Pub Date : 2023-12-04DOI: 10.1080/03081079.2023.2282988
Yue Xu, Chen Fei, Weiyin Fei
In the context of “dual carbon” objectives, ESG investment concept has received wide attention. In this paper, based on stochastic systems and stakeholder theory, we analyze the interest requiremen...
{"title":"Optimal dynamic contract with Knightian uncertainty of ESG rating","authors":"Yue Xu, Chen Fei, Weiyin Fei","doi":"10.1080/03081079.2023.2282988","DOIUrl":"https://doi.org/10.1080/03081079.2023.2282988","url":null,"abstract":"In the context of “dual carbon” objectives, ESG investment concept has received wide attention. In this paper, based on stochastic systems and stakeholder theory, we analyze the interest requiremen...","PeriodicalId":50322,"journal":{"name":"International Journal of General Systems","volume":"93 ","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138507443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-12DOI: 10.1080/03081079.2023.2276710
Xiangjun Wu, Shuo Ding, Ben Niu, Ning Xu, Xudong Zhao
AbstractThis paper investigates the problem of predefined-time event-triggered adaptive tracking control for strict-feedback nonlinear systems (SFNSs) with full-state constraints. To handle asymmetric full-state constraints, a nonlinear state-dependent function (NSDF) that purely depends on the constraint state is introduced. Then, a switching threshold event-triggered mechanism (ETM) is designed to enhance usage efficiency of communication resources. Moreover, a predefined-time event-triggered adaptive tracking controller is constructed by incorporating a smooth tuning function into each step of the backstepping design based on dynamic surface technology. Under such a control scheme, the output tracking error can be steered to the small neighborhood of the origin within the user setting time. Compared to various previous control schemes developed for full-state constrained systems, our proposed method can circumvent the demanding feasibility conditions in controller designs. Finally, a simulation result is given to illustrate the effectiveness of the control scheme.Keywords: Event-triggered controlfull-state constraintsfeasibility conditionstime-varying tuning function AcknowledgmentsThe authors gratefully acknowledge anonymous editors and reviewers.Data availability statementDue to the nature of this research, participants of this study did not agree for their data to be shared publicly, so supporting data is not available.Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThis work was partially supported by the National Natural Science Foundation of China [grant number 62203064].
{"title":"Predefined-time event-triggered adaptive tracking control for strict-feedback nonlinear systems with full-state constraints","authors":"Xiangjun Wu, Shuo Ding, Ben Niu, Ning Xu, Xudong Zhao","doi":"10.1080/03081079.2023.2276710","DOIUrl":"https://doi.org/10.1080/03081079.2023.2276710","url":null,"abstract":"AbstractThis paper investigates the problem of predefined-time event-triggered adaptive tracking control for strict-feedback nonlinear systems (SFNSs) with full-state constraints. To handle asymmetric full-state constraints, a nonlinear state-dependent function (NSDF) that purely depends on the constraint state is introduced. Then, a switching threshold event-triggered mechanism (ETM) is designed to enhance usage efficiency of communication resources. Moreover, a predefined-time event-triggered adaptive tracking controller is constructed by incorporating a smooth tuning function into each step of the backstepping design based on dynamic surface technology. Under such a control scheme, the output tracking error can be steered to the small neighborhood of the origin within the user setting time. Compared to various previous control schemes developed for full-state constrained systems, our proposed method can circumvent the demanding feasibility conditions in controller designs. Finally, a simulation result is given to illustrate the effectiveness of the control scheme.Keywords: Event-triggered controlfull-state constraintsfeasibility conditionstime-varying tuning function AcknowledgmentsThe authors gratefully acknowledge anonymous editors and reviewers.Data availability statementDue to the nature of this research, participants of this study did not agree for their data to be shared publicly, so supporting data is not available.Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThis work was partially supported by the National Natural Science Foundation of China [grant number 62203064].","PeriodicalId":50322,"journal":{"name":"International Journal of General Systems","volume":"80 18","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135037227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-08DOI: 10.1080/03081079.2023.2276703
Lifen Jia, Dongao Li, Fengjia Guo, Bowen Zhang
AbstractKnock-in options are a type of barrier option that become active when the value of the underlying asset exceeds a predetermined target. This paper investigates knock-in options based on the mean-reverting stock model within an uncertain environment where the interest rate is dynamic and the stock price follows a geometric process. We subsequently provide the price formulas for the European up-and-in call option and European down-and-in put option. Additionally, we apply real data from the financial market and employ moments estimation to derive the optimal parameters of the stock model under bullish and bearish conditions, respectively. Hypothesis testing is subsequently utilized to assess the fitting effect between the model and data. Finally, the numerical experiments are set to verify the validity of the formulas by observing the influence of parameters on the option price.Keywords: Mean-reverting stock modelknock-in optionparameter estimationfloating interest rateoption pricing formula Disclosure statementNo potential conflict of interest was reported by the author(s).Data availabilityThe datasets generated during and/or analyzed during the current study are available from the corresponding author on reasonable request.Additional informationFundingThis work was supported by the Project of Teachers' Constructions in Beijing Municipal Universities in the Period of 14th Five-year Plan [No. BPHR20220120] and R&D Program of Beijing Municipal Education Commission [No. KM202110038001].
