10,075 results
Search Results
2. Exam paper generation based on performance prediction of student group
- Author
-
Wu, Zhengyang, primary, He, Tao, additional, Mao, Chenjie, additional, and Huang, Changqin, additional
- Published
- 2020
- Full Text
- View/download PDF
3. SHARE: Designing multiple criteria-based personalized research paper recommendation system
- Author
-
Arpita Chaudhuri, Monalisa Sarma, and Debasis Samanta
- Subjects
Information Systems and Management ,Artificial Intelligence ,Control and Systems Engineering ,Software ,Computer Science Applications ,Theoretical Computer Science - Published
- 2022
4. SimCC: A novel method to consider both content and citations for computing similarity of scientific papers
- Author
-
Reyhani Hamedani, Masoud, primary, Kim, Sang-Wook, additional, and Kim, Dong-Jin, additional
- Published
- 2016
- Full Text
- View/download PDF
5. Exam paper generation based on performance prediction of student group
- Author
-
Chenjie Mao, Changqin Huang, Tao He, and Zhengyang Wu
- Subjects
Information Systems and Management ,Computer science ,media_common.quotation_subject ,02 engineering and technology ,Machine learning ,computer.software_genre ,Theoretical Computer Science ,Task (project management) ,Artificial Intelligence ,ComputingMilieux_COMPUTERSANDEDUCATION ,0202 electrical engineering, electronic engineering, information engineering ,Performance prediction ,Quality (business) ,media_common ,business.industry ,05 social sciences ,050301 education ,Computer Science Applications ,Control and Systems Engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,Focus (optics) ,business ,0503 education ,computer ,Software ,Student group - Abstract
Exam paper generation is an indispensable part of teaching. Existing methods focus on the use of question extraction algorithms with labels for each question provided. Obviously, manual labeling is inefficient and cannot avoid label bias. Furthermore, the quality of the exam papers generated by the existing methods is not guaranteed. To address these problems, we propose a novel approach to generating exam papers based on prediction of exam performance. As such, we update the quality of the initially generated questions one by using dynamic programming, as well as in batches by using genetic algorithms. We performed the prediction task by using Deep Knowledge Tracing. Our approach considered the skill weight, difficulty, and distribution of exam scores. By comparisons, experimental results indicate that our approach performed better than the two baselines. Furthermore, it can generate exam papers with adaptive difficulties closely to the expected levels, and the related student exam scores will be guaranteed to be relatively reasonable distribution. In addition, our approach was evaluated in a real learning scenarios and shows advantages.
- Published
- 2020
6. A note on the paper “A multi-population harmony search algorithm with external archive for dynamic optimization problems” by Turky and Abdullah
- Author
-
Ranginkaman, Amir Ehsan, primary, Kazemi Kordestani, Javidan, additional, Rezvanian, Alireza, additional, and Meybodi, Mohammad Reza, additional
- Published
- 2014
- Full Text
- View/download PDF
7. Why are papers about filters on residuated structures (usually) trivial?
- Author
-
Víta, Martin, primary
- Published
- 2014
- Full Text
- View/download PDF
8. Bayesian sparse joint dynamic topic model with flexible lead-lag order.
- Author
-
Wang, Feifei, Zhou, Rui, Feng, Yichao, and Lu, Xiaoling
- Subjects
- *
DYNAMIC models , *CONFERENCE papers , *LEAD time (Supply chain management) , *CORPORA - Abstract
Currently, text documents from multiple sources have become available in many fields. It is of great interest to study the relationship between documents from different sources and uncover the underlying causality. Zhu et al. (2021) proposed a joint dynamic topic model (JDTM). They classified all topics into three groups and used the "shared topics" with a fixed time lag order to characterize the shared information between two corpora. Although JDTM is a powerful tool for discovering the lead-lag relationship, there are two potential shortcomings. First, different shared topics should have distinct meanings, which should lead to different time lag orders between the two corpora. Second, for dynamic documents, not all topics are represented in each time slice, and thus topic sparsity should be considered. To address these two problems, we propose a sparse joint dynamic topic model (SJDTM) with a flexible lead-lag order. We assume a birth-and-death mechanism for all topics and a flexible lead-lag order for different shared topics. The performance of SJDTM is evaluated using both synthetic data and two real text corpora consisting of conference papers and journal papers. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
9. Graph model for conflict resolution based on the combination of probabilistic uncertain linguistic and EDAS method.
- Author
-
Liu, Peide, Wang, Xue, Fu, Yingxin, and Wang, Peng
- Subjects
- *
CONFLICT management , *ELECTRONIC paper , *GROUP decision making - Abstract
The ranking of decision makers (DMs)' preferences for feasible states in the graph model for conflict resolution (GMCR) is crucial for accurately determining stability results. This paper addresses the issue of subjective ranking methods lacking theoretical foundation and causing ambiguity when the number of feasible states is high by proposing the implementation of the multi-attribute decision-making (MADM) method in the GMCR. The paper utilizes the average level to choose evaluation based on distance from average solution (EDAS) method for determining the DM's preference ranking, which can effectively reduce the impact of anomalous evaluations. Further, the PUL-EDAS method based on probabilistic uncertainty linguistics (PUL) is developed, which overcomes the shortcomings of the traditional EDAS method, which only applies to the simple evaluation of information. The PUL aligns with DMs' daily evaluation practice by providing an interval for the quality of qualitative linguistic evaluations. Furthermore, it utilizes an objective aggregation method to calculate comprehensive evaluation information from all DMs. In addition, the four fundamental stability definitions, applicable solely under crisp preferences, are extended to the PUL context, providing related extended definitions. Finally, to ensure the scientific validity and practicality of the proposed theory, this paper selects digital rural governance as the research context for conflict calculus analysis, comparing it with other MADM methods in the preference ranking section. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. SimCC: A novel method to consider both content and citations for computing similarity of scientific papers
- Author
-
Masoud Reyhani Hamedani, Sang-Wook Kim, and Dong-Jin Kim
- Subjects
Scheme (programming language) ,Information Systems and Management ,Information retrieval ,Relation (database) ,Computer science ,05 social sciences ,050905 science studies ,Computer Science Applications ,Theoretical Computer Science ,Weighting ,Similarity (network science) ,Artificial Intelligence ,Control and Systems Engineering ,Content (measure theory) ,Relevance (information retrieval) ,0509 other social sciences ,050904 information & library sciences ,Citation ,computer ,Software ,computer.programming_language - Abstract
To compute the similarity of scientific papers, text-based similarity measures, link-based similarity measures, and hybrid methods can be applied. The text-based and link-based similarity measures take into account only a single aspect of scientific papers, content or citations, respectively. The hybrid methods consider both content and citations; however, they do not carefully consider the relation between the content of a pair of papers involved in a citation relationship. In this paper, we propose a novel method, SimCC (similarity based on content and citations), that considers both aspects, content and citations, to compute the similarity of scientific papers. Unlike previous methods, SimCC effectively reflects both content and authority of scientific papers simultaneously in similarity computation by applying a new RA (relevance and authority) weighting scheme. Also, we propose an RA+R weighting scheme to consider the recency of papers and an RA+E weighting scheme to take into account the author expertise of papers in similarity computation. The effectiveness of our proposed method is demonstrated by extensive experiments on a real-world dataset of scientific papers. The results show that our method achieves more than 100% improvement in accuracy in comparison with previous methods.
- Published
- 2016
11. Why are papers about filters on residuated structures (usually) trivial?
- Author
-
Martin Víta
- Subjects
Pure mathematics ,Information Systems and Management ,Property (philosophy) ,Generalization ,Extension (predicate logic) ,Computer Science Applications ,Theoretical Computer Science ,Algebra ,Artificial Intelligence ,Control and Systems Engineering ,Simple (abstract algebra) ,Filter (mathematics) ,Residuated lattice ,Software ,Quotient ,Mathematics - Abstract
In this paper we introduce a notion of a t-filter on residuated lattices which is a generalization of several special types of filters. We provide some basic properties of t-filters and show how particular results about special types of filters (e.g. Extension property, Triple of equivalent characteristics, and Quotient characteristics) are uniformly covered by this simple general framework.
