{"title":"A production capacity optimisation model for a global supply chain coordinator","authors":"Snehamay Banerjee, D. Golhar, R. Gopalan","doi":"10.1504/IJADS.2018.095283","DOIUrl":"https://doi.org/10.1504/IJADS.2018.095283","url":null,"abstract":"A supply chain coordinator (SCC) serves as an intermediary between raw material suppliers, contract manufacturers, and end customers who are typically large retailers. The SCC may not actually own a physical manufacturing plant or supply raw material, but performs a crucial coordinating role in a supply chain by orchestrating the purchase of raw material and contract manufacturing of customised products for distribution to globally dispersed retailers. In this intermediary role, the SCC exploits global differences in manufacturing costs at various candidate facilities, but also bears operational risks if the demand at end retailers is significantly different from projected forecasts. This research addresses a facility choice, capacity selection, productions and transportation decisions faced by a SCC who tries to fulfil a multi-period, counter-seasonal demand at a guaranteed service level. A mathematical programming model is developed that integrates the various decision variables. The use of the model as a contract negotiation tool is also illustrated.","PeriodicalId":216414,"journal":{"name":"Int. J. Appl. Decis. Sci.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129860515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A risk-based emergency group decision method for haze disaster weather based on cumulative prospect theory","authors":"Haitao Li","doi":"10.1504/IJADS.2018.095270","DOIUrl":"https://doi.org/10.1504/IJADS.2018.095270","url":null,"abstract":"The frequent occurrence of extreme haze episodes currently in China has caused widespread public concern. The Chinese Government has developed and implemented a series of long-term measures to mitigate the serious situation. Nevertheless, some emergency response measures are also needed in the short-term. Hence, a risk-based emergency group decision method for haze disaster weather based on cumulative prospect theory (CPT) with linguistic evaluation information is proposed. This method obtains and expresses group decision-makers' (DMs') evaluation information based on additional linguistic evaluation scale and its extended scale, calculates the comprehensive prospect value matrix of each haze emergency response alternative based on CPT, after that, calculates the final decision results with DMs' weights. On these bases, the best haze disaster emergency response alternative can be selected. Finally, an application case of HD city in North China is presented to illustrate the usefulness and effectiveness of the proposed method.","PeriodicalId":216414,"journal":{"name":"Int. J. Appl. Decis. Sci.","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123537933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An automated data-driven tool to build artificial neural networks for predictive decision-making","authors":"Chun-Kit Ngan","doi":"10.1504/IJADS.2018.10010870","DOIUrl":"https://doi.org/10.1504/IJADS.2018.10010870","url":null,"abstract":"We propose the development of an automated data-driven tool to assist data analysts in building an optimal artificial neural network (ANN) model to solve their domain-specific problems for predictive decision making. The proposed approach combines the strengths of both sequential training methods and multi-hidden-layer learning algorithms to dynamically learn the best-fitted parameters, including learning rate (LR), momentum rate (MR), number of hidden layers (NHL), and number of neurons in each hidden layer (NNHL), for the given set of key input attributes and multiple output nodes. Specifically, the contributions of this work are three-fold: 1) develop the new extended algorithm, i.e., multidimensional parameter learning (MPL), to learn the optimal ANN parameters; 2) provide the user-friendly GUI tool for data analysts to maintain the data manipulations and the tool operations; 3) conduct the experimental case study, i.e., determining the severity level of Alzheimer's patients, to present the superior result (i.e., 95.33%) in terms of prediction accuracy and model complexity by using the learned parameters (i.e., LR = 0.6, MR = 0.8, NHL = 2, NNHL at the 1st layer = 28, and NNHL at the 2nd layer = 24) from the MPL algorithm.","PeriodicalId":216414,"journal":{"name":"Int. J. Appl. Decis. Sci.","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116015390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Armin Cheraghalipour, M. Paydar, M. Hajiaghaei-Keshteli