{"title":"Knock-in options of mean-reverting stock model with floating interest rate in uncertain environment","authors":"Lifen Jia, Dongao Li, Fengjia Guo, Bowen Zhang","doi":"10.1080/03081079.2023.2276703","DOIUrl":"https://doi.org/10.1080/03081079.2023.2276703","url":null,"abstract":"AbstractKnock-in options are a type of barrier option that become active when the value of the underlying asset exceeds a predetermined target. This paper investigates knock-in options based on the mean-reverting stock model within an uncertain environment where the interest rate is dynamic and the stock price follows a geometric process. We subsequently provide the price formulas for the European up-and-in call option and European down-and-in put option. Additionally, we apply real data from the financial market and employ moments estimation to derive the optimal parameters of the stock model under bullish and bearish conditions, respectively. Hypothesis testing is subsequently utilized to assess the fitting effect between the model and data. Finally, the numerical experiments are set to verify the validity of the formulas by observing the influence of parameters on the option price.Keywords: Mean-reverting stock modelknock-in optionparameter estimationfloating interest rateoption pricing formula Disclosure statementNo potential conflict of interest was reported by the author(s).Data availabilityThe datasets generated during and/or analyzed during the current study are available from the corresponding author on reasonable request.Additional informationFundingThis work was supported by the Project of Teachers' Constructions in Beijing Municipal Universities in the Period of 14th Five-year Plan [No. BPHR20220120] and R&D Program of Beijing Municipal Education Commission [No. KM202110038001].","PeriodicalId":50322,"journal":{"name":"International Journal of General Systems","volume":" 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135341290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-29DOI: 10.1080/03081079.2023.2272036
B. Bedregal, C. G. da Costa, E. Palmeira, E. Mansilla, B. L. L. Bedregal
{"title":"A generalization of the Moore and Yang integral and interval probability density functions","authors":"B. Bedregal, C. G. da Costa, E. Palmeira, E. Mansilla, B. L. L. Bedregal","doi":"10.1080/03081079.2023.2272036","DOIUrl":"https://doi.org/10.1080/03081079.2023.2272036","url":null,"abstract":"","PeriodicalId":50322,"journal":{"name":"International Journal of General Systems","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136157834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-23DOI: 10.1080/03081079.2023.2270138
Sana Younes, Maroua Idi, Riadh Robbana
AbstractTwo important Quality-of-Service (QoS) measures for cellular networks are the fractions of New Calls (NCs) and Handoff Calls (HCs). These types of calls are usually blocked or dropped for two reasons: radio channels are occupied (performance reason) or failure of radio channels (availability reason). Call Admission Control (CAC) is a technique that accepts or rejects user requests in a network. This paper proposes two new CAC schemes for Long Term Evolution (LTE) networks supporting two classes of services (Real-Time (RT) and Non-Real-Time (NRT)). The proposed CAC schemes are composites, meaning that they consider performance changes associated with the failure and recovery of radio channels. We use the Probabilistic Model Checking (PMC) to perform a comparative analysis between the performability measures (combination of performance and availability measures) of the proposed composite CAC schemes and an existing pure performance model. First, we model the composite CAC schemes with multidimensional Continuous Time Markov Chain (CTMC). Then, we specify QoS requirements through the CTMC using the Continuous-time Stochastic Logic (CSL). Finally, we quantify the performability measures of the composite CAC schemes by checking CSL steady-state, transient, and path formulas using the PRISM model checker.KEYWORDS: LTE networksCACschemesCSLCTMCPRISM model checkerperformability modeling Disclosure statementNo potential conflict of interest was reported by the author(s).
