Fuzzy Systems and Data Mining VI - Frontiers in Artificial Intelligence and Applications
Latest Publications


TOTAL DOCUMENTS

76
(FIVE YEARS 76)

H-INDEX

0
(FIVE YEARS 0)

Published By IOS Press

9781643681344, 9781643681351

Author(s):  
Yu-e Bao ◽  
Tingting Li ◽  
Linfen Zhang

This paper discusses the gH-directional differentiability of fuzzy mappings, and proposes the concept of gH-directional differentiability of fuzzy mappings. Based on the concept of gH-directional differentiability of interval-valued mappings and its related properties, two properties of gH-directional differentiability fuzzy mappings are proposed. At the same time, the relation between gH-differentiability and gH-directional differentiability for a fuzzy mapping is discussed, and it is proved that both gH-derivative and gH-partial derivative are directional derivatives of fuzzy mappings in the direction of the coordinate axis.


Author(s):  
Segundo Moisés Toapanta Toapanta ◽  
Ingrid Lilibeth Tacuri López ◽  
Luis Enrique Mafla Gallegos

Cyberbullying is a critical issue in society worldwide, however in Ecuador is not given necessary importance to mitigate this cybercrime. It has been proposed to develop an exhaustive analysis of the laws that are currently considered to sanction cyberbullying when denouncing this fact. The deductive method and exploratory research were employed to make the analysis of the information consulted from the various sources that are obtained on the network about the topic discussed. The investigation revealed how cyberbullying cases arise, from which it is obtained that only 0.07% have been reported, with this result it can be deduced that the number of reported cases is very low in relation to the total number of cellphones activated in Ecuador and people who may be victims of this cyber-crime. In addition, a “Criminal Process Diagram” was obtained that determines the sequence of how the judicial process work. The applied method resulted the following: Can be created a law project that battles each type of derived cyberbullying. It was concluded that several institutions in Ecuador work together with organizations to prevent cyberbullying, however, when this happens, the laws are not enough to punish the act.


Author(s):  
Jing Yang ◽  
Quan Zhang ◽  
Kunpeng Liu ◽  
Peng Jin ◽  
Guoyi Zhao

In recent years, electricity big data has extensive applications in the grid companies across the provinces. However, certain problems are encountered including, the inability to generate an ideal model using the isolated data possessed by each company, and the priority concerns for data privacy and safety during big data application and sharing. In this pursuit, the present research envisaged the application of federated learning to protect the local data, and to build a uniform model for different companies affiliated to the State Grid. Federated learning can serve as an essential means for realizing the grid-wide promotion of the achievements of big data applications, while ensuring the data safety.


Author(s):  
Dušan Krokavec ◽  
Anna Filasová

The generalized interval observer design conditions for continuous-time Metzlerian Takagi-Sugeno systems are presented in the paper. Attention is focused on the analysis and design guaranteeing the asymptotic convergence of the interval observer error and positivity of interval observer state. The relationship between the nonnegativity of the observer gains and the corresponding positive observer state attractiveness is also shown. The method presented extends and generalizes the results that recently appeared in the literature.


Author(s):  
Liguo Fei ◽  
Yuqiang Feng

Belief function has always played an indispensable role in modeling cognitive uncertainty. As an inherited version, the theory of D numbers has been proposed and developed in a more efficient and robust way. Within the framework of D number theory, two more generalized properties are extended: (1) the elements in the frame of discernment (FOD) of D numbers do not required to be mutually exclusive strictly; (2) the completeness constraint is released. The investigation shows that the distance function is very significant in measuring the difference between two D numbers, especially in information fusion and decision. Modeling methods of uncertainty that incorporate D numbers have become increasingly popular, however, very few approaches have tackled the challenges of distance metrics. In this study, the distance measure of two D numbers is presented in cases, including complete information, incomplete information, and non-exclusive elements


Author(s):  
Dong Song

The reliable operation of coal mining machinery acts as an important guarantee for safe productions in underground coal mines. The status monitoring and fault diagnosis of traditional coal mining machinery mainly rely on threshold judgments. However, a single judgment condition and a long fault propagation chain can be found in the method of threshold judgments, which make it difficult to accurately seek the fault type. By using the data analysis of state parameters for coal mining machinery, fault parameters and propagation paths can be analyzed effectively. This paper takes the cutting unit of a certain type of bolter miners as an example, a static and dynamic numerical analysis method of the cutting unit of bolter miners are established by virtue of FTA-Petri net models and BP-Firefly neural networks, which can provide a new perspective for fault diagnosis of coal mining machinery.


