Int. J. Appl. Decis. Sci.最新文献

筛选
英文 中文
A production capacity optimisation model for a global supply chain coordinator 面向全球供应链协调者的产能优化模型
Int. J. Appl. Decis. Sci. Pub Date : 2018-10-04 DOI: 10.1504/IJADS.2018.095283
Snehamay Banerjee, D. Golhar, R. Gopalan
{"title":"A production capacity optimisation model for a global supply chain coordinator","authors":"Snehamay Banerjee, D. Golhar, R. Gopalan","doi":"10.1504/IJADS.2018.095283","DOIUrl":"https://doi.org/10.1504/IJADS.2018.095283","url":null,"abstract":"A supply chain coordinator (SCC) serves as an intermediary between raw material suppliers, contract manufacturers, and end customers who are typically large retailers. The SCC may not actually own a physical manufacturing plant or supply raw material, but performs a crucial coordinating role in a supply chain by orchestrating the purchase of raw material and contract manufacturing of customised products for distribution to globally dispersed retailers. In this intermediary role, the SCC exploits global differences in manufacturing costs at various candidate facilities, but also bears operational risks if the demand at end retailers is significantly different from projected forecasts. This research addresses a facility choice, capacity selection, productions and transportation decisions faced by a SCC who tries to fulfil a multi-period, counter-seasonal demand at a guaranteed service level. A mathematical programming model is developed that integrates the various decision variables. The use of the model as a contract negotiation tool is also illustrated.","PeriodicalId":216414,"journal":{"name":"Int. J. Appl. Decis. Sci.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129860515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A risk-based emergency group decision method for haze disaster weather based on cumulative prospect theory 基于累积前景理论的雾霾灾害天气风险应急群决策方法
Int. J. Appl. Decis. Sci. Pub Date : 2018-10-04 DOI: 10.1504/IJADS.2018.095270
Haitao Li
{"title":"A risk-based emergency group decision method for haze disaster weather based on cumulative prospect theory","authors":"Haitao Li","doi":"10.1504/IJADS.2018.095270","DOIUrl":"https://doi.org/10.1504/IJADS.2018.095270","url":null,"abstract":"The frequent occurrence of extreme haze episodes currently in China has caused widespread public concern. The Chinese Government has developed and implemented a series of long-term measures to mitigate the serious situation. Nevertheless, some emergency response measures are also needed in the short-term. Hence, a risk-based emergency group decision method for haze disaster weather based on cumulative prospect theory (CPT) with linguistic evaluation information is proposed. This method obtains and expresses group decision-makers' (DMs') evaluation information based on additional linguistic evaluation scale and its extended scale, calculates the comprehensive prospect value matrix of each haze emergency response alternative based on CPT, after that, calculates the final decision results with DMs' weights. On these bases, the best haze disaster emergency response alternative can be selected. Finally, an application case of HD city in North China is presented to illustrate the usefulness and effectiveness of the proposed method.","PeriodicalId":216414,"journal":{"name":"Int. J. Appl. Decis. Sci.","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123537933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An automated data-driven tool to build artificial neural networks for predictive decision-making 一种自动数据驱动工具,用于构建用于预测决策的人工神经网络
Int. J. Appl. Decis. Sci. Pub Date : 2018-06-30 DOI: 10.1504/IJADS.2018.10010870
Chun-Kit Ngan
{"title":"An automated data-driven tool to build artificial neural networks for predictive decision-making","authors":"Chun-Kit Ngan","doi":"10.1504/IJADS.2018.10010870","DOIUrl":"https://doi.org/10.1504/IJADS.2018.10010870","url":null,"abstract":"We propose the development of an automated data-driven tool to assist data analysts in building an optimal artificial neural network (ANN) model to solve their domain-specific problems for predictive decision making. The proposed approach combines the strengths of both sequential training methods and multi-hidden-layer learning algorithms to dynamically learn the best-fitted parameters, including learning rate (LR), momentum rate (MR), number of hidden layers (NHL), and number of neurons in each hidden