International Journal of Knowledge-Based and Intelligent Engineering Systems最新文献

筛选
英文 中文
On the optimal multi-objective design of fractional order PID controller with antlion optimization 用蚂蚁雄兵优化分数阶 PID 控制器的多目标优化设计
IF 0.6
Mangal Singh, Mahesh Singh, Shimpy Ralhan, Apoorva Shastri
{"title":"On the optimal multi-objective design of fractional order PID controller with antlion optimization","authors":"Mangal Singh, Mahesh Singh, Shimpy Ralhan, Apoorva Shastri","doi":"10.3233/kes-230176","DOIUrl":"https://doi.org/10.3233/kes-230176","url":null,"abstract":"This study introduces an optimal multi-objective design approach for a robust multimachine Fractional Order PID Controller (FOPID) using the Antlion algorithm. The research focuses on the need for effective stabilizers in multimachine power systems by employing traditional speed-based lead-lag FOPID controllers. The study formulates a multi-objective problem, optimizing the damping factor and damping ratio of lightly damped electromechanical modes to maximize a composite set of objective functions, tackled through the Antlion algorithm. Stability analysis of Single-Machine Infinite-Bus (SMIB) and multimachine power systems is conducted based on rotor speed and power deviation minimization in the time domain response, along with damping ratio and eigenvalue analysis. The proposed approach is implemented and tested on three IEEE test cases, showcasing significant improvements in stability through the reduction of maximum overshoot (Mp) and settling time (ts) of speed deviation. Comparative analysis with other optimization-based FOPID controllers underscores the superiority of the proposed approach in enhancing stability in multimachine power systems. The main impact of this research lies in its contribution to the advancement of stability enhancement techniques in multimachine power systems, offering a systematic framework for optimal FOPID controller design and empowering decision-making processes in power engineering.","PeriodicalId":44076,"journal":{"name":"International Journal of Knowledge-Based and Intelligent Engineering Systems","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141837885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Eternal 1-security number of a fuzzy graph with level J 等级为 J 的模糊图的永恒 1 安全数
IF 0.6
Mary Jiny D, G. Navamani, R. Shanmugapriya, Raman Kumar, Željko Stević, Rajender Kumar, Sandeep Kumar
{"title":"Eternal 1-security number of a fuzzy graph with level J","authors":"Mary Jiny D, G. Navamani, R. Shanmugapriya, Raman Kumar, Željko Stević, Rajender Kumar, Sandeep Kumar","doi":"10.3233/kes-240290","DOIUrl":"https://doi.org/10.3233/kes-240290","url":null,"abstract":"The eternal 1-secure set, strategically protects graphical structures against attacks by placing sentinels within dominating sets. This study adapts this concept to real-world scenarios, like emergency response systems, by addressing challenges such as roadblocks and traffic congestion. We introduce the secure set and the eternal 1-secure set for fuzzy graphs based on edge membership levels J. Our analysis examines the relationship between the security number of a fuzzy graph G at level J and the domination number of its spanning subgraph at level J, demonstrating the potential of the eternal 1-secure set to enhance security measures in dynamic environments.","PeriodicalId":44076,"journal":{"name":"International Journal of Knowledge-Based and Intelligent Engineering Systems","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141838394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interval type-2 fuzzy approach for retinopathy detection in fundus images 用区间-2 型模糊方法检测眼底图像中的视网膜病变
IF 0.7
A. Ashir
{"title":"Interval type-2 fuzzy approach for retinopathy detection in fundus images","authors":"A. Ashir","doi":"10.3233/kes-230443","DOIUrl":"https://doi.org/10.3233/kes-230443","url":null,"abstract":"In the manuscript, an automatic approach for analysis and detection of various stages of retinopathy defects in human eyes has been proposed. The approach consists of a robust preprocessing technique of the retina fundus image to mitigate the effects of noise and poor lightening in the image. To realize a compressive analysis of the defects, methods for extracting blood vessels and optic disc in the fundus image has also been developed. Adaptive Histogram Equalization (AHE), median filtering and Connected Component Analysis techniques were used in separating blood vessels and optic disc from each fundus image. The pre-processing utilizes canny edge detection and Morphological Closing on the fundus image. An interval type-2 fuzzy (IT2F) clustering is applied to segments an input image into four clusters. These four clusters from the fuzzy segmentation are further analyzed to extract various stages of retinopathy abnormalities (e.g., Hemorrhage, hard exudates etc.). The extracted blood vessels and optic disc are removed from the analysis to enhance the defects detection process. Experiments were conducted on DIARETDB1 database. The experimental results obtained are validated using the ground-truth images contained in DIARETDB1 database. Impressive results are recorded throughout the experiment. Hard-Exudates and Hemorrhage were detected from the fundus images and results from similarity indexes such as, accuracy (94.11%) sensitivity (93.03%) and specificity (98.45%) were recorded.","PeriodicalId":44076,"journal":{"name":"International Journal of Knowledge-Based and Intelligent Engineering Systems","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141127272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast retrieval of multi-modal embeddings for e-commerce applications 为电子商务应用快速检索多模态嵌入信息