{"title":"Performability analysis of multi-service call admission control schemes in LTE networks","authors":"Sana Younes, Maroua Idi, Riadh Robbana","doi":"10.1080/03081079.2023.2270138","DOIUrl":"https://doi.org/10.1080/03081079.2023.2270138","url":null,"abstract":"AbstractTwo important Quality-of-Service (QoS) measures for cellular networks are the fractions of New Calls (NCs) and Handoff Calls (HCs). These types of calls are usually blocked or dropped for two reasons: radio channels are occupied (performance reason) or failure of radio channels (availability reason). Call Admission Control (CAC) is a technique that accepts or rejects user requests in a network. This paper proposes two new CAC schemes for Long Term Evolution (LTE) networks supporting two classes of services (Real-Time (RT) and Non-Real-Time (NRT)). The proposed CAC schemes are composites, meaning that they consider performance changes associated with the failure and recovery of radio channels. We use the Probabilistic Model Checking (PMC) to perform a comparative analysis between the performability measures (combination of performance and availability measures) of the proposed composite CAC schemes and an existing pure performance model. First, we model the composite CAC schemes with multidimensional Continuous Time Markov Chain (CTMC). Then, we specify QoS requirements through the CTMC using the Continuous-time Stochastic Logic (CSL). Finally, we quantify the performability measures of the composite CAC schemes by checking CSL steady-state, transient, and path formulas using the PRISM model checker.KEYWORDS: LTE networksCACschemesCSLCTMCPRISM model checkerperformability modeling Disclosure statementNo potential conflict of interest was reported by the author(s).","PeriodicalId":50322,"journal":{"name":"International Journal of General Systems","volume":"40 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135412632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-23DOI: 10.1080/03081079.2023.2271134
Honghua Shi, Yaodong Ni
AbstractModern supply chain operates in a highly uncertain environment caused by natural disasters and market changes. Such a fact has motivated academics and practitioners to pay more attention to the supply chain resilience. This paper reports on designing a resilient supply chain under uncertain environment by an uncertain programming method. The desired resilience level against disruption is achieved with less redundancy by controlling them in the presented models. And parameter uncertainty caused by the limited historical data is also addressed using uncertainty theory. To cope with the problem's complexity, we convert the proposed models into their deterministic formulations, which can easily be solved by cplex solver. The results from sensitivity analysis demonstrate the necessity of including uncertainty during the planning phase of supply chain network design. The performance of resilience constraint and the positive effect of sticker redundancy constraint in improving service level are also investigated fully.KEYWORDS: Uncertainty programmingsupply chain designdisruption riskparameter uncertainty Disclosure statementNo potential conflict of interest was reported by the author(s).Data availability statementAll data generated or used during the study appear in the submitted article.Additional informationFundingThis work was supported by the Fundamental Research Funds for the Central Universities in UIBE [22YB10], Program for the Philosophy and Social Sciences Research of Higher Learning Institutions of Shanxi [2022W067].
{"title":"Resilient supply chain network design under uncertain environment","authors":"Honghua Shi, Yaodong Ni","doi":"10.1080/03081079.2023.2271134","DOIUrl":"https://doi.org/10.1080/03081079.2023.2271134","url":null,"abstract":"AbstractModern supply chain operates in a highly uncertain environment caused by natural disasters and market changes. Such a fact has motivated academics and practitioners to pay more attention to the supply chain resilience. This paper reports on designing a resilient supply chain under uncertain environment by an uncertain programming method. The desired resilience level against disruption is achieved with less redundancy by controlling them in the presented models. And parameter uncertainty caused by the limited historical data is also addressed using uncertainty theory. To cope with the problem's complexity, we convert the proposed models into their deterministic formulations, which can easily be solved by cplex solver. The results from sensitivity analysis demonstrate the necessity of including uncertainty during the planning phase of supply chain network design. The performance of resilience constraint and the positive effect of sticker redundancy constraint in improving service level are also investigated fully.KEYWORDS: Uncertainty programmingsupply chain designdisruption riskparameter uncertainty Disclosure statementNo potential conflict of interest was reported by the author(s).Data availability statementAll data generated or used during the study appear in the submitted article.Additional informationFundingThis work was supported by the Fundamental Research Funds for the Central Universities in UIBE [22YB10], Program for the Philosophy and Social Sciences Research of Higher Learning Institutions of Shanxi [2022W067].","PeriodicalId":50322,"journal":{"name":"International Journal of General Systems","volume":"24 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135411966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-23DOI: 10.1080/03081079.2023.2270771
Zhi-qiang Liu
AbstractIn this paper, we completely characterize the distributivity between the extended conjunctive aggregation functions and the extended disjunctive aggregation functions. We give two necessary and sufficient conditions for the distributivity of the extended aggregation functions and the convexity of fuzzy truth values. Most of the current research focuses on the distributivity of the extended t-norm (resp. t-conorm), overlap function (resp. grouping function) and uninorm (resp. nullnorm), and so on. It is well-known that a conjunctive (resp. disjunctive) aggregation function is a more general aggregation function than a t-norm (resp. t-conorm). Therefore, the obtained results show that the distributivity equation is more general than the previous ones.Keywords: Type-2 fuzzy setdistributivity equationconvex fuzzy truth valueaggregationextended aggregation function AcknowledgmentsThe author would like to thank the editor and anonymous reviewers for their valuable suggestions.Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThis work was supported by the National Natural Science Foundation of China (No. 12201443).
