14,207 research outputs found
Application of Fuzzy Cognitive Mapping in Livelihood Vulnerability Analysis
Feedback mechanisms are important in the analysis of vulnerability and resilience of social-ecological systems, as well as in the analysis of livelihoods, but how to evaluate systems with direct feedbacks has been a great challenge. We applied fuzzy cognitive mapping, a tool that allows analysis of both direct and indirect feedbacks and can be used to explore the vulnerabilities of livelihoods to identified hazards. We studied characteristics and drivers of rural livelihoods in the Great Limpopo Transfrontier Conservation Area in southern Africa to assess the vulnerability of inhabitants to the different hazards they face. The process involved four steps: (1) surveys and interviews to identify the major livelihood types; (2) description of specific livelihood types in a system format using fuzzy cognitive maps (FCMs), a semi-quantitative tool that models systems based on people’s knowledge; (3) linking variables and drivers in FCMs by attaching weights; and (4) defining and applying scenarios to visualize the effects of drought and changing park boundaries on cash and household food security. FCMs successfully gave information concerning the nature (increase or decrease) and magnitude by which a livelihood system changed under different scenarios. However, they did not explain the recovery path in relation to time and pattern (e.g., how long it takes for cattle to return to desired numbers after a drought). Using FCMs revealed that issues of policy, such as changing situations at borders, can strongly aggravate effects of climate change such as drought. FCMs revealed hidden knowledge and gave insights that improved the understanding of the complexity of livelihood systems in a way that is better appreciated by stakeholders
Recommended from our members
Advancing the state of the art in the modelling and simulation of information systems evaluation
It is widely accepted that Information Systems Evaluation (ISE) is a powerful and useful technique
that can be used to assess IT/IS investments in an a-priori or a-posteriori sense. Traditional
approaches to ISE have tended to centre upon financial and management accounting frameworks,
seeking to reconcile tangible and intangible costs, benefits, risks and value factors. Such techniques,
however, do not provide the IS researcher or practitioner with further insight or appreciation of any
inherent and implicit inter-relationships, in the investment justification process. Thus, this paper
outlines and discusses via a taxonomy and resulting classification, alternative and complementary
approaches that can be applied to ISE from the fields of Artificial Intelligence (AI), Operational
Research (OR) and Management Science (MS). The paper subsequently concludes that such
approaches can be potentially used by researchers and practitioners in the field, as a basis for
carrying out further research in the field of applied ISE
Recommended from our members
Knowledge dependencies in fuzzy information systems evaluation
Experience and research within the field of Information Systems Evaluation (ISE), has traditionally centered on providing tools and techniques for investment justification and appraisal, based upon explicit knowledge which encodes financial and other direct situational factors (such as accounting, costing and risk metrics). However, such approaches tend not to include additional causal interdependencies that are based upon tacit knowledge and are inherent within such a decision-making task. The authors show the results of applying a cognitive mapping approach, in the guise of a Fuzzy Cognitive Mapping (FCM) simulation, i.e. Fuzzy Information Systems Evaluation (F-ISE), in order to highlight the usefulness of applying such a technique. The authors highlight those contingent and necessary knowledge dependencies, in an exploratory sense, which relate to the investment appraisal decision-making task, in terms of the interplay between tacit and explicit knowledge, in this regard
Mapping knowledge management and organizational learning in support of organizational memory
The normative literature within the field of Knowledge Management has concentrated on techniques and methodologies for allowing knowledge to be codified and made available to individuals and groups within organizations. The literature on Organizational Learning however, has tended to focus on aspects of knowledge that are pertinent at the macro-organizational level (i.e. the overall business). The authors attempt in this paper to address a relative void in the literature, aiming to demonstrate the inter-locking factors within an enterprise information system that relate knowledge management and organizational learning, via a model that highlights key factors within such an inter-relationship. This is achieved by extrapolating data from a manufacturing organization using a case study, with these data then modeled using a cognitive mapping technique (Fuzzy Cognitive Mapping, FCM). The empirical enquiry explores an interpretivist view of knowledge, within an Information Systems Evaluation (ISE) process, through the associated classification of structural, interpretive and evaluative knowledge. This is achieved by visualizng inter-relationships within the ISE decision-making approach in the case organization. A number of decision paths within the cognitive map are then identified such that a greater understanding of ISE can be sought. The authors therefore present a model that defines a relationship between Knowledge Management (KM) and Organisational Learning (OL), and highlights factors that can lead a firm to develop itself towards a learning organization
Adding Contextual Information to Intrusion Detection Systems Using Fuzzy Cognitive Maps
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.In the last few years there has been considerable increase in the efficiency of Intrusion Detection Systems (IDSs). However, networks are still the victim of attacks. As the complexity of these attacks keeps increasing, new and more robust detection mechanisms need to be developed. The next generation of IDSs should be designed incorporating reasoning engines supported by contextual information about the network, cognitive information and situational awareness to improve their detection results. In this paper, we propose the use of a Fuzzy Cognitive Map (FCM) in conjunction with an IDS to incorporate contextual information into the detection process. We have evaluated the use of FCMs to adjust the Basic Probability Assignment (BPA) values defined prior to the data fusion process, which is crucial for the IDS that we have developed. The experimental results that we present verify that FCMs can improve the efficiency of our IDS by reducing the number of false alarms, while not affecting the number of correct detections
Recommended from our members
Applying a Fuzzy-Morphological approach to complexity within management decision-making
A survey of machine learning techniques applied to self organizing cellular networks
In this paper, a survey of the literature of the past fifteen years involving Machine Learning (ML) algorithms applied to self organizing cellular networks is performed. In order for future networks to overcome the current limitations and address the issues of current cellular systems, it is clear that more intelligence needs to be deployed, so that a fully autonomous and flexible network can be enabled. This paper focuses on the learning perspective of Self Organizing Networks (SON) solutions and provides, not only an overview of the most common ML techniques encountered in cellular networks, but also manages to classify each paper in terms of its learning solution, while also giving some examples. The authors also classify each paper in terms of its self-organizing use-case and discuss how each proposed solution performed. In addition, a comparison between the most commonly found ML algorithms in terms of certain SON metrics is performed and general guidelines on when to choose each ML algorithm for each SON function are proposed. Lastly, this work also provides future research directions and new paradigms that the use of more robust and intelligent algorithms, together with data gathered by operators, can bring to the cellular networks domain and fully enable the concept of SON in the near future
- …