{"title":"Applying a hybrid BWM-VIKOR approach to supplier selection: a case study in the Iranian agricultural implements industry","authors":"Armin Cheraghalipour, M. Paydar, M. Hajiaghaei-Keshteli","doi":"10.1504/IJADS.2018.10010871","DOIUrl":"https://doi.org/10.1504/IJADS.2018.10010871","url":null,"abstract":"In today's economy, due to the importance of quality and quantity of the product, supplier selection plays a significant role in procurement planning of each factory. Agricultural implements industry is one of the industries included in this sensitivity. Thus, in this paper a supplier selection framework for this industry is considered. For this purpose, a strong approach, namely best worst method (BWM) along with a well-known MCDM technique with the name of VIKOR are employed. At first, the criteria with a view to the literature review and opinions of industry experts are identified. Afterward weights of the criteria are obtained by BWM and then candidate suppliers are ranked by using BWM and VIKOR. In order to check the quality of expert's inputs, the consistency tests are applied. Moreover, to investigate the robustness of the approach sensitivity analysis is considered. Finally, according to the obtained results, it is clear that proposed framework could be effective like as existing approaches for supplier selection problems. Also, agricultural managers implementing industries need simple methodologies to select the proper suppliers and improve their situation.","PeriodicalId":216414,"journal":{"name":"Int. J. Appl. Decis. Sci.","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128061661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constrains optimal propagation-based modified semi-supervised spectral clustering for large-scale data","authors":"Dayu Xu, Xuyao Zhang, Jiaqi Huang, Hailin Feng","doi":"10.1504/IJADS.2018.10010706","DOIUrl":"https://doi.org/10.1504/IJADS.2018.10010706","url":null,"abstract":"We focus on the problem of high computational complexity in the clustering process of traditional spectral clustering algorithm that cannot satisfy the requirement of current large-scale data clustering applications. In this article, we establish a constrained optimal propagation based semi-supervised large-scale data clustering model. In this model, micro similarity matrix is constructed by using prior dotted pair constraint information at first. On this basis, the Gabow algorithm is exploited to extract each strongly connected component from the micro similarity matrix that is represented by its connected graph. Then, a new constrained optimisation propagation algorithm for each strongly connected component is proposed to calculate the similarity of the whole dataset. Finally, we employ the singular value decomposition and the accelerated k-means algorithm to obtain the clustering results of large-scale data. Experiments on multiple standard testing datasets show that compared with other previous research results in this field, the proposed clustering model has higher clustering accuracy and lower computation complexity, and is more suitable for large-scale data clustering applications.","PeriodicalId":216414,"journal":{"name":"Int. J. Appl. Decis. Sci.","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123222430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel approach for mining probabilistic frequent itemsets over uncertain data streams","authors":"Tian-Tian Li, Fang’ai Liu, Xinhua Wang","doi":"10.1504/IJADS.2018.10010708","DOIUrl":"https://doi.org/10.1504/IJADS.2018.10010708","url":null,"abstract":"With the growing popularity of internet of things (IoT) and pervasive computing, a large amount of uncertain data has been collected. Frequent itemsets mining has attracted much attention in database and data mining communities. Current methods exists some disadvantages, such as inaccurate, low efficiency, etc. To address this problem, we propose a novel approach, called uncertain pattern-slide window algorithm (UP-SW) is presented. In this algorithm, a new tree structure called USFP-tree is designed to save the redeveloped header table; the model of slide-window is adopted into the renewal process of mining result. The USFP-tree is structured based on dynamic array (ARRAY) and link information (LINK), as the slide-window slides, the mining result saved in USFP-tree is refreshed. The probabilistic frequent itemsets are obtained by traversing the final ARRAY of header table. Experimental results and theoretical analysis show that UP-SW has better performance than several other UP algorithms, especially on the mining efficiency and reducing the memory usage.","PeriodicalId":216414,"journal":{"name":"Int. J. Appl. Decis. Sci.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125593424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource optimisation and fault detection algorithms for cloud computing platforms based on SVM and resource reserve strategy","authors":"Xilong Qu, S. Patnaik","doi":"10.1504/IJADS.2018.10011764","DOIUrl":"https://doi.org/10.1504/IJADS.2018.10011764","url":null,"abstract":"Efficient operation of cloud computing platforms depends on the optimised virtual resources and faster fault diagnosis system of the virtual machines. This paper proposes an algorithm by introducing a virtual machines based on elastic reservation mechanism, which can improve the availability of cloud resources through the demand analysis taking the help of support vector machines which has advantages resolving nonlinear and high dimensional