out structured knowledge representation, and knowledge navigation based on natural language cannot efficiently support the WEORA. To solve above problem, this research proposes a method based on question answering (QA) of weapons and equipment knowledge graph (WEKG) to construct and navigate the knowledge related to weapons and equipment in the WEORA. This method firstly constructs the WEKG, and builds a neutral network-based QA system over the WEKG by means of semantic parsing for knowledge navigation. Finally, the method is evaluated and a chatbot on the QA system is developed for the WEORA. Our proposed method has good performance in the accuracy and efficiency of searching target knowledge, and can well assist the WEORA.","PeriodicalId":50030,"journal":{"name":"Journal of Systems Engineering and Electronics","volume":"28 1","pages":""},"PeriodicalIF":2.1,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141060270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-14DOI: 10.23919/jsee.2024.000029
Qingyuan Zhang, Xiaoyang Li, Tianpei Zu, Rui Kang
This paper systematically introduces and reviews a scientific exploration of reliability called the belief reliability. Beginning with the origin of reliability engineering, the problems of present theories for reliability engineering are summarized as a query, a dilemma, and a puzzle. Then, through philosophical reflection, we introduce the theoretical solutions given by belief reliability theory, including scientific principles, basic equations, reliability science experiments, and mathematical measures. The basic methods and technologies of belief reliability, namely, belief reliability analysis, function-oriented belief reliability design, belief reliability evaluation, and several newly developed methods and technologies are sequentially elaborated and overviewed. Based on the above investigations, we summarize the significance of belief reliability theory and make some prospects about future research, aiming to promote the development of reliability science and engineering.
{"title":"Belief Reliability: A Scientific Exploration of Reliability Engineering","authors":"Qingyuan Zhang, Xiaoyang Li, Tianpei Zu, Rui Kang","doi":"10.23919/jsee.2024.000029","DOIUrl":"https://doi.org/10.23919/jsee.2024.000029","url":null,"abstract":"This paper systematically introduces and reviews a scientific exploration of reliability called the belief reliability. Beginning with the origin of reliability engineering, the problems of present theories for reliability engineering are summarized as a query, a dilemma, and a puzzle. Then, through philosophical reflection, we introduce the theoretical solutions given by belief reliability theory, including scientific principles, basic equations, reliability science experiments, and mathematical measures. The basic methods and technologies of belief reliability, namely, belief reliability analysis, function-oriented belief reliability design, belief reliability evaluation, and several newly developed methods and technologies are sequentially elaborated and overviewed. Based on the above investigations, we summarize the significance of belief reliability theory and make some prospects about future research, aiming to promote the development of reliability science and engineering.","PeriodicalId":50030,"journal":{"name":"Journal of Systems Engineering and Electronics","volume":"49 1","pages":""},"PeriodicalIF":2.1,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141547478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-12DOI: 10.23919/jsee.2024.000016
Wei Song, Tong Wang, Guangxin Yang, Peng Zhang
The formation control of multiple unmanned aerial vehicles (multi-UAVs) has always been a research hotspot. Based on the straight line trajectory, a multi-UAVs target point assignment algorithm based on the assignment probability is proposed to achieve the shortest overall formation path of multi-UAVs with low complexity and reduce the energy consumption. In order to avoid the collision between UAVs in the formation process, the concept of safety ball is introduced, and the collision detection based on continuous motion of two time slots and the lane occupation detection after motion is proposed to avoid collision between UAVs. Based on the idea of game theory, a method of UAV motion form setting based on the maximization of interests is proposed, including the maximization of self-interest and the maximization of formation interest is proposed, so that multi-UAVs can complete the formation task quickly and reasonably with the linear trajectory assigned in advance. Finally, through simulation verification, the multi-UAVs target assignment algorithm based on the assignment probability proposed in this paper can effectively reduce the total path length, and the UAV motion selection method based on the maximization interests can effectively complete the task formation.