layer (NNHL), for the given set of key input attributes and multiple output nodes. Specifically, the contributions of this work are three-fold: 1) develop the new extended algorithm, i.e., multidimensional parameter learning (MPL), to learn the optimal ANN parameters; 2) provide the user-friendly GUI tool for data analysts to maintain the data manipulations and the tool operations; 3) conduct the experimental case study, i.e., determining the severity level of Alzheimer's patients, to present the superior result (i.e., 95.33%) in terms of prediction accuracy and model complexity by using the learned parameters (i.e., LR = 0.6, MR = 0.8, NHL = 2, NNHL at the 1st layer = 28, and NNHL at the 2nd layer = 24) from the MPL algorithm.","PeriodicalId":216414,"journal":{"name":"Int. J. Appl. Decis. Sci.","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116015390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Applying a hybrid BWM-VIKOR approach to supplier selection: a case study in the Iranian agricultural implements industry 将混合BWM-VIKOR方法应用于供应商选择:伊朗农机具行业的案例研究
Int. J. Appl. Decis. Sci. Pub Date : 2018-06-30 DOI: 10.1504/IJADS.2018.10010871
Armin Cheraghalipour, M. Paydar, M. Hajiaghaei-Keshteli
{"title":"Applying a hybrid BWM-VIKOR approach to supplier selection: a case study in the Iranian agricultural implements industry","authors":"Armin Cheraghalipour, M. Paydar, M. Hajiaghaei-Keshteli","doi":"10.1504/IJADS.2018.10010871","DOIUrl":"https://doi.org/10.1504/IJADS.2018.10010871","url":null,"abstract":"In today's economy, due to the importance of quality and quantity of the product, supplier selection plays a significant role in procurement planning of each factory. Agricultural implements industry is one of the industries included in this sensitivity. Thus, in this paper a supplier selection framework for this industry is considered. For this purpose, a strong approach, namely best worst method (BWM) along with a well-known MCDM technique with the name of VIKOR are employed. At first, the criteria with a view to the literature review and opinions of industry experts are identified. Afterward weights of the criteria are obtained by BWM and then candidate suppliers are ranked by using BWM and VIKOR. In order to check the quality of expert's inputs, the consistency tests are applied. Moreover, to investigate the robustness of the approach sensitivity analysis is considered. Finally, according to the obtained results, it is clear that proposed framework could be effective like as existing approaches for supplier selection problems. Also, agricultural managers implementing industries need simple methodologies to select the proper suppliers and improve their situation.","PeriodicalId":216414,"journal":{"name":"Int. J. Appl. Decis. Sci.","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128061661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Constrains optimal propagation-based modified semi-supervised spectral clustering for large-scale data 约束基于最优传播的改进半监督谱聚类的大规模数据
Int. J. Appl. Decis. Sci. Pub Date : 2018-06-30 DOI: 10.1504/IJADS.2018.10010706
Dayu Xu, Xuyao Zhang, Jiaqi Huang, Hailin Feng
{"title":"Constrains optimal propagation-based modified semi-supervised spectral clustering for large-scale data","authors":"Dayu Xu, Xuyao Zhang, Jiaqi Huang, Hailin Feng","doi":"10.1504/IJADS.2018.10010706","DOIUrl":"https://doi.org/10.1504/IJADS.2018.10010706","url":null,"abstract":"We focus on the problem of high computational complexity in the clustering process of traditional spectral clustering algorithm that cannot satisfy the requirement of current large-scale data clustering applications. In this article, we establish a constrained optimal propagation based semi-supervised large-scale data clustering model. In this model, micro similarity matrix is constructed by using prior dotted pair constraint information at first. On this basis, the Gabow algorithm is exploited to extract each strongly connected component from the micro similarity matrix that is represented by its connected graph. Then, a new constrained optimisation propagation algorithm for each strongly connected component is proposed to calculate the similarity of the whole dataset. Finally, we employ the singular value decomposition and the accelerated k-means algorithm to obtain the clustering results of large-scale data. Experiments on multiple standard testing datasets show that compared with other previous research results in this field, the proposed clustering model has higher clustering accuracy and lower computation complexity, and is more suitable for large-scale data clustering applications.","PeriodicalId":216414,"journal":{"name":"Int. J. Appl. Decis. Sci.","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123222430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel approach for mining probabilistic frequent itemsets over uncertain data streams 一种挖掘不确定数据流上概率频繁项集的新方法
