Informatica最新文献

筛选
英文 中文
An Extended EDAS Approach Based on Cumulative Prospect Theory for Multiple Attributes Group Decision Making with Interval-Valued Intuitionistic Fuzzy Information 基于累积前景理论的扩展 EDAS 方法,适用于具有区间值直观模糊信息的多属性群体决策
IF 2.9 4区 计算机科学
Informatica Pub Date : 2024-03-15 DOI: 10.15388/24-infor547
Jing Wang, Qiang Cai, Guiwu Wei, Ningna Liao
{"title":"An Extended EDAS Approach Based on Cumulative Prospect Theory for Multiple Attributes Group Decision Making with Interval-Valued Intuitionistic Fuzzy Information","authors":"Jing Wang, Qiang Cai, Guiwu Wei, Ningna Liao","doi":"10.15388/24-infor547","DOIUrl":"https://doi.org/10.15388/24-infor547","url":null,"abstract":"The interval-valued intuitionistic fuzzy sets (IVIFSs), based on the intuitionistic fuzzy sets (IFSs), combine the classical decision method and its research and application is attracting attention. After a comparative analysis, it becomes clear that multiple classical methods with IVIFSs’ information have been applied to many practical issues. In this paper, we extended the classical EDAS method based on the Cumulative Prospect Theory (CPT) considering the decision experts (DEs)’ psychological factors under IVIFSs. Taking the fuzzy and uncertain character of the IVIFSs and the psychological preference into consideration, an original EDAS method, based on the CPT under IVIFSs (IVIF-CPT-EDAS) method, is created for multiple-attribute group decision making (MAGDM) issues. Meanwhile, the information entropy method is used to evaluate the attribute weight. Finally, a numerical example for Green Technology Venture Capital (GTVC) project selection is given, some comparisons are used to illustrate the advantages of the IVIF-CPT-EDAS method and a sensitivity analysis is applied to prove the effectiveness and stability of this new method.\u0000PDF  XML","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"69 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140149975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of Different Dispatching Rules and Heuristics in a Fully Automated Parking System 全自动停车系统中不同调度规则和启发式方法的性能评估
IF 2.9 4区 计算机科学
Informatica Pub Date : 2024-03-12 DOI: 10.15388/24-infor544
Nurhan Dudakli, Adil Baykasoğlu
{"title":"Performance Evaluation of Different Dispatching Rules and Heuristics in a Fully Automated Parking System","authors":"Nurhan Dudakli, Adil Baykasoğlu","doi":"10.15388/24-infor544","DOIUrl":"https://doi.org/10.15388/24-infor544","url":null,"abstract":"Conventional parking lots struggle to meet demand, prompting the rise of Fully Automated Parking Systems (FAPS), offering eco-friendly alternatives with advanced technology. However, operational challenges persist, especially in planning and scheduling. Real-time responsiveness necessitates dispatching rules and heuristics. This study comprehensively explores FAPS operational dynamics, assessing various rule combinations’ impact on customer wait times and system utilization. Utilizing a six-month MATLAB simulation, results favour the Nearest-Available-Slot (NAS) allocation rule coupled with First-Come-First-Served (FCFS) sequencing, emphasizing allocation’s pivotal role in system efficiency. Future research will refine allocation strategies to further optimize FAPS operational performance.\u0000PDF  XML","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"6 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140107208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Location Selection of Electric Vehicle Charging Stations Through Employing the Spherical Fuzzy CoCoSo and CRITIC Technique 通过球形模糊 CoCoSo 和 CRITIC 技术选择电动汽车充电站位置
IF 2.9 4区 计算机科学
Informatica Pub Date : 2024-03-08 DOI: 10.15388/24-infor545
Rong Yan, Yongguang Han, Huiyuan Zhang, Cun Wei
{"title":"Location Selection of Electric Vehicle Charging Stations Through Employing the Spherical Fuzzy CoCoSo and CRITIC Technique","authors":"Rong Yan, Yongguang Han, Huiyuan Zhang, Cun Wei","doi":"10.15388/24-infor545","DOIUrl":"https://doi.org/10.15388/24-infor545","url":null,"abstract":"Energy conservation and emission reduction are important policies vigorously promoted in China. With the continuous popularization of the concept of green transportation, electric vehicles have become a green transportation tool with good development prospects, greatly reducing the pressure on the environment and resources caused by rapid economic growth. The development status of electric vehicles has a significant impact on urban energy