15 research outputs found

    A Novel Sequential Risk Assessment Model for Analyzing Commercial Aviation Accidents: Soft Computing Perspective

    Get PDF
    Due to the importance of the commercial aviation system and, also, the existence of countless accidents and unfortunate occurrences in this industry, there has been a need for a structured approach to deal with them in recent years. Therefore, this study presents a comprehensive and sequential model for analyzing commercial aviation accidents based on historical data and reports. The model first uses the failure mode and effects analysis (FMEA) technique to determine and score existing risks; then, the risks are prioritized using two multi-attribute decision making (MADM) methods and two novel and innovative techniques, including ranking based on intuitionistic fuzzy risk priority number and ranking based on the vague sets. These techniques are based in an intuitionistic fuzzy environment to handle uncertainties and the FMEA features. A fuzzy cognitive map is utilized to evaluate existing interactions among the risk factors, and additionally, various scenarios are implemented to analyze the role of each risk, group of risks, and behavior of the system in different conditions. Finally, the model is performed for a real case study to clarify its applicability and the two novel risk prioritization techniques. Although this model can be used for other similar complex transportation systems with adequate data, it is mainly employed to illustrate the most critical risks and for analyzing existing relationships among the concepts of the system

    A NCaRBS analysis of SME intended innovation: Learning about the Don’t Knows

    Get PDF
    This study demonstrates a novel form of business analytics, respecting the quality of the data available (allowing incompleteness in the data set), as well as engaging with the uncertainty in the considered outcome variable (inclusive of Don’t Know (DK) responses). The analysis employs the NCaRBS technique, based on the Dempster–Shafer theory of evidence, to investigate the relationship between Small and Medium-sized Enterprise (SME) characteristics and whether they intended to undertake future innovation. The allowed outcome response for intended innovation was either, Yes, No and DK, all of which are considered pertinent responses in this analysis. An additional consequence of the use of the NCaRBS technique is the ability to analyse an incomplete data set, with missing values in the characteristic variables considered, without the need to manage their presence. From a soft computing perspective, this study demonstrates just how exciting the business analytics field of study can be in terms of pushing the bounds of the ability to handle real ‘incomplete’ business data which has real, and sometimes uncertain, outcomes. Further, the findings also inform how different notions of ignorance in evidence are accounted for in such analysis

    IMPROVED EVOLUTIONARY SUPPORT VECTOR MACHINE CLASSIFIER FOR CORONARY ARTERY HEART DISEASE PREDICTION AMONG DIABETIC PATIENTS

    Get PDF
    Soft computing paves way many applications including medical informatics. Decision support system has gained a major attention that will aid medical practitioners to diagnose diseases. Diabetes mellitus is hereditary disease that might result in major heart disease. This research work aims to propose a soft computing mechanism named Improved Evolutionary Support Vector Machine classifier for CAHD risk prediction among diabetes patients. The attribute selection mechanism is attempted to build with the classifier in order to reduce the misclassification error rate of the conventional support vector machine classifier. Radial basis kernel function is employed in IESVM. IESVM classifier is evaluated through the performance metrics namely sensitivity, specificity, prediction accuracy and Matthews correlation coefficient (MCC) and also compared with existing work and our earlier proposed works

    Feature Selection with IG-R for Improving Performance of Intrusion Detection System

    Get PDF
    As the popularity of the internet computer continued to grow and become an indispensable in human life, the security of computer network has become an important issue in computer security field. The Intrusion Detection System (IDS) is a system used in computer security for network security. The feature selection stage of IDS is considered to be the most critical stage in IDS. This stage is very costly both in efforts and time. However, many machine learning approaches have been presented to improve this stage in order to improve the performance of an IDS. However, these approaches did not give desirable results with respect to the detection accuracy in the IDS. A novel technique is proposed in this paper combining the Information Gain and Ranker (IG+R) method as the feature selection strategy with Naïve Bayes (NB), Support Vector Machine (SVM) and K-Nearest Neighbor (KNN) as the classifiers. The performance of these IG+R-NB, IG+R-SVM, and IG+R-KNN was evaluated on NSLKDD dataset. The experimental results of our proposed method gave high accuracy and low false alarm rate. The results obtained was compared and benchmarked with existing works. The results of this paper outperformed the existing approaches in terms of the detection accuracy

    Pain and anxiety treatment based on social robot interaction with children to improve patient experience. Ongoing research