Int. J. Appl. Decis. Sci. Pub Date : 2018-06-30 DOI: 10.1504/IJADS.2018.10010708
Tian-Tian Li, Fang’ai Liu, Xinhua Wang
{"title":"A novel approach for mining probabilistic frequent itemsets over uncertain data streams","authors":"Tian-Tian Li, Fang’ai Liu, Xinhua Wang","doi":"10.1504/IJADS.2018.10010708","DOIUrl":"https://doi.org/10.1504/IJADS.2018.10010708","url":null,"abstract":"With the growing popularity of internet of things (IoT) and pervasive computing, a large amount of uncertain data has been collected. Frequent itemsets mining has attracted much attention in database and data mining communities. Current methods exists some disadvantages, such as inaccurate, low efficiency, etc. To address this problem, we propose a novel approach, called uncertain pattern-slide window algorithm (UP-SW) is presented. In this algorithm, a new tree structure called USFP-tree is designed to save the redeveloped header table; the model of slide-window is adopted into the renewal process of mining result. The USFP-tree is structured based on dynamic array (ARRAY) and link information (LINK), as the slide-window slides, the mining result saved in USFP-tree is refreshed. The probabilistic frequent itemsets are obtained by traversing the final ARRAY of header table. Experimental results and theoretical analysis show that UP-SW has better performance than several other UP algorithms, especially on the mining efficiency and reducing the memory usage.","PeriodicalId":216414,"journal":{"name":"Int. J. Appl. Decis. Sci.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125593424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Resource optimisation and fault detection algorithms for cloud computing platforms based on SVM and resource reserve strategy 基于支持向量机和资源预留策略的云计算平台资源优化与故障检测算法
Int. J. Appl. Decis. Sci. Pub Date : 2018-06-30 DOI: 10.1504/IJADS.2018.10011764
Xilong Qu, S. Patnaik
{"title":"Resource optimisation and fault detection algorithms for cloud computing platforms based on SVM and resource reserve strategy","authors":"Xilong Qu, S. Patnaik","doi":"10.1504/IJADS.2018.10011764","DOIUrl":"https://doi.org/10.1504/IJADS.2018.10011764","url":null,"abstract":"Efficient operation of cloud computing platforms depends on the optimised virtual resources and faster fault diagnosis system of the virtual machines. This paper proposes an algorithm by introducing a virtual machines based on elastic reservation mechanism, which can improve the availability of cloud resources through the demand analysis taking the help of support vector machines which has advantages resolving nonlinear and high dimensional classification problems. Secondly it adopts the anomaly detection algorithm based on support vector machines for failure analysis. In addition, the dimensionality problem can be sorted out by means of principal component analysis (PCA) algorithm and a kernel function used for distance measurement. It establishes the topological structure for the image set of feature space with Delaunay triangulation and analyses the relationship between kernel parameter and regulator, in order to build an effective model.","PeriodicalId":216414,"journal":{"name":"Int. J. Appl. Decis. Sci.","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128027698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An initiative network defence strategy based on game theory 基于博弈论的主动网络防御策略
Int. J. Appl. Decis. Sci. Pub Date : 2018-04-11 DOI: 10.1504/IJADS.2018.10010637
Qian-Yi Zhao, Jun Dong