- Published
- 2014
12. A note on the paper 'A multi-population harmony search algorithm with external archive for dynamic optimization problems' by Turky and Abdullah
- Author
-
Mohammad Reza Meybodi, Amir Ehsan Ranginkaman, Javidan Kazemi Kordestani, and Alireza Rezvanian
- Subjects
Scheme (programming language) ,Information Systems and Management ,Optimization problem ,Point (typography) ,Computer science ,business.industry ,Computer Science Applications ,Theoretical Computer Science ,Dynamic problem ,Artificial Intelligence ,Control and Systems Engineering ,Multi population ,Benchmark (computing) ,Harmony search ,Artificial intelligence ,business ,computer ,Software ,computer.programming_language - Abstract
In a very recently presented paper, Turky and Abdullah 5 proposed a novel multi-population harmony search with external archive (MHSA-ExtArchive) for dynamic optimization problems. In the experimental results, the authors claimed that their approach could outperform several state-of-the-art algorithms. They also showed the superiority of their method by means of numerical experiments on Moving Peaks Benchmark (MPB). Despite the interesting idea of applying multi-population scheme on harmony search and using a new type of external archive for dealing with dynamic problems, we believe that there are two very important shortcomings in the result analysis, which we point out in this short note. The main motivation of the present note is to contribute toward preventing the same mistakes from happening by the other researchers.
- Published
- 2014
13. Deep reinforce learning for joint optimization of condition-based maintenance and spare ordering.
- Author
-
Hao, Shengang, Zheng, Jun, Yang, Jie, Sun, Haipeng, Zhang, Quanxin, Zhang, Li, Jiang, Nan, and Li, Yuanzhang
- Subjects
- *
CONDITION-based maintenance , *REINFORCEMENT learning , *DEEP learning , *MACHINE learning , *SYSTEM failures , *MARKOV processes - Abstract
Condition-based maintenance (CBM) policy can avoid premature or late maintenance and reduce system failures and maintenance costs. Most existing CBM studies cannot solve the dimensional disaster problem in multi-component complex systems. Only some studies consider the constraint of maintenance resources when searching for the optimal maintenance policy, which is hard to apply to practical maintenance. This paper studies the joint optimization of the CBM policy and spare components inventory for the multi-component system in large state and action spaces. We use Markov Decision Process to model it and propose an improved deep reinforcement learning algorithm based on the stochastic policy and actor-critic framework. In this algorithm, factorization decomposes the system action into the linear combination of each component's action. The experimental results show that the algorithm proposed in this paper has better time performance and lower system cost compared with other benchmark algorithms. The training time of the former is only 28.5% and 9.12% of that of PPO and DQN algorithms, and the corresponding system cost is decreased by 17.39% and 27.95%, respectively. At the same time, our algorithm has good scalability and is suitable for solving Markov decision-making problems in large-scale state and action space. • Considering minor and major repair, we model the joint optimization of CBM and spare ordering for large multi-component systems based on MDP. • An improved DRL algorithm is presented to deal with the MDP model in large-scale discrete state and action space. • We validate our DRL algorithm has good time performance and optimal decision-making series solution via comparisons with DQN and PPO algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
14. Simplification logic for the management of unknown information.
- Author
-
Pérez-Gámez, Francisco, Cordero, Pablo, Enciso, Manuel, and Mora, Ángel
- Subjects
- *
HEYTING algebras , *INFORMATION resources management , *IMPLICATION (Logic) - Abstract
This paper aims to contribute to the extension of classical Formal Concept Analysis (FCA), allowing the management of unknown information. In a preliminary paper, we define a new kind of attribute implications to represent the knowledge from the information currently available. The whole FCA framework has to be appropriately extended to manage unknown information. This paper introduces a new logic for reasoning with this kind of implications, which belongs to the family of logics with an underlying Simplification paradigm. Specifically, we introduce a new algebra, named weak dual Heyting Algebra, that allows us to extend the Simplification logic for these new implications. To provide a solid framework, we also prove its soundness and completeness and show the advantages of the Simplification paradigm. Finally, to allow further use of this extension of FCA in applications, an algorithm for automated reasoning, which is directly built from logic, is defined. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
15. Specification transformation method for functional program generation based on partition-recursion refinement rule.
- Author
-
Zuo, Zhengkang, Zeng, Zhicheng, Su, Wei, Huang, Qing, Ke, Yuhan, Liu, Zengxin, Wang, Changjing, and Liang, Wei
- Subjects
- *
MULTIPLICATION , *POLYNOMIALS , *PROTOTYPES , *ALGORITHMS , *COMPUTER software - Abstract
Implementations that follow the functional programming paradigm are being used in more and more domains. As functional programming paradigm has mathematical reference transparency, refinement to functional programs contributes to improving the reliability of the transformation process and simplifying the refinement steps. However, it is a challenge to generate functional programs from specifications. Most existing transformation methods refine specifications into abstract algorithm-level programs based on loop invariants rather than functional programs. This paper proposes a novel functional program generation method based on the partition-recursion refinement rule. It establishes a novel program refinement framework based on functional theory for the first time. This is the first study to regard the whole program refinement process as a composition of abstract functions. This paper designs a recurrence-based algorithm design language (Radl+) and implements a software prototype to map Radl+ algorithms into executable Haskell programs. To prove the feasibility and efficiency of this method, this paper transforms the polynomial multiplication problem from a specification into an executable Haskell program. This case shows that compared with existing approaches, the proposed method can simplify the transformation steps and reduce the number of lines of generated code from 38 to 10. • Novel refinement framework provides a new approach to generating a functional program. • The composition of abstract functions explains the program refinement process. • Substitution rule and Recursion rule have none of the side effects. • Software prototype transforms the polynomial multiplication problem into Haskell program. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
16. Heterogeneous cognitive learning particle swarm optimization for large-scale optimization problems.
- Author
-
Zhang, En, Nie, Zihao, Yang, Qiang, Wang, Yiqiao, Liu, Dong, Jeon, Sang-Woon, and Zhang, Jun
- Subjects
- *
COGNITIVE learning , *PARTICLE swarm optimization , *ZONE of proximal development , *HOTEL suites - Abstract
Large-scale optimization problems (LSOPs) become increasingly ubiquitous but complicated in real-world scenarios. Confronted with such sophisticated optimization problems, most existing optimizers dramatically lose their effectiveness. To tackle this type of problems effectively, we propose a heterogeneous cognitive learning particle swarm optimizer (HCLPSO). Unlike most existing particle swarm optimizers (PSOs), HCLPSO partitions particles in the current swarm into two categories, namely superior particles (SP) and inferior particles (IP), based on their fitness, and then treats the two categories of particles differently. For inferior particles, this paper devises a random elite cognitive learning (RECL) strategy to update each one with a random superior particle chosen from SP. For superior particles, this paper designs a stochastic dominant cognitive learning (SDCL) strategy to evolve each one by randomly selecting one guiding exemplar from SP and then updating it only when the selected exemplar is better. With the collaboration between these two learning mechanisms, HCLPSO expectedly evolves particles effectively to explore the search space and exploit the found optimal zones appropriately to find optimal solutions to LSOPs. Furthermore, to help HCLPSO traverse the vast search space with promising compromise between intensification and diversification, this paper devises a dynamic swarm partition scheme to dynamically separate particles into the two categories. With this dynamic strategy, HCLPSO gradually switches from exploring the search space to exploiting the found optimal zones intensively. Experiments are executed on the publicly acknowledged CEC2010 and CEC2013 LSOP benchmark suites to compare HCLPSO with several state-of-the-art approaches. Experimental results reveal that HCLPSO is effective to tackle LSOPs, and attains considerably competitive or even far better optimization performance than the compared state-of-the-art large-scale methods. Furthermore, the effectiveness of each component in HCLPSO and the good scalability of HCLPSO are also experimentally verified. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
17. Evidential Markov decision-making model based on belief entropy to predict interference effects.
- Author
-
Pan, Lipeng and Gao, Xiaozhuan
- Subjects
- *
MARKOV processes , *DEMPSTER-Shafer theory , *DECISION theory , *ENTROPY , *QUANTUM interference - Abstract
Some cognitive and decision making experiments have demonstrated the classical decision theory may be violated. Recently, the interference effects of quantum theory have attracted a strong interest in applying some fields outside physics. It can be also used to explain the paradox in decision models. Existing some experiments and studies attribute the main reason for the existence of interference effects to uncertain information in decision process. Dempster-Shafer evidence theory extends the framework of discernment to power sets so it can describe unknown and imprecise information. This paper proposes evidential Markov decision-making model based on belief entropy to quantitatively predict and determine the value of interference effects. In new model, the frame of discernment is extended by introducing hesitant or unknown states which could be hidden by participants. Moreover, new model assumes there is no input of any information at initial states so it has the most chaotic states and is determined according to the maximum belief entropy. Finally, this paper discusses the effectiveness of new model by comparing with other methods as studying the interference effects of decision process. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