IF 0.7
Alessandro Abluton, Daniele Ciarlo, Luigi Portinale
{"title":"Fast retrieval of multi-modal embeddings for e-commerce applications","authors":"Alessandro Abluton, Daniele Ciarlo, Luigi Portinale","doi":"10.3233/kes-240006","DOIUrl":"https://doi.org/10.3233/kes-240006","url":null,"abstract":"In this paper, we introduce a retrieval framework designed for e-commerce applications, which employs a multi-modal approach to represent items of interest. This approach incorporates both textual descriptions and images of products, alongside a locality-sensitive hashing (LSH) indexing scheme for rapid retrieval of potentially relevant products. Our focus is on a data-independent methodology, where the indexing mechanism remains unaffected by the specific dataset, while the multi-modal representation is learned beforehand. Specifically, we utilize a multi-modal architecture, CLIP, to learn a latent representation of items by combining text and images in a contrastive manner. The resulting item embeddings encapsulate both the visual and textual information of the products, which are then subjected to various types of LSH for balancing between result quality and retrieval speed. We present the findings of our experiments conducted on two real-world datasets sourced from e-commerce platforms, comprising both product images and textual descriptions. Promising results have been achieved, demonstrating favorable retrieval time and average precision. These results were obtained through testing the approach with a specifically selected set of queries and with synthetic queries generated using a Large Language Model.","PeriodicalId":44076,"journal":{"name":"International Journal of Knowledge-Based and Intelligent Engineering Systems","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141127579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DeepGAN: Utilizing generative adversarial networks for improved deep learning DeepGAN:利用生成对抗网络改进深度学习
IF 0.7
E. V, Jenefa A, Thiyagu T.M, Lincy A, Antony Taurshia
{"title":"DeepGAN: Utilizing generative adversarial networks for improved deep learning","authors":"E. V, Jenefa A, Thiyagu T.M, Lincy A, Antony Taurshia","doi":"10.3233/kes-230326","DOIUrl":"https://doi.org/10.3233/kes-230326","url":null,"abstract":"In the realm of deep learning, Generative Adversarial Networks (GANs) have emerged as a topic of significant interest for their potential to enhance model performance and enable effective data augmentation. This paper addresses the existing challenges in synthesizing high-quality data and harnessing the capabilities of GANs for improved deep learning outcomes. Unlike traditional approaches that heavily rely on manually engineered data augmentation techniques, our work introduces a novel framework that leverages DeepGANs to autonomously generate diverse and high-fidelity data. Our experiments encompass a diverse spectrum of datasets, including images, text, and time series data. In the context of image classification tasks, we conduct experiments on the widely recognized CIFAR-10 dataset, which consists of 50,000 image samples. Our results demonstrate the remarkable efficacy of DeepGANs in enhancing model performance across various data domains. Notably, in image classification using the CIFAR-10 dataset, our innovative approach achieves an impressive accuracy of 97.2%. This represents a substantial advancement beyond conventional CNN models, underscoring the profound impact of DeepGANs in the realm of deep learning. In summary, this research sheds light on DeepGANs as a fundamental component in the pursuit of enhanced deep learning performance. Our framework not only overcomes existing limitations but also heralds a new era of data augmentation, with generative adversarial networks leading the way. The attainment of an accuracy rate of 97.2% on CIFAR-10 serves as a compelling testament to the transformative potential of DeepGANs, solidifying their pivotal role in the future of deep learning. This promises the development of more robust, adaptive, and accurate models across a myriad of applications, marking a significant contribution to the field.","PeriodicalId":44076,"journal":{"name":"International Journal of Knowledge-Based and Intelligent Engineering Systems","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141127377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advanced CoCoSo method for uncertain MAGDM: Evaluating college students’ entrepreneurial skills 针对不确定 MAGDM 的高级 CoCoSo 方法:评估大学生的创业技能