security, environmental protection, and sustainable development in China. With the widespread application of new energy vehicles, charging piles have become an important auxiliary infrastructure necessary for the development of electric vehicles. They have significant social and economic benefits, so it is imperative to build electric vehicle charging piles. There are many factors to consider in the scientific layout of electric vehicle charging stations, and the location selection problem of electric vehicle charging stations is a multiple-attribute group decision-making (MAGDM) problem. Recently, the Combined Compromise Solution (CoCoSo) technique and CRITIC technique have been utilized to deal with MAGDM issues. Spherical fuzzy sets (SFSs) can uncover the uncertainty and fuzziness in MAGDM more effectively and deeply. In this paper, on basis of CoCoSo technique, a novel spherical fuzzy number CoCoSo (SFN-CoCoSo) technique based on spherical fuzzy number cosine similarity measure (SFNCSM) and spherical fuzzy number Euclidean distance (SFNED) is conducted for dealing with MAGDM. Moreover, when the attribute weights are completely unknown, the CRITIC technique is extended to SFSs to acquire the attribute weights based on the SFNCSM and SFNED. Finally, the SFN-CoCoSo technique is utilized for location selection problem of electric vehicle charging stations to prove practicability of the developed technique and compare the SFN-CoCoSo technique with existing techniques to further demonstrate its superiority.\u0000PDF  XML","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"88 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140075590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leakage-Resilient Hybrid Signcryption in Heterogeneous Public-key Systems 异构公钥系统中的防泄漏混合签名加密
IF 2.9 4区 计算机科学
Informatica Pub Date : 2024-03-06 DOI: 10.15388/24-infor546
Ting-Chieh Ho, Yuh-Min Tseng, Sen-Shan Huang
{"title":"Leakage-Resilient Hybrid Signcryption in Heterogeneous Public-key Systems","authors":"Ting-Chieh Ho, Yuh-Min Tseng, Sen-Shan Huang","doi":"10.15388/24-infor546","DOIUrl":"https://doi.org/10.15388/24-infor546","url":null,"abstract":"Signcryption integrates both signature and encryption schemes into single scheme to ensure both content unforgeability (authentication) and message confidentiality while reducing computational complexity. Typically, both signers (senders) and decrypters (receivers) in a signcryption scheme belong to the same public-key systems. When signers and decrypters in a signcryption scheme belong to heterogeneous public-key systems, this scheme is called a hybrid signcryption scheme which provides more elastic usage than typical signcryption schemes. In recent years, a new kind of attack, named side-channel attack, allows adversaries to learn a portion of the secret keys used in cryptographic algorithms. To resist such an attack, leakage-resilient cryptography has been widely discussed and studied while a large number of leakage-resilient schemes have been proposed. Also, numerous hybrid signcryption schemes under heterogeneous public-key systems were proposed, but none of them possesses leakage-resilient property. In this paper, we propose the first hybrid signcryption scheme with leakage resilience, called leakage-resilient hybrid signcryption scheme, in heterogeneous public-key systems (LR-HSC-HPKS). Security proofs are demonstrated to show that the proposed scheme provides both authentication and confidentiality against two types of adversaries in heterogeneous public-key systems.\u0000PDF  XML","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"16 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140046999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MINI Element for the Navier–Stokes System in 3D: Vectorized Codes and Superconvergence 三维纳维-斯托克斯系统的 MINI 要素:矢量化代码和超融合
IF 2.9 4区 计算机科学
Informatica Pub Date : 2024-02-23 DOI: 10.15388/24-infor543
Radek Kučera, Vladimír Arzt, Jonas Koko
{"title":"MINI Element for the Navier–Stokes System in 3D: Vectorized Codes and Superconvergence","authors":"Radek Kučera, Vladimír Arzt, Jonas Koko","doi":"10.15388/24-infor543","DOIUrl":"https://doi.org/10.15388/24-infor543","url":null,"abstract":"A fast vectorized codes for assembly mixed finite element matrices for the generalized Navier–Stokes system in three space dimensions in the MATLAB language are proposed by the MINI element. Vectorization means that the loop over tetrahedra is avoided. Numerical experiments illustrate computational efficiency of the codes. An experimental superconvergence rate for the pressure component is established.\u0000PDF  XML","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"32 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139947844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shadow Minimization Boolean Function Reconstruction 阴影最小化布尔函数重构