18. Writer-independent signature verification; Evaluation of robotic and generative adversarial attacks.
- Author
-
Bird, Jordan J., Naser, Abdallah, and Lotfi, Ahmad
- Subjects
- *
GENERATIVE adversarial networks , *DATA augmentation , *DENIAL of service attacks , *ROBOTICS , *CONVOLUTIONAL neural networks , *FORGERY , *MACHINE learning - Abstract
Forgery of a signature with the aim of deception is a serious crime. Machine learning is often employed to detect real and forged signatures. In this study, we present results which argue that robotic arms and generative models can overcome these systems and mount false-acceptance attacks. Convolutional neural networks and data augmentation strategies are tuned, producing a model of 87.12% accuracy for the verification of 2,640 human signatures. Two approaches are used to successfully attack the model with false-acceptance of forgeries. Robotic arms (Line-us and iDraw) physically copy real signatures on paper, and a conditional Generative Adversarial Network (GAN) is trained to generate signatures based on the binary class of 'genuine' and 'forged'. The 87.12% error margin is overcome by all approaches; prevalence of successful attacks is 32% for iDraw 2.0, 24% for Line-us, and 40% for the GAN. Fine-tuning with examples show that false-acceptance is preventable. We find attack success reduced by 24% for iDraw, 12% for Line-us, and 36% for the GAN. Results show exclusive behaviours between human and robotic forgers, suggesting training wholly on human forgeries can be attacked by robots, thus we argue in favour of fine-tuning systems with robotic forgeries to reduce their prevalence. • Development of a computer vision-based system for signature spoofing attack detection. • A Conditional GAN can generate "real" and "fake" signatures. • Two robots can physically replicate human signatures with pen and paper. • The GAN and both robots can fool the model and mount false-acceptance attacks. • Verification model can be defended by fine-tuning on generative and robotic forgeries. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
19. A supervised data augmentation strategy based on random combinations of key features.
- Author
-
Ding, Yongchang, Liu, Chang, Zhu, Haifeng, and Chen, Qianjun
- Subjects
- *
DATA augmentation , *CONVOLUTIONAL neural networks , *IMAGE recognition (Computer vision) , *ARTIFICIAL intelligence , *FEATURE extraction , *CLASSIFICATION - Abstract
Data augmentation strategies have always been important in machine learning techniques and play a unique role in model performance optimization processes. Therefore, in recent years, these techniques have become popular in the artificial intelligence field. In this paper, a new data augmentation strategy is proposed based on the interpretation algorithm of deep convolutional neural networks, i.e., constructing new training samples by deeply exploiting key features extracted from interpretable networks to achieve sample augmentation. Thus, a novel supervised data augmentation approach known as Supervised Data Augmentation–Key Feature Extraction (SDA-KFE) was proposed. By introducing the Neural Network Interpreter-Segmentation Recognition and Interpretation (NNI-SRI) algorithm, an augmentation strategy is proposed that can balance the high accuracy and high robustness of the final model while ensuring a large amount of data augmentation. The advantages of the SDA-KFE algorithm are mainly reflected in the following aspects. First, it is easy to implement. This algorithm is implemented based on the lightweight NNI-SRI algorithm, which lays the foundation for the implementation of SDA-KFE so that it can be easily implemented on convolutional neural networks. Second, this model, which is widely applicable, can be applied to almost any deep convolutional network. Through research and experiments on this proposed algorithm, SDA-KFE can be applied in graphical image binary classification and multiclassification models. Third, SDA-KFE can rapidly construct data samples with diverse variations. Under the premise of determining the classification labels of the generated samples, the distribution of the feature unit composition of the samples can be controlled. Compared with traditional data augmentation methods, SDA-KFE can control the direction of the model performance, i.e., the balance between the pursuit of high accuracy and robust performance of the model. Therefore, the novel supervised augmentation approach proposed in this paper is relevant for optimizing deep convolutional neural networks, solving model overfitting, augmenting data types, etc. The data augmentation algorithm proposed in this paper can be regarded as a useful supplement to traditional data augmentation methods, such as horizontal or vertical image flipping, cropping, color transformation, extension and rotation. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
20. A user-knowledge vector space reconstruction model for the expert knowledge recommendation system.
- Author
-
Gao, Li, Liu, Yi, Chen, Qing-kui, Yang, He-yu, He, Yi-qi, and Wang, Yan
- Subjects
- *
VECTOR spaces , *RECOMMENDER systems , *INSTITUTIONAL repositories , *PROBLEM solving , *TEXTUAL criticism - Abstract
• EKRS is an intelligent research assistance system to recommend knowledge to scholars. • EKRS is formed through mapping two sets of IR and CRD. • IR and CRD were reconstructed based on the VSM. • LRA improving the solution process and decreasing the complexity of the UKVSM. Expert Knowledge Recommendation System (EKRS) is an intelligent research assistance system. The system is formed by mapping two sets of conceptual spaces through Institutional Repository (IR) and Core Resource Dataset (CRD) in 2018. The user knowledge pattern matching (UKPM) of EKRS has problems such as uncertain user knowledge text matching, slow update of expert knowledge, and inability to accurately track user knowledge. This paper establishes a user knowledge vector space reconstruction model (UKVSM) through the following steps to solve the above problems. Firstly, the text feature items of IR and CRD are reconstructed and the depth and density correction coefficient matrix of the original node of the text semantic meaning is calculated based on the similarity of feature items of the semantic layer. Secondly, in order to improve the efficiency of UKPM exact matching, the Lagrangian relaxation algorithm (LRA) is used to optimize the two sets of knowledge matching strategies. Finally, the real data set is extracted from the EKRS platform, and the model and algorithm proposed in this paper are tested and verified respectively, and compared with other methods. Experiments show that reconstruction model can improve the accuracy of user knowledge task assignment in EKRS, while LRA can improve the efficiency of model solving. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
21. K-DGHC: A hierarchical clustering method based on K-dominance granularity.
- Author
-
Yu, Bin, Zheng, Zijian, and Dai, Jianhua
- Subjects
- *
HIERARCHICAL clustering (Cluster analysis) , *SOCIAL dominance , *EUCLIDEAN metric , *GRANULAR computing , *RANDOM noise theory , *EUCLIDEAN distance - Abstract
Existing hierarchical clustering (HC) algorithms generally depend on the Euclidean characteristic metric (Euclidean distance, Manhattan distance, Chebyshev distance, etc.) on Euclidean space to describe the similarity between objects, which makes the clustering process oriented to data sets with uniform and regular distribution in Euclidean space. Although such methods can visually distinguish the cluster distribution of data, it is not effective for the data sets which are densely distributed, interlaced and complex in Euclidean space. As a scalable, efficient and robust method, granular computing generally analyzes data from the perspective of similarity and proximity. In consideration of the advantages of granular computing in extracting data information from a multi-level perspective, in order to reduce the limitations of HC methods based on Euclidean features on non-Euclidean data, this paper proposes a novel HC method based on non-Euclidean feature structure. First, this paper constructs the similarity between objects based on K -dominance granularity and neighborhood search, and considers the environmental information of data points from both global and local perspectives. Secondly, a new HC method based on non-Euclidean feature structure is designed on the basis of the similarity measurement constructed in this paper. Finally, through comparative analysis, the experimental results prove that our method can more accurately identify the densely distributed and interlaced data sets in Euclidean space; it is significantly better than comparison algorithms using different Euclidean features to measure similarity; it has good robustness when additional Gaussian noise is added. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
22. A consensus measure-based three-way clustering method for fuzzy large group decision making.
- Author
-
Guo, Lun, Zhan, Jianming, Xu, Zeshui, and Alcantud, José Carlos R.
- Subjects
- *
GROUP decision making , *DECISION making , *TRUST - Abstract
In fuzzy large group decision making methods, an effective clustering method can greatly reduce the complexity of decision making, and it is an important ingredient for reaching a group consensus. In this paper, a novel fuzzy large group decision making method is established using three-way clustering and an adaptive exit-delegation mechanism. Traditional clustering approaches group together individuals (isolated points) that deviate from the whole. The individuals (edge points) may exist and wander in between two or more classes. Both circumstances can lead to unstable and unreasonable clustering results. To overcome both setbacks, we propose a three-way clustering method based on the k -means clustering algorithm. The method first applies k -means clustering to perform an initial division of the universe of decision-makers. Then, in the spirit of three-way clustering, the edge points and outliers are separated from the clustering results by resorting to the three-way relationships between individuals and classes. The final clustering stems from an adaptive exit-delegation mechanism, and a consensus measure-based model determines the intra-group individual weight and inter-individual trust weight. Finally, the feasibility and effectiveness of the methodology that arises from the model designed in this paper are verified by comparative analyses. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