{"title":"A Self-Organization Formation Configuration Based Assignment Probability and Collision Detection","authors":"Wei Song, Tong Wang, Guangxin Yang, Peng Zhang","doi":"10.23919/jsee.2024.000016","DOIUrl":"https://doi.org/10.23919/jsee.2024.000016","url":null,"abstract":"The formation control of multiple unmanned aerial vehicles (multi-UAVs) has always been a research hotspot. Based on the straight line trajectory, a multi-UAVs target point assignment algorithm based on the assignment probability is proposed to achieve the shortest overall formation path of multi-UAVs with low complexity and reduce the energy consumption. In order to avoid the collision between UAVs in the formation process, the concept of safety ball is introduced, and the collision detection based on continuous motion of two time slots and the lane occupation detection after motion is proposed to avoid collision between UAVs. Based on the idea of game theory, a method of UAV motion form setting based on the maximization of interests is proposed, including the maximization of self-interest and the maximization of formation interest is proposed, so that multi-UAVs can complete the formation task quickly and reasonably with the linear trajectory assigned in advance. Finally, through simulation verification, the multi-UAVs target assignment algorithm based on the assignment probability proposed in this paper can effectively reduce the total path length, and the UAV motion selection method based on the maximization interests can effectively complete the task formation.","PeriodicalId":50030,"journal":{"name":"Journal of Systems Engineering and Electronics","volume":"50 1","pages":""},"PeriodicalIF":2.1,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140154719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-12DOI: 10.23919/jsee.2024.000010
Chun Su, Kui Huang
Nowadays manufacturers are facing fierce challenge. Apart from the products, providing customers with multiple maintenance options in the service contract becomes more popular, since it can help to improve customer satisfaction, and ultimately promote sales and maximize profit for the manufacturer. By considering the combinations of corrective maintenance and preventive maintenance, totally three types of maintenance service contracts are designed. Moreover, attractive incentive and penalty mechanisms are adopted in the contracts. On this basis, Nash non-cooperative game is applied to analyze the revenue for both the manufacturer and customers, and so as to optimize the pricing mechanism of maintenance service contract and achieve a win-win situation. Numerical experiments are conducted. The results show that by taking into account the incentive and penalty mechanisms, the revenue can be improved for both the customers and manufacturer. Moreover, with the increase of repair rate and improvement factor in the preventive maintenance, the revenue will increase gradually for both the parties.
{"title":"Design and Pricing of Maintenance Service Contract Based on Nash Non-Cooperative Game Approach","authors":"Chun Su, Kui Huang","doi":"10.23919/jsee.2024.000010","DOIUrl":"https://doi.org/10.23919/jsee.2024.000010","url":null,"abstract":"Nowadays manufacturers are facing fierce challenge. Apart from the products, providing customers with multiple maintenance options in the service contract becomes more popular, since it can help to improve customer satisfaction, and ultimately promote sales and maximize profit for the manufacturer. By considering the combinations of corrective maintenance and preventive maintenance, totally three types of maintenance service contracts are designed. Moreover, attractive incentive and penalty mechanisms are adopted in the contracts. On this basis, Nash non-cooperative game is applied to analyze the revenue for both the manufacturer and customers, and so as to optimize the pricing mechanism of maintenance service contract and achieve a win-win situation. Numerical experiments are conducted. The results show that by taking into account the incentive and penalty mechanisms, the revenue can be improved for both the customers and manufacturer. Moreover, with the increase of repair rate and improvement factor in the preventive maintenance, the revenue will increase gradually for both the parties.","PeriodicalId":50030,"journal":{"name":"Journal of Systems Engineering and Electronics","volume":"27 1","pages":""},"PeriodicalIF":2.1,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140154836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-12DOI: 10.23919/jsee.2024.000026
Yong Yang, Boyu Yang
In this paper, a comprehensive overview of radar detection methods for low-altitude targets in maritime environments is presented, focusing on the challenges posed by sea clutter and multipath scattering. The performance of the radar detection methods under sea clutter, multipath, and combined conditions is categorized and summarized, and future research directions are outlined to enhance radar detection performance for low-altitude targets in maritime environments.