classification problems. Secondly it adopts the anomaly detection algorithm based on support vector machines for failure analysis. In addition, the dimensionality problem can be sorted out by means of principal component analysis (PCA) algorithm and a kernel function used for distance measurement. It establishes the topological structure for the image set of feature space with Delaunay triangulation and analyses the relationship between kernel parameter and regulator, in order to build an effective model.","PeriodicalId":216414,"journal":{"name":"Int. J. Appl. Decis. Sci.","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128027698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An initiative network defence strategy based on game theory","authors":"Qian-Yi Zhao, Jun Dong","doi":"10.1504/IJADS.2018.10010637","DOIUrl":"https://doi.org/10.1504/IJADS.2018.10010637","url":null,"abstract":"Traditional network safety evaluation only takes into account the attackers' measures to system threat and it lacks initiative defence strategies. To provide an overall and comprehensive analysis on security status of the network, this paper proposes an initiative network system defence strategy based on game theory. The scheme considers possible attack strategies and defence strategies to establish game strategy graph according to the dependency relationship among host vulnerabilities of network. Further, it puts forward a attack-defence game model with double roles and non-cooperation, defining payoff function on both sides. Then the model designs corresponding defence strategy search algorithm to provide a novel method to reflect real-time and scientific security situation evaluation intuitively. It computes the benefits of both sides to find a balance point and provides the optimal defence measure of defenders. The simulation results show that our strategy is more in line with the actual situation than traditional methods with unilateral evaluation on single side. The model can also rapidly respond to network system and it is feasible to improve the network security defence status.","PeriodicalId":216414,"journal":{"name":"Int. J. Appl. Decis. Sci.","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130262713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Task scheduling optimisation algorithm based on load balance under the cloud computing environment","authors":"Shibiao Mu","doi":"10.1504/IJADS.2018.10010707","DOIUrl":"https://doi.org/10.1504/IJADS.2018.10010707","url":null,"abstract":"In order to achieve an optimal task scheduling scheme with the constraint of load balance in cloud computing platform. We utilise the CloudSim simulator to construct the cloud computing environment, and CloudSim contains three components: 1) CloudSim core simulation engine; 2) CloudSim basic structure; 3) user codes. Afterwards, we propose a novel load balancing oriented task scheduling optimisation algorithm based on genetic algorithm, and task assignment results are obtained through analysing gene values of chromosomes. In order to ensure convergence rate in genetic algorithm, we design the fitness function by integrating computation time and computation cost together. Furthermore, we design adaptive crossover and mutation operations to promote the search efficiency. Finally, we conduct an experiment to demonstrate the performance of the proposed algorithm. The experimental results show that the proposed algorithm can achieve the goal of high level of load balance with lower calculation time and cost.","PeriodicalId":216414,"journal":{"name":"Int. J. Appl. Decis. Sci.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134487156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy evaluation mechanism of trust chain under embedded trusted computing","authors":"Li Gang","doi":"10.1504/IJADS.2018.10008974","DOIUrl":"https://doi.org/10.1504/IJADS.2018.10008974","url":null,"abstract":"This paper proposes a trust chain evaluation mechanism based on fuzzy theory under embedded trusted computing. Firstly, this method described the trusted computing, the trusted computing platform, embedded system, which showed the important position of the trust chain in dependable computing. Then, in the process of the entity evaluation of trust chain, according to the influencing factors of trust chain in the trusted computing, considering the indirect trust degree, completed the establishment of evaluation method of trusted computing model based on the fuzzy set theory. Finally, combined the fuzzy logic inference with the trust transitivity, we proposed a trust chain evaluation mechanism based on similarity, and introduced the time decay function and adaptive weight coefficient to give the trust updating model. Simulation experiment shows that the proposed method can effectively improve the reliability of trust chain evaluation in embedded trusted computing, which has good application value.","PeriodicalId":216414,"journal":{"name":"Int. J. Appl. Decis. Sci.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121175864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}