23. The L2 convergence of stream data mining algorithms based on probabilistic neural networks.
- Author
-
Rutkowska, Danuta, Duda, Piotr, Cao, Jinde, Rutkowski, Leszek, Byrski, Aleksander, Jaworski, Maciej, and Tao, Dacheng
- Subjects
- *
ARTIFICIAL neural networks , *DATA mining , *MATHEMATICAL proofs , *ONLINE algorithms , *ALGORITHMS , *TRACKING algorithms - Abstract
This paper concerns a new incremental approach to mining data streams. It is known that patterns in a data stream may evolve over time. In many cases, we need to track and analyze the nature of these changes. In the paper, the probabilistic neural networks are considered as basic models for tracking changes in data streams. We present globally convergent stream data mining algorithms applied to problems of regression, classification, and density estimation in a time-varying (drifting) environment. The algorithms are derived from the Parzen kernel-based probabilistic neural networks working in the online mode. For each problem, a theorem is presented ensuring the L 2 convergence of the algorithm designed for tracking drifting regression, density, or discriminant functions. Illustrative examples explain in detail how to choose the bandwidth of the Parzen kernel and the learning rate of the online algorithm. The performance of all algorithms is shown in exemplary simulations. It should be noted that this paper is one of very few, in the existing literature, presenting mathematically justified stream data mining algorithms. • The incremental version of the Generalized Regression Neural Network (IGRNN) able to track drifting regression functions. • The incremental version of the Probabilistic Neural Network (IPNN) working in non-stationary environments. • Application of IPNN for tracking drifting discriminant functions. • Mathematical proofs of the L 2 convergence of all the proposed estimators. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
24. Multiplicative consistency analysis of interval-valued fuzzy preference relations.
- Author
-
Wan, Shuping, Cheng, Xianjuan, and Dong, Jiu-Ying
- Subjects
- *
INPAINTING , *DECISION making , *COMPARATIVE studies - Abstract
Interval-valued fuzzy preference relations (IVFPRs) have been applied to many real-life decision-making problems. However, most definitions of consistency of IVFPRs do not satisfy invariability to compared objects' labels. To overcome this drawback, this paper mainly focuses on the multiplicative consistency analysis of interval-valued fuzzy preference relations (IVFPRs). Firstly, this paper proposes a new multiplicative consistency of complete IVFPRs. It is proved that this new multiplicative consistency is robust and invariable to compared objects' labels. Then, the definition of acceptable incomplete IVFPRs (In-IVFPRs) is presented. To make full use of all direct and indirect evaluations of decision-makers, an algorithm is devised to evaluate the missing elements of an acceptable incomplete In-IVFPR. To comprehensively describe the closeness between any two complete IVFPRs, the total deviation of two complete IVFPRs is defined based on the p -norm of a vector. By minimizing the total deviation of two complete IVFPRs, a programming model is built to determine an interval weight vector from a complete IVFPR. Subsequently, a novel decision-making method with an In-IVFPR is proposed. Lastly, three practical and numerical examples and simulation-based comparative analyses are provided to further validate the practicability and advantages of the proposed method. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
25. Finite/fixed-time practical sliding mode: An event-triggered approach.
- Author
-
Song, Feida, Wang, Leimin, Wang, Qingyi, and Wen, Shiping
- Subjects
- *
MEASUREMENT errors , *SMART structures - Abstract
This paper proposes a unified event-triggered sliding-mode control framework to attain the finite/fixed-time reachability of practical sliding-mode band. In event-triggered sliding-mode control, the practical sliding mode makes the size of the sliding-mode band dependent on the event function rather than the disturbance bound and sampling interval and provides better control performance due to this advantage. Under this paper's unified framework, the predesigned practical sliding-mode band can be respectively reached within a finite/fixed time by choosing different parameters. Then, different from the asymptotical convergence obtained in other investigations, the ultimate finite-time stability of the controlled system can be guaranteed. In the sliding phase, by adjusting the initial value of integration for settling time from initial value of the controlled system to the point where the sliding phase starts, a more precise estimation to settling time is obtained and can be generalized to different kinds of systems. In addition, in comparison to other results in finite-time event-triggered sliding-mode control, signum function is subtracted from the measurement error which eliminates the Zeno phenomenon and ensures the reliable operation of the digital controller in reality. Finally, a numerical example is given to verify the effectiveness of the theoretical results. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
26. Three-way decision for probabilistic linguistic conflict analysis via compounded risk preference.
- Author
-
Wang, Tianxing, Huang, Bing, Li, Huaxiong, Liu, Dun, and Yu, Hong
- Subjects
- *
LINGUISTIC analysis , *PSYCHOLOGICAL factors , *DECISION theory , *GRANULAR computing , *PROSPECT theory , *COMPUTER software development , *REGRET - Abstract
Three-way decision, an essential granular computing research tool, provides an efficient solution to complex and uncertain problems. Behavioral decision theory can analyze the risk preferences of decision-makers effectively. Scholars have conducted preliminary exploration on the fusion of these two theories, but it is still challenging to describe the different types of risk preferences of decision-makers. This paper combines prospect theory with regret theory and studies the compound risk preference modeling of three-way decision to address this issue. Because three attitudes of conflicts coincide with three-way decision, many scholars have conducted multi-dimensional research on three-way conflict analysis and accomplished remarkable results. However, few relevant studies consider psychological factors and risk attitudes of decision-makers, and it is more appropriate to describe agents' attitudes on issues using linguistic terms. This paper applies the proposed three-way decision model based on compounded risk preference and probabilistic linguistic term sets to the conflict analysis problem. We utilize examples to explain the decision-making process of the proposed model and three-way conflict analysis method with the influence of the compounded risk preference under the action of reference point and regret avoidance coefficient. The illustrative example illustrates that the proposed three-way decision model can effectively solve the software development conflict analysis problem for different decision-makers and the comparative analysis shows the advantages of the proposed model and method compared with the two existing methods. Finally, we verify the performance of the three-way decision model based on compounded risk preference by UCI data sets in parameter experiments. The changes of the reference point from 10 to 0 and regret avoidance coefficient in 0, 0.15 and 0.3 respectively demonstrate the trend rule of the model's thresholds and delay-decision rate index. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
27. Fed-ESD: Federated learning for efficient epileptic seizure detection in the fog-assisted internet of medical things.
- Author
-
Ding, Weiping, Abdel-Basset, Mohamed, Hawash, Hossam, Abdel-Razek, Sara, and Liu, Chuansheng
- Subjects
- *
EPILEPSY , *INTERNET of things , *PRIVACY , *ENERGY industries , *INTERNET privacy , *SUDDEN death , *ELECTROENCEPHALOGRAPHY , *LEARNING - Abstract
• This paper presents a lightweight and efficient spatial–temporal transformer network to learn collaboratively and efficiently to detect epileptic seizures. • A hierarchical FL framework is introduced to enable resource-efficient training of the detection network. • The proposed Fed-ESD mitigates the risk of a single point of failure by alleviating reliance on a centralized authority. Epilepsy is a predominant paroxysmal neurological disturbance that is usually recognized as the incidence of impulsive seizures rarely seen in medicine. Automatic detection of epileptic seizures from electroencephalogram (EEG) signals is viewed as an effective diagnosis of patients on the Internet of Medical Things (IoMT). To design a robust detection service in an IoMT environment, the EEG signals of different patients are collected from geographically distributed patients to a centralized server. However, this makes the patient's privacy prone to exposure and adds to the energy and communication costs. Also, the central server can be subject to malevolent attacks, resulting in non-efficient solutions. In this regard, for the first time, this paper presents a privacy-preserving federated learning framework for epileptic seizure detection (called Fed-ESD) from EEG signals in the fog-computing-based IoMT. A lightweight and efficient spatiotemporal transformer network is introduced to collaboratively learn spatial and temporal representations from the local data of each participant. The proposed Fed-ESD employs geographically situated fog nodes as local aggregators to enable sharing of location-based EEG signals for comparable IoMT applications. Moreover, a greedy method is introduced for deciding on the ideal fog node to be the coordinator node responsible for global aggregation during the training, thereby decreasing the reliance on the central server in the IoMT. Experimental evaluations demonstrate the efficiency of the proposed Fed-ESD in terms of detection performance, resource-efficiency, stability, and scalability for deployment in the IoMT. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
28. Two-dimensional Gaussian hierarchical priority fuzzy modeling for interval-valued data.
- Author
-
Liu, Xiaotian, Zhao, Tao, and Xie, Xiangpeng
- Subjects
- *
MEMBERSHIP functions (Fuzzy logic) , *GAUSSIAN function , *FUZZY systems , *HIERARCHICAL clustering (Cluster analysis) , *DATA modeling - Abstract
In this paper, a new two-dimensional gaussian hierarchical priority fuzzy system (TGHPFS) is proposed to handle interval-valued data. TGHPFS first performs hierarchical clustering of the average value of interval-valued data in each dimension to generate two-dimensional gaussian membership functions of two-level rules. The two levels of rules are associated by calculating the activation strength of the second-level rules to the first-level rules and setting the connection threshold. The regularized least squares method is used to optimize the consequents of the second-level rules. The two-dimensional gaussian membership function designed in this paper is used to model the antecedents of interval-valued data, solving the correlation problem between the left and right values of interval-valued data. The effectiveness of TGHPFS is validated using real-world datasets, and the proposed method is compared with other latest methods to show the superiority of TGHPFS. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