{"title":"Overview of Radar Detection Methods for Low Altitude Targets in Marine Environments","authors":"Yong Yang, Boyu Yang","doi":"10.23919/jsee.2024.000026","DOIUrl":"https://doi.org/10.23919/jsee.2024.000026","url":null,"abstract":"In this paper, a comprehensive overview of radar detection methods for low-altitude targets in maritime environments is presented, focusing on the challenges posed by sea clutter and multipath scattering. The performance of the radar detection methods under sea clutter, multipath, and combined conditions is categorized and summarized, and future research directions are outlined to enhance radar detection performance for low-altitude targets in maritime environments.","PeriodicalId":50030,"journal":{"name":"Journal of Systems Engineering and Electronics","volume":"24 1","pages":""},"PeriodicalIF":2.1,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140154956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-12DOI: 10.23919/jsee.2023.000164
Yufeng Ma, Yajie Dou, Xiangqian Xu, Qingyang Jia, Yuejin Tan
Based on the characteristics of high-end products, crowd-sourcing user stories can be seen as an effective means of gathering requirements, involving a large user base and generating a substantial amount of unstructured feedback. The key challenge lies in transforming abstract user needs into specific ones, requiring integration and analysis. Therefore, we propose a topic mining-based approach to categorize, summarize, and rank product requirements from user stories. Specifically, after determining the number of story categories based on pyLDAvis, we initially classify “I want to” phrases within user stories. Subsequently, classic topic models are applied to each category to generate their names, defining each post-classification user story category as a requirement. Furthermore, a weighted ranking function is devised to calculate the importance of each requirement. Finally, we validate the effectiveness and feasibility of the proposed method using 2 966 crowd-sourced user stories related to smart home systems.
{"title":"Requirements Ranking Based on Crowd-Sourcing High-End Product USs","authors":"Yufeng Ma, Yajie Dou, Xiangqian Xu, Qingyang Jia, Yuejin Tan","doi":"10.23919/jsee.2023.000164","DOIUrl":"https://doi.org/10.23919/jsee.2023.000164","url":null,"abstract":"Based on the characteristics of high-end products, crowd-sourcing user stories can be seen as an effective means of gathering requirements, involving a large user base and generating a substantial amount of unstructured feedback. The key challenge lies in transforming abstract user needs into specific ones, requiring integration and analysis. Therefore, we propose a topic mining-based approach to categorize, summarize, and rank product requirements from user stories. Specifically, after determining the number of story categories based on pyLDAvis, we initially classify “I want to” phrases within user stories. Subsequently, classic topic models are applied to each category to generate their names, defining each post-classification user story category as a requirement. Furthermore, a weighted ranking function is devised to calculate the importance of each requirement. Finally, we validate the effectiveness and feasibility of the proposed method using 2 966 crowd-sourced user stories related to smart home systems.","PeriodicalId":50030,"journal":{"name":"Journal of Systems Engineering and Electronics","volume":"144 1","pages":""},"PeriodicalIF":2.1,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140154724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-12DOI: 10.23919/jsee.2024.000018
Xiaolong Xu, Shuai Jiang, Jinbo Zhao, Xinheng Wang
The rapid growth of mobile applications, the popularity of the Android system and its openness have attracted many hackers and even criminals, who are creating lots of Android malware. However, the current methods of Android malware detection need a lot of time in the feature engineering phase. Furthermore, these models have the defects of low detection rate, high complexity, and poor practicability, etc. We analyze the Android malware samples, and the distribution of malware and benign software in application programming interface (API) calls, permissions, and other attributes. We classify the software's threat levels based on the correlation of features. Then, we propose deep neural networks and convolutional neural networks with ensemble learning (DCEL), a new classifier fusion model for Android malware detection. First, DCEL preprocesses the malware data to remove redundant data, and converts the one-dimensional data into a two-dimensional gray image. Then, the ensemble learning approach is used to combine the deep neural network with the convolutional neural network, and the final classification results are obtained by voting on the prediction of each single classifier. Experiments based on the Drebin and Malgenome datasets show that compared with current state-of-art models, the proposed DCEL has a higher detection rate, higher recall rate, and lower computational cost.