IF 0.7
Lijun Li, Zhuolin Xiao
{"title":"Advanced CoCoSo method for uncertain MAGDM: Evaluating college students’ entrepreneurial skills","authors":"Lijun Li, Zhuolin Xiao","doi":"10.3233/kes-230096","DOIUrl":"https://doi.org/10.3233/kes-230096","url":null,"abstract":"With the in-depth implementation of the innovative development-driven strategy of “mass innovation and entrepreneurship” put forward by the state, colleges and universities, as the main positions for cultivating innovative and entrepreneurial talents, have set up a multi-level and all-round training system for college students’ innovative and entrepreneurial ability according to the relevant policies and implementation opinions of the state for deepening innovation and entrepreneurship education in colleges and universities, and actively promoted the improvement of college students’ innovative and entrepreneurial ability. The college students’ innovation and entrepreneurship ability evaluation could be regarded as the classical multiple attribute group decision making (MAGDM) issue. The PULTSs could well depict uncertain information during the college students’ innovation and entrepreneurship ability evaluation and the combined compromise solution (CoCoSo) method is appropriate to stable the decision-making results. In this paper, the probabilistic uncertain linguistic combined compromise solution (PUL-CoCoSo) method based on the probabilistic uncertain linguistic sets (PULTSs) and combined compromise solution method is proposed for multiple attribute group decision making (MAGDM). The weights of attribute based on the CRITIC method are obtained under PULTSs. Finally, an application related to the college students’ innovation and entrepreneurship ability evaluation is utilized to demonstrate the usage of the developed algorithms.","PeriodicalId":44076,"journal":{"name":"International Journal of Knowledge-Based and Intelligent Engineering Systems","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140243558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LogTODIM framework for MAGDM with neutrosophic sets: Energy conservation and emission reduction case 中性集 MAGDM 的 LogTODIM 框架:节能减排案例
IF 0.7
Pan Jiang
{"title":"LogTODIM framework for MAGDM with neutrosophic sets: Energy conservation and emission reduction case","authors":"Pan Jiang","doi":"10.3233/kes-230076","DOIUrl":"https://doi.org/10.3233/kes-230076","url":null,"abstract":"The significant acceleration of China’s urbanization process has greatly promoted economic development. At the same time, the massive construction of urban buildings has also caused many problems such as environmental pollution and increased energy consumption. Therefore, in architectural design, it is particularly important to pay attention to the sustainable development of the environment, handle the relationship between good people and nature under the guidance of the concept of green development, and focus on the recycling of resources. Focusing on resource utilization in architectural design and based on certain planning can better control the construction process of urban buildings, save energy consumption, reduce construction costs, and contribute to the green development of cities. The comprehensive evaluation of energy conservation and emission reduction of construction projects is a classical MAGDM problems. Recently, the Logarithmic TODIM (LogTODIM) method has been employed to cope with MAGDM issues. The single-valued neutrosophic sets (SVNSs) are used as a tool for characterizing uncertain information during the comprehensive evaluation of energy conservation and emission reduction of construction projects. In this paper, the single-valued neutrosophic number Logarithmic TODIM (SVNN-LogTODIM) method is built to solve the MAGDM under SVNSs. In the end, a numerical case study for comprehensive evaluation of energy conservation and emission reduction of construction projects is given to validate the proposed method.","PeriodicalId":44076,"journal":{"name":"International Journal of Knowledge-Based and Intelligent Engineering Systems","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140242928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced computer network security assessment through employing an integrated LogTODIM-TOPSIS technique under interval neutrosophic sets 通过采用区间中性集下的集成 LogTODIM-TOPSIS 技术加强计算机网络安全性评估
IF 0.7
Qiongqiong Sun, Longfei Yang