29. Federated probability memory recall for federated continual learning.
- Author
-
Wang, Zhe, Zhang, Yu, Xu, Xinlei, Fu, Zhiling, Yang, Hai, and Du, Wenli
- Subjects
- *
DISTRIBUTION (Probability theory) , *RECOLLECTION (Psychology) , *PROBABILITY theory , *LEARNING - Abstract
Federated Continual Learning (FCL) approaches exist two major problems of the probability bias and the imbalance in parameter variations. These two problems lead to catastrophic forgetting of the network in the FCL process. Therefore, this paper proposes a novel FCL framework, Federated Probability Memory Recall (FedPMR), to mitigate the probability bias problem and the imbalance in parameter variations. Firstly, for the probability bias problem, this paper designs the Probability Distribution Alignment (PDA) module, which consolidates the memory of old probability experience. Specifically, PDA maintains a replay buffer and uses the probability memory stored in the buffer to correct the offset probabilities of the previous tasks during the two-stage training. Secondly, to alleviate the imbalance in parameter variations, this paper designs the Parameter Consistency Constraint (PCC) module, which constrains the magnitude of neural weight changes for previous tasks. Concretely, PCC applies a set of adaptive weights to subsets of the regularization term that constrains parameter changes, forcing the current model to be sufficiently close to the past model in parameter space distance. Experiments with various levels of task similitude across clients demonstrate that our technique establishes the new state-of-the-art performance when compared to previous FCL approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
30. Interval type-2 fuzzy neural networks with asymmetric MFs based on the twice optimization algorithm for nonlinear system identification.
- Author
-
Liu, Jiapu, Zhao, Taoyan, Cao, Jiangtao, and Li, Ping
- Subjects
- *
FUZZY neural networks , *MEMETICS , *MATHEMATICAL optimization , *INFORMATION filtering systems , *SYSTEM identification , *NONLINEAR systems , *STANDARD deviations - Abstract
This paper proposes a novel algorithm twice optimization for interval type-2 fuzzy neural networks with asymmetric membership functions (TOIT2FNN-AMF), for nonlinear system identification problems. The proposed TOIT2FNN-AMF uses an asymmetric Gaussian interval type-2 membership function to enhance the network's ability to describe and solve nonlinear and uncertain problems. The twice optimization algorithm consists of structure learning and parameter learning. Firstly, this paper proposes a multi-strategy adaptive differential evolution (MSADE) algorithm as the first optimization algorithm, which is used to determine the structure and the initial values of the parameters of the TOIT2FNN-AMF. It applies the root mean square error (RMSE) of the TOIT2FNN-AMF as the fitness function to determine the structure (number of rules) and initial parameters of the IT2FNN by searching for the RMSE values under different structures. When the fitness value reaches the minimum, that is, the RMSE value of the TOIT2FNN-AMF, the corresponding number will become the optimal one of fuzzy rules of the TOIT2FNN-AMF. Then, the second optimization algorithm of the TOIT2FNN-AMF turns into a hybrid optimization algorithm composed of an adaptive moment estimation (Adam) algorithm and recursive least squares (RLS) algorithm. Adam is used to optimize the antecedent parameters of TOIT2FNN-AMF rules, so as to maintain rapid convergence without generating oscillation during the training process; RLS is used to optimize the consequent parameters of TOIT2FNN-AMF rules, so that the network parameters can be optimized rapidly. In this way, the problems of excessive parameters to be adjusted and excessive slow convergence of the network can be solved. Finally, this paper evaluates the proposed TOIT2FNN-AMF by testing on problems of nonlinear system identification and chaotic time-series prediction. The simulation results are compared with those of similar methods in the existing literatures, which demonstrates that the proposed TOIT2FNN-AMF model yields a lower RMSE value and a simpler network structure than the other type-2 fuzzy neural networks (T2FNNs). [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
31. Short-term aviation maintenance technician scheduling based on dynamic task disassembly mechanism.
- Author
-
Niu, Ben, Xue, Bowen, Zhong, Huifen, Qiu, Haiyun, and Zhou, Tianwei
- Subjects
- *
REPAIR & maintenance service personnel , *BRIEF psychotherapy , *PARTICLE swarm optimization , *SCHEDULING - Abstract
• The finish time and total costs are extracted as the optimization objectives based on problem characteristics. • The dynamic task disassembling mechanism (DTDM) and four technician scheduling modes are novelly proposed. • A flexible time is introduced into DTDM to provide decision-makers with a larger pool of choices to meet specific needs. • A new solution method suitable for both AMTS model and ATMS-DTDM model is designed based on PSO and MOPSO algorithms. This paper focuses on the aviation maintenance technician scheduling (AMTS) problem and formulates AMTS and AMTS-DTDM model with a practical dynamic task disassembly mechanism (DTDM) and arrange maintenance technicians across shifts in short-term maintenance situations (less than 24–48 h). In DTDM, four technician scheduling modes are devised to flexibly disassemble the overtime work or reassigned it to other maintenance technicians according to work efficiency and progress, which could shorten the maintenance time and save the total cost. Moreover, a flexible time interval is designed to adjust the boundary of task disassembly. To further study the effectiveness of DTDM in reducing maintenance time and total costs, this paper divides both the AMTS and AMTS-DTDM models into three sub-models (i.e., two single-objective models and one multi-objective model), respectively. After that, we design solution methods as well as the encoding schemes compatible with both the AMTS model and the AMTS-DTDM model for different problem scales. Finally, to verify the effectiveness of DTDM, four groups of experiments are set up and particle swarm optimization (PSO) and multi-objective particle swarm optimization (MOPSO) are applied to compare AMTS and AMTS-DTDM sub-models. The experimental results show that the AMTS-DTDM model can effectively shorten the maintenance time and reduce the total costs for different scaled problems. Furthermore, the flexible time interval can facilitate more options for airlines to adjust the two above objectives to a small extent. The increase in flexible time may weaken the advantages of the AMTS-DTDM model while improving the rationality of the ultimate technician scheduling scheme. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
32. Stochastic configuration networks with chaotic maps and hierarchical learning strategy.
- Author
-
Qiao, Jinghui and Chen, Yuxi
- Subjects
- *
LEARNING strategies , *MACHINE learning , *CHAOS theory , *GAUSSIAN distribution , *MATHEMATICAL optimization , *REINFORCEMENT learning - Abstract
Stochastic configuration networks (SCNs) have universal approximation capability and fast modeling properties, which have been successfully employed in large-scale data analytics. Based on SCNs, Stochastic configuration networks with block increments (BSC) use the node block increments mechanism to improve training speed but increase the complexity of the model. This paper presents a parallel configuration method (PCM), develops an extension of the original BSC with chaos theory and proposes stochastic configuration networks with chaotic maps (SCNCM), and establishes a hierarchical learning strategy (HLS) to enhance the compactness and construction speed of the model. Firstly, PCM randomly assigns the input weights w and biases b of hidden layer nodes by using uniform and normal distributions. In PCM, an iterative learning algorithm is intended to generate the scope control set and improve configuration efficiency. Secondly, the paper presents two kinds of stochastic configuration networks with chaotic maps, which are SCNCM-I and SCNCM-II. SCNCM-I adjusts block size by using multiple error values and chaotic maps to improve the training speed. Based on SCNCM-I, SCNCM-II utilizes node removal mechanism to enhance the compactness. Finally, HLS integrates with SCNCM-I, SCNCM-II, and the Harris-hawks optimization algorithm (HHO). The purpose of training is to enhance the training speed and compactness for three algorithms. The experiments are conducted on four benchmark data sets and an industrial application shows its effectiveness. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
33. An iterative cyclic tri-strategy hybrid stochastic fractal with adaptive differential algorithm for global numerical optimization.
- Author
-
Abdel-Nabi, Heba, Ali, Mostafa Z., Awajan, Arafat, Alazrai, Rami, Daoud, Mohammad I., and Suganthan, Ponnuthurai N.