IF 2.9 4区 计算机科学
Informatica Pub Date : 2024-02-14 DOI: 10.15388/24-infor542
Levon Aslanyan, Gyula Katona, Hasmik Sahakyan
{"title":"Shadow Minimization Boolean Function Reconstruction","authors":"Levon Aslanyan, Gyula Katona, Hasmik Sahakyan","doi":"10.15388/24-infor542","DOIUrl":"https://doi.org/10.15388/24-infor542","url":null,"abstract":"A special class of monotone Boolean functions coming from shadow minimization theory of finite set-systems – KK-MBF functions – is considered. These functions are a descriptive model for systems of compatible groups of constraints, however, the class of all functions is unambiguously complex and it is sensible to study relatively simple subclasses of functions such as KK-MBF. Zeros of KK-MBF functions correspond to initial segments of lexicographic order on hypercube layers. This property is used to simplify the recognition. Lexicographic order applies priorities over constraints which is applicable property of practices. Query-based algorithms for KK-MBF functions are investigated in terms of their complexities.\u0000PDF  XML","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"182 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139754790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing A Blockchain Approach to Secure Firefighting Stations Based Internet of Things 设计基于物联网的区块链消防站安全方法
IF 2.9 4区 计算机科学
Informatica Pub Date : 2023-12-24 DOI: 10.31449/inf.v47i10.5395
S. Yousiff, Ra'ad A. Muhajjar, Mishall Al-Zubaidie
{"title":"Designing A Blockchain Approach to Secure Firefighting Stations Based Internet of Things","authors":"S. Yousiff, Ra'ad A. Muhajjar, Mishall Al-Zubaidie","doi":"10.31449/inf.v47i10.5395","DOIUrl":"https://doi.org/10.31449/inf.v47i10.5395","url":null,"abstract":"","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"1987 4","pages":""},"PeriodicalIF":2.9,"publicationDate":"2023-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139160533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-dominated Sorting Genetic Optimization-based Fog Cloudlet Computing for Wireless Metropolitan Area Networks 基于非支配排序遗传优化的无线城域网雾小云计算
IF 2.9 4区 计算机科学
Informatica Pub Date : 2023-12-23 DOI: 10.31449/inf.v47i10.5118
A. S. Hashim, Wid Akeel Awadh, Mohammed S. Hashim
{"title":"Non-dominated Sorting Genetic Optimization-based Fog Cloudlet Computing for Wireless Metropolitan Area Networks","authors":"A. S. Hashim, Wid Akeel Awadh, Mohammed S. Hashim","doi":"10.31449/inf.v47i10.5118","DOIUrl":"https://doi.org/10.31449/inf.v47i10.5118","url":null,"abstract":"","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"13 2","pages":""},"PeriodicalIF":2.9,"publicationDate":"2023-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139161380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Referees of INFORMATICA Volume 34 第 34 卷 INFORMATICA 的推荐人
IF 2.9 4区 计算机科学
Informatica Pub Date : 2023-12-11 DOI: 10.15388/23-infor344re
{"title":"Referees of INFORMATICA Volume 34","authors":"","doi":"10.15388/23-infor344re","DOIUrl":"https://doi.org/10.15388/23-infor344re","url":null,"abstract":"PDF  XML","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"23 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138573004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A PSO-CNN-based approach for Enhancing Precision in Plant Leaf Disease Detection and Classification 基于 PSO-CNN 的植物叶病检测与分类精确度提升方法
IF 2.9 4区 计算机科学
Informatica Pub Date : 2023-12-09 DOI: 10.31449/inf.v47i9.5188
Ashish Gupta, Deepak Gupta, Mohammad Husain, Mohammad Nadeem Ahmed, Arshad Ali, Parveen Badoni
{"title":"A PSO-CNN-based approach for Enhancing Precision in Plant Leaf Disease Detection and Classification","authors":"Ashish Gupta, Deepak Gupta, Mohammad Husain, Mohammad Nadeem Ahmed, Arshad Ali, Parveen Badoni","doi":"10.31449/inf.v47i9.5188","DOIUrl":"https://doi.org/10.31449/inf.v47i9.5188","url":null,"abstract":"","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"11 12","pages":""},"PeriodicalIF":2.9,"publicationDate":"2023-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138585296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信