Author(s):  
Alexey Slavikovsky ◽  
Olga Vladimirova ◽  
Manon Khusainov

The article is devoted to the current topic of choosing the optimal organizational option of multilateral integration of the scientific and educational sphere, business and the state in the process of globalization of the world economy. The authors justify the format of formation of scientific and educational complex on the basis of network interaction, which allows to obtain the greatest synergistic effect. In order to justify the effective network interaction of the scientific and educational complex, an analysis of existing methods of assessing the efficiency of its functioning was carried out and an author’s system of performance indicators and its assessment was proposed in accordance with the general purpose of the integration mechanism and the specific purpose of each interaction subject. The model contains a system of heterogeneous indicators reflecting the principles of formation of a scientific and educational complex on the basis of network interaction, which allows, along with an evaluation task, to determine, using factor models, further directions of inter-network relations of subjects in order to better understand the current processes and identify problem areas of coordination of their innovative activity.


Author(s):  
Segundo Moisés Toapanta Toapanta ◽  
Yaritza Julieth Terán Terranova ◽  
Bertha Alice Naranjo Sánchez ◽  
Luis Enrique Mafla Gallegos

Security and privacy problems in information management are evident in public organizations. The objective of this research is the analisys risks that these organizations run, since computer attacks have increased along with both internal and external threats. Causing information and database thefts, there are risk analysis methodologies which are oriented to the objective for the preservation of guaranteeing the security and privacy of the information. Were used the deductive method and exploratory research to analyze the articles in the references and in the information available online and MAGERIT methodology what protects the information in its integrity, confidentiality and availability guaranteeing the security of the system and processes of public organizations. It turned out a Control of Security and Privacy factors, Threat Probability, Risk Assessment Formula, Prototype of Risk Management for Public Organizations and Privacy and security factor formula. It was concluded that MAGERIT is an alternative what allow mitigate the vulnerabilitys, threat and risks its processes in public organizations for protecting their information.


Author(s):  
A.V. Prosvetov

Widely used recommendation systems do not meet all industry requirements, so the search for more advanced methods for creating recommendations continues. The proposed new methods based on Generative Adversarial Networks (GAN) have a theoretical comparison with other recommendation algorithms; however, real-world comparisons are needed to introduce new methods in the industry. In our work, we compare recommendations from the Generative Adversarial Network with recommendation from the Deep Semantic Similarity Model (DSSM) on real-world case of airflight tickets. We found a way to train the GAN so that users receive appropriate recommendations, and during A/B testing, we noted that the GAN-based recommendation system can successfully compete with other neural networks in generating recommendations. One of the advantages of the proposed approach is that the GAN training process avoids a negative sampling, which causes a number of distortions in the final ratings of recommendations. Due to the ability of the GAN to generate new objects from the distribution of the training set, we assume that the Conditional GAN is able to solve the cold start problem.


Author(s):  
He Tan ◽  
Vladimir Tarasov ◽  
Vasileios Fourlakidis ◽  
Attila Dioszegi

For many industries, an understanding of the fatigue behavior of cast iron is important but this topic is still under extensive research in materials science. This paper offers fuzzy logic as a data-driven approach to address the challenge of predicting casting performance. However, data scarcity is an issue when applying a data-driven approach in this field; the presented study tackled this problem. Four fuzzy logic systems were constructed and compared in the study, two based solely upon experimental data and the others combining the same experimental data with data drawn from relevant literature. The study showed that the latter demonstrated a higher accuracy for the prediction of the ultimate tensile strength for cast iron.


Sign in / Sign up

Export Citation Format

Share Document