- Subjects
- *
EVOLUTIONARY algorithms , *GLOBAL optimization , *DIFFERENTIAL evolution , *ALGORITHMS , *SEARCH algorithms , *HOTEL suites - Abstract
Many real-life problems can be formulated as numerical optimization problems. Such problems pose a challenge for researchers when designing efficient techniques that are capable of finding the desired solution without suffering from premature convergence. This paper proposes a novel evolutionary algorithm that blends the exploitative and explorative merits of two main evolutionary algorithms, namely the Stochastic Fractal Search (SFS) and a Differential Evolution (DE) variant. This amalgam has an effective interaction and cooperation of an ensemble of diverse strategies to derive a single framework called Iterative Cyclic Tri-strategy with adaptive Differential Stochastic Fractal Evolutionary Algorithm (Ic3-aDSF-EA). The component algorithms cooperate and compete to enhance the quality of the generated solutions and complement each other. The iterative cycles in the proposed algorithm consist of three consecutive phases. The main idea behind the cyclic nature of Ic3-aDSF-EA is to gradually emphasize the work of the best-performing algorithm without ignoring the effects of the other inferior algorithm during the search process. The cooperation of component algorithms takes place at the end of each cycle for information sharing and the quality of solutions for the next cycle. The algorithm's performance is evaluated on 43 problems from three different benchmark suites. The paper also investigates the application to a set of real-life problems. The overall results show that the proposed Ic3-aDSF-EA has a propitious performance and a reliable scalability behavior compared to other state-of-the-art algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
34. Semi-supervised Multi-task Learning with Auxiliary data.
- Author
-
Liu, Bo, Chen, Qihang, Xiao, Yanshan, Wang, Kai, Liu, Junrui, Huang, Ruiguang, and Li, Liangjiao
- Subjects
- *
SUPERVISED learning , *SUPPORT vector machines , *ELECTRONIC data processing - Abstract
Compared with single-task learning, multi-tasks can obtain better classifiers by the information provided by each task. In the process of multi-task data collection, we always focus on the target task data in the training process, and ignore the non-target task data and unlabeled data that may be contained in the target task. In response to this issue, this paper introduces auxiliary or Universum into semi-supervised multi-task problem, and proposes a multi-task support vector machine (SU-MTLSVM) method based on semi-supervised learning to handle the case where each task contains the labeled, unlabeled, and Universum samples in the training set. This method introduces Universum as prior knowledge and provides high-dimensional information for semi-supervised learning, and builds a unique classifier from a large amount of unlabeled data. We then use KKT conditions and Lagrangian method to optimize the formulation of the model, and get the model parameters. Finally, we collect different data sets in the experiment part, and compare the performance of multiple baselines with the proposed method. Experiments prove that the method proposed in this paper is more effective for multi-task applications. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
35. Bearing-only distributed localization for multi-agent systems with complex coordinates.
- Author
-
Wang, Zhuping, Chang, Yanhao, Zhang, Hao, and Yan, Huaicheng
- Subjects
- *
MULTIAGENT systems , *SENSOR networks , *CONCEPTUAL models , *DISTRIBUTED algorithms , *SENSOR placement , *SEQUENCE alignment , *PROBLEM solving - Abstract
This paper addresses the bearing-only distributed localization, which is more accurate and more reliable than traditional localization technologies. A new bearing-only distributed localization framework is proposed to solve localization problems for both static sensor networks and mobile multi-agent systems (MASs). Based on the complex coordinate representation, a novel bearing-only distributed localization algorithm for sensor networks is proposed. The algorithm combines the orientation estimation and the position estimation to solve the orientation alignment problem, which makes the compasses no longer needed for the localized networks. The localization for the mobile MASs is also studied and the corresponding localization algorithm is designed, which is more general and more challenging. The key to obtaining positions of moving agents, is the velocity estimator in the proposed localization algorithm which makes the estimated positions and velocities converge to the true value simultaneously. A distinctive advantage of the localization framework proposed in this paper is that the bearing-only localization algorithms can be applied to more general systems, such as sensor networks and MASs. Simulations and experiment are presented to verify the proposed algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
36. Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: Classification, overview, and future perspectives.
- Author
-
Javaheri, Danial, Gorgin, Saeid, Lee, Jeong-A, and Masdari, Mohammad
- Subjects
- *
DENIAL of service attacks , *ANOMALY detection (Computer security) , *TRAFFIC monitoring , *CYBERTERRORISM , *COMPUTER systems , *SYSTEM failures , *QUALITY of service , *DATA security - Abstract
Nowadays, cybersecurity challenges and their ever-growing complexity are the main concerns for various information technology-driven organizations and companies. Although several intrusion detection systems have been introduced in an attempt to deal with zero-day cybersecurity attacks, computer systems are still highly vulnerable to various types of distributed denial of service (DDoS) attacks. This complicated cyber-attack caused many system failures and service disruptions, resulting in billions of dollars of financial loss and irrecoverable reputation damage in recent years. Considering the nonnegligible importance of business continuity in the Industry 4.0 era, this paper presents a comprehensive, systematic survey of DDoS attacks. It also proposes a hierarchy for this severe cyber threat, besides conducting deep comparisons from various perspectives between the studies published by reputed venues in this area. Furthermore, this paper recommends the most effective defensive strategies, with a focus on recently offered fuzzy-based detection methods, to mitigate such threats and bridge the gaps existing in the current intrusion detection systems and related works. The outcomes and key findings of this survey paper are highly advantageous for private companies, enterprises, and government agencies to be implemented in their local or global businesses to significantly improve business sustainability. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
37. An adaptive generalized Nash equilibrium seeking algorithm under high-dimensional input dead-zone.
- Author
-
Chen, Jianing, Qian, Sichen, and Qin, Sitian
- Subjects
- *
NASH equilibrium , *SINGULAR perturbations , *ELECTRICITY markets , *CONVEX sets , *ALGORITHMS - Abstract
In this paper, a novel adaptive generalized Nash equilibrium (GNE) seeking algorithm is designed, in order to address the non-cooperative game with private inequality constraints under high-dimensional input dead-zone. That is to say, the dead-zone dynamics may be thought of as a generic high-dimensional convex set, and the introduction of two methods distinguishes our works in seeking the GNE of non-cooperative games. On the one hand, a two-time-scale structure based on singular perturbation method is led into the design of GNE seeking algorithm, where the fast dynamics part rapidly eliminates the influence of input dead-zone, and the slow dynamics part drives the players' action to the GNE. On the other hand, adaptive penalty method is utilized to ensure the player's action enters the inequality constraints set without a prior estimation of centralized information for penalty parameters. The algorithm in this paper realizes complete distribution and parameter independence, making it easy to apply in practical programming. At last, several numerical examples regarding the electricity markets are employed to verify the effectiveness of the theoretical results. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
38. A performance approximation assisted expensive many-objective evolutionary algorithm.
- Author
-
Wang, Hao, Sun, Chaoli, Xie, Gang, Gao, Xiao-Zhi, and Akhtar, Farooq
- Subjects
- *
EVOLUTIONARY algorithms , *BENCHMARK problems (Computer science) , *GAUSSIAN processes , *SWARM intelligence - Abstract
Surrogate-assisted multi-objective evolutionary algorithms have been paid much attention to solve expensive multi-objective problems in recent years. However, with the number of objectives increasing, an improper solution may be picked for expensive objective evaluation due to the accumulation error of approximated values on objective functions. Furthermore, the time to construct surrogate models for all objectives will significantly increase. Thus, in this paper, Gaussian process (GP) models are proposed for performance indicators instead of for objective functions. Furthermore, solutions are selected from either of two ways to be evaluated using the expensive objective function. When there are non-dominated solutions found so far that are approximated, they will be exactly evaluated using the objective function. Otherwise, the solution with the maximum approximation uncertainty among the current population will be evaluated using the real objective functions. The efficiency of the presented approach is validated on the DTLZ test suite with 3, 6, 10, 15, and 20 objectives, MaF benchmark problems with 3, 6, 10, 15, and 20 objectives, and a real-world optimization problem called filter design. The experimental results show that the method proposed in this paper is competitive compared to recently proposed peer algorithms for expensive many-objective problems. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
39. Distributed event-triggered output-feedback synchronized tracking with connectivity-preserving performance guarantee for nonstrict-feedback nonlinear multiagent systems.