{"title":"Distributivity equations of extended aggregation functions in type-2 fuzzy sets","authors":"Zhi-qiang Liu","doi":"10.1080/03081079.2023.2270771","DOIUrl":"https://doi.org/10.1080/03081079.2023.2270771","url":null,"abstract":"AbstractIn this paper, we completely characterize the distributivity between the extended conjunctive aggregation functions and the extended disjunctive aggregation functions. We give two necessary and sufficient conditions for the distributivity of the extended aggregation functions and the convexity of fuzzy truth values. Most of the current research focuses on the distributivity of the extended t-norm (resp. t-conorm), overlap function (resp. grouping function) and uninorm (resp. nullnorm), and so on. It is well-known that a conjunctive (resp. disjunctive) aggregation function is a more general aggregation function than a t-norm (resp. t-conorm). Therefore, the obtained results show that the distributivity equation is more general than the previous ones.Keywords: Type-2 fuzzy setdistributivity equationconvex fuzzy truth valueaggregationextended aggregation function AcknowledgmentsThe author would like to thank the editor and anonymous reviewers for their valuable suggestions.Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThis work was supported by the National Natural Science Foundation of China (No. 12201443).","PeriodicalId":50322,"journal":{"name":"International Journal of General Systems","volume":"2 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135412124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-23DOI: 10.1080/03081079.2023.2269469
Ginger Y. Ke, Saeed Shakeri Nezhad, David M. Tulett
AbstractIntegrating both proactive and reactive risk-mitigation mechanisms, this research constructs a bi-level network design problem for hazardous materials (hazmats) to regulate the carriers' use of roads, such that the environmental impact is minimized. In more detail, by embedding the emergency response time into the risk assessment, the locations of hazmat response teams are determined along with toll schemes, road closures, and new road constructions. The uncertainties of demand, including differences in the number of shipments, origin/destination changes, and amount variations, are also taken into account by applying a scenario-based approach. The proposed bi-level model is first solved optimally by a single-level reformulation, and then by a three-stage heuristic method for larger instances. Through numerical experiments on a real-world road network in Nanchang, a city in China, a set of management insights are derived to facilitate policy-making in regulating hazmat transportation.Keywords: Risk mitigationemergency responsehazardous materialsdemand uncertaintynetwork design Disclosure statementNo potential conflict of interest was reported by the authors.Notes1 ¥ is the symbol for Renminbi, the official currency of the People's Republic of China.Additional informationFundingThis research has been supported by Discovery Grants from the Natural Sciences and Engineering Research Council of Canada (grant #: RGPIN-2015-04013, RGPIN-2022-03514), and by Mitacs through the Accelerate program.
