342 research outputs found

    Detecting and predicting the topic change of Knowledge-based Systems: A topic-based bibliometric analysis from 1991 to 2016

    Full text link
    © 2017 The journal Knowledge-based Systems (KnoSys) has been published for over 25 years, during which time its main foci have been extended to a broad range of studies in computer science and artificial intelligence. Answering the questions: “What is the KnoSys community interested in?” and “How does such interest change over time?” are important to both the editorial board and audience of KnoSys. This paper conducts a topic-based bibliometric study to detect and predict the topic changes of KnoSys from 1991 to 2016. A Latent Dirichlet Allocation model is used to profile the hotspots of KnoSys and predict possible future trends from a probabilistic perspective. A model of scientific evolutionary pathways applies a learning-based process to detect the topic changes of KnoSys in sequential time slices. Six main research areas of KnoSys are identified, i.e., expert systems, machine learning, data mining, decision making, optimization, and fuzzy, and the results also indicate that the interest of KnoSys communities in the area of computational intelligence is raised, and the ability to construct practical systems through knowledge use and accurate prediction models is highly emphasized. Such empirical insights can be used as a guide for KnoSys submissions

    SciTech News Volume 71, No. 1 (2017)

    Get PDF
    Columns and Reports From the Editor 3 Division News Science-Technology Division 5 Chemistry Division 8 Engineering Division Aerospace Section of the Engineering Division 9 Architecture, Building Engineering, Construction and Design Section of the Engineering Division 11 Reviews Sci-Tech Book News Reviews 12 Advertisements IEEE

    Cyber Security of Critical Infrastructures

    Get PDF
    Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods

    Soft Computing

    Get PDF
    Soft computing is used where a complex problem is not adequately specified for the use of conventional math and computer techniques. Soft computing has numerous real-world applications in domestic, commercial and industrial situations. This book elaborates on the most recent applications in various fields of engineering

    Zadeh's Centenary

    Get PDF
    This is the introductory paper in a special issue on fuzzy logic dedicated to the centenary of the birth of Lotfi A. Zadeh published by International Journal of Computers Communications & Control (IJCCC). In 1965, Lotfi A. Zadeh published in the journal „Information and Control” the article titled „Fuzzy sets”, which today reaches over 117 thousand citations. The total sum of citations for all his papers is above 253 thousand. Based on the notion of fuzzy sets, fuzzy logic and the concept of soft computing emerged, bringing extremely important implications to the field of Artificial Intelligence (AI). In 2017, I published, whith F.G. Filip and M.J. Manolescu, a 42-page long paper in the IJCCC about the life and masterwork of Lotfi A. Zadeh, from which I will use some information in this material [15]

    Uncertain Multi-Criteria Optimization Problems

    Get PDF
    Most real-world search and optimization problems naturally involve multiple criteria as objectives. Generally, symmetry, asymmetry, and anti-symmetry are basic characteristics of binary relationships used when modeling optimization problems. Moreover, the notion of symmetry has appeared in many articles about uncertainty theories that are employed in multi-criteria problems. Different solutions may produce trade-offs (conflicting scenarios) among different objectives. A better solution with respect to one objective may compromise other objectives. There are various factors that need to be considered to address the problems in multidisciplinary research, which is critical for the overall sustainability of human development and activity. In this regard, in recent decades, decision-making theory has been the subject of intense research activities due to its wide applications in different areas. The decision-making theory approach has become an important means to provide real-time solutions to uncertainty problems. Theories such as probability theory, fuzzy set theory, type-2 fuzzy set theory, rough set, and uncertainty theory, available in the existing literature, deal with such uncertainties. Nevertheless, the uncertain multi-criteria characteristics in such problems have not yet been explored in depth, and there is much left to be achieved in this direction. Hence, different mathematical models of real-life multi-criteria optimization problems can be developed in various uncertain frameworks with special emphasis on optimization problems

    Design and Evaluation of Ballast Water Management Systems using Modified and Hybridised Axiomatic Design Principles

    Get PDF
    There are two major motivations to this research. The first is based on the concerns raised at the International Maritime Organisation (IMO) MEPC 67 and 68 meetings regarding the capacity of some type-approved Ballast Water Management (BWM) Systems to meet the performance standard (D-2) of the BWM Convention at-all-times and in all conditions. The second is based on the reluctance expressed by some ship- owners to install the system onboard their ships as a Lloyd\u27s list survey suggested. In this work, an attempt was made to address these issues and concerns using a set of criteria stipulated in Regulation D-5.2 of the BWM Convention which provides the framework for reviewing and evaluating the practical concepts of managing ballast water, developing a conceptual model for managing ballast water and minimizing the contributions of human-error to BWM System performance by analyzing the associated operational human factors. Firstly, the design of a conceptual model of managing ballast water and the evaluation of some established practical concepts of BWM were achieved by using a suitable technique (Axiomatic Design or AD) which was selected via a robust procedure. The two axioms of Axiomatic Design (information and independence) were used to evaluate four different concepts of managing ballast water as well as develop a BWM Convention-compliant conceptual design matrix model respectively. Based on data collected from ballast water management experts, Post-loading Onshore Ballast Water Management System was shown to be the most appropriate ballast water management concept with respect to the Regulation D-5.2 set of criteria. This presents a paradigm shift in expert preference from traditional shipboard systems to onshore systems with respect to the IMO-criteria. The pathway for improved performance of the Convention-compliant design matrix was subsequently determined and prioritised using Sufield model of Altshuler\u27s theory of inventive problem solving (TRIZ). Lastly, a 5-step algorithm was developed to minimise operator errors in the BWM System’s operation. Fatigue and training were found to have the greatest impact on operator performance
    • …
    corecore