- Author
-
Yoo, Sung Jin
- Subjects
- *
MULTIAGENT systems , *NONLINEAR systems , *UNCERTAIN systems , *PSYCHOLOGICAL feedback , *SYNCHRONIZATION - Abstract
In this paper, we present a connectivity-preserving performance function approach for the distributed output-feedback synchronized tracking of uncertain heterogeneous nonlinear multiagent systems in a nonstrict-feedback form. Compared with existing output-feedback cooperative control results using neural networks, this paper contributes to developing a universal output-feedback synchronized control methodology that uses a connectivity-preserving performance function to ensure both initial network connectivity and preselected synchronization performance with a designable convergence time. To this end, a neural-network-based adaptive observer for each follower is designed to ensure the boundedness of estimation errors of unmeasurable states. Then, local event-triggered synchronized trackers using only relative output information and the connectivity-preserving performance function are constructed to guarantee the closed-loop stability in a low-complexity sense, where no adaptive neural networks and command filters are not required in the local trackers. Finally, a purely academic example and a practical platoon-control problem of multiple uncertain vehicular systems are considered to clarify and verify the proposed connectivity-preserving performance function approach in the simulation. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
40. Global polynomial stabilization of proportional delayed inertial memristive neural networks.
- Author
-
Li, Qian and Zhou, Liqun
- Subjects
- *
POLYNOMIALS , *MATHEMATICAL models , *COMPUTER simulation - Abstract
• The paper is the first batch that tries to inquiry the GPS of the PDIMNNs. Furthermore, unlike the previous literature [11,21,35] , the nonlinear substitution that converts the PDs system to a constant delays system is not used. Because the subsequent pro-cessing of the converted system is complicated, this paper directly performs on the original PDs system. • The paper employs the non-reduced-order method, which r-efrains the double-dimensional problem after reduced-order [3–5,23,24]. In practical applications, the method is more ponderable and si-gnificative for second-order scheme under controller. • In the paper, devise both the feedback controller and the adaptive controller for the first time to achieve the GPS of the PD-IMNNs. The advantages of the two types of controllers are compar-ed through numerical examples and simulations. The mathematical model is closer to reality, and selecting the appropriate controller in application can further reduce control expenses. This article probes into the global polynomial stabilization (GPS) of proportional delayed inertial memristive neural networks (PDIMNNs). Here, ruling out the reduced-order way, discuss the GPS of PDIMNNs under the second-order scheme directly. Firstly, a feedback controller is designed to make the system self-stabilizing. By designing suitable Lyapunov functional with adjustable parameters and combining with inequality techniques, two algebraic criteria are obtained to realize the GPS of the PDIMNNs. Owing to the conservatism caused by the ineluctable inequality scaling, it is worth noting that the controller gains are greater than the actual requirements. To further save control expenses, employing an adaptive controller to make the system stabilized. Finally, three numerical examples which sustain the usability of the obtained theoretical conclusions are shown. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
41. Self-attention based deep direct recurrent reinforcement learning with hybrid loss for trading signal generation.
- Author
-
Kwak, Dongkyu, Choi, Sungyoon, and Chang, Woojin
- Subjects
- *
BLENDED learning , *REINFORCEMENT learning , *REWARD (Psychology) , *MACHINE learning , *STOCK price indexes , *TIME series analysis - Abstract
• Algorithmic trading using self-attention based recurrent reinforcement learning is developed. • Self-attention layer reallocates temporal weights in the sequence of temporal embedding. • Hybrid loss feature is incorporated to have predictive and reconstructive power. Algorithmic trading based on machine learning has the advantage of using intrinsic features and embedded causality in complex stock price time series. We propose a novel algorithmic trading model based on recurrent reinforcement learning, optimized for making consecutive trading signals. This paper elaborates on how temporal features from complex observation are optimally extracted to maximize the expected rewards of the reinforcement learning model. Our model incorporates the hybrid learning loss to allow sequences of hidden features for reinforcement learning to contain the original state's characteristics fully. The self-attention mechanism is also introduced to our model for learning the temporal importance of the hidden representation series, which helps the reinforcement learning model to be aware of temporal dependence for its decision-making. In this paper, we verify the effectiveness of proposed model using some major market indices and the representative stocks in each sector of S&P500. The augmented structure that we propose has a significant dominance on trading performance. Our proposed model, self-attention based deep direct recurrent reinforcement learning with hybrid loss (SA-DDR-HL), shows superior performance over well-known baseline benchmark models, including machine learning and time series models. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
42. The EEG signals encryption algorithm with K-sine-transform-based coupling chaotic system.
- Author
-
Wen, Dong, Jiao, Wenlong, Li, Xiaoling, Wan, Xianglong, Zhou, Yanhong, Dong, Xianling, Lan, Xifa, and Han, Wei
- Subjects
- *
ELECTROENCEPHALOGRAPHY , *DATA protection , *RELIABILITY in engineering , *ALGORITHMS , *PROBLEM solving , *CLOUD storage - Abstract
Telemedicine provides remote online services for digital diagnosis and treatment via the Internet. However, there is a risk of data leakage during transmission. Therefore, data protection is an important challenge for telemedicine. Chaos is widely used in image, audio, and EEG encryption because of its unique characteristics of unpredictability, nonlinearity, and sensitivity to an initial state. However, some chaotic maps have various security issues. To solve these problems, this paper proposes a K-sine-transform-based coupled chaotic system (K-STBCCS), combining any two one-dimensional chaotic mappings to generate a new chaos mapping. To demonstrate the reliability of the system, this paper generates three new chaotic mappings using K-STBCCS and analyzes their performance. Using the chaotic mapping generated by K-STBCCS, this paper further proposes an EEG signal encryption scheme based on the confusion-diffusion principle. The purpose of confusion is to separate adjacent EEG signals, while the purpose of diffusion is to change the value of EEG signals. Among them, the diffusion operation uses positive and negative diffusion to reduce the correlation between the ciphertext and the original signals. The experimental results and security analysis show that the proposed EEG signal encryption scheme performs well and passes the rigorous cryptographic security test. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
43. An exponential negation of complex basic belief assignment in complex evidence theory.
- Author
-
Yang, Chengxi and Xiao, Fuyuan
- Subjects
- *
DISTRIBUTION (Probability theory) , *NEGATIVE binomial distribution , *DEMPSTER-Shafer theory , *COMPLEX numbers , *REAL numbers , *NEGATION (Logic) , *CLASSICAL test theory - Abstract
Negation is an important operation in evidence theory, whose idea is to consider the opposite of events, can deal with some problems with uncertainties from the opposite side and obtain information behind probability distribution. In classical D-S theory (Dempster-Shafer's theory), there are already many negation methods existed on real number field and many properties of which have been discovered. However, in complex evidence theory, which based on complex number field, negation is still an open problem. In order to deal with some problems like those in D-S theory, a new negation method for CBBA (Complex Basic Belief Assignment) should be proposed. In this paper, a new negation method called CBBA exponential negation will be presented, which can be seen as a generalization from BBA (Basic Belief Assignment) to CBBA. This proposed negation transforms a CBBA to another one with the entropy increased simultaneously. Also, some properties of this negation will be discussed such as invariance, convergence, fixed point, distribution of Pascal triangle, convergence speed, impact on negation convergence and so on. Besides, most among them will be strictly proved in this paper. Furthermore, a new entropy for CBBA and some numerical examples will be presented, and we will study the proposed negation from the view of entropy. Finally, an application of CBBA exponential negation will be shown in the end. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
44. An enhanced multi-objective biogeography-based optimization for overlapping community detection in social networks with node attributes.
- Author
-
Reihanian, Ali, Feizi-Derakhshi, Mohammad-Reza, and Aghdasi, Hadi S.
- Subjects
- *
SOCIAL networks , *COMMUNITIES , *SOCIAL network analysis , *EVOLUTIONARY algorithms , *PERFORMANCES - Abstract
• An overlapping community finding method based on node/link information is proposed. • A new representation is introduced to encode and decode overlapping communities. • A novel two-phase mutation and a new double-point crossover are presented. • A metric is proposed to evaluate overlapping/non-overlapping partitions. • The proposed method shows better performance than the 15 other relevant methods. Community detection is one of the most important and interesting issues in social network analysis. Most of the current community detection algorithms tend to find communities in social networks with just considering the topological structures of the networks. In recent years, simultaneously considering of nodes' attributes and topological structures of social networks in the process of community detection has attracted the attentions of many scholars, and this consideration has been recently used in some community detection methods to increase their efficiencies and to enhance their performances in finding meaningful and relevant communities. But the problem is that most of these methods tend to find non-overlapping communities, while many real-world networks include communities that often overlap to some extent. In order to solve this problem, an evolutionary algorithm called MOBBO-OCD, which is based on multi-objective biogeography-based optimization (BBO), is proposed in this paper to automatically find overlapping communities in a social network with node attributes with synchronously considering the density of connections and the similarity of nodes' attributes in the network. In MOBBO-OCD, an extended locus-based adjacency representation called OLAR is introduced to encode and decode overlapping communities. Based on OLAR, a rank-based migration operator along with a novel two-phase mutation strategy and a new double-point crossover are used in the evolution process of MOBBO-OCD to effectively lead the population into the evolution path. In order to assess the performance of MOBBO-OCD, a new metric called alpha_SAEM is proposed in this paper, which is able to evaluate the goodness of both overlapping and non-overlapping partitions with considering the two aspects of node attributes and linkage structure. Quantitative evaluations, based on three extensive experiments on 14 real-life data sets with diverse characteristics, reveal that MOBBO-OCD achieves favorable results which are quite superior to the results of 15 relevant community detection algorithms in the literature. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