    Get PDF
    A major focus for children’s quality of life programs in hospitals is improving their experiences during procedures. In anticipation of treatment, children may become anxious and during procedures pain appears. The aim of this article is to introduce a proposal to design pioneering techniques based on the use of social robots to improve the patient experience by eliminating or minimizing pain and anxiety. According to this proposed challenge, this research aims to design and develop specific human-social robot interaction with pet robots. Robot interactive behavior will be designed based on modular skills using soft-computing paradigms.Postprint (published version

    Important Features of CICIDS-2017 Dataset For Anomaly Detection in High Dimension and Imbalanced Class Dataset

    Get PDF
    The growth in internet traffic volume presents a new issue in anomaly detection, one of which is the high data dimension. The feature selection technique has been proven to be able to solve the problem of high data dimension by producing relevant features. On the other hand, high-class imbalance is a problem in feature selection. In this study, two feature selection approaches are proposed that are able to produce the most ideal features in the high-class imbalanced dataset. CICIDS-2017 is a reliable dataset that has a problem in high-class imbalance, therefore it is used in this study. Furthermore, this study performs experiments in Information Gain feature selection technique on the imbalance class datasaet. For validation, the Random Forest classification algorithm is used, because of its ability to handle multi-class data. The experimental results show that the proposed approaches have a very surprising performance, and surpass the state-of-the-art methods

    A local feature engineering strategy to improve network anomaly detection

    Get PDF
    The dramatic increase in devices and services that has characterized modern societies in recent decades, boosted by the exponential growth of ever faster network connections and the predominant use of wireless connection technologies, has materialized a very crucial challenge in terms of security. The anomaly-based intrusion detection systems, which for a long time have represented some of the most efficient solutions to detect intrusion attempts on a network, have to face this new and more complicated scenario. Well-known problems, such as the difficulty of distinguishing legitimate activities from illegitimate ones due to their similar characteristics and their high degree of heterogeneity, today have become even more complex, considering the increase in the network activity. After providing an extensive overview of the scenario under consideration, this work proposes a Local Feature Engineering (LFE) strategy aimed to face such problems through the adoption of a data preprocessing strategy that reduces the number of possible network event patterns, increasing at the same time their characterization. Unlike the canonical feature engineering approaches, which take into account the entire dataset, it operates locally in the feature space of each single event. The experiments conducted on real-world data showed that this strategy, which is based on the introduction of new features and the discretization of their values, improves the performance of the canonical state-of-the-art solutions

    Solar Energy Validation for Strategic Investment Planning via Comparative Data Mining Methods: An Expanded Example within the Cities of Turkey

    Get PDF
    Energy supply together with the data management is one of the key challenges of our century. Specifically, to decrease the climate change effects as energy requirement increases day by day poses a serious dilemma. It can be adequately reconciled with innovative data management in (renewable) energy technologies. The new environmental-friendly planning methods and investments that are discussed by researchers, governments, NGOs, and companies will give the basic and most important variables in shaping the future. We use modern data mining methods (SOM and K-Means) and official governmental statistics for clustering cities according to their consumption similarities, the level of welfare, and growth rate and compare them with their potential of renewable resources with the help of Rapid Miner 5.1 and MATLAB software. The data mining was chosen to make the possible secret relations visible within the variables that can be unpredictable at first sight. Here, we aim to see the success level of the chosen algorithms in validation process simultaneously with the utilized software. Additionally, we aim to improve innovative approach for decision-makers and stakeholders about which renewable resource is the most suitable for an exact region by taking care of different variables at the same time

    A taxonomy and survey of intrusion detection system design techniques, network threats and datasets

    Get PDF
    With the world moving towards being increasingly dependent on computers and automation, one of the main challenges in the current decade has been to build secure applications, systems and networks. Alongside these challenges, the number of threats is rising exponentially due to the attack surface increasing through numerous interfaces offered for each service. To alleviate the impact of these threats, researchers have proposed numerous solutions; however, current tools often fail to adapt to ever-changing architectures, associated threats and 0-days. This manuscript aims to provide researchers with a taxonomy and survey of current dataset composition and current Intrusion Detection Systems (IDS) capabilities and assets. These taxonomies and surveys aim to improve both the efficiency of IDS and the creation of datasets to build the next generation IDS as well as to reflect networks threats more accurately in future datasets. To this end, this manuscript also provides a taxonomy and survey or network threats and associated tools. The manuscript highlights that current IDS only cover 25% of our threat taxonomy, while current datasets demonstrate clear lack of real-network threats and attack representation, but rather include a large number of deprecated threats, hence limiting the accuracy of current machine learning IDS. Moreover, the taxonomies are open-sourced to allow public contributions through a Github repository
    corecore