{"title":"An initiative network defence strategy based on game theory","authors":"Qian-Yi Zhao, Jun Dong","doi":"10.1504/IJADS.2018.10010637","DOIUrl":"https://doi.org/10.1504/IJADS.2018.10010637","url":null,"abstract":"Traditional network safety evaluation only takes into account the attackers' measures to system threat and it lacks initiative defence strategies. To provide an overall and comprehensive analysis on security status of the network, this paper proposes an initiative network system defence strategy based on game theory. The scheme considers possible attack strategies and defence strategies to establish game strategy graph according to the dependency relationship among host vulnerabilities of network. Further, it puts forward a attack-defence game model with double roles and non-cooperation, defining payoff function on both sides. Then the model designs corresponding defence strategy search algorithm to provide a novel method to reflect real-time and scientific security situation evaluation intuitively. It computes the benefits of both sides to find a balance point and provides the optimal defence measure of defenders. The simulation results show that our strategy is more in line with the actual situation than traditional methods with unilateral evaluation on single side. The model can also rapidly respond to network system and it is feasible to improve the network security defence status.","PeriodicalId":216414,"journal":{"name":"Int. J. Appl. Decis. Sci.","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130262713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Task scheduling optimisation algorithm based on load balance under the cloud computing environment 云计算环境下基于负载均衡的任务调度优化算法
Int. J. Appl. Decis. Sci. Pub Date : 2018-04-11 DOI: 10.1504/IJADS.2018.10010707
Shibiao Mu
{"title":"Task scheduling optimisation algorithm based on load balance under the cloud computing environment","authors":"Shibiao Mu","doi":"10.1504/IJADS.2018.10010707","DOIUrl":"https://doi.org/10.1504/IJADS.2018.10010707","url":null,"abstract":"In order to achieve an optimal task scheduling scheme with the constraint of load balance in cloud computing platform. We utilise the CloudSim simulator to construct the cloud computing environment, and CloudSim contains three components: 1) CloudSim core simulation engine; 2) CloudSim basic structure; 3) user codes. Afterwards, we propose a novel load balancing oriented task scheduling optimisation algorithm based on genetic algorithm, and task assignment results are obtained through analysing gene values of chromosomes. In order to ensure convergence rate in genetic algorithm, we design the fitness function by integrating computation time and computation cost together. Furthermore, we design adaptive crossover and mutation operations to promote the search efficiency. Finally, we conduct an experiment to demonstrate the performance of the proposed algorithm. The experimental results show that the proposed algorithm can achieve the goal of high level of load balance with lower calculation time and cost.","PeriodicalId":216414,"journal":{"name":"Int. J. Appl. Decis. Sci.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134487156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fuzzy evaluation mechanism of trust chain under embedded trusted computing 嵌入式可信计算下的信任链模糊评价机制
Int. J. Appl. Decis. Sci. Pub Date : 2018-04-11 DOI: 10.1504/IJADS.2018.10008974
Li Gang
{"title":"Fuzzy evaluation mechanism of trust chain under embedded trusted computing","authors":"Li Gang","doi":"10.1504/IJADS.2018.10008974","DOIUrl":"https://doi.org/10.1504/IJADS.2018.10008974","url":null,"abstract":"This paper proposes a trust chain evaluation mechanism based on fuzzy theory under embedded trusted computing. Firstly, this method described the trusted computing, the trusted computing platform, embedded system, which showed the important position of the trust chain in dependable computing. Then, in the process of the entity evaluation of trust chain, according to the influencing factors of trust chain in the trusted computing, considering the indirect trust degree, completed the establishment of evaluation method of trusted computing model based on the fuzzy set theory. Finally, combined the fuzzy logic inference with the trust transitivity, we proposed a trust chain evaluation mechanism based on similarity, and introduced the time decay function and adaptive weight coefficient to give the trust updating model. Simulation experiment shows that the proposed method can effectively improve the reliability of trust chain evaluation in embedded trusted computing, which has good application value.","PeriodicalId":216414,"journal":{"name":"Int. J. Appl. Decis. Sci.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121175864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信