{"title":"Enhanced computer network security assessment through employing an integrated LogTODIM-TOPSIS technique under interval neutrosophic sets","authors":"Qiongqiong Sun, Longfei Yang","doi":"10.3233/kes-230239","DOIUrl":"https://doi.org/10.3233/kes-230239","url":null,"abstract":"In the context of the development of the new era, computer network technology has become an indispensable and important technological means in people’s daily work and life. Through network technology, information resources can be collected, integrated, processed, and applied, thereby improving information analysis and mining capabilities, constructing big data environments for various industries, providing convenient and fast intelligent information services, and promoting social transformation and development. However, in practical development, network security issues seriously affect information security and social stability, and computer viruses and hackers pose a huge threat to computer systems. The computer network security evaluation is the MAGDM problems. Recently, the Logarithmic TODIM (LogTODIM) and TOPSIS technique has been utilized to cope with MAGDM issues. The interval neutrosophic sets (INSs) are utilized as a technique for characterizing uncertain information during the computer network security evaluation. In this paper, the interval neutrosophic number Logarithmic TODIM-TOPSIS (INN-LogTODIM-TOPSIS) technique is conducted to solve the MAGDM under INSs. Finally, a numerical case study for computer network security evaluation is utilized to validate the proposed technique. The prime contributions of this paper are put forward: (1) The entropy technique based on score values and accuracy value are conducted to obtain weight information under INSs; (2) an integrated INN-LogTODIM-TOPSIS technique is conducted to put forward the MAGDM issue; (3) An illustrative example for computer network security evaluation has been accomplished to put forward the INN-LogTODIM-TOPSIS technique.","PeriodicalId":44076,"journal":{"name":"International Journal of Knowledge-Based and Intelligent Engineering Systems","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140258201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on neural networks in computer network security evaluation and prediction methods 计算机网络安全评估和预测方法中的神经网络研究
IF 0.7
Hanyu Wei, Xu Zhao, Baolan Shi
{"title":"Research on neural networks in computer network security evaluation and prediction methods","authors":"Hanyu Wei, Xu Zhao, Baolan Shi","doi":"10.3233/kes-230407","DOIUrl":"https://doi.org/10.3233/kes-230407","url":null,"abstract":"Anomaly detection in networks to identify intrusions is a common and successful security measure used in many different types of network infrastructure. Network data traffic has increased due to the proliferation of viruses and other forms of cyber-attacks as network technology and applications have developed quickly. The limitations of classical intrusion detection, such as poor detection accuracy, high false negatives, and dependence on dimensionality reduction methods, become more apparent in the face of massive traffic volumes and characteristic information. That’s why IoT infrastructures often use Software-Defined Networking (SDN), allowing for better network adaptability and control. Hence, this paper’s convolutional neural network-based Security Evaluation Model (CNN-SEM) is proposed to secure the source SDN controller from traffic degradation and protect the source network from DDoS assaults. The proposed CNN-SEM system might defend against DDoS assaults once discovered by applying and testing a Convolutional Neural Network (CNN). The model can automatically extract the useful aspects of incursion samples, allowing for precise classification of such data. The detection and mitigation modules evaluate the proposed SDN security system’s performance, and the findings showed promise against next-generation DDoS assaults. The experimental results show the CNN-SEM achieves a high accuracy ratio of 96.6%, a detection ratio of 97.1%, precision ratio of 97.2%, a performance ratio of 95.1% and an enhanced security rate of 98.1% compared to other methods.","PeriodicalId":44076,"journal":{"name":"International Journal of Knowledge-Based and Intelligent Engineering Systems","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140267462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hellinger distance measures on Pythagorean fuzzy environment via their applications 毕达哥拉斯模糊环境上的海灵格距离度量及其应用
IF 0.7
Zhe Liu
{"title":"Hellinger distance measures on Pythagorean fuzzy environment via their applications","authors":"Zhe Liu","doi":"10.3233/kes-230150","DOIUrl":"https://doi.org/10.3233/kes-230150","url":null,"abstract":"Pythagorean fuzzy sets (PFSs) are a versatile tool for handling uncertain problems and have proven effective in practical applications. However, many existing Pythagorean fuzzy distance measures have counter-intuitive situations, making it challenging to measure the difference between PFSs accurately. To address this issue, we propose two distance measures for PFSs inspired by the Hellinger distance measure. We also explore the properties of the proposed measures and provide several comparative examples with existing measures for PFSs, illustrating their superior performance in processing fuzzy information from PFSs. Finally, we further develop a new decision-making method on top of the proposed measures and evaluate its performance in two applications.","PeriodicalId":44076,"journal":{"name":"International Journal of Knowledge-Based and Intelligent Engineering Systems","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140429699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信