{"title":"Regulating hazardous material transportation: a scenario-based network design approach with integrated risk-mitigation mechanisms","authors":"Ginger Y. Ke, Saeed Shakeri Nezhad, David M. Tulett","doi":"10.1080/03081079.2023.2269469","DOIUrl":"https://doi.org/10.1080/03081079.2023.2269469","url":null,"abstract":"AbstractIntegrating both proactive and reactive risk-mitigation mechanisms, this research constructs a bi-level network design problem for hazardous materials (hazmats) to regulate the carriers' use of roads, such that the environmental impact is minimized. In more detail, by embedding the emergency response time into the risk assessment, the locations of hazmat response teams are determined along with toll schemes, road closures, and new road constructions. The uncertainties of demand, including differences in the number of shipments, origin/destination changes, and amount variations, are also taken into account by applying a scenario-based approach. The proposed bi-level model is first solved optimally by a single-level reformulation, and then by a three-stage heuristic method for larger instances. Through numerical experiments on a real-world road network in Nanchang, a city in China, a set of management insights are derived to facilitate policy-making in regulating hazmat transportation.Keywords: Risk mitigationemergency responsehazardous materialsdemand uncertaintynetwork design Disclosure statementNo potential conflict of interest was reported by the authors.Notes1 ¥ is the symbol for Renminbi, the official currency of the People's Republic of China.Additional informationFundingThis research has been supported by Discovery Grants from the Natural Sciences and Engineering Research Council of Canada (grant #: RGPIN-2015-04013, RGPIN-2022-03514), and by Mitacs through the Accelerate program.","PeriodicalId":50322,"journal":{"name":"International Journal of General Systems","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135413275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AbstractCommunity detection and link prediction are interdependent to a high degree. Knowing the community structure beforehand improves the identification of missing links, whereas clustering on networks with newly introduced missing links improves community detection. In this work, we examine the effectiveness of employing community structure information to predict links in static networks by combining local, quasi-local, and global similarity features to compensate for the weaknesses of each approach. Moreover, we formally defined two classes of links, called relevant links, based on the network's community structure. These links are important because they connect communities or distant nodes within communities. To solve these issues, we developed two hybrid link prediction algorithms based on network communities. To evaluate the effectiveness of the proposed hybrid algorithms, we conducted a comprehensive computational campaign using both real-world and synthetic data-sets. Experiments show that adding information on communities and relevant links enhances the accuracy of link prediction.Keywords: Social networkslink prediction problemcommunity detectionsimilarity-based link predictionrelevant links Disclosure statementNo potential conflict of interest was reported by the author(s).Data availability statementThe datasets analyzed during the current study are available in the Konect repository, http://konect.cc/networks/. And also in the Network Repository, https://networkrepository.com/index.php.
{"title":"A hybrid approach for enhanced link prediction in social networks based on community detection","authors":"Mohamed Hassen Kerkache, Lamia Sadeg-Belkacem, Fatima Benbouzid-Si Tayeb","doi":"10.1080/03081079.2023.2265043","DOIUrl":"https://doi.org/10.1080/03081079.2023.2265043","url":null,"abstract":"AbstractCommunity detection and link prediction are interdependent to a high degree. Knowing the community structure beforehand improves the identification of missing links, whereas clustering on networks with newly introduced missing links improves community detection. In this work, we examine the effectiveness of employing community structure information to predict links in static networks by combining local, quasi-local, and global similarity features to compensate for the weaknesses of each approach. Moreover, we formally defined two classes of links, called relevant links, based on the network's community structure. These links are important because they connect communities or distant nodes within communities. To solve these issues, we developed two hybrid link prediction algorithms based on network communities. To evaluate the effectiveness of the proposed hybrid algorithms, we conducted a comprehensive computational campaign using both real-world and synthetic data-sets. Experiments show that adding information on communities and relevant links enhances the accuracy of link prediction.Keywords: Social networkslink prediction problemcommunity detectionsimilarity-based link predictionrelevant links Disclosure statementNo potential conflict of interest was reported by the author(s).Data availability statementThe datasets analyzed during the current study are available in the Konect repository, http://konect.cc/networks/. And also in the Network Repository, https://networkrepository.com/index.php.","PeriodicalId":50322,"journal":{"name":"International Journal of General Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136293989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-03DOI: 10.1080/03081079.2023.2219825
Mohamed Rhaima, Lassaad Mchiri, N. H. Taieb, M. Hammami, A. B. Makhlouf
In this paper, we present a practical Mittag–Leffler stability for a new class of fractional-order nonlinear Takagi–Sugeno fuzzy uncertain systems. Based on fractional-order Lyapunov stability theory and the parallel distributed compensation (PDC) controller techniques, we show the convergence of the solutions of the closed-loop considered system toward a neighborhood of the origin. Furthermore, a numerical example is given to show the applicability of the main result.
{"title":"Practical stability of fractional-order nonlinear fuzzy systems","authors":"Mohamed Rhaima, Lassaad Mchiri, N. H. Taieb, M. Hammami, A. B. Makhlouf","doi":"10.1080/03081079.2023.2219825","DOIUrl":"https://doi.org/10.1080/03081079.2023.2219825","url":null,"abstract":"In this paper, we present a practical Mittag–Leffler stability for a new class of fractional-order nonlinear Takagi–Sugeno fuzzy uncertain systems. Based on fractional-order Lyapunov stability theory and the parallel distributed compensation (PDC) controller techniques, we show the convergence of the solutions of the closed-loop considered system toward a neighborhood of the origin. Furthermore, a numerical example is given to show the applicability of the main result.","PeriodicalId":50322,"journal":{"name":"International Journal of General Systems","volume":"52 1","pages":"864 - 875"},"PeriodicalIF":2.0,"publicationDate":"2023-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42786837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}