45. A semisupervised classification algorithm combining noise learning theory and a disagreement cotraining framework.
- Author
-
Yang, Zaoli, Zhang, Weijian, Han, Chunjia, Li, Yuchen, Yang, Mu, and Ieromonachou, Petros
- Subjects
- *
CLASSIFICATION algorithms , *ESTIMATION theory , *NOISE , *COSPLAY , *LEARNING , *PROBLEM solving - Abstract
In the era of big data, the data in many business scenarios are characterized by a small number of labelled samples and a large number of unlabelled samples. It is quite difficult to classify and identify such data and provide effective decision support for a business. A commonly employed processing method in this kind of data scenario is the disagreement-based semisupervised learning method, i.e., exchanging high-confidence samples among multiple models as pseudolabel samples to improve each model's classification performance. As such pseudolabel samples inevitably contain label noise, they may interfere with the subsequent model learning and damage the robustness of the ensemble model. To solve this problem, a semisupervised classification algorithm based on noise learning theory and a disagreement cotraining framework is proposed. In this model, first, the probably approximately correct (PAC) estimation theory under label noise conditions is applied, the relationship between the label noise level and model robust estimation in the process of multiround cotraining is discussed, and a disagreement elimination algorithm framework based on multiple-model (feature argument and select (FANS) algorithm and L1 penalized logistics regression (PLR) algorithm) cotraining is constructed based on this theoretical relationship. The experimental results show that the algorithm proposed in this paper gives not only a high-confidence sample set that meets the upper bound constraint of the label noise level but also a robust ensemble model capable of resisting sampling bias. The work performed in this paper provides a new research perspective for semisupervised learning theory based on disagreement. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
46. An access control model for medical big data based on clustering and risk.
- Author
-
Jiang, Rong, Han, Shanshan, Yu, Yimin, and Ding, Weiping
- Subjects
- *
ACCESS control , *BIG data , *ENTROPY (Information theory) , *QUALITY of service , *AT-risk behavior - Abstract
• Proposes a new manner of spectral clustering to decrease the sensitivity • Gives an algorithm to calculate information entropy so as to value the risk ranks. • Evaluates SC-RBAC by the datasets and it is robust and efficient Access control has been widely adopted by distributed platforms, and its effectiveness is of great importance to the quality of services provided by such platforms. However, traditional access control is difficult to apply to scenarios where authorization changes frequently and to extremely large-scale datasets with limited resources. This paper proposes an access control model based on spectral clustering (SC) and risk (SC-RBAC), which is more suitable for big data medical scenarios. Based on user history access data, an improved SC algorithm is used to cluster doctor users. Then, the user classification is introduced as a parameter into the information entropy to improve the accuracy of quantifying the user's access behavior risk. Finally, based on the accurate risk value of access behavior, we assign access rights to users through the access control function constructed in the paper. Experimental results show that in three different situations, the model proposed in this paper can distinguish the two types of doctors well, the accuracy of the model can reach more than 90%, and it outperforms other access control models. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
47. Observer-based finite-time consensus control for multiagent systems with nonlinear faults.
- Author
-
Zheng, Xiaohong, Li, Xiao-Meng, Yao, Deyin, Li, Hongyi, and Lu, Renquan
- Subjects
- *
MULTIAGENT systems , *NONLINEAR systems , *MEAN value theorems , *STABILITY criterion , *RELIABILITY in engineering , *SMART structures - Abstract
• In the framework of finite-time command filter control, this paper constructs a quadratic function in the controller. Compared with [23, 24, 25], the presented adaptive finite-time control algorithm not only solves the "explosion of complexity" problem effectively, but also circumvents the singularity problem. • In contrast to the literatures on finite-time control [43, 44, 45], the cases of faults happening during transmission phase of system are rarely considered. Moreover, nonlinear faults may exist in many real systems, which necessitates the design of fault-tolerant controllers to enhance the system reliability and guarantee consistent control performance. In this paper, nonaffine nonlinear faults are taken into account, which is more complex than linear faults studied in [37, 39, 46]. • Different from the results [28, 29, 47] which used the trial-and-error method to validate the observation gain matrix, this paper skillfully introduces the differential mean value theorem and the convex combination theorem to transform the acquisition of the observation gain matrix from solving a nonlinear matrix inequality to solving a set of LMIs. Meanwhile, the solvability of LMIs guarantees the stability of the observer and simplifies the algorithm. The present work deals with the consensus issue for nonlinear multiagent systems (MASs) subject to nonaffine nonlinear faults and unmeasurable states. First, the Butterworth low-pass filter (BLPF) is exploited to eliminate the algebraic loop problem arising from nonaffine nonlinear faults. In light of the convex combination theory, a neural observer is established to estimate the unmeasured states, which improves the efficiency of solving the observer gain. Then, with the help of the adaptive backstepping algorithm, an observer-based neural finite-time control protocol is proposed in which a quadratic function is constructed to circumvent the singularity problem. The finite-time stability criterion and Lyapunov stability theorem are utilized to demonstrate that all signals of the closed-loop system are bounded in finite time. Finally, a simulation experiment is applied to show the effectiveness of the present method. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
48. Adaptive fuzzy resilient control for switched systems with state constraints under deception attacks.
- Author
-
He, Hangfeng, Qi, Wenhai, Yan, Huaicheng, Cheng, Jun, and Shi, Kaibo
- Subjects
- *
ADAPTIVE fuzzy control , *DECEPTION , *BACKSTEPPING control method , *ADAPTIVE control systems , *MARKOVIAN jump linear systems , *LYAPUNOV functions - Abstract
This paper studies an adaptive fuzzy resilient control strategy for switched systems with deception attacks and state constraints. With the deception attacks on both the sensors and actuators, the feedback data is unreliable and the direction of control is unknown, which make it difficult to design the adaptive resilient control for switched systems. By combining Nussbaum-based adaptive control, fuzzy control and a two-step backstepping approach, a novel adaptive resilient controller and mode-dependent switching law are designed to against deception attacks. Considering the buffeting problem triggered by the Nussbaum function, the states are constrained in this paper and the barrier Lyapunov function is utilized. Based on the designed adaptive fuzzy resilient control method, both the asymptotic stability and the state constraints of the switched systems under deception attacks can be guaranteed. The feasibility of the proposed resilient control strategy is demonstrated through an application of the strategy to an attacked single-link robot arm (SLRA) model. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
49. What perceptron neural networks are (not) good for?
- Author
-
Calude, Cristian S., Heidari, Shahrokh, and Sifakis, Joseph
- Subjects
- *
QUANTUM annealing , *ARTIFICIAL intelligence , *BOOLEAN functions , *SET functions , *QUANTUM computing , *COMPLEXITY (Philosophy) , *SUCCESS - Abstract
Perceptron Neural Networks (PNNs) are essential components of intelligent systems because they produce efficient solutions to problems of overwhelming complexity for conventional computing methods. Many papers show that PNNs can approximate a wide variety of functions, but comparatively, very few discuss their limitations and the scope of this paper. To this aim, we define two classes of Boolean functions – sensitive and robust –, and prove that an exponentially large set of sensitive functions are exponentially difficult to compute by multi-layer PNNs (hence incomputable by single-layer PNNs). A comparatively large set of functions in the second one, but not all, are computable by single-layer PNNs. Finally, we used polynomial threshold PNNs to compute all Boolean functions with quantum annealing and present in detail a QUBO computation on the D-Wave Advantage. These results confirm that the successes of PNNs, or lack of them, are in part determined by properties of the learned data sets and suggest that sensitive functions may not be (efficiently) computed by PNNs. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
50. Multi-modal fusion network with complementarity and importance for emotion recognition.
- Author
-
Liu, Shuai, Gao, Peng, Li, Yating, Fu, Weina, and Ding, Weiping
- Subjects
- *
EMOTION recognition , *ARTIFICIAL intelligence , *MACHINE learning , *DEEP learning - Abstract
Multimodal emotion recognition, that is, emotion recognition uses machine learning to generate multi-modal features on the basis of videos which has become a research hotspot in the field of artificial intelligence. Traditional multi-modal emotion recognition method only simply connects multiple modalities, and the interactive utilization rate of modal information is low, and it cannot reflect the real emotion under the conflict of modal features well. This article first proves that effective weighting can improve the discrimination between modalities. Therefore, this paper takes into account the importance differences between multiple modalities, and assigns weights to them through the importance attention network. At the same time, considering that there is a certain complementary relationship between the modalities, this paper constructs an attention network with complementary modalities. Finally, the reconstructed features are fused to obtain a multi-modal feature with good interaction. The method proposed in this paper is compared with traditional methods in public datasets. The test results show that our method is accurate in It performs well in both the rate and confusion matrix metrics. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.