{"title":"DCEL: Classifier Fusion Model for Android Malware Detection","authors":"Xiaolong Xu, Shuai Jiang, Jinbo Zhao, Xinheng Wang","doi":"10.23919/jsee.2024.000018","DOIUrl":"https://doi.org/10.23919/jsee.2024.000018","url":null,"abstract":"The rapid growth of mobile applications, the popularity of the Android system and its openness have attracted many hackers and even criminals, who are creating lots of Android malware. However, the current methods of Android malware detection need a lot of time in the feature engineering phase. Furthermore, these models have the defects of low detection rate, high complexity, and poor practicability, etc. We analyze the Android malware samples, and the distribution of malware and benign software in application programming interface (API) calls, permissions, and other attributes. We classify the software's threat levels based on the correlation of features. Then, we propose deep neural networks and convolutional neural networks with ensemble learning (DCEL), a new classifier fusion model for Android malware detection. First, DCEL preprocesses the malware data to remove redundant data, and converts the one-dimensional data into a two-dimensional gray image. Then, the ensemble learning approach is used to combine the deep neural network with the convolutional neural network, and the final classification results are obtained by voting on the prediction of each single classifier. Experiments based on the Drebin and Malgenome datasets show that compared with current state-of-art models, the proposed DCEL has a higher detection rate, higher recall rate, and lower computational cost.","PeriodicalId":50030,"journal":{"name":"Journal of Systems Engineering and Electronics","volume":"123 1","pages":""},"PeriodicalIF":2.1,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140154665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-12DOI: 10.23919/jsee.2023.000166
Shihua Zhang, Xiaohui Qi, Sen Yang
In this paper, a bandwidth-adjustable extended state observer (ABESO) is proposed for the systems with measurement noise. It is known that increasing the bandwidth of the observer improves the tracking speed but tolerates noise, which conflicts with observation accuracy. Therefore, we introduce a bandwidth scaling factor such that ABESO is formulated to a 2-degree-of-freedom system. The observer gain is determined and the bandwidth scaling factor adjusts the bandwidth according to the tracking error. When the tracking error decreases, the bandwidth decreases to suppress the noise, otherwise the bandwidth does not change. It is proven that the error dynamics are bounded and converge in finite time. The relationship between the upper bound of the estimation error and the scaling factor is given. When the scaling factor is less than 1, the ABESO has higher estimation accuracy than the linear extended state observer (LESO). Simulations of an uncertain nonlinear system with compound disturbances show that the proposed ABESO can successfully estimate the total disturbance in noisy environments. The mean error of total disturbance of ABESO is 15.28% lower than that of LESO.
{"title":"An Extended State Observer with Adjustable Bandwidth for Measurement Noise","authors":"Shihua Zhang, Xiaohui Qi, Sen Yang","doi":"10.23919/jsee.2023.000166","DOIUrl":"https://doi.org/10.23919/jsee.2023.000166","url":null,"abstract":"In this paper, a bandwidth-adjustable extended state observer (ABESO) is proposed for the systems with measurement noise. It is known that increasing the bandwidth of the observer improves the tracking speed but tolerates noise, which conflicts with observation accuracy. Therefore, we introduce a bandwidth scaling factor such that ABESO is formulated to a 2-degree-of-freedom system. The observer gain is determined and the bandwidth scaling factor adjusts the bandwidth according to the tracking error. When the tracking error decreases, the bandwidth decreases to suppress the noise, otherwise the bandwidth does not change. It is proven that the error dynamics are bounded and converge in finite time. The relationship between the upper bound of the estimation error and the scaling factor is given. When the scaling factor is less than 1, the ABESO has higher estimation accuracy than the linear extended state observer (LESO). Simulations of an uncertain nonlinear system with compound disturbances show that the proposed ABESO can successfully estimate the total disturbance in noisy environments. The mean error of total disturbance of ABESO is 15.28% lower than that of LESO.","PeriodicalId":50030,"journal":{"name":"Journal of Systems Engineering and Electronics","volume":"107 1","pages":""},"PeriodicalIF":2.1,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140154722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-12DOI: 10.23919/jsee.2024.000017
Muhammad Wasim, Ahsan Ali, Mohammad Ahmad Choudhry, Inam Ul Hasan Shaikh, Faisal Saleem
The robotic airship can provide a promising aerostatic platform for many potential applications. These applications require a precise autonomous trajectory tracking control for airship. Airship has a nonlinear and uncertain dynamics. It is prone to wind disturbances that offer a challenge for a trajectory tracking control design. This paper addresses the airship trajectory tracking problem having time varying reference path. A lumped parameter estimation approach under model uncertainties and wind disturbances is opted against distributed parameters. It uses extended Kalman filter (EKF) for uncertainty and disturbance estimation. The estimated parameters are used by sliding mode controller (SMC) for ultimate control of airship trajectory tracking. This comprehensive algorithm, EKF based SMC (ESMC), is used as a robust solution to track airship trajectory. The proposed estimator provides the estimates of wind disturbances as well as model uncertainty due to the mass matrix variations and aerodynamic model inaccuracies. The stability and convergence of the proposed method are investigated using the Lyapunov stability analysis. The simulation results show that the proposed method efficiently tracks the desired trajectory. The method solves the stability, convergence, and chattering problem of SMC under model uncertainties and wind disturbances.
{"title":"Robust Design of Sliding Mode Control for Airship Trajectory Tracking with Uncertainty and Disturbance Estimation","authors":"Muhammad Wasim, Ahsan Ali, Mohammad Ahmad Choudhry, Inam Ul Hasan Shaikh, Faisal Saleem","doi":"10.23919/jsee.2024.000017","DOIUrl":"https://doi.org/10.23919/jsee.2024.000017","url":null,"abstract":"The robotic airship can provide a promising aerostatic platform for many potential applications. These applications require a precise autonomous trajectory tracking control for airship. Airship has a nonlinear and uncertain dynamics. It is prone to wind disturbances that offer a challenge for a trajectory tracking control design. This paper addresses the airship trajectory tracking problem having time varying reference path. A lumped parameter estimation approach under model uncertainties and wind disturbances is opted against distributed parameters. It uses extended Kalman filter (EKF) for uncertainty and disturbance estimation. The estimated parameters are used by sliding mode controller (SMC) for ultimate control of airship trajectory tracking. This comprehensive algorithm, EKF based SMC (ESMC), is used as a robust solution to track airship trajectory. The proposed estimator provides the estimates of wind disturbances as well as model uncertainty due to the mass matrix variations and aerodynamic model inaccuracies. The stability and convergence of the proposed method are investigated using the Lyapunov stability analysis. The simulation results show that the proposed method efficiently tracks the desired trajectory. The method solves the stability, convergence, and chattering problem of SMC under model uncertainties and wind disturbances.","PeriodicalId":50030,"journal":{"name":"Journal of Systems Engineering and Electronics","volume":"9 1","pages":""},"PeriodicalIF":2.1,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140154736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-12DOI: 10.23919/jsee.2024.000019
Youliang Lin, Wu Li, Gang Liu, Dong Huang
Aiming at the triangular fuzzy (TF) multi-attribute decision making (MADM) problem with a preference for the distribution density of attribute (DDA), a decision making method with TF number two-dimensional density (TFTD) operator is proposed based on the density operator theory for the decision maker (DM). Firstly, a simple TF vector clustering method is proposed, which considers the feature of TF number and the geometric distance of vectors. Secondly, the least deviation sum of squares method is used in the program model to obtain the density weight vector. Then, two TFTD operators are defined, and the MADM method based on the TFTD operator is proposed. Finally, a numerical example is given to illustrate the superiority of this method, which can not only solve the TF MADM problem with a preference for the DDA but also help the DM make an overall comparison.
{"title":"Method for Triangular Fuzzy Multiple Attribute Decision Making Based on Two-Dimensional Density Operator Method","authors":"Youliang Lin, Wu Li, Gang Liu, Dong Huang","doi":"10.23919/jsee.2024.000019","DOIUrl":"https://doi.org/10.23919/jsee.2024.000019","url":null,"abstract":"Aiming at the triangular fuzzy (TF) multi-attribute decision making (MADM) problem with a preference for the distribution density of attribute (DDA), a decision making method with TF number two-dimensional density (TFTD) operator is proposed based on the density operator theory for the decision maker (DM). Firstly, a simple TF vector clustering method is proposed, which considers the feature of TF number and the geometric distance of vectors. Secondly, the least deviation sum of squares method is used in the program model to obtain the density weight vector. Then, two TFTD operators are defined, and the MADM method based on the TFTD operator is proposed. Finally, a numerical example is given to illustrate the superiority of this method, which can not only solve the TF MADM problem with a preference for the DDA but also help the DM make an overall comparison.","PeriodicalId":50030,"journal":{"name":"Journal of Systems Engineering and Electronics","volume":"123 1","pages":""},"PeriodicalIF":2.1,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140154955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}